Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
8,200 | 8,200 | 15,886,514 | 2,425 | An avail comparator and method validates scheduled avail tones. The method includes receiving an automation playlist indicating at least one scheduled avail tone configured to be included in a broadcast. The method includes receiving a feed corresponding to the broadcast. The method includes receiving a signaling for each of the at least one scheduled avail tone based upon the automation playlist. The method includes determining whether the at least one scheduled avail tone was triggered in the broadcast based upon the corresponding signaling. | 1-20. (canceled) 21. A method, comprising:
receiving a return feed corresponding to a broadcast; comparing the return feed to a schedule of avail tones for the broadcast; and based on the comparing, determining whether the scheduled avail tones were properly triggered during the broadcast. 22. The method of claim 21, further comprising:
receiving a notification signaling when a scheduled avail tone has played. 23. The method of claim 22, further comprising:
determining whether a predetermined time has elapsed from receiving the signaling; and determining the scheduled avail tone was triggered properly when the signaling was received within the predetermined time. 24. The method of claim 21, further comprising:
generating an alert when a scheduled avail tone was not properly triggered. 25. The method of claim 21, further comprising:
generating a log including events corresponding to the presence or absence of properly triggered avail tones. 26. The method of claim 21, wherein the return feed includes a plurality of aggregated feeds. 27. The method of claim 21, wherein the avail tone is one of a cue tone, a Society of Cable Television Engineers (SCTE) 104 generated event, an application for a general purpose interface (GPI) signaling, an application for an AC3 encoder, an application for active format description (AFD) signaling, and an application for a V-Chip signaling. 28. A method, comprising:
receiving an automation playlist comprising at least one scheduled avail tone for a broadcast; and determining whether the at least one scheduled avail tone was played during a predetermined time span in the broadcast. 29. The method of claim 28, further comprising:
signaling a triggering of the at least one avail tone based on the automation playlist. 30. The method of claim 29, further comprising:
receiving a notification indicating the triggering of the at least one avail tone. 31. The method of claim 28, further comprising:
generating an alert when the at least one scheduled avail tone was not played during the predetermined time span. 32. The method of claim 28, further comprising:
generating a log including events corresponding to the presence or absence of properly triggered avail tones. 33. The method of claim 28, further comprising:
receiving a return feed corresponding to the broadcast, wherein the return feed includes a plurality of aggregated feeds. 34. The method of claim 28, wherein the avail tone is one of a cue tone, a Society of Cable Television Engineers (SCTE) 104 generated event, an application for a general purpose interface (GPI) signaling, an application for an AC3 encoder, an application for active format description (AFD) signaling, and an application for a V-Chip signaling. 35. A method, comprising:
monitoring a return feed of a broadcast; signaling a playing of at least one avail tone in the broadcast; comparing the playing of the at least one avail tone to a predetermined schedule of avail tones for the broadcast; and determining whether the at least one avail tone was triggered properly. 36. The method of claim 35, wherein the at least one avail tone was triggered properly when the signaling was received within a predetermined time. 37. The method of claim 36, further comprising:
generating an alert when a scheduled avail tone was not properly triggered. 38. The method of claim 37, further comprising:
generating a log including events corresponding to the presence or absence of properly triggered avail tones. 39. The method of claim 35, wherein the return feed includes a plurality of aggregated feeds. 40. The method of claim 35, wherein the avail tone is one of a cue tone, a Society of Cable Television Engineers (SCTE) 104 generated event, an application for a general purpose interface (GPI) signaling, an application for an AC3 encoder, an application for active format description (AFD) signaling, and an application for a V-Chip signaling. | An avail comparator and method validates scheduled avail tones. The method includes receiving an automation playlist indicating at least one scheduled avail tone configured to be included in a broadcast. The method includes receiving a feed corresponding to the broadcast. The method includes receiving a signaling for each of the at least one scheduled avail tone based upon the automation playlist. The method includes determining whether the at least one scheduled avail tone was triggered in the broadcast based upon the corresponding signaling.1-20. (canceled) 21. A method, comprising:
receiving a return feed corresponding to a broadcast; comparing the return feed to a schedule of avail tones for the broadcast; and based on the comparing, determining whether the scheduled avail tones were properly triggered during the broadcast. 22. The method of claim 21, further comprising:
receiving a notification signaling when a scheduled avail tone has played. 23. The method of claim 22, further comprising:
determining whether a predetermined time has elapsed from receiving the signaling; and determining the scheduled avail tone was triggered properly when the signaling was received within the predetermined time. 24. The method of claim 21, further comprising:
generating an alert when a scheduled avail tone was not properly triggered. 25. The method of claim 21, further comprising:
generating a log including events corresponding to the presence or absence of properly triggered avail tones. 26. The method of claim 21, wherein the return feed includes a plurality of aggregated feeds. 27. The method of claim 21, wherein the avail tone is one of a cue tone, a Society of Cable Television Engineers (SCTE) 104 generated event, an application for a general purpose interface (GPI) signaling, an application for an AC3 encoder, an application for active format description (AFD) signaling, and an application for a V-Chip signaling. 28. A method, comprising:
receiving an automation playlist comprising at least one scheduled avail tone for a broadcast; and determining whether the at least one scheduled avail tone was played during a predetermined time span in the broadcast. 29. The method of claim 28, further comprising:
signaling a triggering of the at least one avail tone based on the automation playlist. 30. The method of claim 29, further comprising:
receiving a notification indicating the triggering of the at least one avail tone. 31. The method of claim 28, further comprising:
generating an alert when the at least one scheduled avail tone was not played during the predetermined time span. 32. The method of claim 28, further comprising:
generating a log including events corresponding to the presence or absence of properly triggered avail tones. 33. The method of claim 28, further comprising:
receiving a return feed corresponding to the broadcast, wherein the return feed includes a plurality of aggregated feeds. 34. The method of claim 28, wherein the avail tone is one of a cue tone, a Society of Cable Television Engineers (SCTE) 104 generated event, an application for a general purpose interface (GPI) signaling, an application for an AC3 encoder, an application for active format description (AFD) signaling, and an application for a V-Chip signaling. 35. A method, comprising:
monitoring a return feed of a broadcast; signaling a playing of at least one avail tone in the broadcast; comparing the playing of the at least one avail tone to a predetermined schedule of avail tones for the broadcast; and determining whether the at least one avail tone was triggered properly. 36. The method of claim 35, wherein the at least one avail tone was triggered properly when the signaling was received within a predetermined time. 37. The method of claim 36, further comprising:
generating an alert when a scheduled avail tone was not properly triggered. 38. The method of claim 37, further comprising:
generating a log including events corresponding to the presence or absence of properly triggered avail tones. 39. The method of claim 35, wherein the return feed includes a plurality of aggregated feeds. 40. The method of claim 35, wherein the avail tone is one of a cue tone, a Society of Cable Television Engineers (SCTE) 104 generated event, an application for a general purpose interface (GPI) signaling, an application for an AC3 encoder, an application for active format description (AFD) signaling, and an application for a V-Chip signaling. | 2,400 |
8,201 | 8,201 | 14,606,843 | 2,432 | The present teaching relates to identity management. In one example, a trusted connector is instantiated in the enterprise system behind a security. The trusted connector is configured to communicate with the private resource via a communication protocol. Upon being triggered by the external system, a secure communication channel is established between the external system and the trusted connector. A request is received from the external source at the trusted connector through the secure communication channel. The request is interpreted for communicating with the private resource. The interpreted request is sent to the private resource. A response is received from the private resource. The response from the private resource is interpreted for communicating with the external system. The interpreted response is sent to the external system through the secure communication channel. | 1. A method, implemented on a computing device having at least one processor, storage, and a communication platform capable of connecting to a network for an external system to access a private resource in an enterprise system behind a security, comprising:
instantiating a trusted connector in the enterprise system behind the security, wherein the trusted connector is configured to communicate with the private resource via a communication protocol; establishing, upon being triggered by the external system, a secure communication channel between the external system and the trusted connector; receiving a request from the external source at the trusted connector through the secure communication channel; interpreting the request for communicating with the private resource; sending the interpreted request to the private resource; receiving a response from the private resource; interpreting the response from the private resource for communicating with the external system; and sending the interpreted response to the external system through the secure communication channel. 2. The method of claim 1, wherein the step of instantiating a trusted connector in the enterprise system includes initiating logging of communications directed to the trusted connector. 3. The method of claim 2, wherein the logging of communications includes logging communications between the trusted connector and the private source. 4. The method of claim 2, wherein the logging of communications includes logging communications between the trusted connector and the external system. 5. The method of claim 1, wherein the step of interpreting the response from the private source includes interpreting a session involving the private resource associated with the response and maintaining the session in subsequent communications associated with the session between the private resource and the external system. 6. The method of claim 1, wherein the communication protocol is one of TCP protocol, UDP protocol or RADIUS protocol. 7. The method of claim 1, wherein the external system includes a cloud system. 8. The method of claim 7, wherein the cloud system includes a system that provides cloud-based identity services. 9. The method of claim 1, wherein the private resource includes at least one private server for verifying the validity of a credential. 10. The method of claim 9, wherein the private includes a server for verifying the validity of a RSA SecureID credential. 11. The method of claim 1 wherein the trusted connector includes a configuration operable to configure the connection between the trusted connector and the external system and/or to configure the connection between the trusted connector and the private resource. 12. The method of claim 11, wherein the configuration of the trusted connector is at least partially accessible to an administrator of the private enterprise system. 13. The method of claim 11, wherein the configuration of the trusted connector is at least partially accessible to the external system. 14. The method of claim 1, wherein the security includes a firewall. 15. The method of claim 1, wherein the private resource includes one or more private servers. 16. The method of claim 15, wherein at least some of the one or more private servers handles the same type of requests. 17. The method of claim 15, wherein the private resource includes a first private server and a second private server, wherein the first private server and the second private server handle different types of requests. 18. The method of claim 2, wherein logging of communications directed to the trusted connector includes security audit logging of security auditable events or activities. 19. The method of claim 18, wherein security audit logging of security auditable events or activities includes logging security audible events or activities that are required by government rules and regulations. 20. A method implemented on a computing device having at least one processor, storage, and a communication platform capable of making a connection to a network for authenticating an online user, the method comprising the steps of:
receiving a first request for authenticating the online user with information related to a credential of the online user and a private resource for verifying the credential, wherein the private resource resides in an enterprise system behind a security; triggering a trusted connector, residing in the enterprise system behind the security, to establish a secure communication channel; sending a second request to the trusted connector via the secure communication channel requesting the private resource to verify the credential, wherein the second request is to be interpreted by the trusted connector before an interpreted request is sent from the trusted connector to the private resource; receiving a response from the trusted connector via the secure communication channel related to the verification of the credential, wherein the response is generated by the private resource and interpreted by the trusted connector; and authenticating the online user based on the response. | The present teaching relates to identity management. In one example, a trusted connector is instantiated in the enterprise system behind a security. The trusted connector is configured to communicate with the private resource via a communication protocol. Upon being triggered by the external system, a secure communication channel is established between the external system and the trusted connector. A request is received from the external source at the trusted connector through the secure communication channel. The request is interpreted for communicating with the private resource. The interpreted request is sent to the private resource. A response is received from the private resource. The response from the private resource is interpreted for communicating with the external system. The interpreted response is sent to the external system through the secure communication channel.1. A method, implemented on a computing device having at least one processor, storage, and a communication platform capable of connecting to a network for an external system to access a private resource in an enterprise system behind a security, comprising:
instantiating a trusted connector in the enterprise system behind the security, wherein the trusted connector is configured to communicate with the private resource via a communication protocol; establishing, upon being triggered by the external system, a secure communication channel between the external system and the trusted connector; receiving a request from the external source at the trusted connector through the secure communication channel; interpreting the request for communicating with the private resource; sending the interpreted request to the private resource; receiving a response from the private resource; interpreting the response from the private resource for communicating with the external system; and sending the interpreted response to the external system through the secure communication channel. 2. The method of claim 1, wherein the step of instantiating a trusted connector in the enterprise system includes initiating logging of communications directed to the trusted connector. 3. The method of claim 2, wherein the logging of communications includes logging communications between the trusted connector and the private source. 4. The method of claim 2, wherein the logging of communications includes logging communications between the trusted connector and the external system. 5. The method of claim 1, wherein the step of interpreting the response from the private source includes interpreting a session involving the private resource associated with the response and maintaining the session in subsequent communications associated with the session between the private resource and the external system. 6. The method of claim 1, wherein the communication protocol is one of TCP protocol, UDP protocol or RADIUS protocol. 7. The method of claim 1, wherein the external system includes a cloud system. 8. The method of claim 7, wherein the cloud system includes a system that provides cloud-based identity services. 9. The method of claim 1, wherein the private resource includes at least one private server for verifying the validity of a credential. 10. The method of claim 9, wherein the private includes a server for verifying the validity of a RSA SecureID credential. 11. The method of claim 1 wherein the trusted connector includes a configuration operable to configure the connection between the trusted connector and the external system and/or to configure the connection between the trusted connector and the private resource. 12. The method of claim 11, wherein the configuration of the trusted connector is at least partially accessible to an administrator of the private enterprise system. 13. The method of claim 11, wherein the configuration of the trusted connector is at least partially accessible to the external system. 14. The method of claim 1, wherein the security includes a firewall. 15. The method of claim 1, wherein the private resource includes one or more private servers. 16. The method of claim 15, wherein at least some of the one or more private servers handles the same type of requests. 17. The method of claim 15, wherein the private resource includes a first private server and a second private server, wherein the first private server and the second private server handle different types of requests. 18. The method of claim 2, wherein logging of communications directed to the trusted connector includes security audit logging of security auditable events or activities. 19. The method of claim 18, wherein security audit logging of security auditable events or activities includes logging security audible events or activities that are required by government rules and regulations. 20. A method implemented on a computing device having at least one processor, storage, and a communication platform capable of making a connection to a network for authenticating an online user, the method comprising the steps of:
receiving a first request for authenticating the online user with information related to a credential of the online user and a private resource for verifying the credential, wherein the private resource resides in an enterprise system behind a security; triggering a trusted connector, residing in the enterprise system behind the security, to establish a secure communication channel; sending a second request to the trusted connector via the secure communication channel requesting the private resource to verify the credential, wherein the second request is to be interpreted by the trusted connector before an interpreted request is sent from the trusted connector to the private resource; receiving a response from the trusted connector via the secure communication channel related to the verification of the credential, wherein the response is generated by the private resource and interpreted by the trusted connector; and authenticating the online user based on the response. | 2,400 |
8,202 | 8,202 | 13,873,401 | 2,458 | Techniques are disclosed for editing pages in a client-server architecture, such as in the context of cloud-based webpage editing applications. In one embodiment, a Clipboard Module running in the client browser is invoked in response to a copy operation that is requested with respect to a selected piece of content on a given page presented at the client. The Clipboard Module is configured to store the copied content in a local storage, and to also present a UI clipboard element for viewing by the user. The UI clipboard element can be dragged-and-dropped at a target drop location within the document being edited. A drop zone indicator can be visually displayed so that user can see where the clipboard content will be placed upon release of the drag-and-drop operation. Upon release, the clipboard content is pasted or otherwise inserted into the DOM of the target page at the current drop zone. | 1. A computer implemented method for editing a page in a client-server arrangement, the method comprising:
copying, by a client computing system, a selected piece of content to a local storage at the client computing system, the selected piece of content being presented on a page served to a browser of the client computing system by a server computing system with which the client computing system is in communication; presenting, by the client computing system, a clipboard user interface (UI) element on the page; and in response to the clipboard UI element being moved to and dropped at a target location, inserting the stored selected piece of content at the target location. 2. The method of claim 1 wherein in response to the clipboard UI element being moved to and dropped at the target location, the method further comprises:
executing a post request to the server computing system, the post request including the stored selected piece of content; and
receiving a response to the post request indicating a status of the post request. 3. The method of claim 2 wherein in response to the status indicating the post request was successful, the method further comprises:
executing a get request to the server computing system, the get request requesting the server computing system to return content resulting from the post request;
receiving a response to the get request including the requested content resulting from the post request; and
refreshing content of the target location with the requested content. 4. The method of claim 2 wherein the response to the post request includes content resulting from server processing of the post request, and the method further comprises refreshing content of the target location with that content. 5. The method of claim 2 wherein in response to the status indicating the post request was not successful, the method further comprises at least one of:
removing the content inserted at the target location; and
presenting visual feedback regarding content drop failure. 6. The method of claim 1 wherein the target location is on a different page than the page with the selected piece of content. 7. The method of claim 1 wherein the method further comprises presenting a drop zone indicator during movement of the clipboard UI element, the presented drop zone indicator showing where the stored selected piece of content would be inserted if the clipboard UI element was dropped at that moment. 8. The method of claim 1 wherein the method is carried out by code embedded within the page and executable in the browser of the client computing system. 9. The method of claim 1, further comprising:
receiving, at the client computing system, a user input associated with the selected piece of content, thereby causing the copying and presenting to be carried out. 10. A computer program product encoded with instructions that when executed by one or more processors cause a process for editing a page in a client-server arrangement to be carried out, the process comprising:
copying, by a client computing system, a selected piece of content to a local storage at the client computing system, the selected piece of content being presented on a page served to a browser of the client computing system by a server computing system with which the client computing system is in communication; presenting, by the client computing system, a clipboard user interface (UI) element on the page; and in response to the clipboard UI element being moved to and dropped at a target location, inserting the stored selected piece of content at the target location. 11. The computer program product of claim 10 wherein in response to the clipboard UI element being moved to and dropped at the target location, the process further comprises:
executing a post request to the server computing system, the post request including the stored selected piece of content; and
receiving a response to the post request indicating a status of the post request. 12. The computer program product of claim 11 wherein in response to the status indicating the post request was successful, the process further comprises:
executing a get request to the server computing system, the get request requesting the server computing system to return content resulting from the post request;
receiving a response to the get request including the requested content resulting from the post request; and
refreshing content of the target location with the requested content. 13. The computer program product of claim 11 wherein the response to the post request includes content resulting from server processing of the post request, and the process further comprises refreshing content of the target location with that content. 14. The computer program product of claim 11 wherein in response to the status indicating the post request was not successful, the process further comprises at least one of:
removing the content inserted at the target location; and
presenting visual feedback regarding content drop failure. 15. The computer program product of claim 10 wherein the target location is on a different page than the page with the selected piece of content. 16. The computer program product of claim 10 wherein the process further comprises presenting a drop zone indicator during movement of the clipboard UI element, the presented drop zone indicator showing where the stored selected piece of content would be inserted if the clipboard UI element was dropped at that moment. 17. The computer program product of claim 10 wherein the process is carried out by code embedded within the page and executable in the browser of the client computing system. 18. The computer program product of claim 10, the process further comprising:
receiving, at the client computing system, a user input associated with the selected piece of content, thereby causing the copying and presenting to be carried out. 19. The computer program product of claim 10 wherein in response to the local storage including multiple pieces of content, the process further comprises presenting a user interface mechanism configured to receive a choice of one or more of those pieces, and the stored selected piece of content that is inserted at the target location is the one or more chosen pieces. 20. A system for editing a page in a client-server arrangement, the system comprising:
one or more client-side modules executable in a browser of a client computer and configured to:
copy a selected piece of content to a local storage at the client computer, the selected piece of content on a page served to the client computer;
present a clipboard user interface (UI) element on the page; and
in response to the clipboard UI element being moved to and dropped at a target location, insert the stored selected piece of content at the target location; and
a server computer configured to serve the page and the one or more client-side modules to the browser of the client computer, wherein the one or more client-side modules are embedded within the page. 21. The system of claim 20 wherein in response to the clipboard UI element being moved to and dropped at the target location, the one or more client-side modules are further configured to:
execute a post request to the server computer, the post request including the stored selected piece of content; and
receive a response to the post request indicating a status of the post request. 22. The system of claim 21 wherein in response to the status indicating the post request was successful, the one or more client-side modules are further configured to:
execute a get request to the server computer, the get request requesting the server computer to return content resulting from the post request;
receive a response to the get request including the requested content resulting from the post request; and
refresh content of the target location with the requested content. 23. The system of claim 21 wherein the response to the post request includes content resulting from server processing of the post request, and the one or more client-side modules are further configured to refresh content of the target location with that content. 24. The system of claim 21 wherein in response to the status indicating the post request was not successful, the one or more client-side modules are further configured to at least one of:
remove the content inserted at the target location; and
present visual feedback regarding content drop failure. 25. The system of claim 20 wherein the one or more client-side modules are further configured to at least one of:
present a drop zone indicator during movement of the clipboard UI element, the presented drop zone indicator showing where the stored selected piece of content would be inserted if the clipboard UI element was dropped at that moment; and
in response to the local storage including multiple pieces of content, present a user interface mechanism configured to receive a choice of one or more of those pieces, and the stored selected piece of content that is inserted at the target location is the one or more chosen pieces. | Techniques are disclosed for editing pages in a client-server architecture, such as in the context of cloud-based webpage editing applications. In one embodiment, a Clipboard Module running in the client browser is invoked in response to a copy operation that is requested with respect to a selected piece of content on a given page presented at the client. The Clipboard Module is configured to store the copied content in a local storage, and to also present a UI clipboard element for viewing by the user. The UI clipboard element can be dragged-and-dropped at a target drop location within the document being edited. A drop zone indicator can be visually displayed so that user can see where the clipboard content will be placed upon release of the drag-and-drop operation. Upon release, the clipboard content is pasted or otherwise inserted into the DOM of the target page at the current drop zone.1. A computer implemented method for editing a page in a client-server arrangement, the method comprising:
copying, by a client computing system, a selected piece of content to a local storage at the client computing system, the selected piece of content being presented on a page served to a browser of the client computing system by a server computing system with which the client computing system is in communication; presenting, by the client computing system, a clipboard user interface (UI) element on the page; and in response to the clipboard UI element being moved to and dropped at a target location, inserting the stored selected piece of content at the target location. 2. The method of claim 1 wherein in response to the clipboard UI element being moved to and dropped at the target location, the method further comprises:
executing a post request to the server computing system, the post request including the stored selected piece of content; and
receiving a response to the post request indicating a status of the post request. 3. The method of claim 2 wherein in response to the status indicating the post request was successful, the method further comprises:
executing a get request to the server computing system, the get request requesting the server computing system to return content resulting from the post request;
receiving a response to the get request including the requested content resulting from the post request; and
refreshing content of the target location with the requested content. 4. The method of claim 2 wherein the response to the post request includes content resulting from server processing of the post request, and the method further comprises refreshing content of the target location with that content. 5. The method of claim 2 wherein in response to the status indicating the post request was not successful, the method further comprises at least one of:
removing the content inserted at the target location; and
presenting visual feedback regarding content drop failure. 6. The method of claim 1 wherein the target location is on a different page than the page with the selected piece of content. 7. The method of claim 1 wherein the method further comprises presenting a drop zone indicator during movement of the clipboard UI element, the presented drop zone indicator showing where the stored selected piece of content would be inserted if the clipboard UI element was dropped at that moment. 8. The method of claim 1 wherein the method is carried out by code embedded within the page and executable in the browser of the client computing system. 9. The method of claim 1, further comprising:
receiving, at the client computing system, a user input associated with the selected piece of content, thereby causing the copying and presenting to be carried out. 10. A computer program product encoded with instructions that when executed by one or more processors cause a process for editing a page in a client-server arrangement to be carried out, the process comprising:
copying, by a client computing system, a selected piece of content to a local storage at the client computing system, the selected piece of content being presented on a page served to a browser of the client computing system by a server computing system with which the client computing system is in communication; presenting, by the client computing system, a clipboard user interface (UI) element on the page; and in response to the clipboard UI element being moved to and dropped at a target location, inserting the stored selected piece of content at the target location. 11. The computer program product of claim 10 wherein in response to the clipboard UI element being moved to and dropped at the target location, the process further comprises:
executing a post request to the server computing system, the post request including the stored selected piece of content; and
receiving a response to the post request indicating a status of the post request. 12. The computer program product of claim 11 wherein in response to the status indicating the post request was successful, the process further comprises:
executing a get request to the server computing system, the get request requesting the server computing system to return content resulting from the post request;
receiving a response to the get request including the requested content resulting from the post request; and
refreshing content of the target location with the requested content. 13. The computer program product of claim 11 wherein the response to the post request includes content resulting from server processing of the post request, and the process further comprises refreshing content of the target location with that content. 14. The computer program product of claim 11 wherein in response to the status indicating the post request was not successful, the process further comprises at least one of:
removing the content inserted at the target location; and
presenting visual feedback regarding content drop failure. 15. The computer program product of claim 10 wherein the target location is on a different page than the page with the selected piece of content. 16. The computer program product of claim 10 wherein the process further comprises presenting a drop zone indicator during movement of the clipboard UI element, the presented drop zone indicator showing where the stored selected piece of content would be inserted if the clipboard UI element was dropped at that moment. 17. The computer program product of claim 10 wherein the process is carried out by code embedded within the page and executable in the browser of the client computing system. 18. The computer program product of claim 10, the process further comprising:
receiving, at the client computing system, a user input associated with the selected piece of content, thereby causing the copying and presenting to be carried out. 19. The computer program product of claim 10 wherein in response to the local storage including multiple pieces of content, the process further comprises presenting a user interface mechanism configured to receive a choice of one or more of those pieces, and the stored selected piece of content that is inserted at the target location is the one or more chosen pieces. 20. A system for editing a page in a client-server arrangement, the system comprising:
one or more client-side modules executable in a browser of a client computer and configured to:
copy a selected piece of content to a local storage at the client computer, the selected piece of content on a page served to the client computer;
present a clipboard user interface (UI) element on the page; and
in response to the clipboard UI element being moved to and dropped at a target location, insert the stored selected piece of content at the target location; and
a server computer configured to serve the page and the one or more client-side modules to the browser of the client computer, wherein the one or more client-side modules are embedded within the page. 21. The system of claim 20 wherein in response to the clipboard UI element being moved to and dropped at the target location, the one or more client-side modules are further configured to:
execute a post request to the server computer, the post request including the stored selected piece of content; and
receive a response to the post request indicating a status of the post request. 22. The system of claim 21 wherein in response to the status indicating the post request was successful, the one or more client-side modules are further configured to:
execute a get request to the server computer, the get request requesting the server computer to return content resulting from the post request;
receive a response to the get request including the requested content resulting from the post request; and
refresh content of the target location with the requested content. 23. The system of claim 21 wherein the response to the post request includes content resulting from server processing of the post request, and the one or more client-side modules are further configured to refresh content of the target location with that content. 24. The system of claim 21 wherein in response to the status indicating the post request was not successful, the one or more client-side modules are further configured to at least one of:
remove the content inserted at the target location; and
present visual feedback regarding content drop failure. 25. The system of claim 20 wherein the one or more client-side modules are further configured to at least one of:
present a drop zone indicator during movement of the clipboard UI element, the presented drop zone indicator showing where the stored selected piece of content would be inserted if the clipboard UI element was dropped at that moment; and
in response to the local storage including multiple pieces of content, present a user interface mechanism configured to receive a choice of one or more of those pieces, and the stored selected piece of content that is inserted at the target location is the one or more chosen pieces. | 2,400 |
8,203 | 8,203 | 15,397,434 | 2,421 | One or more videos are presented to a user. The videos include a plurality of hidden artifacts. The videos also include advertisements. The user looks for the hidden artifacts in the videos. Whenever the user finds the hidden artifacts in one of the videos, the user selects locations in the videos that correspond to the hidden artifacts. A computing device performs different actions depending on which ones of the hidden artifacts the user is able to find. For example, the computing device can provide different rewards to the user depending on which ones of the hidden artifacts the user is able to find. | 1-20. (canceled) 21. A method of presenting a hidden artifact within a video, the method comprising:
selecting a video having entertainment content; purposefully hiding a hidden artifact in the video as part of playback of the video, the hidden artifact being shown only in a portion of a duration of the video; presenting the video including the hidden artifact to a user, the hidden artifact being at least somewhat difficult for the user to perceive except when the user is paying attention to details of the video; presenting a notification to the user to encourage the user to look for the hidden artifact while viewing playback of the video, the notification including a visual depiction of the hidden artifact; receiving a selection from the user during playback of the video, the selection indicating a location in the video that corresponds to the hidden artifact; awarding the user when the user selects the hidden artifact during playback of the video; and changing an appearance of the visual depiction of the hidden artifact after the hidden artifact has been shown in playback of the video without being selected. 22. The method of claim 21, further comprising changing a color of the visual depiction of the hidden artifact after the hidden artifact has been shown in playback of the video without being selected. 23. The method of claim 21, further comprising causing the visual depiction of the hidden artifact to disappear after the hidden artifact has been shown in playback of the video without being selected. 24. The method of claim 21, further comprising:
generating an initial version of the video having the hidden artifact located in a first position within the video; and generating an updated version of the video having the hidden artifact located in a second position within the video, the second position being different from the first position. 25. The method of claim 24, further comprising:
providing the initial version of the video for playback; and thereafter, providing the updated version of the video for playback. 26. The method of claim 21, further comprising allowing the user to share the video. 27. The method of claim 26, further comprising allowing the user to share the video using a social media platform. 28. The method of claim 21, further comprising indicating, on a social media platform, that the user won a reward for watching the video. | One or more videos are presented to a user. The videos include a plurality of hidden artifacts. The videos also include advertisements. The user looks for the hidden artifacts in the videos. Whenever the user finds the hidden artifacts in one of the videos, the user selects locations in the videos that correspond to the hidden artifacts. A computing device performs different actions depending on which ones of the hidden artifacts the user is able to find. For example, the computing device can provide different rewards to the user depending on which ones of the hidden artifacts the user is able to find.1-20. (canceled) 21. A method of presenting a hidden artifact within a video, the method comprising:
selecting a video having entertainment content; purposefully hiding a hidden artifact in the video as part of playback of the video, the hidden artifact being shown only in a portion of a duration of the video; presenting the video including the hidden artifact to a user, the hidden artifact being at least somewhat difficult for the user to perceive except when the user is paying attention to details of the video; presenting a notification to the user to encourage the user to look for the hidden artifact while viewing playback of the video, the notification including a visual depiction of the hidden artifact; receiving a selection from the user during playback of the video, the selection indicating a location in the video that corresponds to the hidden artifact; awarding the user when the user selects the hidden artifact during playback of the video; and changing an appearance of the visual depiction of the hidden artifact after the hidden artifact has been shown in playback of the video without being selected. 22. The method of claim 21, further comprising changing a color of the visual depiction of the hidden artifact after the hidden artifact has been shown in playback of the video without being selected. 23. The method of claim 21, further comprising causing the visual depiction of the hidden artifact to disappear after the hidden artifact has been shown in playback of the video without being selected. 24. The method of claim 21, further comprising:
generating an initial version of the video having the hidden artifact located in a first position within the video; and generating an updated version of the video having the hidden artifact located in a second position within the video, the second position being different from the first position. 25. The method of claim 24, further comprising:
providing the initial version of the video for playback; and thereafter, providing the updated version of the video for playback. 26. The method of claim 21, further comprising allowing the user to share the video. 27. The method of claim 26, further comprising allowing the user to share the video using a social media platform. 28. The method of claim 21, further comprising indicating, on a social media platform, that the user won a reward for watching the video. | 2,400 |
8,204 | 8,204 | 14,723,418 | 2,437 | Embodiments of the present invention provide a method, system and computer program product for trans-locality based fixed storage security. In an embodiment of the invention, a method for trans-locality based fixed storage security includes storing in memory of a fixed disk a key received from a key source over a computer communications network. The method also includes receiving in firmware of the fixed disk from a physically coupled computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk and, in response, retrieving the key received from the key source and determining a validity of the retrieved key. Finally, the method includes decrypting the encrypted data and returning the decrypted data to the computer if the retrieved key is valid, but otherwise denying the request. | 1. A method for trans-locality based fixed storage security, the method comprising:
storing in memory of a fixed disk a key received from a key source over a computer communications network; receiving in firmware of the fixed disk from a physically coupled computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk; retrieving the key received from the key source and determining a validity of the retrieved key; and, decrypting the encrypted data and returning the decrypted data to the computer if the retrieved key is valid, but otherwise denying the request. 2. The method of claim 1, wherein the key expires after a threshold period of time has elapsed necessitating a receipt of a new key from the key source in order to decrypt the encrypted data. 3. The method of claim 1, wherein the key is received from the key source in response to the request to access the encrypted data by the physically coupled computer. 4. The method of claim 1, wherein the data stored in the fixed disk both is encrypted in a manner able to be decrypted by the key from the key source, and also is encrypted in a manner able to be decrypted by a second key present in the fixed disk. 5. A data processing system configured for trans-locality based fixed storage security, the system comprising:
a fixed disk comprising a physical storage medium, a read/write mechanism adapted to read and write data to and from the physical storage medium, both memory and also a processor disposed on the fixed disk, and a cable connector configured to receive a device interface cable coupling the fixed disk to a computer; and, a security module stored in firmware also disposed on the disk, the module comprising program code enabled upon execution by the processor of the fixed to store in the memory of the fixed disk a key received from a key source from over a computer communications network, to receive from the computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk, to retrieve the key received from the key source and determine a validity of the retrieved key and to decrypt the encrypted data and return the decrypted data to the computer if the retrieved key is valid, but otherwise to deny the request. 6. The system of claim 5, wherein the key expires after a threshold period of time has elapsed necessitating a receipt of a new key from the key source in order to decrypt the encrypted data. 7. The system of claim 5, wherein the key is received from the key source in response to the request to access the encrypted data by the physically coupled computer. 8. The system of claim 5, wherein the data stored in the fixed disk both is encrypted in a manner able to be decrypted by the key from the key source, and also is encrypted in a manner able to be decrypted by a second key present in the fixed disk. 9. A computer program product for trans-locality based fixed storage security, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform a method comprising:
storing in memory of a fixed disk a key received from a key source over a computer communications network; receiving in firmware of the fixed disk from a physically coupled computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk; retrieving the key received from the key source and determining a validity of the retrieved key; and, decrypting the encrypted data and returning the decrypted data to the computer if the retrieved key is valid, but otherwise denying the request. 10. The computer program product of claim 9, wherein the key expires after a threshold period of time has elapsed necessitating a receipt of a new key from the key source in order to decrypt the encrypted data. 11. The computer program product of claim 9, wherein the key is received from the key source in response to the request to access the encrypted data by the physically coupled computer. 12. The computer program product of claim 9, wherein the data stored in the fixed disk both is encrypted in a manner able to be decrypted by the key from the key source, and also is encrypted in a manner able to be decrypted by a second key present in the fixed disk. | Embodiments of the present invention provide a method, system and computer program product for trans-locality based fixed storage security. In an embodiment of the invention, a method for trans-locality based fixed storage security includes storing in memory of a fixed disk a key received from a key source over a computer communications network. The method also includes receiving in firmware of the fixed disk from a physically coupled computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk and, in response, retrieving the key received from the key source and determining a validity of the retrieved key. Finally, the method includes decrypting the encrypted data and returning the decrypted data to the computer if the retrieved key is valid, but otherwise denying the request.1. A method for trans-locality based fixed storage security, the method comprising:
storing in memory of a fixed disk a key received from a key source over a computer communications network; receiving in firmware of the fixed disk from a physically coupled computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk; retrieving the key received from the key source and determining a validity of the retrieved key; and, decrypting the encrypted data and returning the decrypted data to the computer if the retrieved key is valid, but otherwise denying the request. 2. The method of claim 1, wherein the key expires after a threshold period of time has elapsed necessitating a receipt of a new key from the key source in order to decrypt the encrypted data. 3. The method of claim 1, wherein the key is received from the key source in response to the request to access the encrypted data by the physically coupled computer. 4. The method of claim 1, wherein the data stored in the fixed disk both is encrypted in a manner able to be decrypted by the key from the key source, and also is encrypted in a manner able to be decrypted by a second key present in the fixed disk. 5. A data processing system configured for trans-locality based fixed storage security, the system comprising:
a fixed disk comprising a physical storage medium, a read/write mechanism adapted to read and write data to and from the physical storage medium, both memory and also a processor disposed on the fixed disk, and a cable connector configured to receive a device interface cable coupling the fixed disk to a computer; and, a security module stored in firmware also disposed on the disk, the module comprising program code enabled upon execution by the processor of the fixed to store in the memory of the fixed disk a key received from a key source from over a computer communications network, to receive from the computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk, to retrieve the key received from the key source and determine a validity of the retrieved key and to decrypt the encrypted data and return the decrypted data to the computer if the retrieved key is valid, but otherwise to deny the request. 6. The system of claim 5, wherein the key expires after a threshold period of time has elapsed necessitating a receipt of a new key from the key source in order to decrypt the encrypted data. 7. The system of claim 5, wherein the key is received from the key source in response to the request to access the encrypted data by the physically coupled computer. 8. The system of claim 5, wherein the data stored in the fixed disk both is encrypted in a manner able to be decrypted by the key from the key source, and also is encrypted in a manner able to be decrypted by a second key present in the fixed disk. 9. A computer program product for trans-locality based fixed storage security, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform a method comprising:
storing in memory of a fixed disk a key received from a key source over a computer communications network; receiving in firmware of the fixed disk from a physically coupled computer by way of a drive interface cable a request to access encrypted data stored in the fixed disk; retrieving the key received from the key source and determining a validity of the retrieved key; and, decrypting the encrypted data and returning the decrypted data to the computer if the retrieved key is valid, but otherwise denying the request. 10. The computer program product of claim 9, wherein the key expires after a threshold period of time has elapsed necessitating a receipt of a new key from the key source in order to decrypt the encrypted data. 11. The computer program product of claim 9, wherein the key is received from the key source in response to the request to access the encrypted data by the physically coupled computer. 12. The computer program product of claim 9, wherein the data stored in the fixed disk both is encrypted in a manner able to be decrypted by the key from the key source, and also is encrypted in a manner able to be decrypted by a second key present in the fixed disk. | 2,400 |
8,205 | 8,205 | 15,054,035 | 2,441 | A method includes: determining a configuration of one or more networked hardware components; determining a usage level associated with one or more of the networked hardware components; determining a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of: outputting a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and configuring of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. Corresponding systems and computer program products are also disclosed. | 1. A computer program product, comprising: a computer readable medium having stored thereon computer readable program instructions configured to cause a processor of a computer system to:
determine a configuration of one or more networked hardware components; determine a usage level associated with one or more of the networked hardware components; determine a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of:
output a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and
configure of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 2. The computer program product as recited in claim 1, comprising computer readable program instructions configured to cause the processor of the computer system to: determine the configuration of one or more of the networked hardware components based on vital product data (VPD) corresponding to the one or more networked hardware components. 3. The computer program product as recited in claim 2, wherein the VPD comprise one or more of:
a number of processors of one of the networked components; a dock speed of one or more processors of the networked components; a type of processor(s) of one of the networked components; a number of memory units of one of the networked components; a type of memory unit(s) of one of the networked components; a capacity of one or more memory units of one of the networked components; a number of bussed components of one of the networked components; a type of bussed component(s) of one of the networked components; a capacity of one or more storage devices of one of the networked components; and a type of storage device(s) of one of the networked components. 4. The computer program product as recited in claim 2, comprising computer readable program instructions configured to cause the processor of the computer system to: determine the configuration of one or more of the networked hardware components based on reading a VPD register of the one or more networked hardware corn ponents. 5. The computer program product as recited in claim I; comprising computer readable program instructions configured to cause the processor of the computer system to: determine the usage level associated with one or more of the networked hardware components based on one or more of:
an input/output (I/O) bandwidth of the one or more networked hardware components; an I/O traffic level of the one or more of the networked hardware components; a processor usage of the one or more of the networked hardware components; a memory usage of the one or more of the networked hardware components; and a number of storage accesses per unit time of the one or more of the networked hardware components. 6. The computer program product as recited in claim 1, comprising computer readable program instructions configured to cause the processor of the computer system to: determine the configuration, the usage level, and the functional category of the one or more networked hardware components in response to detecting a new hardware component being added to the network; and
wherein the one or more networked hardware components for which the configuration, the usage level, and the functional category are determined comprises the new hardware component. 7. The computer program product as recited in claim 6, wherein determining the functional category of the new hardware component comprises either adding the new hardware component to an existing functional category or defining a new functional category. 8. The computer program product as recited in claim 1, comprising computer readable program instructions configured to cause the processor of the computer system to: determine configuration parameters for one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 9. The computer program product as recited in claim 8, comprising computer readable program instructions configured to cause the processor of the computer system to: normalize configuration parameters across a plurality of the one or more networked components based on determining the plurality of the one or more networked components are characterized by a same functional category. 10. The computer program product as recited in claim 9, wherein normalizing the configurationparameters comprises one or more of:
installing or pdating firmware on the plurality of the one or more networked components; installing or updating an operating computer program product of the plurality of the one or more networked components; and setting one or more configuration parameters for the plurality of the one or more networked components. 11. The computer program product as recited in claim 8, wherein the determined functional category is selected from a group consisting of compute components;
management components; storage components; and networking components. 12. A method, comprising:
determining a configuration of one or more networked hardware components; determining a usage level associated with one or more of the networked hardware components; and determining a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of:
outputting a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and
configuring of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 13. The method as recited in claim 12, comprising determining one or more configuration parameters for one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 14. The method as recited in claim 12, comprising normalizing one or more configuration parameters across a plurality of the one or more networked components based on determining the plurality of the one or more networked components are characterized by a same functional category. 15. The method as recited in claim 14, comprising outputting a suggested configuration to a display coupled to a server, the suggested configuration corresponding to one or more of the networked components being characterized by a same functional category; and
receiving user feedback confirming, modifying or refuting the suggested configuration. 16. The method as recited in claim 15, wherein the normalizing is performed in response to receiving user feedback confirming the suggested configuration. 17. The method as recited in claim 15, comprising automatically configuring the one or more networked components in response to receiving the user feedback refuting the suggested configuration. 18. The method as recited in claim 12, wherein determining the usage level associated with one or more of the networked hardware components is based on one or more of:
an input/output (I/O) bandwidth of the one or more networked hardware components; an I/O traffic level of the one or more of the networked hardware components; a processor usage of the one or more of the networked hardware components; a memory usage of the one or more of the networked hardware components; and a number of storage accesses per unit time of the one or more of the networked hardware components. 19. The method as recited in claim 12, wherein determining the configuration of one or more of the networked hardware components is based at least in part on vital product data (VPD) corresponding to the one or more networked hardware components. 20. A system, comprising a server configured to:
determine a configuration of one or more networked hardware components; determine a usage level associated with one or more of the networked hardware components; and determine a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of:
output a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and
configure of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. | A method includes: determining a configuration of one or more networked hardware components; determining a usage level associated with one or more of the networked hardware components; determining a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of: outputting a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and configuring of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. Corresponding systems and computer program products are also disclosed.1. A computer program product, comprising: a computer readable medium having stored thereon computer readable program instructions configured to cause a processor of a computer system to:
determine a configuration of one or more networked hardware components; determine a usage level associated with one or more of the networked hardware components; determine a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of:
output a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and
configure of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 2. The computer program product as recited in claim 1, comprising computer readable program instructions configured to cause the processor of the computer system to: determine the configuration of one or more of the networked hardware components based on vital product data (VPD) corresponding to the one or more networked hardware components. 3. The computer program product as recited in claim 2, wherein the VPD comprise one or more of:
a number of processors of one of the networked components; a dock speed of one or more processors of the networked components; a type of processor(s) of one of the networked components; a number of memory units of one of the networked components; a type of memory unit(s) of one of the networked components; a capacity of one or more memory units of one of the networked components; a number of bussed components of one of the networked components; a type of bussed component(s) of one of the networked components; a capacity of one or more storage devices of one of the networked components; and a type of storage device(s) of one of the networked components. 4. The computer program product as recited in claim 2, comprising computer readable program instructions configured to cause the processor of the computer system to: determine the configuration of one or more of the networked hardware components based on reading a VPD register of the one or more networked hardware corn ponents. 5. The computer program product as recited in claim I; comprising computer readable program instructions configured to cause the processor of the computer system to: determine the usage level associated with one or more of the networked hardware components based on one or more of:
an input/output (I/O) bandwidth of the one or more networked hardware components; an I/O traffic level of the one or more of the networked hardware components; a processor usage of the one or more of the networked hardware components; a memory usage of the one or more of the networked hardware components; and a number of storage accesses per unit time of the one or more of the networked hardware components. 6. The computer program product as recited in claim 1, comprising computer readable program instructions configured to cause the processor of the computer system to: determine the configuration, the usage level, and the functional category of the one or more networked hardware components in response to detecting a new hardware component being added to the network; and
wherein the one or more networked hardware components for which the configuration, the usage level, and the functional category are determined comprises the new hardware component. 7. The computer program product as recited in claim 6, wherein determining the functional category of the new hardware component comprises either adding the new hardware component to an existing functional category or defining a new functional category. 8. The computer program product as recited in claim 1, comprising computer readable program instructions configured to cause the processor of the computer system to: determine configuration parameters for one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 9. The computer program product as recited in claim 8, comprising computer readable program instructions configured to cause the processor of the computer system to: normalize configuration parameters across a plurality of the one or more networked components based on determining the plurality of the one or more networked components are characterized by a same functional category. 10. The computer program product as recited in claim 9, wherein normalizing the configurationparameters comprises one or more of:
installing or pdating firmware on the plurality of the one or more networked components; installing or updating an operating computer program product of the plurality of the one or more networked components; and setting one or more configuration parameters for the plurality of the one or more networked components. 11. The computer program product as recited in claim 8, wherein the determined functional category is selected from a group consisting of compute components;
management components; storage components; and networking components. 12. A method, comprising:
determining a configuration of one or more networked hardware components; determining a usage level associated with one or more of the networked hardware components; and determining a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of:
outputting a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and
configuring of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 13. The method as recited in claim 12, comprising determining one or more configuration parameters for one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. 14. The method as recited in claim 12, comprising normalizing one or more configuration parameters across a plurality of the one or more networked components based on determining the plurality of the one or more networked components are characterized by a same functional category. 15. The method as recited in claim 14, comprising outputting a suggested configuration to a display coupled to a server, the suggested configuration corresponding to one or more of the networked components being characterized by a same functional category; and
receiving user feedback confirming, modifying or refuting the suggested configuration. 16. The method as recited in claim 15, wherein the normalizing is performed in response to receiving user feedback confirming the suggested configuration. 17. The method as recited in claim 15, comprising automatically configuring the one or more networked components in response to receiving the user feedback refuting the suggested configuration. 18. The method as recited in claim 12, wherein determining the usage level associated with one or more of the networked hardware components is based on one or more of:
an input/output (I/O) bandwidth of the one or more networked hardware components; an I/O traffic level of the one or more of the networked hardware components; a processor usage of the one or more of the networked hardware components; a memory usage of the one or more of the networked hardware components; and a number of storage accesses per unit time of the one or more of the networked hardware components. 19. The method as recited in claim 12, wherein determining the configuration of one or more of the networked hardware components is based at least in part on vital product data (VPD) corresponding to the one or more networked hardware components. 20. A system, comprising a server configured to:
determine a configuration of one or more networked hardware components; determine a usage level associated with one or more of the networked hardware components; and determine a functional category of one or more of the networked hardware components based at least in part on the configuration of the one or more networked hardware components and the usage level associated with the one or more networked hardware components; and one or more of:
output a suggested configuration of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components; and
configure of one or more of the networked hardware components based on the determined functional category of the one or more networked hardware components. | 2,400 |
8,206 | 8,206 | 15,840,982 | 2,426 | Novel tools and techniques are provided for implementing conflict resolution for electronic program guides. In various embodiments, a computing system might receive a plurality of metadata each from a metadata source among a plurality of metadata sources, each of the metadata corresponding to a video content, might compile the plurality of metadata, might determine whether at least one metadata of the plurality of metadata is inconsistent with other metadata of the plurality of metadata. Based on a determination that at least one metadata is inconsistent with other metadata, the computing system might analyze the plurality of metadata to determine which set of metadata more accurately corresponds to the video content, might modify one or more metadata based on such determination, might generate an EPG that presents the video content, using metadata consistent with the modified one or more metadata, and might display the EPG on a display device. | 1. A method, comprising:
receiving, with a computing system, a plurality of metadata associated with a first video content of a plurality of video content, the plurality of metadata including a plurality of first metadata, each first metadata of the plurality of first metadata originating from a respective metadata source among a plurality of metadata sources, each of the first metadata corresponding to information regarding the first video content among the plurality of video content; compiling, with the computing system, the plurality of first metadata from the plurality of metadata sources; determining, with the computing system, whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata; based on a determination that at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata, determining, with the computing system, that a first set of the plurality of first metadata more accurately corresponds to the first video content, wherein the first set of the plurality of first metadata includes one or more first metadata members that are consistent, wherein the first set includes more first metadata members than any other sets of the plurality of first metadata with one or more first metadata members that are consistent; modifying, with the computing system, one or more of the plurality of first metadata to be consistent with the first set of the plurality of first metadata; generating, with the computing system, an electronic program guide (“EPG”) that presents the information regarding the first video content based on the modified one or more of the plurality of first metadata; and displaying, with the computing system, the EPG on a display device. 2. The method of claim 1, wherein the computing system comprises one of an EPG system, a metadata server, a set-top box (“STB”), a digital video recording (“DVR”) device, a processor of the display device running a software application (“app”), a processor of a user device running an app, a server computer over a network, a cloud-based computing system over a network, a media player, or a gaming console. 3. The method of claim 1, wherein the display device comprises one of a television set, a smart television, a computer monitor, a laptop monitor, or a projection system. 4. The method of claim 1, wherein the first video content is available from a plurality of video content sources, each comprising one of a video streaming source, a video broadcast source, an off the air (“OTA”) source, or a third party video content source. 5. The method of claim 1, wherein each of the plurality of first metadata is received by the computing system in response to one of a pull data distribution instruction, a push data distribution instruction, or a hybrid push-pull data distribution instruction. 6. The method of claim 1, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content further comprises using at least one of a metadata provider ranking technique, a self-learning adaptive technique, an image recognition technique, an audio recognition technique, a video recognition technique, or a combination of these techniques. 7. The method of claim 1, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content comprise:
identifying, with the computing system, which one or more portions of the plurality of first metadata are inconsistent with corresponding one or more portions of the plurality of first metadata; determining, with the computing system, whether the identified one or more portions of the plurality of first metadata represent a majority over the corresponding one or more portions of the plurality of first metadata; based on a determination that the identified one or more portions of the plurality of first metadata represent a majority over the corresponding one or more portions of the plurality of first metadata, designating, with the computing system, the identified one or more portions of the plurality of first metadata as more accurately corresponding to the first video content; and based on a determination that the corresponding one or more portions of the plurality of first metadata represent a majority over the identified one or more portions of the plurality of first metadata, designating, with the computing system, the corresponding one or more portions of the plurality of first metadata as more accurately corresponding to the first video content. 8. The method of claim 1, wherein each of the plurality of first metadata comprises an accuracy counter value associated with corresponding one of the plurality of metadata sources, the accuracy counter value indicating a level of accuracy that each of the plurality of metadata sources has with respect to the first metadata, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content comprise:
identifying, with the computing system, a metadata source among the plurality of metadata sources that is associated with the highest accuracy counter value; and designating, with the computing system, the first metadata among the plurality of first metadata corresponding to the identified metadata source as more accurately corresponding to the first video content. 9. The method of claim 8, further comprising:
incrementing, with the computing system, the accuracy counter value of the designated first metadata corresponding to the identified metadata source as more accurately corresponding to the first video content. 10. The method of claim 8, further comprising:
decrementing, with the computing system, the accuracy counter value of first metadata corresponding to a metadata source providing first metadata deemed to be inconsistent with other first metadata of the plurality of first metadata. 11. The method of claim 8, further comprising:
determining, with the computing system, accuracy of first metadata associated with at least one metadata source of the plurality of metadata sources over a predetermined period of time; based on a determination that the first metadata associated with the at least one metadata source is accurate for at least a predetermined threshold percentage of instances over the predetermined period of time, incrementing, with the computing system, the accuracy counter value of the first metadata associated with the at least one metadata source; and based on a determination that the first metadata associated with the at least one metadata source is not accurate for at least the predetermined threshold percentage of instances over the predetermined period of time, decrementing, with the computing system, the accuracy counter value of the first metadata associated with the at least one metadata source. 12. The method of claim 1, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content comprise:
analyzing, with the computing system, at least portions of the first video content using at least one of image recognition techniques, audio recognition techniques, or video recognition techniques to identify content information related to the first metadata; determining, with the computing system, whether the first metadata associated with at least one metadata source is consistent with the identified content information; based on a determination that the first metadata associated with the at least one metadata source is consistent with the identified content information, designating, with the computing system, the first metadata associated with the at least one metadata source as more accurately corresponding to the first video content; and based on a determination that the first metadata associated with the at least one metadata source is not consistent with the identified content information, designating, with the computing system, the first metadata associated with the at least one metadata source as less accurately corresponding to the first video content. 13. The method of claim 12, wherein the identified content information are based on at least one of logos or symbols associated with the first video content, music associated with the first video content, news personalities associated with the first video content, actors or actresses associated with the first video content, characters associated with the first video content, scenes associated with the first video content, phrases associated with the first video content, credits associated with the first video content, logos or symbols associated with a video content source associated with the first video content, music associated with the video content source associated with the first video content, news personalities associated with the video content source associated with the first video content, actors or actresses associated with the video content source associated with the first video content, characters associated with the video content source associated with the first video content, phrases associated with the video content source associated with the first video content, or credits associated with the video content source associated with the first video content. 14. An apparatus, comprising:
at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive a plurality of metadata associated with a first video content of a plurality of video content, the plurality of metadata including a plurality of first metadata, each first metadata of the plurality of first metadata originating from a respective metadata source among a plurality of metadata sources, each of the first metadata corresponding to information regarding the first video content among the plurality of video content;
compile the plurality of first metadata from the plurality of metadata sources;
determine whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata;
based on a determination that at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata, determine that a first set of the plurality of first metadata more accurately corresponds to the first video content, wherein the first set of the plurality of first metadata includes one or more first metadata members that are consistent, wherein the first set includes more first metadata members than any other sets of the plurality of first metadata with one or more first metadata members that are consistent;
modify one or more of the plurality of first metadata to be consistent with the first set of the plurality of first metadata;
generate an electronic program guide (“EPG”) that presents the information regarding the first video content based on the modified one or more of the plurality of first metadata; and
display the EPG on a display device. 15. The apparatus of claim 14, wherein the apparatus comprises one of an EPG system, a metadata server, a set-top box (“STB”), a digital video recording (“DVR”) device, a processor of the display device running a software application (“app”), a processor of a user device running an app, a server computer over a network, a cloud-based computing system over a network, a media player, or a gaming console. 16. The apparatus of claim 14, wherein the display device comprises one of a television set, a smart television, a computer monitor, a laptop monitor, or a projection system. 17. The apparatus of claim 14, wherein the first video content is available from a plurality of video content sources, each comprising one of a video streaming source, a video broadcast source, an off the air (“OTA”) source, or a third party video content source. 18. The apparatus of claim 14, wherein each of the plurality of first metadata is received by the computing system in response to one of a pull data distribution instruction, a push data distribution instruction, or a hybrid push-pull data distribution instruction. 19. The apparatus of claim 14, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content further comprises using at least one of a metadata provider ranking technique, a self-learning adaptive technique, an image recognition technique, an audio recognition technique, a video recognition technique, or a combination of these techniques. 20. A system, comprising:
a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive a plurality of metadata associated with a first video content fo a plurality of video content, the plurality of metadata including a plurality of first metadata each first metadata of the plurality of first metadata originating from a respective metadata source among a plurality of metadata sources, each of the first metadata corresponding to information regarding the first video content among the plurality of video content;
compile the plurality of first metadata from the plurality of metadata sources;
determine whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata;
based on a determination that at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata, determine that a first set of the plurality of first metadata more accurately corresponds to the first video content, wherein the first set of the plurality of first metadata includes one or more first metadata members that are consistent, wherein the first set includes more first metadata members than any other sets of the plurality of first metadata with one or more first metadata members that are consistent;
modify one or more of the plurality of first metadata to be consistent with the first set of the plurality of first metadata;
generate an electronic program guide (“EPG”) that presents the information regarding the first video content based on the modified one or more of the plurality of first metadata; and
send the EPG to a display device; and
the display device, comprising:
a display screen;
at least one second processor; and
a second non-transitory computer readable medium communicatively coupled to the at least one second processor, the second non-transitory computer readable medium having stored thereon computer software comprising a second set of instructions that, when executed by the at least one second processor, causes the display device to:
receive the EPG from the computing system; and
display the EPG on the display screen. 21. The system of claim 20, wherein the computing system comprises one of an EPG system, a metadata server, a set-top box (“STB”), a digital video recording (“DVR”) device, a processor of the display device running a software application (“app”), a processor of a user device running an app, a server computer over a network, a cloud-based computing system over a network, a media player, or a gaming console. | Novel tools and techniques are provided for implementing conflict resolution for electronic program guides. In various embodiments, a computing system might receive a plurality of metadata each from a metadata source among a plurality of metadata sources, each of the metadata corresponding to a video content, might compile the plurality of metadata, might determine whether at least one metadata of the plurality of metadata is inconsistent with other metadata of the plurality of metadata. Based on a determination that at least one metadata is inconsistent with other metadata, the computing system might analyze the plurality of metadata to determine which set of metadata more accurately corresponds to the video content, might modify one or more metadata based on such determination, might generate an EPG that presents the video content, using metadata consistent with the modified one or more metadata, and might display the EPG on a display device.1. A method, comprising:
receiving, with a computing system, a plurality of metadata associated with a first video content of a plurality of video content, the plurality of metadata including a plurality of first metadata, each first metadata of the plurality of first metadata originating from a respective metadata source among a plurality of metadata sources, each of the first metadata corresponding to information regarding the first video content among the plurality of video content; compiling, with the computing system, the plurality of first metadata from the plurality of metadata sources; determining, with the computing system, whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata; based on a determination that at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata, determining, with the computing system, that a first set of the plurality of first metadata more accurately corresponds to the first video content, wherein the first set of the plurality of first metadata includes one or more first metadata members that are consistent, wherein the first set includes more first metadata members than any other sets of the plurality of first metadata with one or more first metadata members that are consistent; modifying, with the computing system, one or more of the plurality of first metadata to be consistent with the first set of the plurality of first metadata; generating, with the computing system, an electronic program guide (“EPG”) that presents the information regarding the first video content based on the modified one or more of the plurality of first metadata; and displaying, with the computing system, the EPG on a display device. 2. The method of claim 1, wherein the computing system comprises one of an EPG system, a metadata server, a set-top box (“STB”), a digital video recording (“DVR”) device, a processor of the display device running a software application (“app”), a processor of a user device running an app, a server computer over a network, a cloud-based computing system over a network, a media player, or a gaming console. 3. The method of claim 1, wherein the display device comprises one of a television set, a smart television, a computer monitor, a laptop monitor, or a projection system. 4. The method of claim 1, wherein the first video content is available from a plurality of video content sources, each comprising one of a video streaming source, a video broadcast source, an off the air (“OTA”) source, or a third party video content source. 5. The method of claim 1, wherein each of the plurality of first metadata is received by the computing system in response to one of a pull data distribution instruction, a push data distribution instruction, or a hybrid push-pull data distribution instruction. 6. The method of claim 1, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content further comprises using at least one of a metadata provider ranking technique, a self-learning adaptive technique, an image recognition technique, an audio recognition technique, a video recognition technique, or a combination of these techniques. 7. The method of claim 1, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content comprise:
identifying, with the computing system, which one or more portions of the plurality of first metadata are inconsistent with corresponding one or more portions of the plurality of first metadata; determining, with the computing system, whether the identified one or more portions of the plurality of first metadata represent a majority over the corresponding one or more portions of the plurality of first metadata; based on a determination that the identified one or more portions of the plurality of first metadata represent a majority over the corresponding one or more portions of the plurality of first metadata, designating, with the computing system, the identified one or more portions of the plurality of first metadata as more accurately corresponding to the first video content; and based on a determination that the corresponding one or more portions of the plurality of first metadata represent a majority over the identified one or more portions of the plurality of first metadata, designating, with the computing system, the corresponding one or more portions of the plurality of first metadata as more accurately corresponding to the first video content. 8. The method of claim 1, wherein each of the plurality of first metadata comprises an accuracy counter value associated with corresponding one of the plurality of metadata sources, the accuracy counter value indicating a level of accuracy that each of the plurality of metadata sources has with respect to the first metadata, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content comprise:
identifying, with the computing system, a metadata source among the plurality of metadata sources that is associated with the highest accuracy counter value; and designating, with the computing system, the first metadata among the plurality of first metadata corresponding to the identified metadata source as more accurately corresponding to the first video content. 9. The method of claim 8, further comprising:
incrementing, with the computing system, the accuracy counter value of the designated first metadata corresponding to the identified metadata source as more accurately corresponding to the first video content. 10. The method of claim 8, further comprising:
decrementing, with the computing system, the accuracy counter value of first metadata corresponding to a metadata source providing first metadata deemed to be inconsistent with other first metadata of the plurality of first metadata. 11. The method of claim 8, further comprising:
determining, with the computing system, accuracy of first metadata associated with at least one metadata source of the plurality of metadata sources over a predetermined period of time; based on a determination that the first metadata associated with the at least one metadata source is accurate for at least a predetermined threshold percentage of instances over the predetermined period of time, incrementing, with the computing system, the accuracy counter value of the first metadata associated with the at least one metadata source; and based on a determination that the first metadata associated with the at least one metadata source is not accurate for at least the predetermined threshold percentage of instances over the predetermined period of time, decrementing, with the computing system, the accuracy counter value of the first metadata associated with the at least one metadata source. 12. The method of claim 1, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content comprise:
analyzing, with the computing system, at least portions of the first video content using at least one of image recognition techniques, audio recognition techniques, or video recognition techniques to identify content information related to the first metadata; determining, with the computing system, whether the first metadata associated with at least one metadata source is consistent with the identified content information; based on a determination that the first metadata associated with the at least one metadata source is consistent with the identified content information, designating, with the computing system, the first metadata associated with the at least one metadata source as more accurately corresponding to the first video content; and based on a determination that the first metadata associated with the at least one metadata source is not consistent with the identified content information, designating, with the computing system, the first metadata associated with the at least one metadata source as less accurately corresponding to the first video content. 13. The method of claim 12, wherein the identified content information are based on at least one of logos or symbols associated with the first video content, music associated with the first video content, news personalities associated with the first video content, actors or actresses associated with the first video content, characters associated with the first video content, scenes associated with the first video content, phrases associated with the first video content, credits associated with the first video content, logos or symbols associated with a video content source associated with the first video content, music associated with the video content source associated with the first video content, news personalities associated with the video content source associated with the first video content, actors or actresses associated with the video content source associated with the first video content, characters associated with the video content source associated with the first video content, phrases associated with the video content source associated with the first video content, or credits associated with the video content source associated with the first video content. 14. An apparatus, comprising:
at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to:
receive a plurality of metadata associated with a first video content of a plurality of video content, the plurality of metadata including a plurality of first metadata, each first metadata of the plurality of first metadata originating from a respective metadata source among a plurality of metadata sources, each of the first metadata corresponding to information regarding the first video content among the plurality of video content;
compile the plurality of first metadata from the plurality of metadata sources;
determine whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata;
based on a determination that at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata, determine that a first set of the plurality of first metadata more accurately corresponds to the first video content, wherein the first set of the plurality of first metadata includes one or more first metadata members that are consistent, wherein the first set includes more first metadata members than any other sets of the plurality of first metadata with one or more first metadata members that are consistent;
modify one or more of the plurality of first metadata to be consistent with the first set of the plurality of first metadata;
generate an electronic program guide (“EPG”) that presents the information regarding the first video content based on the modified one or more of the plurality of first metadata; and
display the EPG on a display device. 15. The apparatus of claim 14, wherein the apparatus comprises one of an EPG system, a metadata server, a set-top box (“STB”), a digital video recording (“DVR”) device, a processor of the display device running a software application (“app”), a processor of a user device running an app, a server computer over a network, a cloud-based computing system over a network, a media player, or a gaming console. 16. The apparatus of claim 14, wherein the display device comprises one of a television set, a smart television, a computer monitor, a laptop monitor, or a projection system. 17. The apparatus of claim 14, wherein the first video content is available from a plurality of video content sources, each comprising one of a video streaming source, a video broadcast source, an off the air (“OTA”) source, or a third party video content source. 18. The apparatus of claim 14, wherein each of the plurality of first metadata is received by the computing system in response to one of a pull data distribution instruction, a push data distribution instruction, or a hybrid push-pull data distribution instruction. 19. The apparatus of claim 14, wherein determining whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata and analyzing the plurality of first metadata to determine which set of first metadata more accurately corresponds to the first video content further comprises using at least one of a metadata provider ranking technique, a self-learning adaptive technique, an image recognition technique, an audio recognition technique, a video recognition technique, or a combination of these techniques. 20. A system, comprising:
a computing system, comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to:
receive a plurality of metadata associated with a first video content fo a plurality of video content, the plurality of metadata including a plurality of first metadata each first metadata of the plurality of first metadata originating from a respective metadata source among a plurality of metadata sources, each of the first metadata corresponding to information regarding the first video content among the plurality of video content;
compile the plurality of first metadata from the plurality of metadata sources;
determine whether at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata;
based on a determination that at least one first metadata of the plurality of first metadata is inconsistent with other first metadata of the plurality of first metadata, determine that a first set of the plurality of first metadata more accurately corresponds to the first video content, wherein the first set of the plurality of first metadata includes one or more first metadata members that are consistent, wherein the first set includes more first metadata members than any other sets of the plurality of first metadata with one or more first metadata members that are consistent;
modify one or more of the plurality of first metadata to be consistent with the first set of the plurality of first metadata;
generate an electronic program guide (“EPG”) that presents the information regarding the first video content based on the modified one or more of the plurality of first metadata; and
send the EPG to a display device; and
the display device, comprising:
a display screen;
at least one second processor; and
a second non-transitory computer readable medium communicatively coupled to the at least one second processor, the second non-transitory computer readable medium having stored thereon computer software comprising a second set of instructions that, when executed by the at least one second processor, causes the display device to:
receive the EPG from the computing system; and
display the EPG on the display screen. 21. The system of claim 20, wherein the computing system comprises one of an EPG system, a metadata server, a set-top box (“STB”), a digital video recording (“DVR”) device, a processor of the display device running a software application (“app”), a processor of a user device running an app, a server computer over a network, a cloud-based computing system over a network, a media player, or a gaming console. | 2,400 |
8,207 | 8,207 | 15,298,549 | 2,413 | Embodiments of systems and techniques are described for supporting WLAN offloading. In some embodiments, a network management system (NMS) for WLAN offloading may include a network manager (NM); a first element manager (EM), coupled to the network manager, to communicate with the network manager and one or more WLANs; and a second EM, coupled to the NM, to communicate with the NM and one or more base stations of a cellular network. Coverage areas of at least one access point (AP) of the one or more WLANs are overlaid with at least one cell of the cellular network to support a WLAN offloading operation. Further, the NM is to activate the WLAN offloading operation based at least in part on at least one indicator received from the one or more WLANs. Other embodiments may be described and claimed. | 1.-20. (canceled) 21. One or more non-transitory, computer-readable media having instructions that, when executed, cause an element manager (“EM”) to:
obtain first management information transmitted from an access point (“AP”) of a wireless local area access network (“WLAN”) via a first interface, wherein the first management information includes WLAN performance information or WLAN alarm information; and
map the first management information to second management information to be sent via a Type-2 interface, wherein the Type-2 interface is implemented according to a 3rd generation partnership project (“3PP”) protocol, and wherein the Type-2 interface and the first interface are different. 22. The one or more non-transitory, computer-readable media of claim 21, wherein the instructions, when executed, further cause the EM to send the second management information to an integration reference point (“IRP”) manager of a 3GPP communication network via the Type-2 interface. 23. The one or more non-transitory, computer-readable media of claim 22, wherein the instructions, when executed, further cause the EM to send the second management information to the IRP manager to facilitate management of a WLAN offloading operation based on the WLAN performance information or the WLAN alarm information. 24. The one or more non-transitory, computer-readable media of claim 21, wherein the first management information is to indicate a state change of the AP. 25. The one or more non-transitory, computer-readable media of claim 24, wherein the state change is a change of an ifOperStatus object to up, to indicate a WLAN air interface link is up, or down, to indicate the WLAN air interface link is down. 26. The one or more non-transitory, computer-readable media of claim 21, wherein the second management information includes WLAN alarm information and the Type-2 interface is an alarm integration reference point (AlarmIRP) interface. 27. The one or more non-transitory, computer-readable media of claim 21, wherein the EM is to receive the first management information from an access controller. 28. The one or more non-transitory, computer-readable media of claim 21, wherein the first interface is a Type-1 interface implemented according to a standardized protocol in Institute of Electrical and Electronics Engineers (“IEEE”) 802.11. 29. The one or more non-transitory, computer-readable media of claim 21, wherein the first management information includes one or more counters to provide a request to send failure count, an acknowledgment failure count, or a media access control protocol data units received count. 30. An element manager (“EM”) comprising:
translator circuitry to:
obtain first management information transmitted from an access point (“AP”) of a wireless local area access network (“WLAN”) via a first interface, wherein the first management information includes WLAN alarm information; and
map the first management information to second management information to be sent via an alarm integration reference point (“AlarmIRP”) interface, wherein the AlarmIRP interface is implemented according to a 3rd generation partnership project (“3GPP”) protocol; and
integration reference point (“IRP”) agent circuitry coupled with the translator circuitry to send the second management information to an IRP manager of a 3GPP communication network via the AlarmIRP interface. 31. The EM of claim 30, wherein the IRP agent circuitry is to send the second management information to the IRP manager to facilitate management of a WLAN offloading operation based on the WLAN alarm information. 32. The EM of claim 30, wherein the first management information is to indicate a state change of the AP. 33. The EM of claim 32, wherein the state change is a change of an ifOperStatus object to up, to indicate a WLAN air interface link is up, or down, to indicate the WLAN air interface link is down. 34. The EM of claim 30, wherein the translator circuitry is to receive the first management information from an access controller. 35. The EM of claim 30, wherein the first interface is a Type-1 interface implemented according to a standardized protocol in Institute of Electrical and Electronics Engineers (“IEEE”) 802.11. 36. The EM of claim 30, wherein the first management information comprises a plurality of alarms from the AP. 37. A system comprising:
access controller (“AC”) circuitry to communicate first management information with a plurality of wireless local area access network (“WLAN”) access points (“APs”) via a Type-1 interface, wherein the first management information includes WLAN performance information or WLAN alarm information, and wherein the Type-1 interface is implemented according to a lightweight access point protocol (“LWAPP”) used by at least one of the plurality of WLAN APs; integration reference point (“IRP”) agent circuitry to communicate second management information with an IRP manager of a network management (NM) apparatus via a Type-2 interface, wherein the Type-2 interface is implemented according to a standardized protocol in 3rd generation partnership project (“3GPP”), and wherein the type-2 interface and the type-1 interface are different; and translation circuitry, coupled with the AC circuitry and the IRP agent circuitry, to map the first management information to the second management information or the second management information to the first management information. 38. The system of claim 37, wherein the first management information includes WLAN performance monitoring information. 39. The system of claim 37, wherein the second management information comprises WLAN offloading information or WLAN management information. 40. The system of claim 37, wherein the Type-2interface is a performance management integration reference point (“PMIRP”) interface, and the IRP agent circuitry is to communicate a plurality of performance measurements in the second management information to the IRP manager via the PMIRP interface. 41. The system of claim 37, wherein the Type-2 interface is an alarm integration reference point (“AlarmIRP”) interface and the IRP agent circuitry is to communicate a plurality of alarms in the second management information to the IRP manager via the AlarmIRP interface, the plurality of alarms received from the plurality of WLAN APs via the Type-1 interface. 42. The system of claim 37, wherein the IRP agent circuitry is to provide, to the IRP manager, a plurality of performance measurements from the plurality of WLAN APs. 43. The system of claim 37, wherein the AC circuitry is to receive performance measurements of the WLAN APs in a form that is compatible with the LWAPP. 44. The system of claim 43, wherein the performance measurements are received in a form that is compatible with a quality of service (“QoS”) counters table, and wherein the translation circuitry is to translate the performance measurements of the WLAN APs from the QoS counters table to the Type-2 interface. 45. The system of claim 43, wherein the performance measurements comprise data volume measured per elapsed time on a media access control (“MAC”) layer or an Internet protocol (“IP”) layer of the WLAN APs. 46. One or more non-transitory, computer-readable media having instructions that, when executed, cause an element manager to:
obtain first management information from an access point (“AP”) of a wireless local area access network (“WLAN”) via a Type-1 interface, wherein the first management information includes WLAN performance information or WLAN alarm information, and wherein the Type-1 interface is implemented according to a lightweight access point protocol (“LWAPP”); map the first management information to second management information to be sent via a Type-2 interface, wherein the Type-2 interface is implemented according to a standardized protocol in 3rd generation partnership project (3GPP), and wherein the Type-2 interface and the Type-1 interface are different; and send the second management information to a network manager associated with a 3GPP communication network via the Type-2 interface. 47. The one or more non-transitory, computer-readable media of claim 46, wherein the instructions, when executed, further cause the element manager to:
send instructions to the AP via the Type-1 interface to adjust offloading traffic between the AP and a base station of a cellular network. 48. The one or more non-transitory, computer-readable media of claim 47, wherein the element manager is to send the instructions based on a traffic volume threshold or a traffic type filter for WLAN offloading. 49. The one or more non-transitory, computer-readable media of claim 46, wherein the first management information comprises a plurality of performance measurements of the AP or a plurality of alarms from the AP. 50. The one or more non-transitory, computer-readable media of claim 46, wherein the first management information comprises performance measurements of the AP in a form that is compatible with a control and provisioning of wireless access points (“CAPWAP”) protocol. 51. The one or more non-transitory, computer-readable media of claim 50, wherein the performance measurements are received in a form that is compatible with a quality of service (“QoS”) counters table, and wherein translate the first management information comprises translate the performance measurements of the AP from the QoS counters table to the Type-2 interface. 52. The one or more non-transitory, computer-readable media of claim 50, wherein the performance measurements comprise data volume measured on a media access control (“MAC”) layer of the AP. 53. The one or more non-transitory, computer-readable media of claim 50, wherein the performance measurements comprise data volume measured on an IP layer of the AP per elapsed time. 54. The one or more non-transitory, computer-readable media of claim 46, wherein the instructions, when executed, further cause the element manager to:
detect one or more AP faults associated with the WLAN based on the first management information; and reduce an offloading volume threshold associated with the WLAN offloading operation based on detection of one or more AP faults. 55. The one or more non-transitory, computer-readable media of claim 46, wherein the instructions, when executed, further cause the element manager to:
monitor a distribution of traffic among two or more cells of the AP based on the first management information; and redistribute a part of the traffic from a first AP cell to a second AP cell based on an imbalance in the distribution of traffic. | Embodiments of systems and techniques are described for supporting WLAN offloading. In some embodiments, a network management system (NMS) for WLAN offloading may include a network manager (NM); a first element manager (EM), coupled to the network manager, to communicate with the network manager and one or more WLANs; and a second EM, coupled to the NM, to communicate with the NM and one or more base stations of a cellular network. Coverage areas of at least one access point (AP) of the one or more WLANs are overlaid with at least one cell of the cellular network to support a WLAN offloading operation. Further, the NM is to activate the WLAN offloading operation based at least in part on at least one indicator received from the one or more WLANs. Other embodiments may be described and claimed.1.-20. (canceled) 21. One or more non-transitory, computer-readable media having instructions that, when executed, cause an element manager (“EM”) to:
obtain first management information transmitted from an access point (“AP”) of a wireless local area access network (“WLAN”) via a first interface, wherein the first management information includes WLAN performance information or WLAN alarm information; and
map the first management information to second management information to be sent via a Type-2 interface, wherein the Type-2 interface is implemented according to a 3rd generation partnership project (“3PP”) protocol, and wherein the Type-2 interface and the first interface are different. 22. The one or more non-transitory, computer-readable media of claim 21, wherein the instructions, when executed, further cause the EM to send the second management information to an integration reference point (“IRP”) manager of a 3GPP communication network via the Type-2 interface. 23. The one or more non-transitory, computer-readable media of claim 22, wherein the instructions, when executed, further cause the EM to send the second management information to the IRP manager to facilitate management of a WLAN offloading operation based on the WLAN performance information or the WLAN alarm information. 24. The one or more non-transitory, computer-readable media of claim 21, wherein the first management information is to indicate a state change of the AP. 25. The one or more non-transitory, computer-readable media of claim 24, wherein the state change is a change of an ifOperStatus object to up, to indicate a WLAN air interface link is up, or down, to indicate the WLAN air interface link is down. 26. The one or more non-transitory, computer-readable media of claim 21, wherein the second management information includes WLAN alarm information and the Type-2 interface is an alarm integration reference point (AlarmIRP) interface. 27. The one or more non-transitory, computer-readable media of claim 21, wherein the EM is to receive the first management information from an access controller. 28. The one or more non-transitory, computer-readable media of claim 21, wherein the first interface is a Type-1 interface implemented according to a standardized protocol in Institute of Electrical and Electronics Engineers (“IEEE”) 802.11. 29. The one or more non-transitory, computer-readable media of claim 21, wherein the first management information includes one or more counters to provide a request to send failure count, an acknowledgment failure count, or a media access control protocol data units received count. 30. An element manager (“EM”) comprising:
translator circuitry to:
obtain first management information transmitted from an access point (“AP”) of a wireless local area access network (“WLAN”) via a first interface, wherein the first management information includes WLAN alarm information; and
map the first management information to second management information to be sent via an alarm integration reference point (“AlarmIRP”) interface, wherein the AlarmIRP interface is implemented according to a 3rd generation partnership project (“3GPP”) protocol; and
integration reference point (“IRP”) agent circuitry coupled with the translator circuitry to send the second management information to an IRP manager of a 3GPP communication network via the AlarmIRP interface. 31. The EM of claim 30, wherein the IRP agent circuitry is to send the second management information to the IRP manager to facilitate management of a WLAN offloading operation based on the WLAN alarm information. 32. The EM of claim 30, wherein the first management information is to indicate a state change of the AP. 33. The EM of claim 32, wherein the state change is a change of an ifOperStatus object to up, to indicate a WLAN air interface link is up, or down, to indicate the WLAN air interface link is down. 34. The EM of claim 30, wherein the translator circuitry is to receive the first management information from an access controller. 35. The EM of claim 30, wherein the first interface is a Type-1 interface implemented according to a standardized protocol in Institute of Electrical and Electronics Engineers (“IEEE”) 802.11. 36. The EM of claim 30, wherein the first management information comprises a plurality of alarms from the AP. 37. A system comprising:
access controller (“AC”) circuitry to communicate first management information with a plurality of wireless local area access network (“WLAN”) access points (“APs”) via a Type-1 interface, wherein the first management information includes WLAN performance information or WLAN alarm information, and wherein the Type-1 interface is implemented according to a lightweight access point protocol (“LWAPP”) used by at least one of the plurality of WLAN APs; integration reference point (“IRP”) agent circuitry to communicate second management information with an IRP manager of a network management (NM) apparatus via a Type-2 interface, wherein the Type-2 interface is implemented according to a standardized protocol in 3rd generation partnership project (“3GPP”), and wherein the type-2 interface and the type-1 interface are different; and translation circuitry, coupled with the AC circuitry and the IRP agent circuitry, to map the first management information to the second management information or the second management information to the first management information. 38. The system of claim 37, wherein the first management information includes WLAN performance monitoring information. 39. The system of claim 37, wherein the second management information comprises WLAN offloading information or WLAN management information. 40. The system of claim 37, wherein the Type-2interface is a performance management integration reference point (“PMIRP”) interface, and the IRP agent circuitry is to communicate a plurality of performance measurements in the second management information to the IRP manager via the PMIRP interface. 41. The system of claim 37, wherein the Type-2 interface is an alarm integration reference point (“AlarmIRP”) interface and the IRP agent circuitry is to communicate a plurality of alarms in the second management information to the IRP manager via the AlarmIRP interface, the plurality of alarms received from the plurality of WLAN APs via the Type-1 interface. 42. The system of claim 37, wherein the IRP agent circuitry is to provide, to the IRP manager, a plurality of performance measurements from the plurality of WLAN APs. 43. The system of claim 37, wherein the AC circuitry is to receive performance measurements of the WLAN APs in a form that is compatible with the LWAPP. 44. The system of claim 43, wherein the performance measurements are received in a form that is compatible with a quality of service (“QoS”) counters table, and wherein the translation circuitry is to translate the performance measurements of the WLAN APs from the QoS counters table to the Type-2 interface. 45. The system of claim 43, wherein the performance measurements comprise data volume measured per elapsed time on a media access control (“MAC”) layer or an Internet protocol (“IP”) layer of the WLAN APs. 46. One or more non-transitory, computer-readable media having instructions that, when executed, cause an element manager to:
obtain first management information from an access point (“AP”) of a wireless local area access network (“WLAN”) via a Type-1 interface, wherein the first management information includes WLAN performance information or WLAN alarm information, and wherein the Type-1 interface is implemented according to a lightweight access point protocol (“LWAPP”); map the first management information to second management information to be sent via a Type-2 interface, wherein the Type-2 interface is implemented according to a standardized protocol in 3rd generation partnership project (3GPP), and wherein the Type-2 interface and the Type-1 interface are different; and send the second management information to a network manager associated with a 3GPP communication network via the Type-2 interface. 47. The one or more non-transitory, computer-readable media of claim 46, wherein the instructions, when executed, further cause the element manager to:
send instructions to the AP via the Type-1 interface to adjust offloading traffic between the AP and a base station of a cellular network. 48. The one or more non-transitory, computer-readable media of claim 47, wherein the element manager is to send the instructions based on a traffic volume threshold or a traffic type filter for WLAN offloading. 49. The one or more non-transitory, computer-readable media of claim 46, wherein the first management information comprises a plurality of performance measurements of the AP or a plurality of alarms from the AP. 50. The one or more non-transitory, computer-readable media of claim 46, wherein the first management information comprises performance measurements of the AP in a form that is compatible with a control and provisioning of wireless access points (“CAPWAP”) protocol. 51. The one or more non-transitory, computer-readable media of claim 50, wherein the performance measurements are received in a form that is compatible with a quality of service (“QoS”) counters table, and wherein translate the first management information comprises translate the performance measurements of the AP from the QoS counters table to the Type-2 interface. 52. The one or more non-transitory, computer-readable media of claim 50, wherein the performance measurements comprise data volume measured on a media access control (“MAC”) layer of the AP. 53. The one or more non-transitory, computer-readable media of claim 50, wherein the performance measurements comprise data volume measured on an IP layer of the AP per elapsed time. 54. The one or more non-transitory, computer-readable media of claim 46, wherein the instructions, when executed, further cause the element manager to:
detect one or more AP faults associated with the WLAN based on the first management information; and reduce an offloading volume threshold associated with the WLAN offloading operation based on detection of one or more AP faults. 55. The one or more non-transitory, computer-readable media of claim 46, wherein the instructions, when executed, further cause the element manager to:
monitor a distribution of traffic among two or more cells of the AP based on the first management information; and redistribute a part of the traffic from a first AP cell to a second AP cell based on an imbalance in the distribution of traffic. | 2,400 |
8,208 | 8,208 | 13,867,867 | 2,414 | A packet recovery transmits N requests for retransmission of the transmitted packet to the sender node at N scheduled times upon determining satisfaction of a packet recovery condition associated with a transmitted packet from a sender node at a receiver node. At least one of the N scheduled times includes a receiver waiting time. M retransmissions of the transmitted packet from sender node at M scheduled times is performed upon the first receipt of a request for retransmission of the transmitted packet. At least one of the M scheduled times includes a sender waiting time. N and M are non-zero positive integers, and at least one of N or M is greater than one. | 1. A packet recovery method, comprising:
upon determining satisfaction of a packet recovery condition associated with a transmitted packet from a sender node at a receiver node, transmitting N requests for retransmission of the transmitted packet to the sender node at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time; and upon the first receipt of a request for retransmission of the transmitted packet, performing M retransmissions of the transmitted packet from sender node at M scheduled times, wherein at least one of the M scheduled times includes a sender waiting time, wherein N and M are non-zero positive integers, and wherein at least one of N or M is greater than one. 2. The method of claim 1, wherein the packet recovery condition is associated with meeting a deadline driven criteria for the transmitted packet. 3. The method of claim 1, wherein at least one of the sender or receiver nodes comprises an overlay node. 4. The method of claim 1, wherein the packet recovery process is terminated upon receipt of the transmitted packet from the sender node. 5. The method of claim 1, wherein the packet recovery condition is satisfied based on detection of an out-of-order arrival of sequenced packets. 6. The method of claim 1, wherein the packet recovery condition is satisfied after the elapse of a wait period from detection of an out-of-order arrival of sequenced packets. 7. The method of claim 6, wherein the wait period depends on a target deadline associated with the deadline driven criteria. 8. The method of claim 1, wherein at least one of a request for retransmission of the transmitted packet or a retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for transmission of the transmitted packet. 9. The method of claim 1, wherein at least one of a request for retransmission of the transmitted packet and a retransmission of the transmitted packet are transmitted on different physical links. 10. The method of claim 1, wherein a plurality of requests for retransmissions of the transmitted packet are transmitted on different physical links. 11. The method of claim 1, wherein a plurality of retransmissions of the transmitted packet are transmitted on different physical links. 12. A method for recovering packets, comprising:
a) upon determining satisfaction of a packet recovery condition for a transmitted packet from a sender node to a receiver node:
associating N scheduled times with N requests for retransmission of the transmitted packet to the sender node, wherein at least one of the N scheduled times includes a receiver waiting time; and
at each scheduled time, transmitting a request for retransmission of the transmitted packet; and
b) upon the first receipt of a request for retransmission of the transmitted packet at the sender node:
associating M scheduled times with M retransmissions of the transmitted packet to the receiver node, wherein at least one of the M scheduled times includes a sender waiting time; and
at each scheduled time, retransmitting the transmitted packet, wherein the N and M are non-zero positive integers and wherein at least one of N or M is greater than one. 13. A packet recovery method, comprising:
upon determining satisfaction of a packet recovery condition associated with a transmitted packet from a sender node at a receiver node, transmitting N requests for retransmission of the transmitted packet to the sender node at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time; and upon the first receipt of a request for retransmission of the transmitted packet, using an erasure coding function, with integer parameter k greater than 1 and less than M, to generate M encoded blocks such that any k out of M encoded blocks are sufficient to recreate the transmitted packet at the receiver node, transmitting the M encoded blocks to the receiver node at M scheduled times, wherein at least one of the M scheduled times includes a sender waiting time, wherein N and M are non-zero positive integers, and wherein M is greater than two. 14. The method of claim 13, wherein the packet recovery condition is associated with meeting a deadline driven criteria for the transmitted packet. 15. The method of claim 13, wherein at least one of the sender or receiver nodes comprises an overlay node. 16. The method of claim 13, wherein the packet recovery process is terminated upon receipt of the transmitted packet from the sender node. 17. The method of claim 13, wherein the packet recovery condition is satisfied based on detection of an out-of-order arrival of sequenced packets. 18. The method of claim 13, wherein the packet recovery condition is satisfied after the elapse of a wait period from detection of an out-of-order arrival of sequenced packets. 19. The method of claim 18, wherein the wait period depends on a target deadline associated with the deadline driven criteria. 20. The method of claim 13, wherein at least one of a request for retransmission of the transmitted packet or a retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for transmission of the transmitted packet. 21. The method of claim 13, wherein at least one of a request for retransmission of the transmitted packet and a retransmission of the transmitted packet are transmitted on different physical links. 22. The method of claim 13, wherein a plurality of requests for retransmissions of the transmitted packet are transmitted on different physical links. 23. The method of claim 13, wherein a plurality of retransmissions of the transmitted packet are transmitted on different physical links. 24. A method for recovering packets, comprising:
a) upon determining satisfaction of a packet recovery condition for a transmitted packet from a sender node to a receiver node:
associating N scheduled times with N requests for retransmission of the transmitted packet to the sender node, wherein at least one of the N scheduled times includes a receiver waiting time; and
at each scheduled time, transmitting a request for retransmission of the transmitted packet; and
b) upon the first receipt of a request for retransmission of the transmitted packet at the sender node:
using an erasure coding function, with integer parameter k greater than 1 and less than M, to generate M encoded blocks such that any k out of M encoded blocks are sufficient to recreate the transmitted packet at the receiver node; and
associating M scheduled times, each of them with one of the M encoded blocks, wherein at least one of the M scheduled times includes a sender waiting time; and
at each scheduled time, transmitting the corresponding encoded block to the receiver node, wherein the N and M are non-zero positive integers and M is greater than two. 25. A packet recovery method at a receiver node, comprising:
only upon the first determination of satisfaction of a packet recovery condition associated with a transmitted packet to the receive node, transmitting N requests for retransmission of the transmitted packet at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time, wherein N is an integer greater than one; and receiving M retransmissions of the transmitted packet, wherein M is a non-zero positive integer. 26. The method of claim 25, wherein the packet recovery condition is associated with meeting a deadline driven criteria for the transmitted packet. 27. The method of claim 25, wherein the receiver node comprises an overlay node. 28. The method of claim 25, wherein the packet recovery process is terminated upon receipt of the transmitted packet. 29. The method of claim 25, wherein the packet recovery condition is satisfied based on detection of an out-of-order arrival of sequenced packets. 30. The method of claim 25, wherein the packet recovery condition is satisfied after the elapse of a wait period from detection of an out-of-order arrival of sequenced packets. 31. The method of claim 30, wherein the wait period depends on a target deadline associated with the deadline driven criteria. 32. The method of claim 25, wherein a request for retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for the transmitted packet. 33. The method of claim 25, wherein a plurality of requests for retransmissions of the transmitted packet are transmitted on different physical links. 34. A packet retransmission method at a sender node, comprising:
receiving N requests for retransmission of a transmitted packet by the sender node; and only upon the first receipt of a request for retransmission of the transmitted packet, performing M retransmissions of the transmitted packet at M scheduled time, wherein at least one of the M scheduled time includes a sender waiting time, wherein N and M are non-zero positive integers, and wherein at least one of N or M is greater than one. 35. The method of claim 34, wherein the sender node comprises an overlay node. 36. The method of claim 34, wherein a retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for the transmitted packet. 37. The method of claim 34, wherein a retransmission of the transmitted packet is transmitted on a different physical link than the request for retransmission was received on. 38. The method of claim 34, wherein a plurality of retransmissions of the transmitted packet are transmitted on different physical links. 39. A receiver node, comprising:
a processor configured to make a determination that a packet recovery condition associated with a transmitted packet to the receiver node is satisfied; a transmitter that only upon the first determination of satisfaction of the packet recovery condition transmits N requests for retransmission of the transmitted packet at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time, and wherein N is an integer greater than one; and a receiver configured to receive M retransmissions of the transmitted packet, wherein M is a non-zero positive integer. 40. A sender node, comprising:
a receiver configured to receive N requests for retransmission of a transmitted packet by the sender node; a processor configured to make a determination of the first receipt of a request for retransmission of the transmitted packet; and a transmitter that only upon the first receipt of a request for retransmission of the transmitted packet, performs M retransmissions of the transmitted packet at respective M scheduled times, wherein N and M are non-zero positive integers, and wherein at least one of N or M is greater than one. | A packet recovery transmits N requests for retransmission of the transmitted packet to the sender node at N scheduled times upon determining satisfaction of a packet recovery condition associated with a transmitted packet from a sender node at a receiver node. At least one of the N scheduled times includes a receiver waiting time. M retransmissions of the transmitted packet from sender node at M scheduled times is performed upon the first receipt of a request for retransmission of the transmitted packet. At least one of the M scheduled times includes a sender waiting time. N and M are non-zero positive integers, and at least one of N or M is greater than one.1. A packet recovery method, comprising:
upon determining satisfaction of a packet recovery condition associated with a transmitted packet from a sender node at a receiver node, transmitting N requests for retransmission of the transmitted packet to the sender node at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time; and upon the first receipt of a request for retransmission of the transmitted packet, performing M retransmissions of the transmitted packet from sender node at M scheduled times, wherein at least one of the M scheduled times includes a sender waiting time, wherein N and M are non-zero positive integers, and wherein at least one of N or M is greater than one. 2. The method of claim 1, wherein the packet recovery condition is associated with meeting a deadline driven criteria for the transmitted packet. 3. The method of claim 1, wherein at least one of the sender or receiver nodes comprises an overlay node. 4. The method of claim 1, wherein the packet recovery process is terminated upon receipt of the transmitted packet from the sender node. 5. The method of claim 1, wherein the packet recovery condition is satisfied based on detection of an out-of-order arrival of sequenced packets. 6. The method of claim 1, wherein the packet recovery condition is satisfied after the elapse of a wait period from detection of an out-of-order arrival of sequenced packets. 7. The method of claim 6, wherein the wait period depends on a target deadline associated with the deadline driven criteria. 8. The method of claim 1, wherein at least one of a request for retransmission of the transmitted packet or a retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for transmission of the transmitted packet. 9. The method of claim 1, wherein at least one of a request for retransmission of the transmitted packet and a retransmission of the transmitted packet are transmitted on different physical links. 10. The method of claim 1, wherein a plurality of requests for retransmissions of the transmitted packet are transmitted on different physical links. 11. The method of claim 1, wherein a plurality of retransmissions of the transmitted packet are transmitted on different physical links. 12. A method for recovering packets, comprising:
a) upon determining satisfaction of a packet recovery condition for a transmitted packet from a sender node to a receiver node:
associating N scheduled times with N requests for retransmission of the transmitted packet to the sender node, wherein at least one of the N scheduled times includes a receiver waiting time; and
at each scheduled time, transmitting a request for retransmission of the transmitted packet; and
b) upon the first receipt of a request for retransmission of the transmitted packet at the sender node:
associating M scheduled times with M retransmissions of the transmitted packet to the receiver node, wherein at least one of the M scheduled times includes a sender waiting time; and
at each scheduled time, retransmitting the transmitted packet, wherein the N and M are non-zero positive integers and wherein at least one of N or M is greater than one. 13. A packet recovery method, comprising:
upon determining satisfaction of a packet recovery condition associated with a transmitted packet from a sender node at a receiver node, transmitting N requests for retransmission of the transmitted packet to the sender node at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time; and upon the first receipt of a request for retransmission of the transmitted packet, using an erasure coding function, with integer parameter k greater than 1 and less than M, to generate M encoded blocks such that any k out of M encoded blocks are sufficient to recreate the transmitted packet at the receiver node, transmitting the M encoded blocks to the receiver node at M scheduled times, wherein at least one of the M scheduled times includes a sender waiting time, wherein N and M are non-zero positive integers, and wherein M is greater than two. 14. The method of claim 13, wherein the packet recovery condition is associated with meeting a deadline driven criteria for the transmitted packet. 15. The method of claim 13, wherein at least one of the sender or receiver nodes comprises an overlay node. 16. The method of claim 13, wherein the packet recovery process is terminated upon receipt of the transmitted packet from the sender node. 17. The method of claim 13, wherein the packet recovery condition is satisfied based on detection of an out-of-order arrival of sequenced packets. 18. The method of claim 13, wherein the packet recovery condition is satisfied after the elapse of a wait period from detection of an out-of-order arrival of sequenced packets. 19. The method of claim 18, wherein the wait period depends on a target deadline associated with the deadline driven criteria. 20. The method of claim 13, wherein at least one of a request for retransmission of the transmitted packet or a retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for transmission of the transmitted packet. 21. The method of claim 13, wherein at least one of a request for retransmission of the transmitted packet and a retransmission of the transmitted packet are transmitted on different physical links. 22. The method of claim 13, wherein a plurality of requests for retransmissions of the transmitted packet are transmitted on different physical links. 23. The method of claim 13, wherein a plurality of retransmissions of the transmitted packet are transmitted on different physical links. 24. A method for recovering packets, comprising:
a) upon determining satisfaction of a packet recovery condition for a transmitted packet from a sender node to a receiver node:
associating N scheduled times with N requests for retransmission of the transmitted packet to the sender node, wherein at least one of the N scheduled times includes a receiver waiting time; and
at each scheduled time, transmitting a request for retransmission of the transmitted packet; and
b) upon the first receipt of a request for retransmission of the transmitted packet at the sender node:
using an erasure coding function, with integer parameter k greater than 1 and less than M, to generate M encoded blocks such that any k out of M encoded blocks are sufficient to recreate the transmitted packet at the receiver node; and
associating M scheduled times, each of them with one of the M encoded blocks, wherein at least one of the M scheduled times includes a sender waiting time; and
at each scheduled time, transmitting the corresponding encoded block to the receiver node, wherein the N and M are non-zero positive integers and M is greater than two. 25. A packet recovery method at a receiver node, comprising:
only upon the first determination of satisfaction of a packet recovery condition associated with a transmitted packet to the receive node, transmitting N requests for retransmission of the transmitted packet at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time, wherein N is an integer greater than one; and receiving M retransmissions of the transmitted packet, wherein M is a non-zero positive integer. 26. The method of claim 25, wherein the packet recovery condition is associated with meeting a deadline driven criteria for the transmitted packet. 27. The method of claim 25, wherein the receiver node comprises an overlay node. 28. The method of claim 25, wherein the packet recovery process is terminated upon receipt of the transmitted packet. 29. The method of claim 25, wherein the packet recovery condition is satisfied based on detection of an out-of-order arrival of sequenced packets. 30. The method of claim 25, wherein the packet recovery condition is satisfied after the elapse of a wait period from detection of an out-of-order arrival of sequenced packets. 31. The method of claim 30, wherein the wait period depends on a target deadline associated with the deadline driven criteria. 32. The method of claim 25, wherein a request for retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for the transmitted packet. 33. The method of claim 25, wherein a plurality of requests for retransmissions of the transmitted packet are transmitted on different physical links. 34. A packet retransmission method at a sender node, comprising:
receiving N requests for retransmission of a transmitted packet by the sender node; and only upon the first receipt of a request for retransmission of the transmitted packet, performing M retransmissions of the transmitted packet at M scheduled time, wherein at least one of the M scheduled time includes a sender waiting time, wherein N and M are non-zero positive integers, and wherein at least one of N or M is greater than one. 35. The method of claim 34, wherein the sender node comprises an overlay node. 36. The method of claim 34, wherein a retransmission of the transmitted packet is transmitted over a physical link that is different from the physical link used for the transmitted packet. 37. The method of claim 34, wherein a retransmission of the transmitted packet is transmitted on a different physical link than the request for retransmission was received on. 38. The method of claim 34, wherein a plurality of retransmissions of the transmitted packet are transmitted on different physical links. 39. A receiver node, comprising:
a processor configured to make a determination that a packet recovery condition associated with a transmitted packet to the receiver node is satisfied; a transmitter that only upon the first determination of satisfaction of the packet recovery condition transmits N requests for retransmission of the transmitted packet at N scheduled times, wherein at least one of the N scheduled times includes a receiver waiting time, and wherein N is an integer greater than one; and a receiver configured to receive M retransmissions of the transmitted packet, wherein M is a non-zero positive integer. 40. A sender node, comprising:
a receiver configured to receive N requests for retransmission of a transmitted packet by the sender node; a processor configured to make a determination of the first receipt of a request for retransmission of the transmitted packet; and a transmitter that only upon the first receipt of a request for retransmission of the transmitted packet, performs M retransmissions of the transmitted packet at respective M scheduled times, wherein N and M are non-zero positive integers, and wherein at least one of N or M is greater than one. | 2,400 |
8,209 | 8,209 | 15,421,058 | 2,477 | In accordance with one aspect of the invention, a process for handling emergency calls from a caller in a voice over IP system is described. The process involves receiving a routing request message including a caller identifier and a callee identifier. The process also involves setting an emergency call flag active in response to the callee identifier matching an emergency call identifier pre-associated with the caller. The process further involves producing an emergency response center identifier in response to the emergency call identifier. The process also involves determining whether the caller identifier is associated with a pre-associated direct inward dialing (DID) identifier. The process further involves producing a direct inward dialing (DID) identifier for the caller by associating a temporary DID identifier with the caller identifier when the emergency call flag is active and it is determined that the caller has no pre-associated DID. The process also involves producing a routing message including the emergency response center identifier and the temporary DID identifier for receipt by a routing controller operable to cause a route to be established between the caller and the emergency response center. | 1. A process for routing emergency communications having a caller identifier associated with a caller and a callee identifier associated with a callee, the process comprising:
using the caller identifier to identify a dialing profile associated with the caller, said dialing profile including an emergency call identifier and an emergency response center identifier associated with the caller; when said callee identifier matches said emergency call identifier:
producing a routing message for receipt by a call controller operable to cause a route to be established between the caller and an emergency response center, said routing message having a first portion and a second portion, said first portion including said emergency response center identifier; and
initiating a search of a direct inward dial (DID) database for a DID record associating a DID identifier with said caller, and
when said search finds a DID record associating a DID identifier with said caller, causing said second portion to include said DID identifier from said DID record, and
when said search does not find a DID record associating a DID identifier with said caller, associating a temporary DID identifier with said caller and causing said second portion to include said temporary DID identifier. | In accordance with one aspect of the invention, a process for handling emergency calls from a caller in a voice over IP system is described. The process involves receiving a routing request message including a caller identifier and a callee identifier. The process also involves setting an emergency call flag active in response to the callee identifier matching an emergency call identifier pre-associated with the caller. The process further involves producing an emergency response center identifier in response to the emergency call identifier. The process also involves determining whether the caller identifier is associated with a pre-associated direct inward dialing (DID) identifier. The process further involves producing a direct inward dialing (DID) identifier for the caller by associating a temporary DID identifier with the caller identifier when the emergency call flag is active and it is determined that the caller has no pre-associated DID. The process also involves producing a routing message including the emergency response center identifier and the temporary DID identifier for receipt by a routing controller operable to cause a route to be established between the caller and the emergency response center.1. A process for routing emergency communications having a caller identifier associated with a caller and a callee identifier associated with a callee, the process comprising:
using the caller identifier to identify a dialing profile associated with the caller, said dialing profile including an emergency call identifier and an emergency response center identifier associated with the caller; when said callee identifier matches said emergency call identifier:
producing a routing message for receipt by a call controller operable to cause a route to be established between the caller and an emergency response center, said routing message having a first portion and a second portion, said first portion including said emergency response center identifier; and
initiating a search of a direct inward dial (DID) database for a DID record associating a DID identifier with said caller, and
when said search finds a DID record associating a DID identifier with said caller, causing said second portion to include said DID identifier from said DID record, and
when said search does not find a DID record associating a DID identifier with said caller, associating a temporary DID identifier with said caller and causing said second portion to include said temporary DID identifier. | 2,400 |
8,210 | 8,210 | 15,027,214 | 2,461 | In order to allow a plurality of MNOs to share at least two of a radio access network (RAN) ( 100 ), a mobile backhaul network (MBH) ( 200 ), and a core network (CN) ( 300 ), a network control system ( 500 ) operates to enforce a network resource configuration to each of the at least two networks to be shared out of the RAN ( 100 ), the MBH ( 200 ), and the CN ( 300 ) in accordance with common resource partitioning information indicating slicing of network resources among the plurality of MNOs. It is thus possible to contribute to improving the efficiency of performing setting of network resource allocation on the at least two networks to be shared. | 1. A network control system comprising:
a control module configured to enforce a network resource configuration to each of at least two of a radio access network, a mobile backhaul network, and a core network in accordance with common resource partitioning information indicating slicing of network resources among a plurality of mobile network operators, in order to allow the plurality of mobile network operators to share the at least two networks. 2. The network control system according to claim 1, wherein the control module is configured to generate a first configuration regarding allocation of radio resources of the radio access network in accordance with the resource partitioning information, and apply the first configuration to a first network element in the radio access network. 3. The network control system according to claim 2, wherein the first configuration affects scheduling of at least one of downlink transmission and uplink transmission in the first network element. 4. The network control system according to claim 1, wherein the control module is configured to generate a second configuration regarding allocation of a network bandwidth of the mobile backhaul network in accordance with the resource partitioning information, and apply the second configuration to a second network element in the mobile backhaul network. 5. The network control system according to claim 4, wherein the second configuration affects at least one of a Virtual Private Network (VPN) configuration, a Virtual Local Area Network (VLAN) configuration, a Multi-protocol Label Switching (MPLS) configuration, a traffic shaping configuration, and a traffic scheduling configuration in the second network element. 6. The network control system according to claim 1, wherein the control module is configured to generate, in accordance with the resource partitioning information, a third configuration causing at least one hardware element in the core network to function as a virtualized core network node of each of the plurality of mobile operators, and apply the third configuration to the at least one hardware. 7. The network control system according to claim 6, wherein the third configuration indicates allocation of computing resources of the at least one hardware. 8. The network control system according to claim 1, wherein the control module is configured to generate a third configuration regarding allocation of network resources of the core network in accordance with the resource partitioning information, and apply the third configuration to a third network element in the core network. 9. The network control system according to claim 8, wherein the third configuration affects at least one of a traffic shaping configuration and a traffic scheduling configuration in the third network element. 10. The network control system according to claim 1, wherein the control module is configured to receive the resource partitioning information from an Operations Support System (OSS). 11. The network control system according to claim 1, wherein the control module includes:
a mediation module configured to convert the resource partitioning information into configuration information of network resources to be applied to each of the at least two networks; and an enforcement module configured to apply the configuration information to each of the at least two networks. 12. The network control system according to claim 11, wherein
the mediation module includes a Software Defined Networking (SDN) controller, and the enforcement module includes at least one of an Element Management System (EMS) coupled to the radio access network and a Backhaul Resource Manager (BRM) coupled to the mobile backhaul network. 13. The network control system according to claim 1, wherein the resource partitioning information indicates an amount or a proportion of network resources to be partitioned to each of the plurality of mobile network operators. 14. The network control system according to claim 13, wherein the resource partitioning information indicates an amount or a proportion of network resources to be fixedly partitioned to each of the plurality of mobile network operators and an amount or a proportion of network resources to be shared among the plurality of mobile network operators. 15. The network control system according to claim 1, wherein
the resource partitioning information contains first resource partitioning information and second resource partitioning information different from the first resource partitioning information in slicing of network resources, and the control module is configured to select one of the first and second resource partitioning information to be used based on a communication status of one of the at least two networks, and enforce a network resource configuration to each of the at least two networks in accordance with the selected resource partitioning information. 16. The network control system according to claim 15, wherein
the one network is the mobile backhaul network, the mobile backhaul network includes a point-to-point radio link, and the communication status relates to at least one of communication quality, throughput, a modulation scheme, and a code rate of the point-to-point radio link. 17. A control method comprising:
receiving common resource partitioning information indicating slicing of network resources among a plurality of mobile network operators; and converting the resource partitioning information into configuration information of network resources to be applied to each of at least two of a radio access network, a mobile backhaul network, and a core network, in order to allow the plurality of mobile network operators to share the at least two networks. 18. A computer system comprising a unit configured to perform the control method according to claim 17. 19. A non-transitory computer readable medium storing a program for causing a computer to perform the control method according to claim 17. 20. A network control apparatus comprising:
a mediation module configured to convert common resource partitioning information, indicating slicing of network resources among a plurality of mobile network operators, into configuration information of network resources to be applied to each of at least two of a radio access network, a mobile backhaul network, and a core network, in order to allow the plurality of mobile network operators to share the at least two networks. 21. The network control apparatus according to claim 20, wherein
the configuration information contains first configuration information regarding allocation of radio resources of the radio access network, and the first configuration information affects scheduling of at least one of downlink transmission and uplink transmission in a first network element in the radio access network. 22. The network control apparatus according to claim 20, wherein
the configuration information contains second configuration information regarding allocation of a network bandwidth of the mobile backhaul network, and the second configuration information affects at least one of a Virtual Private Network (VPN) configuration, a Virtual Local Area Network (VLAN) configuration, a Multi-Protocol Label Switching (MPLS) configuration, a traffic shaping configuration, and a traffic scheduling configuration in a second network element in the mobile backhaul network. 23. A network management apparatus comprising:
an enforcement module configured to communicate with a management system of a mobile backhaul network to receive a message indicating a communication status of the mobile backhaul network, and change a configuration of network resource allocation among a plurality of mobile network operators based on the communication status of the mobile backhaul network, the configuration of network resource allocation being applied to a radio access network or a core network. | In order to allow a plurality of MNOs to share at least two of a radio access network (RAN) ( 100 ), a mobile backhaul network (MBH) ( 200 ), and a core network (CN) ( 300 ), a network control system ( 500 ) operates to enforce a network resource configuration to each of the at least two networks to be shared out of the RAN ( 100 ), the MBH ( 200 ), and the CN ( 300 ) in accordance with common resource partitioning information indicating slicing of network resources among the plurality of MNOs. It is thus possible to contribute to improving the efficiency of performing setting of network resource allocation on the at least two networks to be shared.1. A network control system comprising:
a control module configured to enforce a network resource configuration to each of at least two of a radio access network, a mobile backhaul network, and a core network in accordance with common resource partitioning information indicating slicing of network resources among a plurality of mobile network operators, in order to allow the plurality of mobile network operators to share the at least two networks. 2. The network control system according to claim 1, wherein the control module is configured to generate a first configuration regarding allocation of radio resources of the radio access network in accordance with the resource partitioning information, and apply the first configuration to a first network element in the radio access network. 3. The network control system according to claim 2, wherein the first configuration affects scheduling of at least one of downlink transmission and uplink transmission in the first network element. 4. The network control system according to claim 1, wherein the control module is configured to generate a second configuration regarding allocation of a network bandwidth of the mobile backhaul network in accordance with the resource partitioning information, and apply the second configuration to a second network element in the mobile backhaul network. 5. The network control system according to claim 4, wherein the second configuration affects at least one of a Virtual Private Network (VPN) configuration, a Virtual Local Area Network (VLAN) configuration, a Multi-protocol Label Switching (MPLS) configuration, a traffic shaping configuration, and a traffic scheduling configuration in the second network element. 6. The network control system according to claim 1, wherein the control module is configured to generate, in accordance with the resource partitioning information, a third configuration causing at least one hardware element in the core network to function as a virtualized core network node of each of the plurality of mobile operators, and apply the third configuration to the at least one hardware. 7. The network control system according to claim 6, wherein the third configuration indicates allocation of computing resources of the at least one hardware. 8. The network control system according to claim 1, wherein the control module is configured to generate a third configuration regarding allocation of network resources of the core network in accordance with the resource partitioning information, and apply the third configuration to a third network element in the core network. 9. The network control system according to claim 8, wherein the third configuration affects at least one of a traffic shaping configuration and a traffic scheduling configuration in the third network element. 10. The network control system according to claim 1, wherein the control module is configured to receive the resource partitioning information from an Operations Support System (OSS). 11. The network control system according to claim 1, wherein the control module includes:
a mediation module configured to convert the resource partitioning information into configuration information of network resources to be applied to each of the at least two networks; and an enforcement module configured to apply the configuration information to each of the at least two networks. 12. The network control system according to claim 11, wherein
the mediation module includes a Software Defined Networking (SDN) controller, and the enforcement module includes at least one of an Element Management System (EMS) coupled to the radio access network and a Backhaul Resource Manager (BRM) coupled to the mobile backhaul network. 13. The network control system according to claim 1, wherein the resource partitioning information indicates an amount or a proportion of network resources to be partitioned to each of the plurality of mobile network operators. 14. The network control system according to claim 13, wherein the resource partitioning information indicates an amount or a proportion of network resources to be fixedly partitioned to each of the plurality of mobile network operators and an amount or a proportion of network resources to be shared among the plurality of mobile network operators. 15. The network control system according to claim 1, wherein
the resource partitioning information contains first resource partitioning information and second resource partitioning information different from the first resource partitioning information in slicing of network resources, and the control module is configured to select one of the first and second resource partitioning information to be used based on a communication status of one of the at least two networks, and enforce a network resource configuration to each of the at least two networks in accordance with the selected resource partitioning information. 16. The network control system according to claim 15, wherein
the one network is the mobile backhaul network, the mobile backhaul network includes a point-to-point radio link, and the communication status relates to at least one of communication quality, throughput, a modulation scheme, and a code rate of the point-to-point radio link. 17. A control method comprising:
receiving common resource partitioning information indicating slicing of network resources among a plurality of mobile network operators; and converting the resource partitioning information into configuration information of network resources to be applied to each of at least two of a radio access network, a mobile backhaul network, and a core network, in order to allow the plurality of mobile network operators to share the at least two networks. 18. A computer system comprising a unit configured to perform the control method according to claim 17. 19. A non-transitory computer readable medium storing a program for causing a computer to perform the control method according to claim 17. 20. A network control apparatus comprising:
a mediation module configured to convert common resource partitioning information, indicating slicing of network resources among a plurality of mobile network operators, into configuration information of network resources to be applied to each of at least two of a radio access network, a mobile backhaul network, and a core network, in order to allow the plurality of mobile network operators to share the at least two networks. 21. The network control apparatus according to claim 20, wherein
the configuration information contains first configuration information regarding allocation of radio resources of the radio access network, and the first configuration information affects scheduling of at least one of downlink transmission and uplink transmission in a first network element in the radio access network. 22. The network control apparatus according to claim 20, wherein
the configuration information contains second configuration information regarding allocation of a network bandwidth of the mobile backhaul network, and the second configuration information affects at least one of a Virtual Private Network (VPN) configuration, a Virtual Local Area Network (VLAN) configuration, a Multi-Protocol Label Switching (MPLS) configuration, a traffic shaping configuration, and a traffic scheduling configuration in a second network element in the mobile backhaul network. 23. A network management apparatus comprising:
an enforcement module configured to communicate with a management system of a mobile backhaul network to receive a message indicating a communication status of the mobile backhaul network, and change a configuration of network resource allocation among a plurality of mobile network operators based on the communication status of the mobile backhaul network, the configuration of network resource allocation being applied to a radio access network or a core network. | 2,400 |
8,211 | 8,211 | 15,535,058 | 2,426 | A computing device presents a user interface in which graphical representations of content may be positioned based on user input. Inclusionary and exclusionary portions of metadata associated with the content may be ranked based on the positions and/or positional relationships of the graphical representations in the user interface. The computing device generates content recommendations based on the rankings. Presented content associated with the content recommendations may be provided to a user in response to selection of a content recommendation. The content recommendations may be modified in response to changes to the user interface received from a user. | 1. A method for generating a content recommendation, comprising:
obtaining, a ranking of an inclusionary portion of metadata derived from instances of content for which graphical representations are presented in a user interface and an exclusionary portion of the metadata, the metadata ranked based on positions of the graphical representations in the user interface; generating a content recommendation based on the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata; and modifying the metadata from the instances of content based on user input. 2. The method of claim 1, further comprising presenting the content recommendation via the user interface. 3. The method of claim 2, further comprising providing a requested instance of content in response to receiving a selection of the presented content recommendation. 4. The method of claim 1, wherein:
the inclusionary portion of the metadata is derived from a first number of the instances of content for which graphical representations are located in an inclusion region; and the exclusionary portion of the metadata is derived from a second number of the instances of content for which graphical representations are located in an exclusion region. 5. The method of claim 4, wherein the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata ranks at least one of:
a first item of the inclusionary portion of the metadata higher than a second item of the inclusionary portion of the metadata when a graphical representation of a first instance of content associated with the first item of the inclusionary portion of the metadata is located closer along a direction to a strong association position of the inclusion region than a graphical representation of a second instance of content associated with the second item of the inclusionary portion of the metadata; or a first item of the exclusionary portion of the metadata higher than a second item of the exclusionary portion of the metadata when a graphical representation of a third instance of content associated with the first item of the exclusionary portion of the metadata is located closer along the direction to a strong disassociation position of the exclusion region than a graphical representation of a fourth instance of content associated with the second item of the exclusionary portion of the metadata. 6. The method of claim 4, wherein the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata ranks at least one of:
an item of the inclusionary portion of the metadata associated with a graphical representation of a first instance of content higher when the graphical representation of the first instance of content is more proximate to a graphical representation of a second instance of content that is closer in a direction to a strong association position of the inclusion region than when the graphical representation of the first instance of content is less proximate to the graphical representation of the second instance of content; or an item of the exclusionary portion of the metadata associated with a graphical representation of a third instance of content higher when the graphical representation of the third instance of content is more proximate to a graphical representation of a fourth instance of content that is closer in the direction to a strong disassociation position of the exclusion region than when the graphical representation of the third instance of content is less proximate to the graphical representation of the fourth instance of content. 7. The method of claim 1, wherein the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata treats metadata common to multiple instances of content as a single set when graphical representations of the multiple instances of content are grouped together at a same position in the user interface. 8. The method of claim 1, further comprising positioning a graphical representation of one of the instances of content in the user interface in response to user input. 9. The method of claim 8, wherein the graphical representation of the one of the instances of content is one of selected from an available content region of the user interface or provided by a user. 10. (canceled) 11. A computing device, comprising:
at least one processor; and a memory coupled to the at least one processor, the memory for storing instructions which, when executed by the processor, performs a method for generating a content recommendation, the method comprising: obtaining a ranking of an inclusionary portion of metadata derived from instances of content for which first graphical representations are presented in an inclusion region of a user interface and an exclusionary portion of the metadata derived from instances of content for which second graphical representations are presented in an exclusion region of the user interface, the metadata ranked based on positions of the first and second graphical representations in the user interface; generating a content recommendation based on the ranking of the inclusionary metadata and the exclusionary metadata; and modifying at least one of the inclusionary metadata or the exclusionary metadata based on a user response to presentation of the inclusionary metadata and the exclusionary metadata. 12. (canceled) 13. The computing device of claim 11, wherein the presentation of the inclusionary metadata and the exclusionary metadata presents the inclusionary metadata and the exclusionary metadata in ranked order. 14. The computing device of claim 11, wherein the ranking ranks a first item of the inclusionary metadata common to more of the instances of content for which the first graphical representations are presented in the inclusion region than a second item of the inclusionary metadata common to fewer of the instances of content for which the first graphical representations are presented in the inclusion region. 15. The computing device of claim 11, wherein the generating of the content recommendation is further based on user supplied metadata. 16. A computer program product, tangibly embodied in a non-transitory computer-readable storage medium, comprising:
a first set of instructions, stored in the non-transitory computer-readable storage medium, executable by a processing unit to provide a user interface; a second set of instructions, stored in the non-transitory computer-readable storage medium, executable by the processing unit to position graphical representations of instances of content in the user interface according to input received from a user; and a third set of instructions, stored in the non-transitory computer-readable storage medium, executable by the processing unit to generate a content recommendation based on rankings of inclusionary metadata and exclusionary metadata associated with the instances of content, the rankings determined based on the positions of the graphical representations in the user interface, wherein the inclusionary metadata and exclusionary metadata comprises a category of content. 17. The computer program product of claim 16, wherein the ranking of an item of metadata is related to a location of a graphical representation of an instance of content of the instances of content along a first direction. 18. The computer program product of claim 17, wherein a set of metadata not common to two instances of content is treated as metadata for a single instance of content when graphical representations for the two instances of content are positioned along a second direction perpendicular to the first direction. 19. (canceled) 20. The computer program product of claim 16, further comprising a fourth set of instructions, stored in the non-transitory computer-readable storage medium, executable by the processing unit to generate an additional content recommendation after modifying the user interface in response to additional input received from the user. 21. A user interface, comprising:
a display device having a first display panel region, a second display panel region and a third display panel region; and a processor being configured to display in said first display panel region at least a first pair of user selected image representations, each representing a corresponding content having associated metadata, said processor being additionally configured to display in said second display panel region a second image representation representing content having associated metadata and said processor being further configured to display in said third display panel region at least a third image representation representing recommended content having associated metadata, said metadata associated with said at least third image representation being selected to enhance inclusion therein of inclusionary metadata associated with a given image representation displayed in one of said first and second display panel regions, said metadata associated with said at least third image representation being selected to enhance exclusion therefrom of exclusionary metadata associated with a given image representation displayed in the other one of said first and second display panel regions and said metadata associated with said at least third image representation being selected to enhance the applicable inclusionary metadata inclusion and exclusionary metadata exclusion associated with said at least pair of image representations in accordance with an order of presentation of said at least pair of image representations within said first display panel region, wherein, in response to a user input, said processor is configured to change an individual category of metadata from being included in said listing to being excluded from said listing, and vice versa, and wherein said at least said metadata associated with said at least third image representation is selected in accordance with said changed listing. 22. A user interface according to claim 21 wherein said processor is configured to display in said second display panel region at least a second pair of user selected image representations that includes said second image and wherein said metadata associated with said at least third image representation is selected to enhance the applicable inclusionary metadata inclusion therein and exclusionary metadata exclusion therefrom associated with said at least second pair of image representations in accordance with an order of presentation of said at least second pair of image representations within said second display panel region. 23. A user interface in accordance with claim 21 wherein said a processor is configured to display in a fourth region of said display panel a listing of said inclusionary metadata and said exclusionary metadata. 24. A user interface in accordance with claim 21 wherein said a processor is configured to display in a fourth region of said display panel a plurality of image representations and, in response to a user input, said processor is configured to transfer at least a copy of one of said plurality of image representations from said fourth region to one of said first and second regions in a dragging manner that results in a change in said metadata associated with said at least third image representation. 25. A user interface in accordance with claim 21 wherein said metadata associated with said at least third image representation is selected to further enhance the applicable inclusionary metadata inclusion and exclusionary metadata exclusion associated with said at least pair of image representations in accordance with a sum total of occurrences of an identical category of metadata in said in said at least pair of image representations displayed within said first display panel region. | A computing device presents a user interface in which graphical representations of content may be positioned based on user input. Inclusionary and exclusionary portions of metadata associated with the content may be ranked based on the positions and/or positional relationships of the graphical representations in the user interface. The computing device generates content recommendations based on the rankings. Presented content associated with the content recommendations may be provided to a user in response to selection of a content recommendation. The content recommendations may be modified in response to changes to the user interface received from a user.1. A method for generating a content recommendation, comprising:
obtaining, a ranking of an inclusionary portion of metadata derived from instances of content for which graphical representations are presented in a user interface and an exclusionary portion of the metadata, the metadata ranked based on positions of the graphical representations in the user interface; generating a content recommendation based on the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata; and modifying the metadata from the instances of content based on user input. 2. The method of claim 1, further comprising presenting the content recommendation via the user interface. 3. The method of claim 2, further comprising providing a requested instance of content in response to receiving a selection of the presented content recommendation. 4. The method of claim 1, wherein:
the inclusionary portion of the metadata is derived from a first number of the instances of content for which graphical representations are located in an inclusion region; and the exclusionary portion of the metadata is derived from a second number of the instances of content for which graphical representations are located in an exclusion region. 5. The method of claim 4, wherein the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata ranks at least one of:
a first item of the inclusionary portion of the metadata higher than a second item of the inclusionary portion of the metadata when a graphical representation of a first instance of content associated with the first item of the inclusionary portion of the metadata is located closer along a direction to a strong association position of the inclusion region than a graphical representation of a second instance of content associated with the second item of the inclusionary portion of the metadata; or a first item of the exclusionary portion of the metadata higher than a second item of the exclusionary portion of the metadata when a graphical representation of a third instance of content associated with the first item of the exclusionary portion of the metadata is located closer along the direction to a strong disassociation position of the exclusion region than a graphical representation of a fourth instance of content associated with the second item of the exclusionary portion of the metadata. 6. The method of claim 4, wherein the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata ranks at least one of:
an item of the inclusionary portion of the metadata associated with a graphical representation of a first instance of content higher when the graphical representation of the first instance of content is more proximate to a graphical representation of a second instance of content that is closer in a direction to a strong association position of the inclusion region than when the graphical representation of the first instance of content is less proximate to the graphical representation of the second instance of content; or an item of the exclusionary portion of the metadata associated with a graphical representation of a third instance of content higher when the graphical representation of the third instance of content is more proximate to a graphical representation of a fourth instance of content that is closer in the direction to a strong disassociation position of the exclusion region than when the graphical representation of the third instance of content is less proximate to the graphical representation of the fourth instance of content. 7. The method of claim 1, wherein the ranking of the inclusionary portions of the metadata and the exclusionary portions of the metadata treats metadata common to multiple instances of content as a single set when graphical representations of the multiple instances of content are grouped together at a same position in the user interface. 8. The method of claim 1, further comprising positioning a graphical representation of one of the instances of content in the user interface in response to user input. 9. The method of claim 8, wherein the graphical representation of the one of the instances of content is one of selected from an available content region of the user interface or provided by a user. 10. (canceled) 11. A computing device, comprising:
at least one processor; and a memory coupled to the at least one processor, the memory for storing instructions which, when executed by the processor, performs a method for generating a content recommendation, the method comprising: obtaining a ranking of an inclusionary portion of metadata derived from instances of content for which first graphical representations are presented in an inclusion region of a user interface and an exclusionary portion of the metadata derived from instances of content for which second graphical representations are presented in an exclusion region of the user interface, the metadata ranked based on positions of the first and second graphical representations in the user interface; generating a content recommendation based on the ranking of the inclusionary metadata and the exclusionary metadata; and modifying at least one of the inclusionary metadata or the exclusionary metadata based on a user response to presentation of the inclusionary metadata and the exclusionary metadata. 12. (canceled) 13. The computing device of claim 11, wherein the presentation of the inclusionary metadata and the exclusionary metadata presents the inclusionary metadata and the exclusionary metadata in ranked order. 14. The computing device of claim 11, wherein the ranking ranks a first item of the inclusionary metadata common to more of the instances of content for which the first graphical representations are presented in the inclusion region than a second item of the inclusionary metadata common to fewer of the instances of content for which the first graphical representations are presented in the inclusion region. 15. The computing device of claim 11, wherein the generating of the content recommendation is further based on user supplied metadata. 16. A computer program product, tangibly embodied in a non-transitory computer-readable storage medium, comprising:
a first set of instructions, stored in the non-transitory computer-readable storage medium, executable by a processing unit to provide a user interface; a second set of instructions, stored in the non-transitory computer-readable storage medium, executable by the processing unit to position graphical representations of instances of content in the user interface according to input received from a user; and a third set of instructions, stored in the non-transitory computer-readable storage medium, executable by the processing unit to generate a content recommendation based on rankings of inclusionary metadata and exclusionary metadata associated with the instances of content, the rankings determined based on the positions of the graphical representations in the user interface, wherein the inclusionary metadata and exclusionary metadata comprises a category of content. 17. The computer program product of claim 16, wherein the ranking of an item of metadata is related to a location of a graphical representation of an instance of content of the instances of content along a first direction. 18. The computer program product of claim 17, wherein a set of metadata not common to two instances of content is treated as metadata for a single instance of content when graphical representations for the two instances of content are positioned along a second direction perpendicular to the first direction. 19. (canceled) 20. The computer program product of claim 16, further comprising a fourth set of instructions, stored in the non-transitory computer-readable storage medium, executable by the processing unit to generate an additional content recommendation after modifying the user interface in response to additional input received from the user. 21. A user interface, comprising:
a display device having a first display panel region, a second display panel region and a third display panel region; and a processor being configured to display in said first display panel region at least a first pair of user selected image representations, each representing a corresponding content having associated metadata, said processor being additionally configured to display in said second display panel region a second image representation representing content having associated metadata and said processor being further configured to display in said third display panel region at least a third image representation representing recommended content having associated metadata, said metadata associated with said at least third image representation being selected to enhance inclusion therein of inclusionary metadata associated with a given image representation displayed in one of said first and second display panel regions, said metadata associated with said at least third image representation being selected to enhance exclusion therefrom of exclusionary metadata associated with a given image representation displayed in the other one of said first and second display panel regions and said metadata associated with said at least third image representation being selected to enhance the applicable inclusionary metadata inclusion and exclusionary metadata exclusion associated with said at least pair of image representations in accordance with an order of presentation of said at least pair of image representations within said first display panel region, wherein, in response to a user input, said processor is configured to change an individual category of metadata from being included in said listing to being excluded from said listing, and vice versa, and wherein said at least said metadata associated with said at least third image representation is selected in accordance with said changed listing. 22. A user interface according to claim 21 wherein said processor is configured to display in said second display panel region at least a second pair of user selected image representations that includes said second image and wherein said metadata associated with said at least third image representation is selected to enhance the applicable inclusionary metadata inclusion therein and exclusionary metadata exclusion therefrom associated with said at least second pair of image representations in accordance with an order of presentation of said at least second pair of image representations within said second display panel region. 23. A user interface in accordance with claim 21 wherein said a processor is configured to display in a fourth region of said display panel a listing of said inclusionary metadata and said exclusionary metadata. 24. A user interface in accordance with claim 21 wherein said a processor is configured to display in a fourth region of said display panel a plurality of image representations and, in response to a user input, said processor is configured to transfer at least a copy of one of said plurality of image representations from said fourth region to one of said first and second regions in a dragging manner that results in a change in said metadata associated with said at least third image representation. 25. A user interface in accordance with claim 21 wherein said metadata associated with said at least third image representation is selected to further enhance the applicable inclusionary metadata inclusion and exclusionary metadata exclusion associated with said at least pair of image representations in accordance with a sum total of occurrences of an identical category of metadata in said in said at least pair of image representations displayed within said first display panel region. | 2,400 |
8,212 | 8,212 | 14,850,145 | 2,485 | A surveillance camera system includes a camera that acquires images and that has an adjustable field of view. A processing device is operably coupled to the camera. The processing device allows a user to define a virtual mask within the acquired images. The processing device also tracks a moving object of interest in the acquired images with a reduced level of regard for areas of the acquired images that are within the virtual mask. | 1. A surveillance camera system comprising:
a camera having an adjustable field of view and configured to acquire images; and a processing device operably coupled to said camera and configured to:
allow a user to define a virtual mask within the acquired images wherein said virtual mask defines a masked area completely encircling an unmasked area; and
track a moving object of interest in the acquired images with a reduced level of regard for the areas of the acquired images that are within the virtual mask. 2. The system of claim 2 wherein the acquired images include a plurality of pixels, said processing device being configured to track a moving object of interest in the acquired images with less regard for first ones of the pixels that are within the virtual mask than for second ones of the pixels that are outside of the virtual mask. 3. The system of claim 2 wherein said processing device is configured to track a moving object of interest in the acquired images with no regard for the first ones of the pixels that are within the virtual mask. 4. The system of claim 1 wherein said processing device is further configured to:
sense movement within the acquired images and to create a motion mask based upon the sensed movement;
modify the motion mask by use of the virtual mask; and
identify the moving object of interest in the acquired images dependent upon the modified motion mask. 5. The system of claim 4 wherein the motion mask comprises a plurality of motion values, each of the motion values corresponding to at least one respective pixel in the acquired images. 6. The system of claim 1 wherein the processing device is configured to allow a user to define a virtual mask within the acquired images by drawing a visible representation of the virtual mask. 7. The system of claim 1 wherein the processing device is configured to allow a user to define a virtual mask within the acquired images by selecting a plurality of vertices of the virtual mask within the acquired images. 8. The system of claim 1 wherein the areas of the acquired images that are within the virtual mask include a source of static motion. 9. The system of claim 1 wherein said virtual mask defines a masked area completely encircling an unmasked area. 10. A method of operating a surveillance camera system, said method comprising:
acquiring images with a camera; defining a virtual mask within the acquired images wherein said virtual mask defines a masked area completely encircling an unmasked area; and tracking a moving object of interest in the acquired images with a reduced level of regard for areas of the acquired images that are within the virtual mask. 11. The method of claim 10 wherein the acquired images include a plurality of pixels, said tracking step comprising tracking the moving object of interest in the acquired images with less regard for first ones of the pixels that are within the virtual mask than for the second ones of the pixels that are outside of the virtual mask. 12. The method of claim 11 wherein said tracking step comprises tracking the moving object of interest in the acquired images with no regard for the first ones of the pixels that are within the virtual mask. 13. The method of claim 10 comprising the further steps of:
sensing movement within the acquired images;
creating a motion mask based upon the sensed movement;
modifying the motion mask by use of the virtual mask; and
identify the moving object of interest in the acquired images dependent upon the modified motion mask. 14. The method of claim 13 wherein the motion mask comprises a plurality of motion values, each of the motion values corresponding to at least one respective pixel in the acquired images. 15. The method of claim 10 wherein said defining step comprises drawing a visible representation of the virtual mask. 16. The method of claim 10 wherein said defining step comprises selecting a plurality of vertices of the virtual mask within the acquired images. 17. The method of claim 10 wherein the areas of the acquired images that are within the virtual mask include a source of static motion. 18. The method of claim 10 wherein said virtual mask defines a masked area completely encircling an unmasked area. 19. A method of operating a surveillance camera system, said method comprising:
acquiring images with a camera; creating a motion mask based upon the acquired images; locating a source of static motion within the acquired images; defining a virtual mask over the source of static motion within the acquired images wherein said virtual mask defines a masked area completely encircling an unmasked area; modifying the motion mask by use of the virtual mask; and tracking a moving object of interest in the acquired images based upon the modified motion mask. 20. The method of claim 19 wherein the acquired images include a plurality of pixels, said motion mask including a plurality of motion values, each of the motion values corresponding to at least one of the pixels, said modifying step being performed on the motion values. 21. The method of claim 20 wherein said tracking step comprises tracking the moving object of interest in the acquired images with no regard for ones of the pixels that are within the virtual mask. 22. The method of claim 19 wherein said defining step comprises drawing a visible representation of the virtual mask. 23. The method of claim 19 wherein said defining step comprises selecting a plurality of vertices of the virtual mask within the acquired image. 24. The method of claim 19 wherein said virtual mask defines a masked area completely encircling an unmasked area. | A surveillance camera system includes a camera that acquires images and that has an adjustable field of view. A processing device is operably coupled to the camera. The processing device allows a user to define a virtual mask within the acquired images. The processing device also tracks a moving object of interest in the acquired images with a reduced level of regard for areas of the acquired images that are within the virtual mask.1. A surveillance camera system comprising:
a camera having an adjustable field of view and configured to acquire images; and a processing device operably coupled to said camera and configured to:
allow a user to define a virtual mask within the acquired images wherein said virtual mask defines a masked area completely encircling an unmasked area; and
track a moving object of interest in the acquired images with a reduced level of regard for the areas of the acquired images that are within the virtual mask. 2. The system of claim 2 wherein the acquired images include a plurality of pixels, said processing device being configured to track a moving object of interest in the acquired images with less regard for first ones of the pixels that are within the virtual mask than for second ones of the pixels that are outside of the virtual mask. 3. The system of claim 2 wherein said processing device is configured to track a moving object of interest in the acquired images with no regard for the first ones of the pixels that are within the virtual mask. 4. The system of claim 1 wherein said processing device is further configured to:
sense movement within the acquired images and to create a motion mask based upon the sensed movement;
modify the motion mask by use of the virtual mask; and
identify the moving object of interest in the acquired images dependent upon the modified motion mask. 5. The system of claim 4 wherein the motion mask comprises a plurality of motion values, each of the motion values corresponding to at least one respective pixel in the acquired images. 6. The system of claim 1 wherein the processing device is configured to allow a user to define a virtual mask within the acquired images by drawing a visible representation of the virtual mask. 7. The system of claim 1 wherein the processing device is configured to allow a user to define a virtual mask within the acquired images by selecting a plurality of vertices of the virtual mask within the acquired images. 8. The system of claim 1 wherein the areas of the acquired images that are within the virtual mask include a source of static motion. 9. The system of claim 1 wherein said virtual mask defines a masked area completely encircling an unmasked area. 10. A method of operating a surveillance camera system, said method comprising:
acquiring images with a camera; defining a virtual mask within the acquired images wherein said virtual mask defines a masked area completely encircling an unmasked area; and tracking a moving object of interest in the acquired images with a reduced level of regard for areas of the acquired images that are within the virtual mask. 11. The method of claim 10 wherein the acquired images include a plurality of pixels, said tracking step comprising tracking the moving object of interest in the acquired images with less regard for first ones of the pixels that are within the virtual mask than for the second ones of the pixels that are outside of the virtual mask. 12. The method of claim 11 wherein said tracking step comprises tracking the moving object of interest in the acquired images with no regard for the first ones of the pixels that are within the virtual mask. 13. The method of claim 10 comprising the further steps of:
sensing movement within the acquired images;
creating a motion mask based upon the sensed movement;
modifying the motion mask by use of the virtual mask; and
identify the moving object of interest in the acquired images dependent upon the modified motion mask. 14. The method of claim 13 wherein the motion mask comprises a plurality of motion values, each of the motion values corresponding to at least one respective pixel in the acquired images. 15. The method of claim 10 wherein said defining step comprises drawing a visible representation of the virtual mask. 16. The method of claim 10 wherein said defining step comprises selecting a plurality of vertices of the virtual mask within the acquired images. 17. The method of claim 10 wherein the areas of the acquired images that are within the virtual mask include a source of static motion. 18. The method of claim 10 wherein said virtual mask defines a masked area completely encircling an unmasked area. 19. A method of operating a surveillance camera system, said method comprising:
acquiring images with a camera; creating a motion mask based upon the acquired images; locating a source of static motion within the acquired images; defining a virtual mask over the source of static motion within the acquired images wherein said virtual mask defines a masked area completely encircling an unmasked area; modifying the motion mask by use of the virtual mask; and tracking a moving object of interest in the acquired images based upon the modified motion mask. 20. The method of claim 19 wherein the acquired images include a plurality of pixels, said motion mask including a plurality of motion values, each of the motion values corresponding to at least one of the pixels, said modifying step being performed on the motion values. 21. The method of claim 20 wherein said tracking step comprises tracking the moving object of interest in the acquired images with no regard for ones of the pixels that are within the virtual mask. 22. The method of claim 19 wherein said defining step comprises drawing a visible representation of the virtual mask. 23. The method of claim 19 wherein said defining step comprises selecting a plurality of vertices of the virtual mask within the acquired image. 24. The method of claim 19 wherein said virtual mask defines a masked area completely encircling an unmasked area. | 2,400 |
8,213 | 8,213 | 14,973,606 | 2,437 | A method and system of distributing files among devices is described. The method and system permits users and authors to create customized channels for filtering the automatic distribution of content. Each content item can have an associated plurality of tags, and each user's device can define a channel as a set of tag values. The channel definition and filtering may also be used to control, restrict or monitor distribution of content through the system. | 1. A system for sharing content files comprised of a computer server and at least one remote computing device associated with a viewer operating a viewer module on the remote device, said system comprised of:
a conversion subsystem operating on the server configured to receive a content file and convert the content file into a predetermined standardized image format file that is displayable by the viewer module and into a predetermined thumbnail file that is also displayable by the viewer module, where the viewer module renders the data in the application without reliance on a locally installed codec; an input subsystem to receive at least one tag data to be associated with the received content file; a data storage subsystem comprised of a database configured to store that associates the converted file with the thumbnail file and the corresponding at least one tag data, said data storage subsystem further configured to persistently store at least one custom channel tag data corresponding to the at least one viewers; a routing subsystem configured to automatically and as a result of receiving the tag data associated with the converted content file to determine whether the at least one tag data associated with the converted content file conforms with the at least one viewer custom channel tag data, and in dependence thereon, automatically transmit a data message to the remote device, the data message being comprised of the thumbnail file; a transmitting subsystem configured to transmit the converted file or a link to such file to the remote device in response to a request received from the remote device to view the converted file associated with the transmitted thumbnail file. 2. The system of claim 1 where the at least one tag data is comprised of data encoding use permissions and the system is further comprised of
a security subsystem that verifies upon receiving a command to render the content, whether the at least one viewer associated with the remote computer is associated with a user permission that conforms to the use permissions comprising the at least one tag data associated with the converted file and in dependence thereon, either causing or preventing transmission of the message. 3. The system of claim 1 where the viewing module is configured to receive the converted content file from the transmitting subsystem and display it and at the time of receipt of a request to render the content, to prevent the at least one viewer from accessing the file upon the viewer module detecting a restriction condition. 4. The system of claim 1 where the transmitted message is not comprised of the thumbnail file and instead is comprised of a hyperlink to a location on the servers, whereby activation of the link causes scripts to be downloaded to the remote device causing such scripts to operate on the remote device, and in operation retrieve and display the content file and prevent the content file from being stored or modified on the remote device, where the scripts are configured to run an authorization protocol to obtain a decryption key, and use the decryption key to decrypt the content. 5. The system of claim 3 where the restriction condition is one of: the expiration of a predetermined amount of time from receiving the request to view the converted file and the remote device is in a restricted location. 6. The system of claim 1 where the converted file is transmitted to the viewer module with data encoding use restrictions in order to cause the viewing module to prevent use of the converted file in violation of the encoded restrictions. 7. The system of claim 6 where the data encoding use restrictions is comprised of one of: restriction on saving the file on the remote device, restriction on further transmitting the file, and restriction on viewing the file more than a predetermined number of times. 8. The system of claim 1 where the routing subsystem is further configured to determine if a restriction condition encoded in the at least one tag data applies to the condition that the viewer custom channel tag data conforms to the at least one tag data and in dependence on such determination, prevent transmission of either the thumbnail file or the converted file. 9. The system of claim 8 where the restriction condition is one of:
the data associated with the viewer not including values indicating permission to access the converted file or thumbnail file, the IP address of the remote computer not being within some predetermined range associated with the converted file or thumbnail file, and
a domain associated with the viewer not be associated with a permissible domain associated with the converted file or thumbnail file. 10. The system of claim 8 where the security subsystem is further configured to interact with the viewing module operating on the remote device in order to obtain an indicia of identity, and use the indicia of identity in order to determine if the restriction condition applies to that remote device. 11. The system of claim 8 where the restriction conditions are one of: restriction on how many views the converted file can have, how long the file can be viewed for, causing the file to be deleted from the remote device upon being viewed once, limitations on when the file may be viewed, and limitations on where the remote device is located. 12. The system of claim 1 further comprising a chat sub-system comprised of a designated memory location on the server, where the server is adapted to receive text, audio or audio visual content generated on at least one user's device, where such content is associated with a pre-existing channel, to store the received content and associate it with the tags comprising the pre-existing channel, and to transmit to the users' devices who are subscribed to the channel. 13. The system of claim 1 further comprising an analytics subsystem adapted to receive from at least one user's device an indicia identifying a piece of content rendered on the device and a value associated with that indicia indicating the period of time that the content was displayed, and a database comprised of a data record storing the identity of the user, the identity of the content, the time of day, and the time period that the content was displayed on that user's device. 14. A method for sharing content files executed by a system comprised of a computer server and at least one remote computing device associated with a viewer operating a viewer module on the remote device, said method comprised of:
receiving a content file at the server and converting the content file into a predetermined standardized image format file that is displayable by the viewer module and into a predetermined thumbnail file that is also displayable by the viewer module; receiving at least one tag data to be associated with the received content file; storing in a database data that associates the converted file with the thumbnail file and the received corresponding at least one tag data; persistently storing in the database at least one custom channel tag data corresponding to the at least one viewers; automatically and as a result of receiving the tag data associated with the converted content file determining whether the at least one tag data associated with the converted content file conforms with the at least one viewer custom channel tag data, and in dependence thereon, automatically transmitting a data message to the remote device, the data message being comprised of the thumbnail file; and transmitting the converted file or a link to such file to the remote device in response to a receiving a request from the remote device to view the converted file associated with the transmitted thumbnail file. 15. The method of claim 14 where the at least one tag data is comprised of data encoding use permissions and the method is further comprised of
verifying whether the at least one viewer associated with the remote computer is associated with a user permission that conforms to the use permissions comprising the at least one tag data and in dependence thereon, either causing or preventing transmission of the message. 16. The method of claim 14 where the method is further comprised of:
the viewing module receiving the converted content file from the transmitting subsystem and displaying it and preventing the at least one viewer from accessing the file upon the viewer module detecting a restriction condition. 17. The method of claim 14 where the transmitting step is not comprised of transmitting the thumbnail file and instead is comprised of transmitting a hyperlink to a location on the servers, whereby activation of the link causes scripts to be downloaded to the remote device causing such scripts to operate on the remote device, and in operation retrieve and display the content file and prevent the content file from being stored in an unencrypted state or modified on the remote device. 18. The method of claim 14 where the restriction condition is one of: the expiration of a predetermined amount of time from receiving the request to view the converted file and the remote device being in a restricted location. 19. The method of claim 14 where the step of transmitting the converted file to the viewer module is further comprised of transmitting data encoding use restrictions in order to cause the viewing module to prevent use of the converted file in violation of the encoded restrictions. 20. The method of claim 19 where the data encoding use restrictions is comprised of one of: restriction on saving the file on the remote device, restriction on further transmitting the file, and restriction on viewing the file more than a predetermined number of times. 21. The method of claim 14 further comprising:
determining if a restriction condition encoded in the at least one tag data applies to the condition that the viewer custom channel tag data conforms to the at least one tag data and in dependence on such determination, prevent transmission of either the thumbnail file or the converted file. 22. The method of claim 21 where the restriction condition is one of:
the data associated with the viewer not including values indicating permission to access the converted file or thumbnail file, the IP address of the remote computer not being within some predetermined range associated with the converted file or thumbnail file, a domain associated with the viewer not be associated with a permissible domain associated with the converted file or thumbnail file, a MAC address, a wifi network. 23. The method of claim 21 further comprising:
the server interacting with the viewing module operating on the remote device in order to obtain an indicia of identity, and use the indicia of identity in order to determine if the restriction condition applies to that remote device. 24. The method of claim 21 where the restriction conditions are one of: restriction on how many views the converted file can have, how long the file can be viewed for, causing the file to be deleted from the remote device upon being viewed once, limitations on when the file may be viewed, and limitations on where the remote device is located. 25. The system of claim 1 where the received content file is comprised of data representing a text document. 26. The method of claim 14 where the received content file is comprised of data representing a text document. 27. The method of claim 14 further comprising a chat sub-system comprised of a designated memory location on the server, where the server is adapted to receive text, audio or audio visual content generated on at least one user's device, where such content is associated with a pre-existing channel, to store the received content and associate it with the tags comprising the pre-existing channel, and to transmit to the users' devices who are subscribed to the channel. 28. The method of claim 14 further comprising an analytics subsystem adapted to receive from at least one user's device an indicia identifying a piece of content rendered on the device and a value associated with that indicia indicating the period of time that the content was displayed, and a database comprised of a data record storing the identity of the user, the identity of the content, the time of day, and the time period that the content was displayed on that user's device. 29. The system of claim 3 where the viewing module is configured to detect an input corresponding to a moving location on the screen moves and render the content so that a portions of the screen that become more distant from the location revert to an unreadable appearance and those portions of the screen displaying the content that are approaching the location become re-rendered so that portion of the content becomes viewable. 30. The method of claim 16 further comprising:
detecting an input corresponding to a moving location on the screen; and
rendering the content so that portions of the screen displaying the content that become more distant from the location revert to an unreadable appearance and those portions of the screen displaying the content that are approaching the location become re-rendered so that that portion of the content is viewable. | A method and system of distributing files among devices is described. The method and system permits users and authors to create customized channels for filtering the automatic distribution of content. Each content item can have an associated plurality of tags, and each user's device can define a channel as a set of tag values. The channel definition and filtering may also be used to control, restrict or monitor distribution of content through the system.1. A system for sharing content files comprised of a computer server and at least one remote computing device associated with a viewer operating a viewer module on the remote device, said system comprised of:
a conversion subsystem operating on the server configured to receive a content file and convert the content file into a predetermined standardized image format file that is displayable by the viewer module and into a predetermined thumbnail file that is also displayable by the viewer module, where the viewer module renders the data in the application without reliance on a locally installed codec; an input subsystem to receive at least one tag data to be associated with the received content file; a data storage subsystem comprised of a database configured to store that associates the converted file with the thumbnail file and the corresponding at least one tag data, said data storage subsystem further configured to persistently store at least one custom channel tag data corresponding to the at least one viewers; a routing subsystem configured to automatically and as a result of receiving the tag data associated with the converted content file to determine whether the at least one tag data associated with the converted content file conforms with the at least one viewer custom channel tag data, and in dependence thereon, automatically transmit a data message to the remote device, the data message being comprised of the thumbnail file; a transmitting subsystem configured to transmit the converted file or a link to such file to the remote device in response to a request received from the remote device to view the converted file associated with the transmitted thumbnail file. 2. The system of claim 1 where the at least one tag data is comprised of data encoding use permissions and the system is further comprised of
a security subsystem that verifies upon receiving a command to render the content, whether the at least one viewer associated with the remote computer is associated with a user permission that conforms to the use permissions comprising the at least one tag data associated with the converted file and in dependence thereon, either causing or preventing transmission of the message. 3. The system of claim 1 where the viewing module is configured to receive the converted content file from the transmitting subsystem and display it and at the time of receipt of a request to render the content, to prevent the at least one viewer from accessing the file upon the viewer module detecting a restriction condition. 4. The system of claim 1 where the transmitted message is not comprised of the thumbnail file and instead is comprised of a hyperlink to a location on the servers, whereby activation of the link causes scripts to be downloaded to the remote device causing such scripts to operate on the remote device, and in operation retrieve and display the content file and prevent the content file from being stored or modified on the remote device, where the scripts are configured to run an authorization protocol to obtain a decryption key, and use the decryption key to decrypt the content. 5. The system of claim 3 where the restriction condition is one of: the expiration of a predetermined amount of time from receiving the request to view the converted file and the remote device is in a restricted location. 6. The system of claim 1 where the converted file is transmitted to the viewer module with data encoding use restrictions in order to cause the viewing module to prevent use of the converted file in violation of the encoded restrictions. 7. The system of claim 6 where the data encoding use restrictions is comprised of one of: restriction on saving the file on the remote device, restriction on further transmitting the file, and restriction on viewing the file more than a predetermined number of times. 8. The system of claim 1 where the routing subsystem is further configured to determine if a restriction condition encoded in the at least one tag data applies to the condition that the viewer custom channel tag data conforms to the at least one tag data and in dependence on such determination, prevent transmission of either the thumbnail file or the converted file. 9. The system of claim 8 where the restriction condition is one of:
the data associated with the viewer not including values indicating permission to access the converted file or thumbnail file, the IP address of the remote computer not being within some predetermined range associated with the converted file or thumbnail file, and
a domain associated with the viewer not be associated with a permissible domain associated with the converted file or thumbnail file. 10. The system of claim 8 where the security subsystem is further configured to interact with the viewing module operating on the remote device in order to obtain an indicia of identity, and use the indicia of identity in order to determine if the restriction condition applies to that remote device. 11. The system of claim 8 where the restriction conditions are one of: restriction on how many views the converted file can have, how long the file can be viewed for, causing the file to be deleted from the remote device upon being viewed once, limitations on when the file may be viewed, and limitations on where the remote device is located. 12. The system of claim 1 further comprising a chat sub-system comprised of a designated memory location on the server, where the server is adapted to receive text, audio or audio visual content generated on at least one user's device, where such content is associated with a pre-existing channel, to store the received content and associate it with the tags comprising the pre-existing channel, and to transmit to the users' devices who are subscribed to the channel. 13. The system of claim 1 further comprising an analytics subsystem adapted to receive from at least one user's device an indicia identifying a piece of content rendered on the device and a value associated with that indicia indicating the period of time that the content was displayed, and a database comprised of a data record storing the identity of the user, the identity of the content, the time of day, and the time period that the content was displayed on that user's device. 14. A method for sharing content files executed by a system comprised of a computer server and at least one remote computing device associated with a viewer operating a viewer module on the remote device, said method comprised of:
receiving a content file at the server and converting the content file into a predetermined standardized image format file that is displayable by the viewer module and into a predetermined thumbnail file that is also displayable by the viewer module; receiving at least one tag data to be associated with the received content file; storing in a database data that associates the converted file with the thumbnail file and the received corresponding at least one tag data; persistently storing in the database at least one custom channel tag data corresponding to the at least one viewers; automatically and as a result of receiving the tag data associated with the converted content file determining whether the at least one tag data associated with the converted content file conforms with the at least one viewer custom channel tag data, and in dependence thereon, automatically transmitting a data message to the remote device, the data message being comprised of the thumbnail file; and transmitting the converted file or a link to such file to the remote device in response to a receiving a request from the remote device to view the converted file associated with the transmitted thumbnail file. 15. The method of claim 14 where the at least one tag data is comprised of data encoding use permissions and the method is further comprised of
verifying whether the at least one viewer associated with the remote computer is associated with a user permission that conforms to the use permissions comprising the at least one tag data and in dependence thereon, either causing or preventing transmission of the message. 16. The method of claim 14 where the method is further comprised of:
the viewing module receiving the converted content file from the transmitting subsystem and displaying it and preventing the at least one viewer from accessing the file upon the viewer module detecting a restriction condition. 17. The method of claim 14 where the transmitting step is not comprised of transmitting the thumbnail file and instead is comprised of transmitting a hyperlink to a location on the servers, whereby activation of the link causes scripts to be downloaded to the remote device causing such scripts to operate on the remote device, and in operation retrieve and display the content file and prevent the content file from being stored in an unencrypted state or modified on the remote device. 18. The method of claim 14 where the restriction condition is one of: the expiration of a predetermined amount of time from receiving the request to view the converted file and the remote device being in a restricted location. 19. The method of claim 14 where the step of transmitting the converted file to the viewer module is further comprised of transmitting data encoding use restrictions in order to cause the viewing module to prevent use of the converted file in violation of the encoded restrictions. 20. The method of claim 19 where the data encoding use restrictions is comprised of one of: restriction on saving the file on the remote device, restriction on further transmitting the file, and restriction on viewing the file more than a predetermined number of times. 21. The method of claim 14 further comprising:
determining if a restriction condition encoded in the at least one tag data applies to the condition that the viewer custom channel tag data conforms to the at least one tag data and in dependence on such determination, prevent transmission of either the thumbnail file or the converted file. 22. The method of claim 21 where the restriction condition is one of:
the data associated with the viewer not including values indicating permission to access the converted file or thumbnail file, the IP address of the remote computer not being within some predetermined range associated with the converted file or thumbnail file, a domain associated with the viewer not be associated with a permissible domain associated with the converted file or thumbnail file, a MAC address, a wifi network. 23. The method of claim 21 further comprising:
the server interacting with the viewing module operating on the remote device in order to obtain an indicia of identity, and use the indicia of identity in order to determine if the restriction condition applies to that remote device. 24. The method of claim 21 where the restriction conditions are one of: restriction on how many views the converted file can have, how long the file can be viewed for, causing the file to be deleted from the remote device upon being viewed once, limitations on when the file may be viewed, and limitations on where the remote device is located. 25. The system of claim 1 where the received content file is comprised of data representing a text document. 26. The method of claim 14 where the received content file is comprised of data representing a text document. 27. The method of claim 14 further comprising a chat sub-system comprised of a designated memory location on the server, where the server is adapted to receive text, audio or audio visual content generated on at least one user's device, where such content is associated with a pre-existing channel, to store the received content and associate it with the tags comprising the pre-existing channel, and to transmit to the users' devices who are subscribed to the channel. 28. The method of claim 14 further comprising an analytics subsystem adapted to receive from at least one user's device an indicia identifying a piece of content rendered on the device and a value associated with that indicia indicating the period of time that the content was displayed, and a database comprised of a data record storing the identity of the user, the identity of the content, the time of day, and the time period that the content was displayed on that user's device. 29. The system of claim 3 where the viewing module is configured to detect an input corresponding to a moving location on the screen moves and render the content so that a portions of the screen that become more distant from the location revert to an unreadable appearance and those portions of the screen displaying the content that are approaching the location become re-rendered so that portion of the content becomes viewable. 30. The method of claim 16 further comprising:
detecting an input corresponding to a moving location on the screen; and
rendering the content so that portions of the screen displaying the content that become more distant from the location revert to an unreadable appearance and those portions of the screen displaying the content that are approaching the location become re-rendered so that that portion of the content is viewable. | 2,400 |
8,214 | 8,214 | 15,387,242 | 2,433 | A method of defining distributed firewall rules in a group of datacenters is provided. Each datacenter includes a group of data compute nodes (DCNs). The method sends a set of security tags from a particular datacenter to other datacenters. The method, at each datacenter, associates a unique identifier of one or more DCNs of the datacenter to each security tag. The method associates one or more security tags to each of a set of security group at the particular datacenter and defines a set of distributed firewall rules at the particular datacenter based on the security tags. The method sends the set of distributed firewall rules from the particular datacenter to other datacenters. The method, at each datacenter, translates the firewall rules by mapping the unique identifier of each DCN in a distributed firewall rule to a corresponding static address associated with the DCN. | 1-20. (canceled) 21. A method of defining global objects for use in distributed firewall rules in a plurality of data centers, each data center comprising a network manager server and a plurality of data compute nodes (DCNs), the method comprising:
for each DCN, identifying a set of dynamically defined identifiers of the DCN for use in the distributed firewall rules; storing an object corresponding to each DCN of each datacenter in a distributed cache accessible to the network manager of each datacenter, each object comprising a mapping of the set of dynamically defined identifiers of the corresponding DCN to a static identifier of the DCN; receiving a distributed firewall rule comprising a dynamically defined identifier of a DCN of a first datacenter at a network manager of a second datacenter; and by the network manager of the second datacenter, translating the dynamically defined identifier of the DCN of the first datacenter into the static identifier of the DCN using the object corresponding to the DCN the first datacenter stored in the distributed cache. 22. The method of claim 21, wherein each data center comprises a local object data store storing a plurality objects defined in the data center, each object stored in the local object data store comprising a set of parameters, wherein storing an object corresponding to each DCN of each datacenter in a distributed cache comprises defining a lightweight object comprising a subset of the set of parameters of the object stored in the local object data store, the subset of parameters comprising parameters required to map the dynamically defined identifier of a DCN to the static identifier of the DCN. 23. The method of claim 22 further comprising:
moving a DCN from a first data center to a second different data center;
by the network manager of the first data center, (i) deleting the set of parameters corresponding the DCN from the local object data store of the first data center, and (ii) deleting the lightweight object corresponding to the DCN from the distributed cache; and
by the network manager of the second data center, (i) adding the set of parameters corresponding the DCN from the local object data store of the second data center, and (ii) adding the lightweight object corresponding to the DCN from the distributed cache. 24. The method of claim 21, wherein the distributed cache is implemented as a distributed cluster of nodes, wherein each network manager server operates as a node of the distributed cluster of nodes, wherein each node stores a copy of all objects stored in the distributed cache, the method further comprising:
adding a network manager as a new node of the distributed cluster of nodes; and replicating objects stored in the distributed cache cluster in the new node. 25. The method of claim 21, wherein the distributed cache comprises volatile memory. 26. The method of claim 21 further comprising:
receiving a set of firewall rules comprising a dynamically defined identifier of a DCN;
translating the dynamically defined identifier of the DCN to the static identifier of the DCN using the object corresponding to the DCN stored in the distributed cache. 27. The method of claim 21, wherein the static identifier of each DCN comprises one of a layer 2 (L2) network address associated with the DCN and a layer 3 (L3) network address associated with the DCN. 28. A non-transitory machine readable medium storing a program that when executed by at least one processing unit defines global objects for use in distributed firewall rules in a plurality of data centers, each data center comprising a network manager server and a plurality of data compute nodes (DCNs), the program comprising sets of instructions for:
identifying, for each DCN, a set of dynamically defined identifiers of the DCN for use in the distributed firewall rules; storing an object corresponding to each DCN of each datacenter in a distributed cache accessible to the network manager of each datacenter, each object comprising a mapping of the set of dynamically defined identifiers of the corresponding DCN to a static identifier of the DCN; receiving a distributed firewall rule comprising a dynamically defined identifier of a DCN of a first datacenter at a network manager of a second datacenter; and translating, by the network manager of the second datacenter, the dynamically defined identifier of the DCN of the first datacenter into the static identifier of the DCN using the object corresponding to the DCN the first datacenter stored in the distributed cache. 29. The non-transitory machine readable medium of claim 28, wherein each data center comprises a local object data store storing a plurality objects defined in the data center, each object stored in the local object data store comprising a set of parameters, wherein the set of instructions for storing an object corresponding to each DCN of each datacenter in a distributed cache comprises sets of instructions for defining a lightweight object comprising a subset of the set of parameters of the object stored in the local object data store, the subset of parameters comprising parameters required to map the dynamically defined identifier of a DCN to the static identifier of the DCN. 30. The non-transitory machine readable medium of claim 29, the program further comprising sets of instructions for:
moving a DCN from a first data center to a second different data center; by the network manager of the first data center, (i) deleting the set of parameters corresponding the DCN from the local object data store of the first data center, and (ii) deleting the lightweight object corresponding to the DCN from the distributed cache; and by the network manager of the second data center, (i) adding the set of parameters corresponding the DCN from the local object data store of the second data center, and (ii) adding the lightweight object corresponding to the DCN from the distributed cache. 31. The non-transitory machine readable medium of claim 28, wherein the distributed cache is implemented as a distributed cluster of nodes, wherein each network manager server operates as a node of the distributed cluster of nodes, wherein each node stores a copy of all objects stored in the distributed cache, the program further comprising sets of instructions for:
adding a network manager as a new node of the distributed cluster of nodes; and replicating objects stored in the distributed cache cluster in the new node. 32. The non-transitory machine readable medium of claim 28, wherein the distributed cache comprises volatile memory. 33. The non-transitory machine readable medium of claim 28, the program further comprising sets of instructions for:
receiving a set of firewall rules comprising a dynamically defined identifier of a DCN; translating the dynamically defined identifier of the DCN to the static identifier of the DCN using the object corresponding to the DCN stored in the distributed cache. 34. The non-transitory machine readable medium of claim 28, wherein the static identifier of each DCN comprises one of a layer 2 (L2) network address associated with the DCN and a layer 3 (L3) network address associated with the DCN. 35. A system comprising:
a plurality of datacenters, each datacenter comprising:
a plurality of data compute nodes (DCNs), and
a network manager server, each network manager server comprising a non-transitory machine readable medium storing a program that when executed by at least one processing unit defines global objects for use in distributed firewall rules in a plurality of data centers, each data center comprising a network manager server and a plurality of data compute nodes (DCNs), the program comprising sets of instructions for:
identifying, for each DCN, a set of dynamically defined identifiers of the DCN for use in the distributed firewall rules;
storing an object corresponding to each DCN of each datacenter in a distributed cache accessible to the network manager of each datacenter, each object comprising a mapping of the set of dynamically defined identifiers of the corresponding DCN to a static identifier of the DCN;
receiving a distributed firewall rule comprising a dynamically defined identifier of a DCN of a first datacenter at a network manager of a second datacenter; and
translating, by the network manager of the second datacenter, the dynamically defined identifier of the DCN of the first datacenter into the static identifier of the DCN using the object corresponding to the DCN the first datacenter stored in the distributed cache. 36. The system of claim 35, wherein each data center comprises a local object data store storing a plurality objects defined in the data center, each object stored in the local object data store comprising a set of parameters, wherein the set of instructions for storing an object corresponding to each DCN of each datacenter in a distributed cache comprises sets of instructions for defining a lightweight object comprising a subset of the set of parameters of the object stored in the local object data store, the subset of parameters comprising parameters required to map the dynamically defined identifier of a DCN to the static identifier of the DCN. 37. The system of claim 36, the program further comprising sets of instructions for:
moving a DCN from a first data center to a second different data center; by the network manager of the first data center, (i) deleting the set of parameters corresponding the DCN from the local object data store of the first data center, and (ii) deleting the lightweight object corresponding to the DCN from the distributed cache; and by the network manager of the second data center, (i) adding the set of parameters corresponding the DCN from the local object data store of the second data center, and (ii) adding the lightweight object corresponding to the DCN from the distributed cache. 38. The system of claim 35, wherein the distributed cache is implemented as a distributed cluster of nodes, wherein each network manager server operates as a node of the distributed cluster of nodes, wherein each node stores a copy of all objects stored in the distributed cache, the program further comprising sets of instructions for:
adding a network manager as a new node of the distributed cluster of nodes; and replicating objects stored in the distributed cache cluster in the new node. 39. The system of claim 35, wherein the distributed cache comprises volatile memory. 40. The system of claim 35, the program further comprising sets of instructions for:
receiving a set of firewall rules comprising a dynamically defined identifier of a DCN; translating the dynamically defined identifier of the DCN to the static identifier of the DCN using the object corresponding to the DCN stored in the distributed cache. | A method of defining distributed firewall rules in a group of datacenters is provided. Each datacenter includes a group of data compute nodes (DCNs). The method sends a set of security tags from a particular datacenter to other datacenters. The method, at each datacenter, associates a unique identifier of one or more DCNs of the datacenter to each security tag. The method associates one or more security tags to each of a set of security group at the particular datacenter and defines a set of distributed firewall rules at the particular datacenter based on the security tags. The method sends the set of distributed firewall rules from the particular datacenter to other datacenters. The method, at each datacenter, translates the firewall rules by mapping the unique identifier of each DCN in a distributed firewall rule to a corresponding static address associated with the DCN.1-20. (canceled) 21. A method of defining global objects for use in distributed firewall rules in a plurality of data centers, each data center comprising a network manager server and a plurality of data compute nodes (DCNs), the method comprising:
for each DCN, identifying a set of dynamically defined identifiers of the DCN for use in the distributed firewall rules; storing an object corresponding to each DCN of each datacenter in a distributed cache accessible to the network manager of each datacenter, each object comprising a mapping of the set of dynamically defined identifiers of the corresponding DCN to a static identifier of the DCN; receiving a distributed firewall rule comprising a dynamically defined identifier of a DCN of a first datacenter at a network manager of a second datacenter; and by the network manager of the second datacenter, translating the dynamically defined identifier of the DCN of the first datacenter into the static identifier of the DCN using the object corresponding to the DCN the first datacenter stored in the distributed cache. 22. The method of claim 21, wherein each data center comprises a local object data store storing a plurality objects defined in the data center, each object stored in the local object data store comprising a set of parameters, wherein storing an object corresponding to each DCN of each datacenter in a distributed cache comprises defining a lightweight object comprising a subset of the set of parameters of the object stored in the local object data store, the subset of parameters comprising parameters required to map the dynamically defined identifier of a DCN to the static identifier of the DCN. 23. The method of claim 22 further comprising:
moving a DCN from a first data center to a second different data center;
by the network manager of the first data center, (i) deleting the set of parameters corresponding the DCN from the local object data store of the first data center, and (ii) deleting the lightweight object corresponding to the DCN from the distributed cache; and
by the network manager of the second data center, (i) adding the set of parameters corresponding the DCN from the local object data store of the second data center, and (ii) adding the lightweight object corresponding to the DCN from the distributed cache. 24. The method of claim 21, wherein the distributed cache is implemented as a distributed cluster of nodes, wherein each network manager server operates as a node of the distributed cluster of nodes, wherein each node stores a copy of all objects stored in the distributed cache, the method further comprising:
adding a network manager as a new node of the distributed cluster of nodes; and replicating objects stored in the distributed cache cluster in the new node. 25. The method of claim 21, wherein the distributed cache comprises volatile memory. 26. The method of claim 21 further comprising:
receiving a set of firewall rules comprising a dynamically defined identifier of a DCN;
translating the dynamically defined identifier of the DCN to the static identifier of the DCN using the object corresponding to the DCN stored in the distributed cache. 27. The method of claim 21, wherein the static identifier of each DCN comprises one of a layer 2 (L2) network address associated with the DCN and a layer 3 (L3) network address associated with the DCN. 28. A non-transitory machine readable medium storing a program that when executed by at least one processing unit defines global objects for use in distributed firewall rules in a plurality of data centers, each data center comprising a network manager server and a plurality of data compute nodes (DCNs), the program comprising sets of instructions for:
identifying, for each DCN, a set of dynamically defined identifiers of the DCN for use in the distributed firewall rules; storing an object corresponding to each DCN of each datacenter in a distributed cache accessible to the network manager of each datacenter, each object comprising a mapping of the set of dynamically defined identifiers of the corresponding DCN to a static identifier of the DCN; receiving a distributed firewall rule comprising a dynamically defined identifier of a DCN of a first datacenter at a network manager of a second datacenter; and translating, by the network manager of the second datacenter, the dynamically defined identifier of the DCN of the first datacenter into the static identifier of the DCN using the object corresponding to the DCN the first datacenter stored in the distributed cache. 29. The non-transitory machine readable medium of claim 28, wherein each data center comprises a local object data store storing a plurality objects defined in the data center, each object stored in the local object data store comprising a set of parameters, wherein the set of instructions for storing an object corresponding to each DCN of each datacenter in a distributed cache comprises sets of instructions for defining a lightweight object comprising a subset of the set of parameters of the object stored in the local object data store, the subset of parameters comprising parameters required to map the dynamically defined identifier of a DCN to the static identifier of the DCN. 30. The non-transitory machine readable medium of claim 29, the program further comprising sets of instructions for:
moving a DCN from a first data center to a second different data center; by the network manager of the first data center, (i) deleting the set of parameters corresponding the DCN from the local object data store of the first data center, and (ii) deleting the lightweight object corresponding to the DCN from the distributed cache; and by the network manager of the second data center, (i) adding the set of parameters corresponding the DCN from the local object data store of the second data center, and (ii) adding the lightweight object corresponding to the DCN from the distributed cache. 31. The non-transitory machine readable medium of claim 28, wherein the distributed cache is implemented as a distributed cluster of nodes, wherein each network manager server operates as a node of the distributed cluster of nodes, wherein each node stores a copy of all objects stored in the distributed cache, the program further comprising sets of instructions for:
adding a network manager as a new node of the distributed cluster of nodes; and replicating objects stored in the distributed cache cluster in the new node. 32. The non-transitory machine readable medium of claim 28, wherein the distributed cache comprises volatile memory. 33. The non-transitory machine readable medium of claim 28, the program further comprising sets of instructions for:
receiving a set of firewall rules comprising a dynamically defined identifier of a DCN; translating the dynamically defined identifier of the DCN to the static identifier of the DCN using the object corresponding to the DCN stored in the distributed cache. 34. The non-transitory machine readable medium of claim 28, wherein the static identifier of each DCN comprises one of a layer 2 (L2) network address associated with the DCN and a layer 3 (L3) network address associated with the DCN. 35. A system comprising:
a plurality of datacenters, each datacenter comprising:
a plurality of data compute nodes (DCNs), and
a network manager server, each network manager server comprising a non-transitory machine readable medium storing a program that when executed by at least one processing unit defines global objects for use in distributed firewall rules in a plurality of data centers, each data center comprising a network manager server and a plurality of data compute nodes (DCNs), the program comprising sets of instructions for:
identifying, for each DCN, a set of dynamically defined identifiers of the DCN for use in the distributed firewall rules;
storing an object corresponding to each DCN of each datacenter in a distributed cache accessible to the network manager of each datacenter, each object comprising a mapping of the set of dynamically defined identifiers of the corresponding DCN to a static identifier of the DCN;
receiving a distributed firewall rule comprising a dynamically defined identifier of a DCN of a first datacenter at a network manager of a second datacenter; and
translating, by the network manager of the second datacenter, the dynamically defined identifier of the DCN of the first datacenter into the static identifier of the DCN using the object corresponding to the DCN the first datacenter stored in the distributed cache. 36. The system of claim 35, wherein each data center comprises a local object data store storing a plurality objects defined in the data center, each object stored in the local object data store comprising a set of parameters, wherein the set of instructions for storing an object corresponding to each DCN of each datacenter in a distributed cache comprises sets of instructions for defining a lightweight object comprising a subset of the set of parameters of the object stored in the local object data store, the subset of parameters comprising parameters required to map the dynamically defined identifier of a DCN to the static identifier of the DCN. 37. The system of claim 36, the program further comprising sets of instructions for:
moving a DCN from a first data center to a second different data center; by the network manager of the first data center, (i) deleting the set of parameters corresponding the DCN from the local object data store of the first data center, and (ii) deleting the lightweight object corresponding to the DCN from the distributed cache; and by the network manager of the second data center, (i) adding the set of parameters corresponding the DCN from the local object data store of the second data center, and (ii) adding the lightweight object corresponding to the DCN from the distributed cache. 38. The system of claim 35, wherein the distributed cache is implemented as a distributed cluster of nodes, wherein each network manager server operates as a node of the distributed cluster of nodes, wherein each node stores a copy of all objects stored in the distributed cache, the program further comprising sets of instructions for:
adding a network manager as a new node of the distributed cluster of nodes; and replicating objects stored in the distributed cache cluster in the new node. 39. The system of claim 35, wherein the distributed cache comprises volatile memory. 40. The system of claim 35, the program further comprising sets of instructions for:
receiving a set of firewall rules comprising a dynamically defined identifier of a DCN; translating the dynamically defined identifier of the DCN to the static identifier of the DCN using the object corresponding to the DCN stored in the distributed cache. | 2,400 |
8,215 | 8,215 | 14,398,571 | 2,445 | A method of providing a plurality of versions of a content stream with different bit-rates is suggested. According to the method a set of versions of a content stream with different bit-rates is offered to a client. A manifest part describing the offered set of versions of the content stream is submitted to the client. The client requests one version of the content stream having a specific bit-rate. The bit-rate of the versions offered to the client is dynamically selected such that the difference between bit-rates of neighbouring versions is dynamically adapted. The suggested method improves adaptive transcoding so that it uses a small manifest part based on a small set of bit-rate values distributed around the currently delivered bit-rate. In addition to that a system is suggested for implementing the method. | 1. Method of offering a set of versions of a content stream with different bit-rates to a client, wherein the method comprises:
preparing a manifest part describing the offered set of versions of the content stream; submitting the manifest part to the client; receiving a request from the client for one version of the content stream having a specific bit-rate; transcoding a version of the content stream into the bit-rate requested by the client; dynamically selecting the bit-rate of the versions offered to the client in the manifest part such that the difference between bit-rates of neighbouring versions is dynamically adapted; and repeating the previously mentioned steps. 2. Method according to claim 1, wherein the method further comprises offering the set of versions of the content stream to a single client. 3. Method according to claim 1, wherein the method further comprises dynamically adapting the difference of the bit-rates between different neighbouring versions in the set of offered bit-rates such that the neighbouring bit-rate depends on the changes of the bit-rates requested by the client. 4. Method according to claim 3, wherein the method further comprises the step of dynamically adapting the difference of the bit-rates between different neighbouring versions in the set of offered bit-rates such that the difference of the bit-rate depends on how often the client requests a different bit-rate. 5. Method according to claim 3, wherein the method further comprises dynamically adapting the difference of the bit-rates between different neighbouring versions in the set of offered bit-rates such that the difference of the bit-rate depends on how big the change of the bit-rates requested by the client is compared to the bit-rate of the currently received version. 6. Method according to claim 3, wherein the method further comprises providing a set of offered bit-rates which comprises bit-rates with an increasing difference to the neighbouring bit-rate which is closer to the currently requested bit-rate. 7. Method according to claim 3, wherein the method further comprises providing a set of offered bit-rates each having an equal distance to the neighbouring bit-rates. 8. Method according to claim 3, wherein the method further comprises the step of dynamically adapting the step width of neighbouring bit-rates of different versions if the difference of the bit-rate of a requested version compared with the bit-rate of the currently received version exceeds a threshold value. 9. System comprising a source, an adaptation platform and a client adapted for implementing the method according to claim 1. | A method of providing a plurality of versions of a content stream with different bit-rates is suggested. According to the method a set of versions of a content stream with different bit-rates is offered to a client. A manifest part describing the offered set of versions of the content stream is submitted to the client. The client requests one version of the content stream having a specific bit-rate. The bit-rate of the versions offered to the client is dynamically selected such that the difference between bit-rates of neighbouring versions is dynamically adapted. The suggested method improves adaptive transcoding so that it uses a small manifest part based on a small set of bit-rate values distributed around the currently delivered bit-rate. In addition to that a system is suggested for implementing the method.1. Method of offering a set of versions of a content stream with different bit-rates to a client, wherein the method comprises:
preparing a manifest part describing the offered set of versions of the content stream; submitting the manifest part to the client; receiving a request from the client for one version of the content stream having a specific bit-rate; transcoding a version of the content stream into the bit-rate requested by the client; dynamically selecting the bit-rate of the versions offered to the client in the manifest part such that the difference between bit-rates of neighbouring versions is dynamically adapted; and repeating the previously mentioned steps. 2. Method according to claim 1, wherein the method further comprises offering the set of versions of the content stream to a single client. 3. Method according to claim 1, wherein the method further comprises dynamically adapting the difference of the bit-rates between different neighbouring versions in the set of offered bit-rates such that the neighbouring bit-rate depends on the changes of the bit-rates requested by the client. 4. Method according to claim 3, wherein the method further comprises the step of dynamically adapting the difference of the bit-rates between different neighbouring versions in the set of offered bit-rates such that the difference of the bit-rate depends on how often the client requests a different bit-rate. 5. Method according to claim 3, wherein the method further comprises dynamically adapting the difference of the bit-rates between different neighbouring versions in the set of offered bit-rates such that the difference of the bit-rate depends on how big the change of the bit-rates requested by the client is compared to the bit-rate of the currently received version. 6. Method according to claim 3, wherein the method further comprises providing a set of offered bit-rates which comprises bit-rates with an increasing difference to the neighbouring bit-rate which is closer to the currently requested bit-rate. 7. Method according to claim 3, wherein the method further comprises providing a set of offered bit-rates each having an equal distance to the neighbouring bit-rates. 8. Method according to claim 3, wherein the method further comprises the step of dynamically adapting the step width of neighbouring bit-rates of different versions if the difference of the bit-rate of a requested version compared with the bit-rate of the currently received version exceeds a threshold value. 9. System comprising a source, an adaptation platform and a client adapted for implementing the method according to claim 1. | 2,400 |
8,216 | 8,216 | 14,221,360 | 2,484 | A vehicle may include at least one media content capture device. The vehicle may further include a controller in communication with the at least one media content capture device and configured to, responsive to a user request, capture a media content instance using the at least one media content capture device according to media content capture settings of the vehicle, and post the media content instance to an account of a remote service associated with the vehicle. | 1. A vehicle comprising:
at least one media content capture device; and a controller in communication with the at least one media content capture device and configured to:
responsive to a user request, capture a media content instance using the at least one media content capture device according to media content capture settings of the vehicle, and
post the media content instance to an account of a remote service associated with the vehicle. 2. The vehicle of claim 1, wherein the controller is further configured to store the media content instance on a persistent memory of the controller. 3. The vehicle of claim 1, wherein the controller is further configured to receive the request to capture the media content instance from a nomadic device associated with the user and in communication with the vehicle. 4. The vehicle of claim 3, wherein the request is provided to the vehicle via at least one of: (i) a short message service message from the nomadic device to a modem of the vehicle, (ii) a network device configured to provide the request to the vehicle responsive to a request received from the nomadic device, and (iii) via a direct network connection between the nomadic device to the vehicle. 5. The vehicle of claim 1, wherein the media content capture settings include an indication of which of the at least one media content capture device to use to capture the media content instance. 6. The vehicle of claim 1, wherein the media content instance further includes metadata including an identifier of the vehicle. 7. The vehicle of claim 1 wherein the media content instance further includes metadata including a geographic location of the vehicle when the media content instance was captained, and a date and time at which the media content instance was captured. 8. A method comprising:
responsive to a user request, capturing, by a controller of a vehicle in communication with at least one media content capture device of the vehicle, a media content instance using the at least one media content capture device of the vehicle according to media content capture settings of the vehicle, and posting the media content instance to an account of a remote service associated with the vehicle. 9. The method of claim 8, further comprising storing the media content instance on a persistent memory of the controller. 10. The method of claim 8, further comprising receiving the request to capture the media content instance from a nomadic device associated with the user and in communication with the vehicle. 11. The method of claim 10, further comprising receiving the user request according to at least one of: (i) a short message service message from the nomadic device to a modem of the vehicle, (ii) a network device providing the request to the vehicle responsive to a request received from the nomadic device, and (iii) via a direct network connection between the nomadic device to the vehicle. 12. The method of claim 8, wherein the media content capture settings include an indication of which of the at least one media content capture device to use to capture the media content instance. 13. The method of claim 8, further comprising including metadata in the media content instance including: an identifier of the vehicle, a geographic location of the vehicle when the media content instance was captained, and a date and time at which the media content instance was captured. 14. A non-transitory computer-readable medium including instructions that when executed by a controller of a vehicle are configured to cause the controller to:
responsive to a user request, capture, by the controller in communication with at least one media content capture device of the vehicle, a media content instance using the at least one media content capture device of the vehicle according to media content capture settings of the vehicle, and post the media content instance to an account of a remote service associated with the vehicle. 15. The computer-readable medium of claim 14, further including instructions configured to cause the controller to store the media content instance on a persistent memory of the controller. 16. The computer-readable medium of claim 14, further including instructions configured to cause the controller to receive the request to capture the media content instance from a nomadic device associated with the user and in communication with the vehicle. 17. The computer-readable medium of claim 16, further including instructions configured to cause the controller to receive the user request according to at least one of: (i) a short message service message from the nomadic device to a modem of the vehicle, (ii) a network device providing the request to the vehicle responsive to a request received from the nomadic device, and (iii) via a direct network connection between the nomadic device to the vehicle. 18. The computer-readable medium of claim 14, wherein the media content capture settings include an indication of which of the at least one media content capture device to use to capture the media content instance. 19. The computer-readable medium of claim 14, further including instructions configured to cause the controller to include metadata in the media content instance including: an identifier of the vehicle, a geographic location of the vehicle when the media content instance was captained, and a date and time at which the media content instance was captured. 20. The computer-readable medium of claim 14, further including instructions configured to cause the controller to upload the media content instance to an account of a vehicle content remote service configured to host media content instances captured by vehicles, the account of the vehicle content remote service being identified by the controller to the vehicle content remote service based at least in part on vehicle identification number (VIN). | A vehicle may include at least one media content capture device. The vehicle may further include a controller in communication with the at least one media content capture device and configured to, responsive to a user request, capture a media content instance using the at least one media content capture device according to media content capture settings of the vehicle, and post the media content instance to an account of a remote service associated with the vehicle.1. A vehicle comprising:
at least one media content capture device; and a controller in communication with the at least one media content capture device and configured to:
responsive to a user request, capture a media content instance using the at least one media content capture device according to media content capture settings of the vehicle, and
post the media content instance to an account of a remote service associated with the vehicle. 2. The vehicle of claim 1, wherein the controller is further configured to store the media content instance on a persistent memory of the controller. 3. The vehicle of claim 1, wherein the controller is further configured to receive the request to capture the media content instance from a nomadic device associated with the user and in communication with the vehicle. 4. The vehicle of claim 3, wherein the request is provided to the vehicle via at least one of: (i) a short message service message from the nomadic device to a modem of the vehicle, (ii) a network device configured to provide the request to the vehicle responsive to a request received from the nomadic device, and (iii) via a direct network connection between the nomadic device to the vehicle. 5. The vehicle of claim 1, wherein the media content capture settings include an indication of which of the at least one media content capture device to use to capture the media content instance. 6. The vehicle of claim 1, wherein the media content instance further includes metadata including an identifier of the vehicle. 7. The vehicle of claim 1 wherein the media content instance further includes metadata including a geographic location of the vehicle when the media content instance was captained, and a date and time at which the media content instance was captured. 8. A method comprising:
responsive to a user request, capturing, by a controller of a vehicle in communication with at least one media content capture device of the vehicle, a media content instance using the at least one media content capture device of the vehicle according to media content capture settings of the vehicle, and posting the media content instance to an account of a remote service associated with the vehicle. 9. The method of claim 8, further comprising storing the media content instance on a persistent memory of the controller. 10. The method of claim 8, further comprising receiving the request to capture the media content instance from a nomadic device associated with the user and in communication with the vehicle. 11. The method of claim 10, further comprising receiving the user request according to at least one of: (i) a short message service message from the nomadic device to a modem of the vehicle, (ii) a network device providing the request to the vehicle responsive to a request received from the nomadic device, and (iii) via a direct network connection between the nomadic device to the vehicle. 12. The method of claim 8, wherein the media content capture settings include an indication of which of the at least one media content capture device to use to capture the media content instance. 13. The method of claim 8, further comprising including metadata in the media content instance including: an identifier of the vehicle, a geographic location of the vehicle when the media content instance was captained, and a date and time at which the media content instance was captured. 14. A non-transitory computer-readable medium including instructions that when executed by a controller of a vehicle are configured to cause the controller to:
responsive to a user request, capture, by the controller in communication with at least one media content capture device of the vehicle, a media content instance using the at least one media content capture device of the vehicle according to media content capture settings of the vehicle, and post the media content instance to an account of a remote service associated with the vehicle. 15. The computer-readable medium of claim 14, further including instructions configured to cause the controller to store the media content instance on a persistent memory of the controller. 16. The computer-readable medium of claim 14, further including instructions configured to cause the controller to receive the request to capture the media content instance from a nomadic device associated with the user and in communication with the vehicle. 17. The computer-readable medium of claim 16, further including instructions configured to cause the controller to receive the user request according to at least one of: (i) a short message service message from the nomadic device to a modem of the vehicle, (ii) a network device providing the request to the vehicle responsive to a request received from the nomadic device, and (iii) via a direct network connection between the nomadic device to the vehicle. 18. The computer-readable medium of claim 14, wherein the media content capture settings include an indication of which of the at least one media content capture device to use to capture the media content instance. 19. The computer-readable medium of claim 14, further including instructions configured to cause the controller to include metadata in the media content instance including: an identifier of the vehicle, a geographic location of the vehicle when the media content instance was captained, and a date and time at which the media content instance was captured. 20. The computer-readable medium of claim 14, further including instructions configured to cause the controller to upload the media content instance to an account of a vehicle content remote service configured to host media content instances captured by vehicles, the account of the vehicle content remote service being identified by the controller to the vehicle content remote service based at least in part on vehicle identification number (VIN). | 2,400 |
8,217 | 8,217 | 12,747,619 | 2,498 | The invention relates to a method for authorizing a communication with a portable electronic device, such as access to at least one memory area. The portable electronic device has a display for presenting an item of information visible to the outside and an interface for communication with the outside of the portable electronic device. The item of information is at least in part taken into account by the portable electronic device in order to authorize the communication. The method includes a step of optical reading of the item of information outside the portable electronic device. The method is distinguished in that it also includes a step of varying the item of information, the step of varying causing the item of information, termed the variable item of information, to vary at least in part. The invention also relates to the portable electronic device, and the system comprising the portable electronic device and an electronic communication or reading device. | 1. Process for authorising a communication with a portable electronic device, such as access to at least one memory zone, wherein the portable electronic device comprises means for presenting an item of information visible to the outside and means for communicating with the outside of the portable electronic device, and the item of information is at least in part taken into account by the portable electronic device in order to authorise the communication, wherein the method comprises an optical reading step of the item of information outside the portable electronic device,
wherein the process further comprises a step of varying the item of information, wherein the variation step causes the item of information, termed the variable item of information, to vary at least in part. 2. Process according to claim 1, wherein the process comprises a step in which the portable electronic device supplies the variable item of information. 3. Process according to claim 2, wherein the process comprises a comparison step in relation to an item of information based at least in part on the variable item of information. 4. Process according to claim 3, wherein the portable electronic device performs the comparison step in relation to an item of information based at least in part on the variable item of information. 5. Process according to claim 2, wherein the step for supplying the variable item of information is preceded by a step for starting the supply of a variable item of information. 6. Process according to claim 5, wherein the step for starting the supply of a variable item of information comprises the reception from the outside, through the portable electronic device, of at least one item of information representative of the successful comparison pertaining to a previous reading of a variable item of information. 7. Process according to claim 5, wherein the step for starting the supply of a variable item of information comprises the reception from the outside, through the portable electronic device, of a pre-determined number of ratifications relative to a previous reading of a variable item of information. 8. Process according to claim 1, wherein the optical reading step allows access to at least one application supported by the portable electronic device. 9. Process according to claim 8, wherein the application is included within the following list:
an identification application of a bearer; an interlocutor authentication application of the portable electronic device; a bearer's loyalty application; an access control application to a restricted access zone or to a transportation service; an electronic payment application; and/or a subscriber identification application. 10. Application of the process according to claim 1 for identifying the bearer of the portable electronic device, wherein the process comprises the following steps:
optical reading of the variable item of information by an electronic reading device; determination of the first authentication value by the electronic reading device according to a pre-determined authentication algorithm and variable item of information; receiving the first authentication value through the portable electronic device by way of a radio frequency link from the electronic reading device; comparison of the first authentication value with a second authentication value by the portable electronic device, wherein the second authentication value is a function of the variable item of information; if the first and second authentication values match, granting access authorisation by the portable electronic device to the memory zone. 11. Portable electronic device comprising at least one memory zone, wherein the portable electronic device comprises means to present an item of information visible to the outside, means of communication with the outside and means of acknowledging, at least in part, items of information to authorise communication such as an access from the outside to the memory zone,
wherein the portable electronic device comprises information variation means, wherein the variation means vary the information, at least in part, of the item of information. 12. Device according to claim 11, wherein the portable electronic device comprises means for supplying a variable item of information. 13. Device according to claim 12, wherein the portable electronic device comprises means for starting the supply of variable item of information. 14. Device according to claim 13, wherein the means of starting the supply of variable item of information comprise means for detecting the entry of the portable electronic device within an electrical, electromagnetic, light and/or sound field. 15. Device according to claim 14, wherein the means of starting the supply of variable item of information comprise at least a key that can be activated from the outside of the portable electronic device. 16. Device according to claim 12, wherein the means of supplying the variable item of information comprise means for generating a random or variable number. 17. Device according to claim 11, wherein the portable electronic device comprises means of communication with the outside of a contact type and/or contactless type. 18. Device according to claim 11, wherein the portable electronic device comprises power supply means that may be rechargeable or non-rechargeable. 19. Device according to claim 11, wherein the portable electronic device is a chip card of the type included within the list comprising:
electronic identification of an object an/or a person; electronic passport; health card; electronic payment; electronic ticket; and/or subscriber identification module having radio frequency means of communication outside the chip card. 20. System for authorising communication, such as an access to at least one memory zone of a portable electronic device, wherein the portable electronic device comprises means to present visible information to the outside, means of communication with the outside of the portable electronic device, and means for acknowledging, at least in part, the item of information to authorise communication, such as access to the memory zone, wherein, the system comprises the portable electronic device and an electronic communication device,
wherein the portable electronic device comprises information variation means wherein the variation means vary the information, at least in part, of the item of information, and wherein the electronic communication device is suited to read or retrieve a variable item of information and communicate an item of information to the portable electronic device based at least in part on the variable item of information. | The invention relates to a method for authorizing a communication with a portable electronic device, such as access to at least one memory area. The portable electronic device has a display for presenting an item of information visible to the outside and an interface for communication with the outside of the portable electronic device. The item of information is at least in part taken into account by the portable electronic device in order to authorize the communication. The method includes a step of optical reading of the item of information outside the portable electronic device. The method is distinguished in that it also includes a step of varying the item of information, the step of varying causing the item of information, termed the variable item of information, to vary at least in part. The invention also relates to the portable electronic device, and the system comprising the portable electronic device and an electronic communication or reading device.1. Process for authorising a communication with a portable electronic device, such as access to at least one memory zone, wherein the portable electronic device comprises means for presenting an item of information visible to the outside and means for communicating with the outside of the portable electronic device, and the item of information is at least in part taken into account by the portable electronic device in order to authorise the communication, wherein the method comprises an optical reading step of the item of information outside the portable electronic device,
wherein the process further comprises a step of varying the item of information, wherein the variation step causes the item of information, termed the variable item of information, to vary at least in part. 2. Process according to claim 1, wherein the process comprises a step in which the portable electronic device supplies the variable item of information. 3. Process according to claim 2, wherein the process comprises a comparison step in relation to an item of information based at least in part on the variable item of information. 4. Process according to claim 3, wherein the portable electronic device performs the comparison step in relation to an item of information based at least in part on the variable item of information. 5. Process according to claim 2, wherein the step for supplying the variable item of information is preceded by a step for starting the supply of a variable item of information. 6. Process according to claim 5, wherein the step for starting the supply of a variable item of information comprises the reception from the outside, through the portable electronic device, of at least one item of information representative of the successful comparison pertaining to a previous reading of a variable item of information. 7. Process according to claim 5, wherein the step for starting the supply of a variable item of information comprises the reception from the outside, through the portable electronic device, of a pre-determined number of ratifications relative to a previous reading of a variable item of information. 8. Process according to claim 1, wherein the optical reading step allows access to at least one application supported by the portable electronic device. 9. Process according to claim 8, wherein the application is included within the following list:
an identification application of a bearer; an interlocutor authentication application of the portable electronic device; a bearer's loyalty application; an access control application to a restricted access zone or to a transportation service; an electronic payment application; and/or a subscriber identification application. 10. Application of the process according to claim 1 for identifying the bearer of the portable electronic device, wherein the process comprises the following steps:
optical reading of the variable item of information by an electronic reading device; determination of the first authentication value by the electronic reading device according to a pre-determined authentication algorithm and variable item of information; receiving the first authentication value through the portable electronic device by way of a radio frequency link from the electronic reading device; comparison of the first authentication value with a second authentication value by the portable electronic device, wherein the second authentication value is a function of the variable item of information; if the first and second authentication values match, granting access authorisation by the portable electronic device to the memory zone. 11. Portable electronic device comprising at least one memory zone, wherein the portable electronic device comprises means to present an item of information visible to the outside, means of communication with the outside and means of acknowledging, at least in part, items of information to authorise communication such as an access from the outside to the memory zone,
wherein the portable electronic device comprises information variation means, wherein the variation means vary the information, at least in part, of the item of information. 12. Device according to claim 11, wherein the portable electronic device comprises means for supplying a variable item of information. 13. Device according to claim 12, wherein the portable electronic device comprises means for starting the supply of variable item of information. 14. Device according to claim 13, wherein the means of starting the supply of variable item of information comprise means for detecting the entry of the portable electronic device within an electrical, electromagnetic, light and/or sound field. 15. Device according to claim 14, wherein the means of starting the supply of variable item of information comprise at least a key that can be activated from the outside of the portable electronic device. 16. Device according to claim 12, wherein the means of supplying the variable item of information comprise means for generating a random or variable number. 17. Device according to claim 11, wherein the portable electronic device comprises means of communication with the outside of a contact type and/or contactless type. 18. Device according to claim 11, wherein the portable electronic device comprises power supply means that may be rechargeable or non-rechargeable. 19. Device according to claim 11, wherein the portable electronic device is a chip card of the type included within the list comprising:
electronic identification of an object an/or a person; electronic passport; health card; electronic payment; electronic ticket; and/or subscriber identification module having radio frequency means of communication outside the chip card. 20. System for authorising communication, such as an access to at least one memory zone of a portable electronic device, wherein the portable electronic device comprises means to present visible information to the outside, means of communication with the outside of the portable electronic device, and means for acknowledging, at least in part, the item of information to authorise communication, such as access to the memory zone, wherein, the system comprises the portable electronic device and an electronic communication device,
wherein the portable electronic device comprises information variation means wherein the variation means vary the information, at least in part, of the item of information, and wherein the electronic communication device is suited to read or retrieve a variable item of information and communicate an item of information to the portable electronic device based at least in part on the variable item of information. | 2,400 |
8,218 | 8,218 | 15,196,933 | 2,433 | A pseudo-random cipher stream is used to band-spread an optical carrier signal with coded data. A legitimate receiver uses an agreed-upon key to modulate its local oscillator and a resulting beat signal uncovers the band-spread signal. An eavesdropper who does not have the key finds the spread signal with too low signal-to-noise ratio to perform any useful determination of the message sequence. Theoretical bounds based on Shannon's Theory of Secrecy are used to show strength of the encoding scheme and predict it to be superior to the prior art. | 1. An optical signal encryptor, comprising:
a first input port configured to receive an encryption key signal; a pseudo-random cipher-stream generator that generates a pseudo-random cipher-stream according to the encryption key signal; a laser whose optical output is band-spread according to the pseudo-random cipher-stream to produce a band-spread optical signal; a second input port configured to receive a data stream; and a modulator that modules the band-spread optical signal according to the data stream. 2. An optical signal encryptor according to claim 1, wherein the modulator is integrated with the laser. 3. An optical signal encryptor according to claim 1, wherein the laser is directly modulated to cause the band-spread. 4. An optical signal encryptor according to claim 1, wherein the laser is directly modulated by varying bias current to the laser. 5. An optical signal encryptor according to claim 1, wherein the laser is directly modulated by varying temperature of the laser. 6. An optical signal encryptor according to claim 1, wherein the modulator comprises an electro-optical modulator. 7. An optical signal encryptor according to claim 1, wherein the modulator comprises an electro-absorption modulator. 8. An optical signal encryptor according to claim 1, wherein the laser optical output is band-spread at least 50 GHz. 9. An optical signal encryptor according to claim 1, wherein the laser optical output is band-spread at least 1 THz. 10. An optical signal encryptor according to claim 1, further comprising a pseudo-random timeslot interleaver disposed between the second input port and the modulator, the timeslot interleaver interleaving at least portions of the data stream and providing a timeslot interleaved data stream to the modulator. 11. An optical signal encryptor according to claim 1, wherein the modulator produces a modulated band-spread optical signal, the optical signal encryptor further comprising a noise generator coupled to introduce errors in the modulated band-spread optical signal. 12. An optical signal decryptor, comprising:
a first input port that receives an encryption key signal; a pseudo-random cipher-stream generator that generates a pseudo-random cipher-stream according to the decryption key signal; a local optical oscillator modulated by the pseudo-random cipher-stream; a second input port that receives an encrypted optical signal; an optical balanced mixer having one input coupled to the local optical oscillator and another input coupled to the second input port; and a demodulator coupled to an output of the optical balanced mixer. 13. An optical signal decryptor according to claim 12, further comprising a deinterleaver decoder coupled to an output of the demodulator. 14. An optical signal decryptor according to claim 12, further comprising a forward error corrector coupled to an output of the demodulator. 15. An optical signal decryptor according to claim 12, wherein the demodulator operates within 0.1 dB of a quantum limit of coherent detection of the demodulator. 16. An optical signal decryptor according to claim 12, wherein the demodulator operates within 1 dB of a quantum limit of coherent detection of the demodulator. 17. An optical signal decryptor according to claim 12, wherein the demodulator operates within 3 dB of a quantum limit of coherent detection of the demodulator. 18. A method for encrypting an optical signal, the method comprising:
generating a coherent optical signal; generating a pseudo-random cipher-stream according to an encryption key; band-spreading the coherent optical signal according to the pseudo-random cipher-stream to generate a band-spread coherent optical signal; receiving a data stream; modulating the band-spread coherent optical signal according to the data stream to generate a modulated optical signal; and transmitting the modulated optical signal. 19. A method according to claim 18, further comprising pseudo-random timeslot interleaving at least portions of the data stream, thereby producing a timeslot interleaved data stream, wherein modulating the band-spreading coherent optical signal comprises modulating the band-spreading coherent optical signal according to the timeslot interleaved data stream. 20. A method according to claim 18, further comprising deliberately introducing errors in the modulated optical signal. 21. A method for decrypting an encrypted optical signal, the method comprising:
generating a pseudo-random cipher-stream according to an encryption key; generating a local optical signal; modulating the local optical signal according to the pseudo-random cipher-stream; receiving an encrypted optical signal; mixing the encrypted optical signal and the modulated local optical signal to produce a product optical signal; demodulating the product optical signal, thereby producing a demodulated signal. 22. A method according to claim 21, further comprising deinterleaving the demodulated signal. 23. A method according to claim 21, further comprising forward error correcting the demodulated signal. | A pseudo-random cipher stream is used to band-spread an optical carrier signal with coded data. A legitimate receiver uses an agreed-upon key to modulate its local oscillator and a resulting beat signal uncovers the band-spread signal. An eavesdropper who does not have the key finds the spread signal with too low signal-to-noise ratio to perform any useful determination of the message sequence. Theoretical bounds based on Shannon's Theory of Secrecy are used to show strength of the encoding scheme and predict it to be superior to the prior art.1. An optical signal encryptor, comprising:
a first input port configured to receive an encryption key signal; a pseudo-random cipher-stream generator that generates a pseudo-random cipher-stream according to the encryption key signal; a laser whose optical output is band-spread according to the pseudo-random cipher-stream to produce a band-spread optical signal; a second input port configured to receive a data stream; and a modulator that modules the band-spread optical signal according to the data stream. 2. An optical signal encryptor according to claim 1, wherein the modulator is integrated with the laser. 3. An optical signal encryptor according to claim 1, wherein the laser is directly modulated to cause the band-spread. 4. An optical signal encryptor according to claim 1, wherein the laser is directly modulated by varying bias current to the laser. 5. An optical signal encryptor according to claim 1, wherein the laser is directly modulated by varying temperature of the laser. 6. An optical signal encryptor according to claim 1, wherein the modulator comprises an electro-optical modulator. 7. An optical signal encryptor according to claim 1, wherein the modulator comprises an electro-absorption modulator. 8. An optical signal encryptor according to claim 1, wherein the laser optical output is band-spread at least 50 GHz. 9. An optical signal encryptor according to claim 1, wherein the laser optical output is band-spread at least 1 THz. 10. An optical signal encryptor according to claim 1, further comprising a pseudo-random timeslot interleaver disposed between the second input port and the modulator, the timeslot interleaver interleaving at least portions of the data stream and providing a timeslot interleaved data stream to the modulator. 11. An optical signal encryptor according to claim 1, wherein the modulator produces a modulated band-spread optical signal, the optical signal encryptor further comprising a noise generator coupled to introduce errors in the modulated band-spread optical signal. 12. An optical signal decryptor, comprising:
a first input port that receives an encryption key signal; a pseudo-random cipher-stream generator that generates a pseudo-random cipher-stream according to the decryption key signal; a local optical oscillator modulated by the pseudo-random cipher-stream; a second input port that receives an encrypted optical signal; an optical balanced mixer having one input coupled to the local optical oscillator and another input coupled to the second input port; and a demodulator coupled to an output of the optical balanced mixer. 13. An optical signal decryptor according to claim 12, further comprising a deinterleaver decoder coupled to an output of the demodulator. 14. An optical signal decryptor according to claim 12, further comprising a forward error corrector coupled to an output of the demodulator. 15. An optical signal decryptor according to claim 12, wherein the demodulator operates within 0.1 dB of a quantum limit of coherent detection of the demodulator. 16. An optical signal decryptor according to claim 12, wherein the demodulator operates within 1 dB of a quantum limit of coherent detection of the demodulator. 17. An optical signal decryptor according to claim 12, wherein the demodulator operates within 3 dB of a quantum limit of coherent detection of the demodulator. 18. A method for encrypting an optical signal, the method comprising:
generating a coherent optical signal; generating a pseudo-random cipher-stream according to an encryption key; band-spreading the coherent optical signal according to the pseudo-random cipher-stream to generate a band-spread coherent optical signal; receiving a data stream; modulating the band-spread coherent optical signal according to the data stream to generate a modulated optical signal; and transmitting the modulated optical signal. 19. A method according to claim 18, further comprising pseudo-random timeslot interleaving at least portions of the data stream, thereby producing a timeslot interleaved data stream, wherein modulating the band-spreading coherent optical signal comprises modulating the band-spreading coherent optical signal according to the timeslot interleaved data stream. 20. A method according to claim 18, further comprising deliberately introducing errors in the modulated optical signal. 21. A method for decrypting an encrypted optical signal, the method comprising:
generating a pseudo-random cipher-stream according to an encryption key; generating a local optical signal; modulating the local optical signal according to the pseudo-random cipher-stream; receiving an encrypted optical signal; mixing the encrypted optical signal and the modulated local optical signal to produce a product optical signal; demodulating the product optical signal, thereby producing a demodulated signal. 22. A method according to claim 21, further comprising deinterleaving the demodulated signal. 23. A method according to claim 21, further comprising forward error correcting the demodulated signal. | 2,400 |
8,219 | 8,219 | 15,420,052 | 2,472 | Technology for allocating network adapter resources such as air interface time and queue space amongst multiple virtual network stations or other virtual adapters is disclosed. As one example, the resource allocation may be based on analysis of the relative latency, jitter, or bandwidth considerations for applications communicating via each of the multiple virtual adapters. The resource allocation may also be based on how efficiently each of the virtual adapters utilized previously allocated resources. | 1-20. (canceled) 21. A method for managing a shared network adapter, the method comprising:
receiving data for transmission by the shared network adapter from multiple virtual adapters that access shared resources of the shared network adapter; dynamically allocating the shared resources based at least in part on information from the multiple virtual adapters, the information including attributes associated with applications communicating over the shared network adapter via respective ones of the virtual adapters; and controlling use of the shared resources based at least in part on the dynamic allocation. 22. The method of claim 21, wherein dynamically allocating the shared resources includes:
determining at least one of latency or bandwidth characteristics from the information from the multiple virtual adapters. 23. The method of claim 21, wherein dynamically allocating the shared resources includes:
assigning at least one of receiver access tokens or transmitter access tokens to each of the multiple virtual adapters based on bandwidth characteristics of the applications associated with respective ones of the virtual adapters. 24. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating frequencies at which each of the at least two virtual adapters are granted use of a receiver of the shared network adapter; and allocating receiver dwell durations for each of the at least two virtual adapters. 25. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating at least one of a radio transmission schedule or a radio reception schedule based at least in part on minimum air interface access time for maintaining wireless connections. 26. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating a radio transmission time reservation and a radio reception time reservation to a particular virtual adapter in response to a request by the particular virtual adapter to establish a wireless connection. 27. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating radio resource access frequencies to each of the multiple virtual adapters based at least in part on jitter characteristics associated with the applications communicating over the shared network adapter via respective ones of the virtual adapters; allocating radio receiver dwell durations to the multiple virtual stations based at least in part on bandwidth characteristics associated with the applications communicating over the shared network adapter via respective ones of the virtual adapters; and allocating queue resource characteristics based at least in part on at least one of the jitter or bandwidth characteristics associated with the applications communicating over the shared network adapter via respective ones of the virtual adapters. 28. The method of claim 21, wherein the method further comprises:
receiving feedback from the shared network adapter regarding transmission over an air interface during a scheduled transmission time; and dynamically reallocating the shared resources based at least in part on the feedback. 29. The method of claim 21, wherein at least two of the multiple virtual adapter are configured to operate according to different air interface protocols. 30. The method of claim 21, wherein at least two of the multiple virtual adapter are configured to operate on different wireless channels. 31. A computing device for providing multiple virtual network adapters, comprising:
a physical radio adapted to transmit and receive data via a wireless medium; and a memory and a processor that are respectively adapted to store and execute instructions for causing the computing device to:
receive data for transmission by the physical radio from multiple virtual stations of the computing device that access shared resources of the physical radio;
dynamically allocate the shared resources based at least in part on information from the multiple virtual stations, the information including attributes associated with applications communicating over the physical radio via respective ones of the multiple virtual stations; and
control use of the shared resources based at least in part on the dynamic allocation. 32. The computing device of claim 31, wherein:
the physical radio is a half-duplex radio and includes a receiver that is adapted to receive data via the wireless medium and a transmitter that is adapted to transmit data via the wireless medium; and the dynamic allocation of the shared resources includes allocation of access to the wireless medium for the receiver and for the transmitter. 33. The computing device of claim 31, wherein:
the physical radio includes a receiver that is adapted to receive data via the wireless medium; and the dynamic allocation of the shared resources includes assignment of frequencies at which the receiver is allocated to service each of the virtual stations and dynamically determines lengths of time, following receipts of beacons, that the receiver continues to service each of the virtual stations. 34. The computing device of claim 31, wherein:
the dynamic allocation of the shared resources includes allocation of air interface time for use by the multiple virtual stations based at least in part on prior utilization of previously allocated air interface time. 35. The computing device of claim 31, wherein the instructions are also for causing the computing device to:
receive feedback from the physical radio regarding transmission over an air interface; and dynamically reallocate the shared resources based at least in part on the feedback. 36. A computing device for sharing a physical radio amongst multiple virtual stations, comprising:
the physical radio, wherein the physical radio is adapted to transmit and receive data via a wireless medium; and a memory and a processor that are respectively adapted to store and execute instructions for causing the computing device to:
receive information from each of a plurality of virtual stations operating on the computing device, wherein each of the plurality of virtual stations is configured to communicate with the wireless medium via the physical radio, wherein the information includes attributes associated with bandwidth characteristics of applications communicating over the physical radio via respective corresponding virtual stations of the multiple virtual stations;
allocate a radio transmission schedule of the physical radio based at least in part on the bandwidth characteristics of the applications; and
transmitting data for the plurality of virtual stations according to the allocated radio transmission schedule. 37. The computing device of claim 36, wherein allocation of the radio transmission schedule includes:
allocation of the radio transmission schedule based at least in part on minimum air interface access needed to maintain established wireless connections. 38. The computing device of claim 36, wherein the instructions are also for causing the computing device to:
receive feedback from the physical radio regarding transmission over the wireless medium; and reallocate the radio transmission schedule based at least in part on the feedback. 39. The computing device of claim 36, wherein at least two of the plurality of virtual stations are configured to operate according to different air interface protocols. 40. The computing device of claim 36, wherein the instructions are also for causing the computing device to:
allocate radio reception resources of the physical radio based at least in part on the bandwidth characteristics of the applications. | Technology for allocating network adapter resources such as air interface time and queue space amongst multiple virtual network stations or other virtual adapters is disclosed. As one example, the resource allocation may be based on analysis of the relative latency, jitter, or bandwidth considerations for applications communicating via each of the multiple virtual adapters. The resource allocation may also be based on how efficiently each of the virtual adapters utilized previously allocated resources.1-20. (canceled) 21. A method for managing a shared network adapter, the method comprising:
receiving data for transmission by the shared network adapter from multiple virtual adapters that access shared resources of the shared network adapter; dynamically allocating the shared resources based at least in part on information from the multiple virtual adapters, the information including attributes associated with applications communicating over the shared network adapter via respective ones of the virtual adapters; and controlling use of the shared resources based at least in part on the dynamic allocation. 22. The method of claim 21, wherein dynamically allocating the shared resources includes:
determining at least one of latency or bandwidth characteristics from the information from the multiple virtual adapters. 23. The method of claim 21, wherein dynamically allocating the shared resources includes:
assigning at least one of receiver access tokens or transmitter access tokens to each of the multiple virtual adapters based on bandwidth characteristics of the applications associated with respective ones of the virtual adapters. 24. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating frequencies at which each of the at least two virtual adapters are granted use of a receiver of the shared network adapter; and allocating receiver dwell durations for each of the at least two virtual adapters. 25. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating at least one of a radio transmission schedule or a radio reception schedule based at least in part on minimum air interface access time for maintaining wireless connections. 26. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating a radio transmission time reservation and a radio reception time reservation to a particular virtual adapter in response to a request by the particular virtual adapter to establish a wireless connection. 27. The method of claim 21, wherein dynamically allocating the shared resources includes:
allocating radio resource access frequencies to each of the multiple virtual adapters based at least in part on jitter characteristics associated with the applications communicating over the shared network adapter via respective ones of the virtual adapters; allocating radio receiver dwell durations to the multiple virtual stations based at least in part on bandwidth characteristics associated with the applications communicating over the shared network adapter via respective ones of the virtual adapters; and allocating queue resource characteristics based at least in part on at least one of the jitter or bandwidth characteristics associated with the applications communicating over the shared network adapter via respective ones of the virtual adapters. 28. The method of claim 21, wherein the method further comprises:
receiving feedback from the shared network adapter regarding transmission over an air interface during a scheduled transmission time; and dynamically reallocating the shared resources based at least in part on the feedback. 29. The method of claim 21, wherein at least two of the multiple virtual adapter are configured to operate according to different air interface protocols. 30. The method of claim 21, wherein at least two of the multiple virtual adapter are configured to operate on different wireless channels. 31. A computing device for providing multiple virtual network adapters, comprising:
a physical radio adapted to transmit and receive data via a wireless medium; and a memory and a processor that are respectively adapted to store and execute instructions for causing the computing device to:
receive data for transmission by the physical radio from multiple virtual stations of the computing device that access shared resources of the physical radio;
dynamically allocate the shared resources based at least in part on information from the multiple virtual stations, the information including attributes associated with applications communicating over the physical radio via respective ones of the multiple virtual stations; and
control use of the shared resources based at least in part on the dynamic allocation. 32. The computing device of claim 31, wherein:
the physical radio is a half-duplex radio and includes a receiver that is adapted to receive data via the wireless medium and a transmitter that is adapted to transmit data via the wireless medium; and the dynamic allocation of the shared resources includes allocation of access to the wireless medium for the receiver and for the transmitter. 33. The computing device of claim 31, wherein:
the physical radio includes a receiver that is adapted to receive data via the wireless medium; and the dynamic allocation of the shared resources includes assignment of frequencies at which the receiver is allocated to service each of the virtual stations and dynamically determines lengths of time, following receipts of beacons, that the receiver continues to service each of the virtual stations. 34. The computing device of claim 31, wherein:
the dynamic allocation of the shared resources includes allocation of air interface time for use by the multiple virtual stations based at least in part on prior utilization of previously allocated air interface time. 35. The computing device of claim 31, wherein the instructions are also for causing the computing device to:
receive feedback from the physical radio regarding transmission over an air interface; and dynamically reallocate the shared resources based at least in part on the feedback. 36. A computing device for sharing a physical radio amongst multiple virtual stations, comprising:
the physical radio, wherein the physical radio is adapted to transmit and receive data via a wireless medium; and a memory and a processor that are respectively adapted to store and execute instructions for causing the computing device to:
receive information from each of a plurality of virtual stations operating on the computing device, wherein each of the plurality of virtual stations is configured to communicate with the wireless medium via the physical radio, wherein the information includes attributes associated with bandwidth characteristics of applications communicating over the physical radio via respective corresponding virtual stations of the multiple virtual stations;
allocate a radio transmission schedule of the physical radio based at least in part on the bandwidth characteristics of the applications; and
transmitting data for the plurality of virtual stations according to the allocated radio transmission schedule. 37. The computing device of claim 36, wherein allocation of the radio transmission schedule includes:
allocation of the radio transmission schedule based at least in part on minimum air interface access needed to maintain established wireless connections. 38. The computing device of claim 36, wherein the instructions are also for causing the computing device to:
receive feedback from the physical radio regarding transmission over the wireless medium; and reallocate the radio transmission schedule based at least in part on the feedback. 39. The computing device of claim 36, wherein at least two of the plurality of virtual stations are configured to operate according to different air interface protocols. 40. The computing device of claim 36, wherein the instructions are also for causing the computing device to:
allocate radio reception resources of the physical radio based at least in part on the bandwidth characteristics of the applications. | 2,400 |
8,220 | 8,220 | 15,281,189 | 2,483 | A collision avoidance system comprises a pair of video cameras mounted to a vertical stabilizer of the aircraft, a machine vision processing unit, and a system to inform the pilots of a potential collision. The machine vision processing unit is configured to process image data captured by the video cameras using stereoscopic and structure from motion techniques to detect an obstacle that is near or in the path of the aircraft. Estimates of the range to the object and the rate of change of that range are computed. With the range and range rate, a time to collision can be estimated toward every point of the aircraft. A pilot warning can be sounded based on the nearness of the potential collision. A method of calibrating the video cameras using existing feature points on the top of the aircraft is initiated in response to power being turned on. | 1. A system for warning a pilot of a risk of collision, the system comprising:
a first camera mounted at a first height to a leading edge of a vertical stabilizer of an aircraft for generating a first stream of video frames that include first image data representing an image of an object in a scene and second image data representing an image of a portion of the aircraft; a second camera mounted at a second height to the leading edge of the vertical stabilizer for generating a second stream of video frames that include third image data representing an image of the object in the scene and fourth image data representing an image of the portion of the aircraft, wherein the second height is less than the first height; a cue system on a flight deck of the aircraft capable of generating a cue; and a computer system programmed to: process the video frames of the first and second streams to determine a first range to the object and a first range rate at which the range to the object is changing at a first time; compute a first time to collision based on at least the first range and first range rate; and trigger the cue system to produce a first cue in response to the first time to collision being less than a first detection threshold. 2. The system as recited in claim 1, wherein the computer system is further programmed to:
process the video frames of the first and second streams to determine a second range to the object and a second range rate at which the range is changing at a second time that is subsequent to the first time; compute a second time to collision based on at least the second range and second range rate; and trigger the cue system to produce a second cue different than the first cue in response to the second time to collision being less than a second detection threshold, wherein the second detection threshold is less than the first detection threshold. 3. The system as recited in claim 2, wherein the first cue is a sound having a first volume and the second cue is a sound having a second volume greater than the first volume. 4. The system as recited in claim 2, wherein the first cue is a repetitive sound having a first repetition rate and the second cue is a repetitive sound having a second repetition rate greater than the first repetition rate. 5. The system as recited in claim 1, wherein the video frames of the first and second streams are processed using a stereoscopic technique to estimate a depth of the object. 6. The system as recited in claim 1, wherein the video frames of the first and second streams are processed using a structure from motion technique to estimate a three-dimensional structure of the scene. 7. The system as recited in claim 1, wherein the first and second cameras are directed in a forward direction along a centerline of the aircraft with respective fields of view that are at least partially overlapping. 8. The system as recited in claim 1, wherein the computer system is further programmed to:
activate the first and second cameras to capture first and second images; and calibrate the first and second cameras based on the first and second images. 9. The system as recited in claim 8, wherein the computer system is further programmed to:
detect image data correlated to a camera template in the first image; and declare the first camera to be a top camera in response to detection of image data correlated to the camera template in the first image. 10. The system as recited in claim 1, wherein the computer system is further programmed to:
segment the image data in the first and second images which represents portions of the aircraft appearing in both images using feature locations with sizes appropriate for image templates of each feature; correlate each feature segment against its template image; compute a maximum correlation coefficient together with an offset from an original feature location; compare the maximum correlation coefficient to a correlation coefficient threshold; and determine an essential matrix based at least in part on the results of the comparison of the maximum correlation coefficient to the correlation coefficient threshold. 11. A system for warning a pilot of a risk of collision, the system comprising:
a first camera mounted at a first height to a leading edge of a vertical stabilizer of an aircraft; a second camera mounted at a second height to the leading edge of the vertical stabilizer, wherein the second height is different than the first height; and a computer system programmed to: activate the first and second cameras to capture first and second images; detect image data correlated to a camera template in one of the first and second images; and declare one of the first and second cameras to be a top camera based on which one of the first and second images contained image data correlated to the camera template. 12. A method for warning that a risk of collision exists, the method comprising:
activating a first camera mounted at a first height to a leading edge of a vertical stabilizer of an aircraft to generate a first stream of video frames that include first image data representing an image of an object in a scene and second image data representing an image of a portion of the aircraft; activating a second camera mounted at a second height to the leading edge of the vertical stabilizer to generate a second stream of video frames that include third image data representing an image of the object in the scene and fourth image data representing an image of the portion of the aircraft, wherein the second height is less than the first height; processing the video frames of the first and second streams to determine a first range to the object and a first range rate at which the range to the object is changing at a first time; computing a first time to collision based on at least the first range and first range rate; and producing a first cue in response to the first time to collision being less than a first detection threshold. 13. The method as recited in claim 12, further comprising:
processing the video frames of the first and second streams to determine a second range to the object and a second range rate at which the range is changing at a second time that is subsequent to the first time; computing a second time to collision based on at least the second range and second range rate; and producing a second cue different than the first cue in response to the second time to collision being less than a second detection threshold, wherein the second detection threshold is less than the first detection threshold. 14. The method as recited in claim 13, wherein the first cue is a sound having a first volume and the second cue is a sound having a second volume greater than the first volume. 15. The method as recited in claim 13, wherein the first cue is a repetitive sound having a first repetition rate and the second cue is a repetitive sound having a second repetition rate greater than the first repetition rate. 16. The method as recited in claim 12, wherein the video frames of the first and second streams are processed using a stereoscopic technique to estimate a depth of the object. 17. The method as recited in claim 12, wherein the video frames of the first and second streams are processed using a structure from motion technique to estimate a three-dimensional structure of the scene. 18. The method as recited in claim 12, further comprising:
segmenting the image data in the first and second images which represents portions of the aircraft appearing in both images using feature locations with sizes appropriate for image templates of each feature; correlating each feature segment against its template image; computing a maximum correlation coefficient together with an offset from an original feature location; comparing the maximum correlation coefficient to a correlation coefficient threshold; and determining an essential matrix based at least in part on the results of the comparison of the maximum correlation coefficient to the correlation coefficient threshold. 19. A method for calibrating a pair of cameras, the method comprising:
activating first and second cameras mounted to a leading edge of a vertical stabilizer of an aircraft to capture first and second images; and calibrating the first and second cameras based on the first and second images. 20. The method as recited in claim 19, wherein further comprising:
detecting image data correlated to a camera template in the first image; and declaring the first camera to be a top camera in response to detection of image data in the first image that is correlated to the camera template. | A collision avoidance system comprises a pair of video cameras mounted to a vertical stabilizer of the aircraft, a machine vision processing unit, and a system to inform the pilots of a potential collision. The machine vision processing unit is configured to process image data captured by the video cameras using stereoscopic and structure from motion techniques to detect an obstacle that is near or in the path of the aircraft. Estimates of the range to the object and the rate of change of that range are computed. With the range and range rate, a time to collision can be estimated toward every point of the aircraft. A pilot warning can be sounded based on the nearness of the potential collision. A method of calibrating the video cameras using existing feature points on the top of the aircraft is initiated in response to power being turned on.1. A system for warning a pilot of a risk of collision, the system comprising:
a first camera mounted at a first height to a leading edge of a vertical stabilizer of an aircraft for generating a first stream of video frames that include first image data representing an image of an object in a scene and second image data representing an image of a portion of the aircraft; a second camera mounted at a second height to the leading edge of the vertical stabilizer for generating a second stream of video frames that include third image data representing an image of the object in the scene and fourth image data representing an image of the portion of the aircraft, wherein the second height is less than the first height; a cue system on a flight deck of the aircraft capable of generating a cue; and a computer system programmed to: process the video frames of the first and second streams to determine a first range to the object and a first range rate at which the range to the object is changing at a first time; compute a first time to collision based on at least the first range and first range rate; and trigger the cue system to produce a first cue in response to the first time to collision being less than a first detection threshold. 2. The system as recited in claim 1, wherein the computer system is further programmed to:
process the video frames of the first and second streams to determine a second range to the object and a second range rate at which the range is changing at a second time that is subsequent to the first time; compute a second time to collision based on at least the second range and second range rate; and trigger the cue system to produce a second cue different than the first cue in response to the second time to collision being less than a second detection threshold, wherein the second detection threshold is less than the first detection threshold. 3. The system as recited in claim 2, wherein the first cue is a sound having a first volume and the second cue is a sound having a second volume greater than the first volume. 4. The system as recited in claim 2, wherein the first cue is a repetitive sound having a first repetition rate and the second cue is a repetitive sound having a second repetition rate greater than the first repetition rate. 5. The system as recited in claim 1, wherein the video frames of the first and second streams are processed using a stereoscopic technique to estimate a depth of the object. 6. The system as recited in claim 1, wherein the video frames of the first and second streams are processed using a structure from motion technique to estimate a three-dimensional structure of the scene. 7. The system as recited in claim 1, wherein the first and second cameras are directed in a forward direction along a centerline of the aircraft with respective fields of view that are at least partially overlapping. 8. The system as recited in claim 1, wherein the computer system is further programmed to:
activate the first and second cameras to capture first and second images; and calibrate the first and second cameras based on the first and second images. 9. The system as recited in claim 8, wherein the computer system is further programmed to:
detect image data correlated to a camera template in the first image; and declare the first camera to be a top camera in response to detection of image data correlated to the camera template in the first image. 10. The system as recited in claim 1, wherein the computer system is further programmed to:
segment the image data in the first and second images which represents portions of the aircraft appearing in both images using feature locations with sizes appropriate for image templates of each feature; correlate each feature segment against its template image; compute a maximum correlation coefficient together with an offset from an original feature location; compare the maximum correlation coefficient to a correlation coefficient threshold; and determine an essential matrix based at least in part on the results of the comparison of the maximum correlation coefficient to the correlation coefficient threshold. 11. A system for warning a pilot of a risk of collision, the system comprising:
a first camera mounted at a first height to a leading edge of a vertical stabilizer of an aircraft; a second camera mounted at a second height to the leading edge of the vertical stabilizer, wherein the second height is different than the first height; and a computer system programmed to: activate the first and second cameras to capture first and second images; detect image data correlated to a camera template in one of the first and second images; and declare one of the first and second cameras to be a top camera based on which one of the first and second images contained image data correlated to the camera template. 12. A method for warning that a risk of collision exists, the method comprising:
activating a first camera mounted at a first height to a leading edge of a vertical stabilizer of an aircraft to generate a first stream of video frames that include first image data representing an image of an object in a scene and second image data representing an image of a portion of the aircraft; activating a second camera mounted at a second height to the leading edge of the vertical stabilizer to generate a second stream of video frames that include third image data representing an image of the object in the scene and fourth image data representing an image of the portion of the aircraft, wherein the second height is less than the first height; processing the video frames of the first and second streams to determine a first range to the object and a first range rate at which the range to the object is changing at a first time; computing a first time to collision based on at least the first range and first range rate; and producing a first cue in response to the first time to collision being less than a first detection threshold. 13. The method as recited in claim 12, further comprising:
processing the video frames of the first and second streams to determine a second range to the object and a second range rate at which the range is changing at a second time that is subsequent to the first time; computing a second time to collision based on at least the second range and second range rate; and producing a second cue different than the first cue in response to the second time to collision being less than a second detection threshold, wherein the second detection threshold is less than the first detection threshold. 14. The method as recited in claim 13, wherein the first cue is a sound having a first volume and the second cue is a sound having a second volume greater than the first volume. 15. The method as recited in claim 13, wherein the first cue is a repetitive sound having a first repetition rate and the second cue is a repetitive sound having a second repetition rate greater than the first repetition rate. 16. The method as recited in claim 12, wherein the video frames of the first and second streams are processed using a stereoscopic technique to estimate a depth of the object. 17. The method as recited in claim 12, wherein the video frames of the first and second streams are processed using a structure from motion technique to estimate a three-dimensional structure of the scene. 18. The method as recited in claim 12, further comprising:
segmenting the image data in the first and second images which represents portions of the aircraft appearing in both images using feature locations with sizes appropriate for image templates of each feature; correlating each feature segment against its template image; computing a maximum correlation coefficient together with an offset from an original feature location; comparing the maximum correlation coefficient to a correlation coefficient threshold; and determining an essential matrix based at least in part on the results of the comparison of the maximum correlation coefficient to the correlation coefficient threshold. 19. A method for calibrating a pair of cameras, the method comprising:
activating first and second cameras mounted to a leading edge of a vertical stabilizer of an aircraft to capture first and second images; and calibrating the first and second cameras based on the first and second images. 20. The method as recited in claim 19, wherein further comprising:
detecting image data correlated to a camera template in the first image; and declaring the first camera to be a top camera in response to detection of image data in the first image that is correlated to the camera template. | 2,400 |
8,221 | 8,221 | 14,216,010 | 2,483 | A method for reducing power consumption of a 3D image capture system includes capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state, detecting a power state change trigger, and switching from the first power state to a second power state based on the power state change trigger, wherein the 3D image capture system consumes less power in the second power state than in the first power state. | 1. A method for reducing power consumption of a 3D image capture system comprising:
capturing, at a first time, using an RGB camera and an active depth camera, 3D image data with the 3D image capture system while the 3D image capture system is in a first power state, wherein the 3D image data includes pose data; capturing, at a second time, using an RGB camera, 2D image data, wherein the 2D image data includes estimated pose data; refining, using an image warping technique operating on the 2D image data and the 3D image data, the estimated pose data into refined pose data; determining, based on results of the image warping technique, a refined pose data quality level; generating, based on the refined posed data quality level satisfying a quality threshold, a power state change trigger; and switching, on the 3D image capture system, from the first power state to a second power state based on the power state change trigger, wherein the active depth camera is disabled and pose data is captured using 2D image data in the second power state. 2. The method of claim 1, wherein the active depth camera is a structured light camera having a structured light emitter and an infrared camera. 3. The method of claim 1, further comprising:
capturing additional 2D image data at a third time using an RGB camera, wherein the additional 2D image data includes new estimated pose data; refining, using an image warping technique operating on the additional 2D image data, the new estimated pose data into new refined pose data; determining, based on results of the image warping technique, a new refined pose data quality level; generating, based on the new refined posed data quality level not satisfying a second quality threshold, a second power state change trigger; and switching, on the 3D image capture system, from the second power state to the first power state based on the second power state change trigger. 4. The method of claim 1, wherein capturing 2D image data further comprises capturing estimated pose data using an inertial motion unit. 5. The method of claim 1, further comprising capturing 3D image data while the 3D image capture system is in the second power state, using a derived data technique operating on the 2D image data. 6. A method for reducing power consumption of a 3D image capture system comprising:
capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state; detecting, on the 3D image capture system, a power state change trigger; and switching, on the 3D image capture system, from the first power state to a second power state based on the power state change trigger, wherein the 3D image capture system consumes less power in the second power state than in the first power state. 7. The method of claim 6, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state comprises capturing 3D image data with an active depth camera and an RGB camera. 8. The method of claim 7, further comprising capturing a pose of the 3D image capture system; wherein detecting a power state change trigger comprises determining that the 3D image capture system has already collected 3D image data for the pose; wherein the active depth camera of the 3D image capture system is disabled in the second power state. 9. The method of claim 7, further comprising capturing a pose of the 3D image capture system, wherein detecting a power state change trigger comprises determining that the 3D image data results in updates to an environment map, wherein modification to the environment map by the updates is below a threshold; wherein the active depth camera of the 3D image capture system is disabled in the second power state. 10. The method of claim 7, wherein detecting a power state change trigger comprises detecting that a battery charge level of the 3D image capture system is below a low battery threshold; wherein the active depth camera of the 3D image capture system is disabled in the second power state. 11. The method of claim 10, further comprising capturing 3D image data while the 3D image capture system is in the second power state, using a derived data technique operating on 2D image data from the RGB camera. 12. The method of claim 7, wherein detecting a power state change trigger comprises detecting that motion of the 3D image capture system is below a low-motion threshold. 13. The method of claim 12, wherein the active depth camera operates at a first pulse pattern having a first duty cycle in the first power state and the active depth camera operates at a second pulse pattern having a second duty cycle in the second power state; wherein the first duty cycle is greater than the second duty cycle. 14. The method of claim 7, wherein detecting a power state change trigger comprises detecting that a distance between the 3D image capture system and an imaging target is below a distance threshold. 15. The method of claim 14, wherein the active depth camera operates at a first emitter power in the first power state and the active depth camera operates at a second emitter power in the second power state; wherein the first emitter power is greater than the second emitter power. 16. The method of claim 7, wherein the active depth camera has an emitter that can spatially direct emission; wherein detecting a power state change trigger comprises detecting an area of interest in the 3D image data; wherein the emitter spatially directs emission to the area of interest in the second power state. 17. The method of claim 7, wherein detecting a power state change trigger comprises detecting that a rate of 3D image capture is greater than a threshold rate in the first power state; wherein the active depth camera pulses at the threshold rate in the second power state. 18. The method of claim 6, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state comprises capturing 3D image data with two RGB cameras using a stereoscopic technique. 19. The method of claim 18, wherein one of the two RGB cameras is disabled in the second power state. 20. The method of claim 19, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state further comprises running a technique tracking algorithm; wherein detecting a power state change trigger comprises detecting a power state change trigger generated by the technique tracking algorithm. 21. The method of claim 6, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state further comprises running a technique tracking algorithm; wherein detecting a power state change trigger comprises detecting a power state change trigger generated by the technique tracking algorithm. | A method for reducing power consumption of a 3D image capture system includes capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state, detecting a power state change trigger, and switching from the first power state to a second power state based on the power state change trigger, wherein the 3D image capture system consumes less power in the second power state than in the first power state.1. A method for reducing power consumption of a 3D image capture system comprising:
capturing, at a first time, using an RGB camera and an active depth camera, 3D image data with the 3D image capture system while the 3D image capture system is in a first power state, wherein the 3D image data includes pose data; capturing, at a second time, using an RGB camera, 2D image data, wherein the 2D image data includes estimated pose data; refining, using an image warping technique operating on the 2D image data and the 3D image data, the estimated pose data into refined pose data; determining, based on results of the image warping technique, a refined pose data quality level; generating, based on the refined posed data quality level satisfying a quality threshold, a power state change trigger; and switching, on the 3D image capture system, from the first power state to a second power state based on the power state change trigger, wherein the active depth camera is disabled and pose data is captured using 2D image data in the second power state. 2. The method of claim 1, wherein the active depth camera is a structured light camera having a structured light emitter and an infrared camera. 3. The method of claim 1, further comprising:
capturing additional 2D image data at a third time using an RGB camera, wherein the additional 2D image data includes new estimated pose data; refining, using an image warping technique operating on the additional 2D image data, the new estimated pose data into new refined pose data; determining, based on results of the image warping technique, a new refined pose data quality level; generating, based on the new refined posed data quality level not satisfying a second quality threshold, a second power state change trigger; and switching, on the 3D image capture system, from the second power state to the first power state based on the second power state change trigger. 4. The method of claim 1, wherein capturing 2D image data further comprises capturing estimated pose data using an inertial motion unit. 5. The method of claim 1, further comprising capturing 3D image data while the 3D image capture system is in the second power state, using a derived data technique operating on the 2D image data. 6. A method for reducing power consumption of a 3D image capture system comprising:
capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state; detecting, on the 3D image capture system, a power state change trigger; and switching, on the 3D image capture system, from the first power state to a second power state based on the power state change trigger, wherein the 3D image capture system consumes less power in the second power state than in the first power state. 7. The method of claim 6, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state comprises capturing 3D image data with an active depth camera and an RGB camera. 8. The method of claim 7, further comprising capturing a pose of the 3D image capture system; wherein detecting a power state change trigger comprises determining that the 3D image capture system has already collected 3D image data for the pose; wherein the active depth camera of the 3D image capture system is disabled in the second power state. 9. The method of claim 7, further comprising capturing a pose of the 3D image capture system, wherein detecting a power state change trigger comprises determining that the 3D image data results in updates to an environment map, wherein modification to the environment map by the updates is below a threshold; wherein the active depth camera of the 3D image capture system is disabled in the second power state. 10. The method of claim 7, wherein detecting a power state change trigger comprises detecting that a battery charge level of the 3D image capture system is below a low battery threshold; wherein the active depth camera of the 3D image capture system is disabled in the second power state. 11. The method of claim 10, further comprising capturing 3D image data while the 3D image capture system is in the second power state, using a derived data technique operating on 2D image data from the RGB camera. 12. The method of claim 7, wherein detecting a power state change trigger comprises detecting that motion of the 3D image capture system is below a low-motion threshold. 13. The method of claim 12, wherein the active depth camera operates at a first pulse pattern having a first duty cycle in the first power state and the active depth camera operates at a second pulse pattern having a second duty cycle in the second power state; wherein the first duty cycle is greater than the second duty cycle. 14. The method of claim 7, wherein detecting a power state change trigger comprises detecting that a distance between the 3D image capture system and an imaging target is below a distance threshold. 15. The method of claim 14, wherein the active depth camera operates at a first emitter power in the first power state and the active depth camera operates at a second emitter power in the second power state; wherein the first emitter power is greater than the second emitter power. 16. The method of claim 7, wherein the active depth camera has an emitter that can spatially direct emission; wherein detecting a power state change trigger comprises detecting an area of interest in the 3D image data; wherein the emitter spatially directs emission to the area of interest in the second power state. 17. The method of claim 7, wherein detecting a power state change trigger comprises detecting that a rate of 3D image capture is greater than a threshold rate in the first power state; wherein the active depth camera pulses at the threshold rate in the second power state. 18. The method of claim 6, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state comprises capturing 3D image data with two RGB cameras using a stereoscopic technique. 19. The method of claim 18, wherein one of the two RGB cameras is disabled in the second power state. 20. The method of claim 19, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state further comprises running a technique tracking algorithm; wherein detecting a power state change trigger comprises detecting a power state change trigger generated by the technique tracking algorithm. 21. The method of claim 6, wherein capturing 3D image data with the 3D image capture system while the 3D image capture system is in a first power state further comprises running a technique tracking algorithm; wherein detecting a power state change trigger comprises detecting a power state change trigger generated by the technique tracking algorithm. | 2,400 |
8,222 | 8,222 | 15,097,767 | 2,433 | Methods and apparatus for using a biometric template to control access to a user credential for a shared wireless communication device. One method includes receiving, from a mobile device, an authentication request. The authentication request includes a device credential associated with the mobile device. The method further includes receiving, from the mobile device, a request for a biometric template of a user. The method further includes determining, by reference to at least one of a group consisting of the device credential and an authorization database, that the mobile device is authorized to receive the biometric template of the user based on at least one attribute controlling a use of the biometric template. The method further includes, in response to determining that the mobile device is authorized to receive the biometric template of the user, conveying the biometric template of the user to the mobile device. | 1. A method for controlling access to a user credential, the method comprising:
receiving, from a mobile device, an authentication request, the authentication request including a device credential associated with the mobile device; receiving, from the mobile device, a request for a biometric template of a user; determining, by reference to at least one of a group consisting of the device credential and an authorization database, that the mobile device is authorized to receive the biometric template of the user based on at least one attribute controlling a use of the biometric template; and in response to determining that the mobile device is authorized to receive the biometric template of the user, conveying the biometric template of the user to the mobile device. 2. The method of claim 1, wherein the at least one attribute controlling a use of the biometric template includes one or more of an agency, a department, a precinct, a jurisdiction, an assurance level, an authority indicator, or a role of the user. 3. The method of claim 1, wherein conveying the biometric template of the user to the mobile device includes conveying, to the mobile device, metadata. 4. The method of claim 3, wherein the metadata includes at least one selected from the group consisting of a role of a user authorized to use the biometric template, a rank of a user authorized to use the biometric template, a biometric template lifetime, conditions upon which to delete the biometric template, a type of mobile device authorized to use the biometric template, a user credential subject name, a user credential validity period, one or more authorization attributes, and an assurance level. 5. The method of claim 1, further comprising:
subsequent to conveying the biometric template of the user to the mobile device, receiving, from the mobile device, a request for a user credential associated with the user, wherein the request is signed by the mobile device; and in response to receiving the request for a user credential,
validating that the mobile device is authorized to approve user credential requests, and
conveying, to the mobile device, the user credential associated with the user. 6. The method of claim 5, wherein validating that the mobile device is authorized to approve user credential requests includes
performing device authentication with the mobile device; wherein the mobile device, prior to requesting the user credential, provides a device certificate containing an attribute that indicates to the user credential server that the mobile device is configured to perform user authentication based on a stored biometric template. 7. A method for authenticating a user on a mobile device, the method comprising:
receiving, by a input/output interface of the mobile device, a user identifying input; in response to receiving the user identifying input, authenticating, by the mobile device, to a biometric template server; in response to authenticating to the biometric template server, conveying, by the mobile device to the biometric template server, the user identifying input; in response to conveying the user identifying input, receiving, by the mobile device, one or more messages including a biometric template for the user; and authenticating, by the mobile device, the user based on the biometric template. 8. The method of claim 7, wherein
the biometric template is valid for only a biometric template lifetime, and the mobile device deletes the biometric template when the biometric template lifetime has expired. 9. The method of claim 7, further comprising:
assembling, by the mobile device, a request for a user credential based on metadata included in the one or more messages; signing, by the mobile device, the request for a user credential to produce a signed request; conveying, by the mobile device to a user credential server, the signed request; and in response to conveying the signed request, receiving, by the mobile device, the user credential. 10. The method of claim 9, further comprising:
in response to receiving the user credential, securely storing the user credential. 11. The method of claim 10, wherein securely storing includes requiring a biometric authentication of the user, based on the biometric template, in order to activate a use of the user credential. 12. The method of claim 9, wherein the metadata includes information controlling a use of the biometric template by the mobile device. 13. The method of claim 9, wherein the metadata includes information controlling a use of the user credential by the mobile device. 14. The method of claim 9, wherein the metadata is at least one selected from a group consisting of a role of a user authorized to use the biometric template, a rank of a user authorized to use the biometric template, a biometric template lifetime, conditions upon which to delete the biometric template, a type of mobile device authorized to use the biometric template, a user credential subject name, a user credential validity period, one or more authorization attributes, and an assurance level. 15. The method of claim 9, wherein signing the request includes signing the request using a registration authority key associated with the mobile device. 16. The method of claim 9, wherein the request for a user credential is a certificate signing request and wherein the user credential is a certificate. 17. The method of claim 9, wherein the request for a user credential is a request for an identity token, and wherein the user credential is an identity token. 18. The method of claim 9, wherein the user credential server includes at least one selected from a group consisting of a public key infrastructure, a public key infrastructure element, a registration authority and a certificate authority. 19. The method of claim 7, further comprising:
receiving a user input including a user-provided personal identification number; decrypting the biometric template based on the user-provided personal identification number to produce a decrypted biometric template; and authenticating the user based on the decrypted biometric template. 20. A mobile device comprising:
an input/output interface; a wireless interface a processor; at least one memory device configured to store a set of instructions that, when executed by the processor, cause the processor to perform the following functions:
receive, via the input/output interface, a user identifying input from a user of the mobile device;
in response to receiving the user identifying input, authenticate to a biometric template server and convey, to the biometric template server via the wireless interface, the user identifying input;
in response to conveying the user identifying input, receive, via the wireless interface, one or more messages including a biometric template for the user;
authenticate the user based on the biometric template;
assemble a request for a user credential based on metadata included in the one or more messages;
sign the request for a user credential to produce a signed request;
convey, via the wireless interface, to a user credential server, the signed request; and
in response to conveying the signed request, receive, via the wireless interface, the user credential. | Methods and apparatus for using a biometric template to control access to a user credential for a shared wireless communication device. One method includes receiving, from a mobile device, an authentication request. The authentication request includes a device credential associated with the mobile device. The method further includes receiving, from the mobile device, a request for a biometric template of a user. The method further includes determining, by reference to at least one of a group consisting of the device credential and an authorization database, that the mobile device is authorized to receive the biometric template of the user based on at least one attribute controlling a use of the biometric template. The method further includes, in response to determining that the mobile device is authorized to receive the biometric template of the user, conveying the biometric template of the user to the mobile device.1. A method for controlling access to a user credential, the method comprising:
receiving, from a mobile device, an authentication request, the authentication request including a device credential associated with the mobile device; receiving, from the mobile device, a request for a biometric template of a user; determining, by reference to at least one of a group consisting of the device credential and an authorization database, that the mobile device is authorized to receive the biometric template of the user based on at least one attribute controlling a use of the biometric template; and in response to determining that the mobile device is authorized to receive the biometric template of the user, conveying the biometric template of the user to the mobile device. 2. The method of claim 1, wherein the at least one attribute controlling a use of the biometric template includes one or more of an agency, a department, a precinct, a jurisdiction, an assurance level, an authority indicator, or a role of the user. 3. The method of claim 1, wherein conveying the biometric template of the user to the mobile device includes conveying, to the mobile device, metadata. 4. The method of claim 3, wherein the metadata includes at least one selected from the group consisting of a role of a user authorized to use the biometric template, a rank of a user authorized to use the biometric template, a biometric template lifetime, conditions upon which to delete the biometric template, a type of mobile device authorized to use the biometric template, a user credential subject name, a user credential validity period, one or more authorization attributes, and an assurance level. 5. The method of claim 1, further comprising:
subsequent to conveying the biometric template of the user to the mobile device, receiving, from the mobile device, a request for a user credential associated with the user, wherein the request is signed by the mobile device; and in response to receiving the request for a user credential,
validating that the mobile device is authorized to approve user credential requests, and
conveying, to the mobile device, the user credential associated with the user. 6. The method of claim 5, wherein validating that the mobile device is authorized to approve user credential requests includes
performing device authentication with the mobile device; wherein the mobile device, prior to requesting the user credential, provides a device certificate containing an attribute that indicates to the user credential server that the mobile device is configured to perform user authentication based on a stored biometric template. 7. A method for authenticating a user on a mobile device, the method comprising:
receiving, by a input/output interface of the mobile device, a user identifying input; in response to receiving the user identifying input, authenticating, by the mobile device, to a biometric template server; in response to authenticating to the biometric template server, conveying, by the mobile device to the biometric template server, the user identifying input; in response to conveying the user identifying input, receiving, by the mobile device, one or more messages including a biometric template for the user; and authenticating, by the mobile device, the user based on the biometric template. 8. The method of claim 7, wherein
the biometric template is valid for only a biometric template lifetime, and the mobile device deletes the biometric template when the biometric template lifetime has expired. 9. The method of claim 7, further comprising:
assembling, by the mobile device, a request for a user credential based on metadata included in the one or more messages; signing, by the mobile device, the request for a user credential to produce a signed request; conveying, by the mobile device to a user credential server, the signed request; and in response to conveying the signed request, receiving, by the mobile device, the user credential. 10. The method of claim 9, further comprising:
in response to receiving the user credential, securely storing the user credential. 11. The method of claim 10, wherein securely storing includes requiring a biometric authentication of the user, based on the biometric template, in order to activate a use of the user credential. 12. The method of claim 9, wherein the metadata includes information controlling a use of the biometric template by the mobile device. 13. The method of claim 9, wherein the metadata includes information controlling a use of the user credential by the mobile device. 14. The method of claim 9, wherein the metadata is at least one selected from a group consisting of a role of a user authorized to use the biometric template, a rank of a user authorized to use the biometric template, a biometric template lifetime, conditions upon which to delete the biometric template, a type of mobile device authorized to use the biometric template, a user credential subject name, a user credential validity period, one or more authorization attributes, and an assurance level. 15. The method of claim 9, wherein signing the request includes signing the request using a registration authority key associated with the mobile device. 16. The method of claim 9, wherein the request for a user credential is a certificate signing request and wherein the user credential is a certificate. 17. The method of claim 9, wherein the request for a user credential is a request for an identity token, and wherein the user credential is an identity token. 18. The method of claim 9, wherein the user credential server includes at least one selected from a group consisting of a public key infrastructure, a public key infrastructure element, a registration authority and a certificate authority. 19. The method of claim 7, further comprising:
receiving a user input including a user-provided personal identification number; decrypting the biometric template based on the user-provided personal identification number to produce a decrypted biometric template; and authenticating the user based on the decrypted biometric template. 20. A mobile device comprising:
an input/output interface; a wireless interface a processor; at least one memory device configured to store a set of instructions that, when executed by the processor, cause the processor to perform the following functions:
receive, via the input/output interface, a user identifying input from a user of the mobile device;
in response to receiving the user identifying input, authenticate to a biometric template server and convey, to the biometric template server via the wireless interface, the user identifying input;
in response to conveying the user identifying input, receive, via the wireless interface, one or more messages including a biometric template for the user;
authenticate the user based on the biometric template;
assemble a request for a user credential based on metadata included in the one or more messages;
sign the request for a user credential to produce a signed request;
convey, via the wireless interface, to a user credential server, the signed request; and
in response to conveying the signed request, receive, via the wireless interface, the user credential. | 2,400 |
8,223 | 8,223 | 14,958,988 | 2,447 | The current document is directed to cloud-based cloud-management systems and subsystem components of the management systems that store, retrieve, use, and manipulate artifacts. In the described implementations, artifacts are represented by artifact descriptors, referred to as “artifact specs,” which are instantiated, at run time, as corresponding artifact models. The artifact models include full descriptions of the artifacts as well as references to locally stored instances of the artifacts that can be used to access the artifacts. In the case of automated-application-release-management subsystems, artifacts include executables, program code, files containing input and/or output data, and other stored data used in provisioning virtual machines, deploying application executables, testing application executables, and carrying out other subtasks of application development, testing, and release. | 1. A workflow-based cloud-management system incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the workflow-based cloud-management system comprising:
an infrastructure-management-and-administration subsystem; a workflow-execution engine; an automated-application-deployment subsystem; and an automated-application-release-management subsystem that executes application-release-management pipelines that each comprises one or more stages, each having one of more tasks and that interfaces to one or more artifact repositories through a model-based artifact-management-subsystem interface to access artifacts on behalf of the executing executes application-release-management pipelines. 2. The workflow-based cloud-management system of claim 1 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
a management controller;
an interface to the workflow-execution engine; and
an artifact-management subsystem. 3. The workflow-based cloud-management system of claim 2 wherein the automated-application-release-management subsystem and the infrastructure-management-and-administration subsystem include control logic at least partially implemented as workflows that are executed by the workflow-execution-engine subsystem. 4. The workflow-based cloud-management system of claim 2 wherein an application-release-management pipeline stage or task within an application-release-management pipeline that accesses one or more artifacts managed by the artifact-management subsystem uses one or more search specs, stored in memory, as one or more handles for the one or more artifacts. 5. The workflow-based cloud-management system of claim 4 wherein each search spec includes:
a name of the artifact or artifacts represented by the search spec;
an indication of one or more artifact repositories in which to search;
an indication of a search type; and
parameter values submitted in a call to an entrypoint corresponding to the search type. 6. The workflow-based cloud-management system of claim 4 wherein the management controller resolves a search spec into a an artifact model by:
for each artifact repository indicated by artifact-repository indications in the search spec,
compiling a search request from the search-type indication and parameter values,
submitting the search request to the artifact repository, and
retrieving artifacts or references to artifacts returned in response to the search request;
generating an artifact model for each artifact retrieved from one or more of the artifact repositories; and
storing the artifact model in memory. 7. The workflow-based cloud-management system of claim 6 wherein each artifact model includes:
a name for the artifact;
a reference to the artifact;
information that describes the repository from which the artifact was retrieved;
a size of the artifact;
a reference to a description of, or to a callable reference to, the search request used to retrieve the artifact; and
properties or attributes of the artifact. 8. The workflow-based cloud-management system of claim 6 wherein each artifact model further includes:
check sums that can be used to verify the artifact. 9. The workflow-based cloud-management system of claim 6 wherein the management controller downloads resolved artifacts to a computer system on which they are locally accessed by executing tasks of an application-release-management pipeline and wherein the reference to the artifact in the corresponding artifact model refers to the locally stored artifact. 10. The workflow-based cloud-management system of claim 6 wherein an executing application-release-management pipeline downloads resolved artifacts to a computer system on which they are locally accessed by executing task and wherein the reference to the artifact in the corresponding artifact model refers to a remotely stored artifact. 11. The workflow-based cloud-management system of claim 6 wherein the management controller maintains, in memory:
a storage-type table that lists each type of search, the parameter values supplied to invoke the search, and a list of artifact repositories that support the search type; and
a repository spec that provides connection information for each accessible artifact repository. 12. A method that provides for execution of application-release-management pipelines, by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks and that that accesses artifacts through a model-based artifact-management-subsystem interface, the method comprising:
configuring an application-release-management pipeline to include one or more stages, each having one of more tasks, that include one or more search-spec handles for one or more artifacts; and launching, by a management controller, execution of the application-release-management pipeline, during which the management controller resolves the search specs into one or more artifact models. 13. The method of claim 12 wherein the workflow-based cloud-management system comprises:
an infrastructure-management-and-administration subsystem;
a workflow-execution engine;
an automated-application-deployment subsystem; and
the automated-application-release-management subsystem that executes application-release-management pipelines. 14. The method of claim 13 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
the management controller;
an interface to the workflow-execution engine; and
an artifact-management subsystem. 15. The method of claim 14 wherein each application-release-management pipeline task that accesses one or more artifacts managed by the artifact-management subsystem uses one or more search specs, stored in memory, as one or more handles to describe the one or more artifacts. 16. The method of claim 15 wherein each search spec includes:
a name of the artifact or artifacts represented by the search spec;
an indication of one or more artifact repositories in which to search;
an indication of a search type; and
parameter values submitted in a call to an entrypoint corresponding to the search type. 17. The method of claim 15 wherein the management controller resolves a search spec into a an artifact model by:
for each artifact repository indicated by artifact-repository indications in the search spec,
compiling a search request from the search-type indication and parameter values,
submitting the search request to the artifact repository, and
retrieving artifacts or references to artifacts returned in response to the search request; and
generating an artifact model for each artifact retrieved from one or more of the artifact repositories; and
storing the artifact model in memory. 18. The method of claim 17 wherein each artifact model includes:
a name for the artifact;
a reference to the artifact;
information that describes the repository from which the artifact was retrieved;
a size of the artifact;
a reference to a description of, or to a callable reference to, the search request used to retrieve the artifact; and
properties or attributes of the artifact. 19. The method of claim 6 wherein each artifact model further includes:
check sums that can be used to verify the artifact. 20. Computer instructions, stored within one or more physical data-storage devices, that, when executed on one or more processors within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, control the cloud-computing facility to provide for execution of application-release-management pipelines, by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within the cloud-computing facility and that accesses artifacts through a model-based artifact-management-subsystem interface, by:
configuring an application-release-management pipeline to include one or more stages, each having one of more tasks, that include one or more search-spec handles for one or more artifacts; and launching, by a management controller, execution of the application-release-management pipeline, during which the management controller resolves the search specs into one or more artifact models. | The current document is directed to cloud-based cloud-management systems and subsystem components of the management systems that store, retrieve, use, and manipulate artifacts. In the described implementations, artifacts are represented by artifact descriptors, referred to as “artifact specs,” which are instantiated, at run time, as corresponding artifact models. The artifact models include full descriptions of the artifacts as well as references to locally stored instances of the artifacts that can be used to access the artifacts. In the case of automated-application-release-management subsystems, artifacts include executables, program code, files containing input and/or output data, and other stored data used in provisioning virtual machines, deploying application executables, testing application executables, and carrying out other subtasks of application development, testing, and release.1. A workflow-based cloud-management system incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the workflow-based cloud-management system comprising:
an infrastructure-management-and-administration subsystem; a workflow-execution engine; an automated-application-deployment subsystem; and an automated-application-release-management subsystem that executes application-release-management pipelines that each comprises one or more stages, each having one of more tasks and that interfaces to one or more artifact repositories through a model-based artifact-management-subsystem interface to access artifacts on behalf of the executing executes application-release-management pipelines. 2. The workflow-based cloud-management system of claim 1 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
a management controller;
an interface to the workflow-execution engine; and
an artifact-management subsystem. 3. The workflow-based cloud-management system of claim 2 wherein the automated-application-release-management subsystem and the infrastructure-management-and-administration subsystem include control logic at least partially implemented as workflows that are executed by the workflow-execution-engine subsystem. 4. The workflow-based cloud-management system of claim 2 wherein an application-release-management pipeline stage or task within an application-release-management pipeline that accesses one or more artifacts managed by the artifact-management subsystem uses one or more search specs, stored in memory, as one or more handles for the one or more artifacts. 5. The workflow-based cloud-management system of claim 4 wherein each search spec includes:
a name of the artifact or artifacts represented by the search spec;
an indication of one or more artifact repositories in which to search;
an indication of a search type; and
parameter values submitted in a call to an entrypoint corresponding to the search type. 6. The workflow-based cloud-management system of claim 4 wherein the management controller resolves a search spec into a an artifact model by:
for each artifact repository indicated by artifact-repository indications in the search spec,
compiling a search request from the search-type indication and parameter values,
submitting the search request to the artifact repository, and
retrieving artifacts or references to artifacts returned in response to the search request;
generating an artifact model for each artifact retrieved from one or more of the artifact repositories; and
storing the artifact model in memory. 7. The workflow-based cloud-management system of claim 6 wherein each artifact model includes:
a name for the artifact;
a reference to the artifact;
information that describes the repository from which the artifact was retrieved;
a size of the artifact;
a reference to a description of, or to a callable reference to, the search request used to retrieve the artifact; and
properties or attributes of the artifact. 8. The workflow-based cloud-management system of claim 6 wherein each artifact model further includes:
check sums that can be used to verify the artifact. 9. The workflow-based cloud-management system of claim 6 wherein the management controller downloads resolved artifacts to a computer system on which they are locally accessed by executing tasks of an application-release-management pipeline and wherein the reference to the artifact in the corresponding artifact model refers to the locally stored artifact. 10. The workflow-based cloud-management system of claim 6 wherein an executing application-release-management pipeline downloads resolved artifacts to a computer system on which they are locally accessed by executing task and wherein the reference to the artifact in the corresponding artifact model refers to a remotely stored artifact. 11. The workflow-based cloud-management system of claim 6 wherein the management controller maintains, in memory:
a storage-type table that lists each type of search, the parameter values supplied to invoke the search, and a list of artifact repositories that support the search type; and
a repository spec that provides connection information for each accessible artifact repository. 12. A method that provides for execution of application-release-management pipelines, by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks and that that accesses artifacts through a model-based artifact-management-subsystem interface, the method comprising:
configuring an application-release-management pipeline to include one or more stages, each having one of more tasks, that include one or more search-spec handles for one or more artifacts; and launching, by a management controller, execution of the application-release-management pipeline, during which the management controller resolves the search specs into one or more artifact models. 13. The method of claim 12 wherein the workflow-based cloud-management system comprises:
an infrastructure-management-and-administration subsystem;
a workflow-execution engine;
an automated-application-deployment subsystem; and
the automated-application-release-management subsystem that executes application-release-management pipelines. 14. The method of claim 13 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
the management controller;
an interface to the workflow-execution engine; and
an artifact-management subsystem. 15. The method of claim 14 wherein each application-release-management pipeline task that accesses one or more artifacts managed by the artifact-management subsystem uses one or more search specs, stored in memory, as one or more handles to describe the one or more artifacts. 16. The method of claim 15 wherein each search spec includes:
a name of the artifact or artifacts represented by the search spec;
an indication of one or more artifact repositories in which to search;
an indication of a search type; and
parameter values submitted in a call to an entrypoint corresponding to the search type. 17. The method of claim 15 wherein the management controller resolves a search spec into a an artifact model by:
for each artifact repository indicated by artifact-repository indications in the search spec,
compiling a search request from the search-type indication and parameter values,
submitting the search request to the artifact repository, and
retrieving artifacts or references to artifacts returned in response to the search request; and
generating an artifact model for each artifact retrieved from one or more of the artifact repositories; and
storing the artifact model in memory. 18. The method of claim 17 wherein each artifact model includes:
a name for the artifact;
a reference to the artifact;
information that describes the repository from which the artifact was retrieved;
a size of the artifact;
a reference to a description of, or to a callable reference to, the search request used to retrieve the artifact; and
properties or attributes of the artifact. 19. The method of claim 6 wherein each artifact model further includes:
check sums that can be used to verify the artifact. 20. Computer instructions, stored within one or more physical data-storage devices, that, when executed on one or more processors within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, control the cloud-computing facility to provide for execution of application-release-management pipelines, by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within the cloud-computing facility and that accesses artifacts through a model-based artifact-management-subsystem interface, by:
configuring an application-release-management pipeline to include one or more stages, each having one of more tasks, that include one or more search-spec handles for one or more artifacts; and launching, by a management controller, execution of the application-release-management pipeline, during which the management controller resolves the search specs into one or more artifact models. | 2,400 |
8,224 | 8,224 | 15,233,708 | 2,436 | A programming session may be initiated to a vehicle ECU by an update device. A software update for the ECU may be authenticated by the update device using an authentication key. When an authentication result indicates successful authentication, the ECU software update is sent by the update device over the in-vehicle network to the ECU. The ECU may then flash a memory with the ECU software update. The authentication key may be obtained from the ECU. The update device may be a vehicle telematics control unit or a service tool coupled to a connector of the vehicle. | 1. A method comprising:
initiating a programming session of a vehicle electronic control unit (ECU) by an update device in communication with the ECU over a vehicle bus; authenticating a software update to be installed to the ECU by the update device using an authentication key received from the ECU; and responsive to successful authentication, sending the software update from the update device over the vehicle bus to be applied to the ECU. 2. The method of claim 1, further comprising:
requesting the authentication key over the vehicle bus from the ECU by the update device; and validating a checksum of the software update by the ECU responsive to receipt of the software update by the ECU. 3. The method of claim 1, further comprising generating a notification indicating a result of the authenticating. 4. The method of claim 1, wherein the authenticating comprises authenticating a digital signature of the software update using the authentication key, the authentication key being a public key, the digital signature being applied to the software update by an originator of the software update using a private key corresponding to the authentication key. 5. The method of claim 1, further comprising:
determining an update version of the software update; determining a current version of the software installed in the ECU; comparing the update version with the current version to obtain a comparison result; and based on the comparison result, identifying whether to request the authentication key from the ECU by the update device. 6. The method of claim 5, further comprising outputting a message based on the comparison result. 7. The method of claim 1 further comprising requesting an authentication key from the ECU by the update device in response to an update version of the software update not matching a current version of the software installed in the ECU. 8. The method of claim 1, wherein the update device is connected to the vehicle bus of the vehicle using an On-Board Diagnostic 2 (OBD2) connector. 9. The method of claim 1, further comprising receiving the software update using a Telematics Control Unit (TCU) over a wireless link. 10. The method of claim 9, wherein the update device is the TCU. 11. A vehicle system comprising:
a Telematics Control Unit (TCU) connected to an in-vehicle network, configured to
receive a software update for an Electronic Control Unit (ECU) over a wireless network;
initiate a programming session with the ECU via the in-vehicle network;
authenticate the software update using an authentication key received from the ECU via the in-vehicle network to obtain an authentication result; and
responsive to the authentication result indicating successful authentication, send the software update over the in-vehicle network to the ECU to cause the ECU to flash a memory of the ECU with the software update. 12. The vehicle system of claim 11, wherein the TCU is further configured to obtain the authentication key from the ECU from a memory of the TCU, wherein the authentication key is stored to the memory from application of a previous software update from the TCU to the ECU. 13. The vehicle system of claim 11, wherein the TCU is further configured to display a notification indicating the authentication result. 14. The vehicle system of claim 11, wherein the TCU is further configured to authenticate a digital signature of the software update using the authentication key, the authentication key being a public key, the digital signature being applied to the software update by an originator of the software update using a private key corresponding to the authentication key. 15. The vehicle system of claim 11, wherein the TCU is further configured to
determine an update version of the software update before receiving it; determine a current version of software that is currently installed in the ECU; compare the update version with the current version to obtain a comparison result; and based on the comparison result, decide whether to receive the software update. 16. The vehicle system of claim 11, wherein the TCU is further configured to reject the software update in response to an update version of the software being incompatible with a current version of the software installed in the ECU. 17. The vehicle system of claim 11, wherein the wireless network is at least one of a cellular network, a Wi-Fi network, or a Bluetooth network. 18. An apparatus for flashing software of an Electronic Control Unit (ECU) of a vehicle, comprising:
a connector configured to couple the apparatus to an in-vehicle network of the vehicle; a memory configured to store an Electronic Control Unit (ECU) software update; and a processor configured to
initiate a programming session to the ECU via the connector;
authenticate the ECU software update using an authentication key to obtain an authentication result; and
when the authentication result indicates successful authentication, send the ECU software update over the in-vehicle network to the ECU to cause the ECU to flash with the ECU software update. 19. The apparatus of claim 18, further comprising a communication device configured to download the ECU software update. 20. The apparatus of claim 18, wherein the processor is further configured to authenticate a digital signature of the software update using the authentication key, the authentication key being a public key, the digital signature being applied to the software update by an originator of the software update using a private key corresponding to the authentication key. 21. The apparatus of claim 18, wherein the processor is further configured to determine to obtain the authentication key from the ECU responsive to determining that a version of the ECU software update is greater than a current version of the software installed to the ECU. | A programming session may be initiated to a vehicle ECU by an update device. A software update for the ECU may be authenticated by the update device using an authentication key. When an authentication result indicates successful authentication, the ECU software update is sent by the update device over the in-vehicle network to the ECU. The ECU may then flash a memory with the ECU software update. The authentication key may be obtained from the ECU. The update device may be a vehicle telematics control unit or a service tool coupled to a connector of the vehicle.1. A method comprising:
initiating a programming session of a vehicle electronic control unit (ECU) by an update device in communication with the ECU over a vehicle bus; authenticating a software update to be installed to the ECU by the update device using an authentication key received from the ECU; and responsive to successful authentication, sending the software update from the update device over the vehicle bus to be applied to the ECU. 2. The method of claim 1, further comprising:
requesting the authentication key over the vehicle bus from the ECU by the update device; and validating a checksum of the software update by the ECU responsive to receipt of the software update by the ECU. 3. The method of claim 1, further comprising generating a notification indicating a result of the authenticating. 4. The method of claim 1, wherein the authenticating comprises authenticating a digital signature of the software update using the authentication key, the authentication key being a public key, the digital signature being applied to the software update by an originator of the software update using a private key corresponding to the authentication key. 5. The method of claim 1, further comprising:
determining an update version of the software update; determining a current version of the software installed in the ECU; comparing the update version with the current version to obtain a comparison result; and based on the comparison result, identifying whether to request the authentication key from the ECU by the update device. 6. The method of claim 5, further comprising outputting a message based on the comparison result. 7. The method of claim 1 further comprising requesting an authentication key from the ECU by the update device in response to an update version of the software update not matching a current version of the software installed in the ECU. 8. The method of claim 1, wherein the update device is connected to the vehicle bus of the vehicle using an On-Board Diagnostic 2 (OBD2) connector. 9. The method of claim 1, further comprising receiving the software update using a Telematics Control Unit (TCU) over a wireless link. 10. The method of claim 9, wherein the update device is the TCU. 11. A vehicle system comprising:
a Telematics Control Unit (TCU) connected to an in-vehicle network, configured to
receive a software update for an Electronic Control Unit (ECU) over a wireless network;
initiate a programming session with the ECU via the in-vehicle network;
authenticate the software update using an authentication key received from the ECU via the in-vehicle network to obtain an authentication result; and
responsive to the authentication result indicating successful authentication, send the software update over the in-vehicle network to the ECU to cause the ECU to flash a memory of the ECU with the software update. 12. The vehicle system of claim 11, wherein the TCU is further configured to obtain the authentication key from the ECU from a memory of the TCU, wherein the authentication key is stored to the memory from application of a previous software update from the TCU to the ECU. 13. The vehicle system of claim 11, wherein the TCU is further configured to display a notification indicating the authentication result. 14. The vehicle system of claim 11, wherein the TCU is further configured to authenticate a digital signature of the software update using the authentication key, the authentication key being a public key, the digital signature being applied to the software update by an originator of the software update using a private key corresponding to the authentication key. 15. The vehicle system of claim 11, wherein the TCU is further configured to
determine an update version of the software update before receiving it; determine a current version of software that is currently installed in the ECU; compare the update version with the current version to obtain a comparison result; and based on the comparison result, decide whether to receive the software update. 16. The vehicle system of claim 11, wherein the TCU is further configured to reject the software update in response to an update version of the software being incompatible with a current version of the software installed in the ECU. 17. The vehicle system of claim 11, wherein the wireless network is at least one of a cellular network, a Wi-Fi network, or a Bluetooth network. 18. An apparatus for flashing software of an Electronic Control Unit (ECU) of a vehicle, comprising:
a connector configured to couple the apparatus to an in-vehicle network of the vehicle; a memory configured to store an Electronic Control Unit (ECU) software update; and a processor configured to
initiate a programming session to the ECU via the connector;
authenticate the ECU software update using an authentication key to obtain an authentication result; and
when the authentication result indicates successful authentication, send the ECU software update over the in-vehicle network to the ECU to cause the ECU to flash with the ECU software update. 19. The apparatus of claim 18, further comprising a communication device configured to download the ECU software update. 20. The apparatus of claim 18, wherein the processor is further configured to authenticate a digital signature of the software update using the authentication key, the authentication key being a public key, the digital signature being applied to the software update by an originator of the software update using a private key corresponding to the authentication key. 21. The apparatus of claim 18, wherein the processor is further configured to determine to obtain the authentication key from the ECU responsive to determining that a version of the ECU software update is greater than a current version of the software installed to the ECU. | 2,400 |
8,225 | 8,225 | 15,129,681 | 2,433 | A method for a computer to execute an item of software, the method comprising: the computer executing one or more security modules; the computer executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by: sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function; receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and continuing execution of the item of software at the address received from the address system. | 1. A method for a computer to execute an item of software, the method comprising:
the computer executing one or more security modules; the computer executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by:
sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function;
receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and
continuing execution of the item of software at the address received from the address system. 2. The method of claim 1, comprising the at least one of the one or more security modules providing the verification data to the address system in response to receiving a request for the verification data from the address system. 3. The method of claim 1, comprising the at least one of the one or more security modules providing the verification data to the address system periodically. 4. A method of facilitating execution of an item of software by a computer, the method comprising an address system performing the steps of:
receiving, from the computer, a request for an address of instructions for carrying out a predetermined function of the item of software, the request comprising an identifier of the predetermined function; receiving, from at least one of one or more security modules being executed by the computer, verification data; generating an address based, at least in part, on (a) the identifier and (b) the verification data; providing the generated address to the computer for the computer to continue execution of the item of software at the provided address. 5. The method of claim 4, comprising:
in response to receiving the request for the address, sending, to the at least one of the one or more security modules, a request for the verification data. 6. The method of claim 5, comprising identifying, based on the identifier, the at least one of the one or more security modules to which the request for the verification data is to be sent. 7. The method of claim 4, comprising receiving the verification data from the at least one of the one or more security modules periodically. 8. The method of claim 4, wherein generating the address comprises:
generating a hash value by performing a hash based, at least in part, on the verification data; and combining the generated hash value with a predetermined compensation value to generate a result, wherein the address system stores the predetermined compensation value in association with the identifier; wherein the address is generated based on the result. 9. The method of claim 8, wherein the address is a predetermined part of the result. 10. The method of claim 8, wherein the address equals the result. 11. The method of claim 8, comprising performing an error-detection operation on the result, and:
if no errors are detected in the result, then the address is generated as at least part of the result; if at least one error is detected in the result, then the address is set to be a predetermined address. 12. The method of claim 11, wherein the predetermined address is arranged such that continuing execution of the item of software at the predetermined address causes the item of software to perform at least one of:
(a) ceasing execution of the item of software; (b) providing a notification to a provider of the item of software or to another entity; (c) preventing future execution of the item of software; (d) ensuring that data output by the item of software is corrupted. 13. The method of claim 12, wherein the notification comprises data identifying the computer and/or a user of the computer. 14. The method of claim 8, in which the hash is further based, at least in part, on the identifier. 15. The method of claim 8, wherein combining the generated hash value with the predetermined compensation value comprises XOR-ing the generated hash value with the predetermined compensation value. 16. The method of claim 1, in which each of the one or more security modules is arranged to perform a respective security-related operation. 17. The method of claim 16, wherein the respective security-related operation comprises one or more of:
(a) software license processing in relation to the item of software; (b) preventing the item of software from executing on a device other than the computer; (c) authenticating the item of software; (d) authenticating a user of the item of software; (e) authorizing use of the item of software; (f) providing a countermeasure against an attack on the item of software; (g) detecting an attack on the item of software. 18. The method of claim 1, in which the verification data comprises one or more values dependent on a current state of at least one of the one or more security modules. 19. The method of claim 1, in which the verification data comprises a hash value based on a hash of one or more software portions, wherein each software portion is a respective part of the item of software or a respective part of one of the one or more security modules. 20. The method of claim 1, in which the verification data comprises data representing one or more properties of the computer. 21. The method of claim 20, in which the one or more properties of the computer comprises one or both of: (a) an identification number for the computer; (b) a model type of the computer. 22. The method of claim 1, in which the address system executes on the computer. 23. An apparatus comprising a processor, the processor arranged to execute an item of software by:
executing one or more security modules; executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by:
sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function;
receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and
continuing execution of the item of software at the address received from the address system. 24. An apparatus comprising a processor, the processor arranged to facilitate execution of an item of software by a computer by:
receiving, from the computer, a request for an address of instructions for carrying out a predetermined function of the item of software, the request comprising an identifier of the predetermined function; receiving, from at least one of one or more security modules being executed by the computer, verification data; generating an address based, at least in part, on (a) the identifier and (b) the verification data; providing the generated address to the computer for the computer to continue execution of the item of software at the provided address. 25. A non-transitory computer-readable medium storing a computer program which, when executed by one or more processors, causes the one or more processors to:
execute one or more security modules; execute the item of software, execution of the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by:
sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function;
receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and
continuing execution of the item of software at the address received from the address system. 26. A non-transitory computer-readable medium storing a computer program which, when executed by one or more processors, causes the one or more processors to facilitate execution of an item of software by a computer by:
receiving, from the computer, a request for an address of instructions for carrying out a predetermined function of the item of software, the request comprising an identifier of the predetermined function; receiving, from at least one of one or more security modules being executed by the computer, verification data; generating an address based, at least in part, on (a) the identifier and (b) the verification data; providing the generated address to the computer for the computer to continue execution of the item of software at the provided address. 27. The method claim 4, in which each of the one or more security modules is arranged to perform a respective security-related operation. 28. The method of claim 27, wherein the respective security-related operation comprises one or more of:
(a) software license processing in relation to the item of software; (b) preventing the item of software from executing on a device other than the computer; (c) authenticating the item of software; (d) authenticating a user of the item of software; (e) authorizing use of the item of software; (f) providing a countermeasure against an attack on the item of software; (g) detecting an attack on the item of software. 29. The method of claim 4, in which the verification data comprises one or more values dependent on a current state of at least one of the one or more security modules. 30. The method of claim 4, in which the verification data comprises a hash value based on a hash of one or more software portions, wherein each software portion is a respective part of the item of software or a respective part of one of the one or more security modules. 31. The method of claim 4, in which the verification data comprises data representing one or more properties of the computer. 32. The method of claim 31, in which the one or more properties of the computer comprises one or both of: (a) an identification number for the computer; (b) a model type of the computer. 33. The method of claim 4, in which the address system executes on the computer. | A method for a computer to execute an item of software, the method comprising: the computer executing one or more security modules; the computer executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by: sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function; receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and continuing execution of the item of software at the address received from the address system.1. A method for a computer to execute an item of software, the method comprising:
the computer executing one or more security modules; the computer executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by:
sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function;
receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and
continuing execution of the item of software at the address received from the address system. 2. The method of claim 1, comprising the at least one of the one or more security modules providing the verification data to the address system in response to receiving a request for the verification data from the address system. 3. The method of claim 1, comprising the at least one of the one or more security modules providing the verification data to the address system periodically. 4. A method of facilitating execution of an item of software by a computer, the method comprising an address system performing the steps of:
receiving, from the computer, a request for an address of instructions for carrying out a predetermined function of the item of software, the request comprising an identifier of the predetermined function; receiving, from at least one of one or more security modules being executed by the computer, verification data; generating an address based, at least in part, on (a) the identifier and (b) the verification data; providing the generated address to the computer for the computer to continue execution of the item of software at the provided address. 5. The method of claim 4, comprising:
in response to receiving the request for the address, sending, to the at least one of the one or more security modules, a request for the verification data. 6. The method of claim 5, comprising identifying, based on the identifier, the at least one of the one or more security modules to which the request for the verification data is to be sent. 7. The method of claim 4, comprising receiving the verification data from the at least one of the one or more security modules periodically. 8. The method of claim 4, wherein generating the address comprises:
generating a hash value by performing a hash based, at least in part, on the verification data; and combining the generated hash value with a predetermined compensation value to generate a result, wherein the address system stores the predetermined compensation value in association with the identifier; wherein the address is generated based on the result. 9. The method of claim 8, wherein the address is a predetermined part of the result. 10. The method of claim 8, wherein the address equals the result. 11. The method of claim 8, comprising performing an error-detection operation on the result, and:
if no errors are detected in the result, then the address is generated as at least part of the result; if at least one error is detected in the result, then the address is set to be a predetermined address. 12. The method of claim 11, wherein the predetermined address is arranged such that continuing execution of the item of software at the predetermined address causes the item of software to perform at least one of:
(a) ceasing execution of the item of software; (b) providing a notification to a provider of the item of software or to another entity; (c) preventing future execution of the item of software; (d) ensuring that data output by the item of software is corrupted. 13. The method of claim 12, wherein the notification comprises data identifying the computer and/or a user of the computer. 14. The method of claim 8, in which the hash is further based, at least in part, on the identifier. 15. The method of claim 8, wherein combining the generated hash value with the predetermined compensation value comprises XOR-ing the generated hash value with the predetermined compensation value. 16. The method of claim 1, in which each of the one or more security modules is arranged to perform a respective security-related operation. 17. The method of claim 16, wherein the respective security-related operation comprises one or more of:
(a) software license processing in relation to the item of software; (b) preventing the item of software from executing on a device other than the computer; (c) authenticating the item of software; (d) authenticating a user of the item of software; (e) authorizing use of the item of software; (f) providing a countermeasure against an attack on the item of software; (g) detecting an attack on the item of software. 18. The method of claim 1, in which the verification data comprises one or more values dependent on a current state of at least one of the one or more security modules. 19. The method of claim 1, in which the verification data comprises a hash value based on a hash of one or more software portions, wherein each software portion is a respective part of the item of software or a respective part of one of the one or more security modules. 20. The method of claim 1, in which the verification data comprises data representing one or more properties of the computer. 21. The method of claim 20, in which the one or more properties of the computer comprises one or both of: (a) an identification number for the computer; (b) a model type of the computer. 22. The method of claim 1, in which the address system executes on the computer. 23. An apparatus comprising a processor, the processor arranged to execute an item of software by:
executing one or more security modules; executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by:
sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function;
receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and
continuing execution of the item of software at the address received from the address system. 24. An apparatus comprising a processor, the processor arranged to facilitate execution of an item of software by a computer by:
receiving, from the computer, a request for an address of instructions for carrying out a predetermined function of the item of software, the request comprising an identifier of the predetermined function; receiving, from at least one of one or more security modules being executed by the computer, verification data; generating an address based, at least in part, on (a) the identifier and (b) the verification data; providing the generated address to the computer for the computer to continue execution of the item of software at the provided address. 25. A non-transitory computer-readable medium storing a computer program which, when executed by one or more processors, causes the one or more processors to:
execute one or more security modules; execute the item of software, execution of the item of software comprising, at at least one point during execution of the item of software at which a predetermined function is to be performed, attempting to perform the predetermined function by:
sending, to an address system, a request for an address of instructions for carrying out the predetermined function, the request comprising an identifier of the predetermined function;
receiving, from the address system in response to the request, an address generated by the address system based, at least in part, on (a) the identifier and (b) verification data provided to the address system from at least one of the one or more security modules; and
continuing execution of the item of software at the address received from the address system. 26. A non-transitory computer-readable medium storing a computer program which, when executed by one or more processors, causes the one or more processors to facilitate execution of an item of software by a computer by:
receiving, from the computer, a request for an address of instructions for carrying out a predetermined function of the item of software, the request comprising an identifier of the predetermined function; receiving, from at least one of one or more security modules being executed by the computer, verification data; generating an address based, at least in part, on (a) the identifier and (b) the verification data; providing the generated address to the computer for the computer to continue execution of the item of software at the provided address. 27. The method claim 4, in which each of the one or more security modules is arranged to perform a respective security-related operation. 28. The method of claim 27, wherein the respective security-related operation comprises one or more of:
(a) software license processing in relation to the item of software; (b) preventing the item of software from executing on a device other than the computer; (c) authenticating the item of software; (d) authenticating a user of the item of software; (e) authorizing use of the item of software; (f) providing a countermeasure against an attack on the item of software; (g) detecting an attack on the item of software. 29. The method of claim 4, in which the verification data comprises one or more values dependent on a current state of at least one of the one or more security modules. 30. The method of claim 4, in which the verification data comprises a hash value based on a hash of one or more software portions, wherein each software portion is a respective part of the item of software or a respective part of one of the one or more security modules. 31. The method of claim 4, in which the verification data comprises data representing one or more properties of the computer. 32. The method of claim 31, in which the one or more properties of the computer comprises one or both of: (a) an identification number for the computer; (b) a model type of the computer. 33. The method of claim 4, in which the address system executes on the computer. | 2,400 |
8,226 | 8,226 | 14,332,071 | 2,424 | A computing system for identifying, describing, and sharing salient events depicted in images and videos executes feature detection algorithms on multimedia input (e.g., video and/or images). The computing system applies semantic reasoning techniques to the output of the feature detection algorithms. The computing system identifies salient event segments of the multimedia input as a result of the semantic reasoning. The computing system can incorporate the salient event segments into a visual presentation, such as a video clip. Alternatively or in addition, the computing system can generate a natural language description of the content of the multimedia input. | 1. A video assistant for understanding content of a video, the video assistant embodied in one or more non-transitory machine accessible storage media of a computing system and comprising instructions executable by one or more processors to cause the computing system to:
detect a plurality of different features in a plurality of different segments of a video by executing a plurality of different feature detection algorithms on the video, each of the video segments comprising one or more frames of the video; determine an event evidenced by the detected features; determine a plurality of salient activities associated with the event; and algorithmically identify a plurality of different salient event segments of the video, each of the salient event segments depicting a salient activity associated with the event. 2. The video assistant of claim 1, comprising instructions executable to determine salient event criteria associated with the event, and determine the salient activities associated with the event based on the salient event criteria. 3. The video assistant of claim 2, comprising instructions executable to determine the salient event criteria by one or more of: algorithmically analyzing a video collection and algorithmically learning a user specification relating to the salient event criteria. 4. The video assistant of claim 1, comprising instructions executable to determine a saliency indicator associated with each of the salient event segments of the video, and select a subset of the plurality of salient event segments for inclusion in a visual presentation based on the saliency indicator. 5. The video assistant of claim 1, comprising instructions executable to extract the salient event segments from the video and incorporate the extracted salient event segments into a video clip. 6. The video assistant of claim 5, comprising instructions executable to, in response to user input, share the video clip with another computing device over a network. 7. The video assistant of claim 5, comprising instructions executable to one or more of: (i) by a human-computer interface device, interactively edit the video clip and (ii) automatically edit the video clip. 8. The video assistant of claim 7, comprising instructions executable to store data relating to the interactive editing of the video clip, execute one or more machine learning algorithms on the stored data, and, in response to the execution of the one or more machine learning algorithms on the stored data, update one or more of: the determination of salient activities associated with the event and the identification of salient event segments. 9. The video assistant of claim 1, comprising instructions executable to, by a human-computer interface device, output a natural language description of the one or more salient event segments. 10. A computing system for understanding content of a video, the computing system comprising:
one or more computing devices; and a plurality of processor-executable modules embodied in one or more non-transitory machine accessible storage media of the one or more computing devices, the processor-executable modules comprising: a visual content understanding module to cause the computing system to:
detect a plurality of different features in a plurality of different segments of a video by executing one or more event recognition algorithms;
determine a semantic description of an event evidenced by one or more of the detected features; and
identify one or more salient event segments of the video, each salient event segment depicting a salient activity associated with the event;
an output generator module to cause the computing system to output a video clip comprising the salient event segments; and an interactive storyboard module to cause the computing system to one or more of: interactively edit the video clip and share the video clip over a network. 11. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine a configuration of a camera used to record the video; derive, from the camera configuration, a user intent with respect to the video; and identify the salient event segments by selecting one or more segments of the video that relate to the user intent. 12. The computing system of claim 11, wherein in response to the user intent, the output generator module is to cause the computing system to select a template for creating the video clip. 13. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine the semantic description based on a plurality of different algorithmically-detected features comprising two or more of: a visual feature, an audio feature, a textual feature, and a meta-level feature indicative of a camera configuration. 14. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine relationships between the detected features, map the detected features and relationships to semantic concepts, and formulate the semantic description to comprise the semantic concepts. 15. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to, in an automated fashion, associate the semantic description with the video. 16. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine a salient event criterion and, based on the salient event criterion, identify the salient activity associated with the event. 17. The computing system of claim 16, wherein the computing system is to learn the salient event criterion by analyzing a professionally-made video. 18. The computing system of claim 16, wherein the computing system is to analyze one or more of: semantic content of a video collection and user input, and determine the salient event criterion based on the analysis of the one or more of the semantic content and the user input. 19. The computing system of claim 10, wherein the computing system is to determine a saliency indicator comprising data associated with one or more of the detected features, and use the saliency indicator to identify the salient event segments. 20. A computing system for understanding visual content in digital images, the computing system comprising:
one or more computing devices; and instructions embodied in one or more non-transitory machine accessible storage media of the one or more computing devices, the instructions executable by the one or more computing devices to cause the computing system to: detect a plurality of different features in a set of digital images by executing a plurality of different feature detection algorithms on the set of images; map the one or more features detected by the feature detection algorithms to an event, the event evidenced by the one or more detected features; determine a plurality of salient activities associated with the event; extract one or more salient event segments from the set of images, each of the salient event segments depicting a salient activity associated with the event; and incorporate the extracted one or more salient event segments into a visual presentation. 21. The computing system of claim 20, wherein the instructions cause the computing system to select at least two of: a visual feature detection algorithm, an audio feature detection algorithm, and a textual feature detection algorithm, execute the selected feature detection algorithms to detect at least two of: a visual feature, an audio feature, and a textual feature of the set of images, and determine the event evidenced by at least two of: the visual feature, the audio feature, and the textual feature. 22. The computing system of claim 20, wherein the instructions cause the computing system to, in an automated fashion, generate a semantic description of the event based on the one or more features detected by the feature detection algorithms. 23. The computing system of claim 20, wherein the instructions cause the computing system to determine a saliency indicator associated with each of the salient event segments, and arrange the salient event segments in the visual presentation according to the saliency indicators associated with the salient event segments. 24. The computing system of claim 23, wherein the instructions cause the computing system to one or more of: (i) by a human-computer interface device of the computing system, interactively rearrange the salient event segments in the visual presentation and (ii) automatically rearrange the salient event segments in the visual presentation. 25. The computing system of claim 23, wherein the instructions cause the computing system to select a subset of the salient event segments based on the saliency indicators associated with the salient event segments, and create a visual presentation comprising the salient event segments in the selected subset of salient event segments. 26. The computing system of claim 20, wherein the instructions cause the computing system to, in an automated fashion, associate a description of the event with the images in the set of digital images. 27. The computing system of claim 26, wherein the instructions cause the computing system to detect user input comprising a textual description, compare the textual description to the description of the event associated with the images in the set of digital images, and, in an automated fashion, suggest one or more images having a relevancy to the text description as determined by the comparison of the textual description of the user input to the description of the event. | A computing system for identifying, describing, and sharing salient events depicted in images and videos executes feature detection algorithms on multimedia input (e.g., video and/or images). The computing system applies semantic reasoning techniques to the output of the feature detection algorithms. The computing system identifies salient event segments of the multimedia input as a result of the semantic reasoning. The computing system can incorporate the salient event segments into a visual presentation, such as a video clip. Alternatively or in addition, the computing system can generate a natural language description of the content of the multimedia input.1. A video assistant for understanding content of a video, the video assistant embodied in one or more non-transitory machine accessible storage media of a computing system and comprising instructions executable by one or more processors to cause the computing system to:
detect a plurality of different features in a plurality of different segments of a video by executing a plurality of different feature detection algorithms on the video, each of the video segments comprising one or more frames of the video; determine an event evidenced by the detected features; determine a plurality of salient activities associated with the event; and algorithmically identify a plurality of different salient event segments of the video, each of the salient event segments depicting a salient activity associated with the event. 2. The video assistant of claim 1, comprising instructions executable to determine salient event criteria associated with the event, and determine the salient activities associated with the event based on the salient event criteria. 3. The video assistant of claim 2, comprising instructions executable to determine the salient event criteria by one or more of: algorithmically analyzing a video collection and algorithmically learning a user specification relating to the salient event criteria. 4. The video assistant of claim 1, comprising instructions executable to determine a saliency indicator associated with each of the salient event segments of the video, and select a subset of the plurality of salient event segments for inclusion in a visual presentation based on the saliency indicator. 5. The video assistant of claim 1, comprising instructions executable to extract the salient event segments from the video and incorporate the extracted salient event segments into a video clip. 6. The video assistant of claim 5, comprising instructions executable to, in response to user input, share the video clip with another computing device over a network. 7. The video assistant of claim 5, comprising instructions executable to one or more of: (i) by a human-computer interface device, interactively edit the video clip and (ii) automatically edit the video clip. 8. The video assistant of claim 7, comprising instructions executable to store data relating to the interactive editing of the video clip, execute one or more machine learning algorithms on the stored data, and, in response to the execution of the one or more machine learning algorithms on the stored data, update one or more of: the determination of salient activities associated with the event and the identification of salient event segments. 9. The video assistant of claim 1, comprising instructions executable to, by a human-computer interface device, output a natural language description of the one or more salient event segments. 10. A computing system for understanding content of a video, the computing system comprising:
one or more computing devices; and a plurality of processor-executable modules embodied in one or more non-transitory machine accessible storage media of the one or more computing devices, the processor-executable modules comprising: a visual content understanding module to cause the computing system to:
detect a plurality of different features in a plurality of different segments of a video by executing one or more event recognition algorithms;
determine a semantic description of an event evidenced by one or more of the detected features; and
identify one or more salient event segments of the video, each salient event segment depicting a salient activity associated with the event;
an output generator module to cause the computing system to output a video clip comprising the salient event segments; and an interactive storyboard module to cause the computing system to one or more of: interactively edit the video clip and share the video clip over a network. 11. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine a configuration of a camera used to record the video; derive, from the camera configuration, a user intent with respect to the video; and identify the salient event segments by selecting one or more segments of the video that relate to the user intent. 12. The computing system of claim 11, wherein in response to the user intent, the output generator module is to cause the computing system to select a template for creating the video clip. 13. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine the semantic description based on a plurality of different algorithmically-detected features comprising two or more of: a visual feature, an audio feature, a textual feature, and a meta-level feature indicative of a camera configuration. 14. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine relationships between the detected features, map the detected features and relationships to semantic concepts, and formulate the semantic description to comprise the semantic concepts. 15. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to, in an automated fashion, associate the semantic description with the video. 16. The computing system of claim 10, wherein the visual content understanding module is to cause the computing system to determine a salient event criterion and, based on the salient event criterion, identify the salient activity associated with the event. 17. The computing system of claim 16, wherein the computing system is to learn the salient event criterion by analyzing a professionally-made video. 18. The computing system of claim 16, wherein the computing system is to analyze one or more of: semantic content of a video collection and user input, and determine the salient event criterion based on the analysis of the one or more of the semantic content and the user input. 19. The computing system of claim 10, wherein the computing system is to determine a saliency indicator comprising data associated with one or more of the detected features, and use the saliency indicator to identify the salient event segments. 20. A computing system for understanding visual content in digital images, the computing system comprising:
one or more computing devices; and instructions embodied in one or more non-transitory machine accessible storage media of the one or more computing devices, the instructions executable by the one or more computing devices to cause the computing system to: detect a plurality of different features in a set of digital images by executing a plurality of different feature detection algorithms on the set of images; map the one or more features detected by the feature detection algorithms to an event, the event evidenced by the one or more detected features; determine a plurality of salient activities associated with the event; extract one or more salient event segments from the set of images, each of the salient event segments depicting a salient activity associated with the event; and incorporate the extracted one or more salient event segments into a visual presentation. 21. The computing system of claim 20, wherein the instructions cause the computing system to select at least two of: a visual feature detection algorithm, an audio feature detection algorithm, and a textual feature detection algorithm, execute the selected feature detection algorithms to detect at least two of: a visual feature, an audio feature, and a textual feature of the set of images, and determine the event evidenced by at least two of: the visual feature, the audio feature, and the textual feature. 22. The computing system of claim 20, wherein the instructions cause the computing system to, in an automated fashion, generate a semantic description of the event based on the one or more features detected by the feature detection algorithms. 23. The computing system of claim 20, wherein the instructions cause the computing system to determine a saliency indicator associated with each of the salient event segments, and arrange the salient event segments in the visual presentation according to the saliency indicators associated with the salient event segments. 24. The computing system of claim 23, wherein the instructions cause the computing system to one or more of: (i) by a human-computer interface device of the computing system, interactively rearrange the salient event segments in the visual presentation and (ii) automatically rearrange the salient event segments in the visual presentation. 25. The computing system of claim 23, wherein the instructions cause the computing system to select a subset of the salient event segments based on the saliency indicators associated with the salient event segments, and create a visual presentation comprising the salient event segments in the selected subset of salient event segments. 26. The computing system of claim 20, wherein the instructions cause the computing system to, in an automated fashion, associate a description of the event with the images in the set of digital images. 27. The computing system of claim 26, wherein the instructions cause the computing system to detect user input comprising a textual description, compare the textual description to the description of the event associated with the images in the set of digital images, and, in an automated fashion, suggest one or more images having a relevancy to the text description as determined by the comparison of the textual description of the user input to the description of the event. | 2,400 |
8,227 | 8,227 | 14,875,581 | 2,439 | Systems and methods of managing network connections are disclosed. The method includes receiving a communication from a media device that requests permission to allow a connection between the media device and a client device, processing the communication by querying at least one database with the identifying information for the client device, if a unique identifier for the client device is received from the database, comparing the unique identifier for the client device with a unique identifier for the media device, in the event that the unique identifier for the client device matches the unique identifier for the media device, returning a result to the media device that allows the connection between the media device and the client device, and in the event that the unique identifier for the client device does not match the unique identifier for the media device, returning a result to the media device that does not allow the connection between the media device and the client device. | 1. A method of managing network connections, comprising:
receiving a communication from a media device that requests permission to allow a connection between the media device and a client device; processing the communication by querying at least one database with the identifying information for the client device; if a unique identifier for the client device is received from the database, comparing the unique identifier for the client device with a unique identifier for the media device; in the event that the unique identifier for the client device matches the unique identifier for the media device, returning a result to the media device that allows the connection between the media device and the client device; and in the event that the unique identifier for the client device does not match the unique identifier for the media device, returning a result to the media device that does not allow the connection between the media device and the client device. 2. The method of claim 1, wherein:
the unique identifier for the client device is a room number assigned to a user of the client device; and the unique identifier for the media device is a room number for a room in which the media device is located. 3. The method of claim 1, wherein processing the communication comprises querying a connection database with the identifying information for the client device and receiving the room number assigned to the user in return. 4. The method of claim 3, wherein the identifying information for the client device and the room number assigned to the user are stored together in the connection database from a prior network authentication for the client device. 5. The method of claim 1, wherein processing the communication comprises:
querying a connection database with the identifying information for the client device and receiving a name of the user in return; and querying a property management database with the name of the user and receiving the room number assigned to the user in return. 6. The method of claim 5, wherein:
the identifying information for the client device and the name of the user are stored together in the connection database from a prior network authentication for the client device; and the name of the user and the room assigned to the user are stored together in the property management database from a prior room check-in procedure for the user. 7. A method of claim 1, further comprising returning a result to the media device that does not allow the connection between the media device and the client device in the event that a unique identifier for the client device is not received from the database. 8. A method of claim 1, further comprising querying at least one database with the identifying information for the media device and receiving the unique identifier for the media device in return. 9. A method of managing network connections, comprising:
receiving a connection request from a client device at a media device; granting the connection request if a unique identifier for the client device matches a unique identifier for the media device; and denying the connection request if the unique identifier for the client device does not match the unique identifier for the media device or if a unique identifier for the client device cannot be found. 10. The method of claim 9, wherein:
the unique identifier for the client device is a room number assigned to a user of the client device; and the unique identifier for the media device is a room number for a room in which the media device is located. 11. The method of claim 10, further comprising:
in response to receiving the connection request, transmitting a communication from the media device to a server, the communication including identifying information for the client device and for the media device and including a request for permission to allow the connection between the media device and the client device; receiving a responsive communication from the server; and granting or denying the connection request based on the responsive communication. 12. The method of claim 11, wherein the server processes the communication from the media device by querying a connection database with the identifying information for the client device and receiving the room number assigned to the user in return. 13. The method of claim 11, wherein the server processes the communication from the media device by querying a connection database with the identifying information for the client device and receiving a name of the user in return, and querying a property management database with the name of the user and receiving the room number assigned to the user in return. 14. A system for managing streaming media connections, comprising
at least one database configured to store client device identifying information in association with unique identifiers for client device users; and a connection management module configured to:
receive a communication from a media device that requests permission to allow a connection between the media device and a client device;
processes the communication by querying at least one database with the identifying information for the client device;
if a unique identifier for the client device is received from the database, compare the unique identifier for the client device with a unique identifier for the media device;
in the event that the unique identifier for the client device matches the unique identifier for the media device, return a result to the media device that allows the connection between the media device and the client device; and
in the event that the unique identifier for the client device does not match the unique identifier for the media device, return a result to the media device that does not allow the connection between the media device and the client device. 15. The system of claim 14, wherein the connection management module is further configured to:
receive a network authentication request from the client device; process the network authentication request in the event that the client device provides qualifying network credentials; store the qualifying network credentials in a connection database in association with identifying information for the client device. 16. The system of claim 15, wherein:
the qualifying network credentials include a room number assigned to a user of the client device; the connection module queries at least one database by querying the connection database with the identifying information for the client device and receives the room number assigned to the user in return; and the connection module compares the unique identifier for the client device with a unique identifier for the media device by comparing the room number assigned to the user with a room number assigned to media device. 17. The system of claim 15, further comprising:
a property management module configured to process a room check-in procedure for the user including storing in a property management database a name of the user together with a room number assigned to the user; wherein the qualifying network credentials include a name of the user of the client device; the connection module queries at least one database by querying the property management database with the identifying information for the client device, receiving the name of the user in return, querying the connection database with the name of the user, and receiving the room number assigned to the user in return; and the connection module compares the unique identifier for the client device with a unique identifier for the media device by comparing the room number assigned to the user with a room number assigned to media device. 18. The system of claim 14, wherein the connection management module is further configured to return a result to the media device that does not allow the connection between the media device and the client device in the event that a unique identifier for the client device is not received from the database. 19. The system of claim 14, wherein the connection management module is further configured to query at least one database with the identifying information for the media device and receive the unique identifier for the media device in return. 20. The system of claim 14, wherein the media device is configured to connect to a streaming media source in the event that that the connection management module allows the connection between the media device and the client device. | Systems and methods of managing network connections are disclosed. The method includes receiving a communication from a media device that requests permission to allow a connection between the media device and a client device, processing the communication by querying at least one database with the identifying information for the client device, if a unique identifier for the client device is received from the database, comparing the unique identifier for the client device with a unique identifier for the media device, in the event that the unique identifier for the client device matches the unique identifier for the media device, returning a result to the media device that allows the connection between the media device and the client device, and in the event that the unique identifier for the client device does not match the unique identifier for the media device, returning a result to the media device that does not allow the connection between the media device and the client device.1. A method of managing network connections, comprising:
receiving a communication from a media device that requests permission to allow a connection between the media device and a client device; processing the communication by querying at least one database with the identifying information for the client device; if a unique identifier for the client device is received from the database, comparing the unique identifier for the client device with a unique identifier for the media device; in the event that the unique identifier for the client device matches the unique identifier for the media device, returning a result to the media device that allows the connection between the media device and the client device; and in the event that the unique identifier for the client device does not match the unique identifier for the media device, returning a result to the media device that does not allow the connection between the media device and the client device. 2. The method of claim 1, wherein:
the unique identifier for the client device is a room number assigned to a user of the client device; and the unique identifier for the media device is a room number for a room in which the media device is located. 3. The method of claim 1, wherein processing the communication comprises querying a connection database with the identifying information for the client device and receiving the room number assigned to the user in return. 4. The method of claim 3, wherein the identifying information for the client device and the room number assigned to the user are stored together in the connection database from a prior network authentication for the client device. 5. The method of claim 1, wherein processing the communication comprises:
querying a connection database with the identifying information for the client device and receiving a name of the user in return; and querying a property management database with the name of the user and receiving the room number assigned to the user in return. 6. The method of claim 5, wherein:
the identifying information for the client device and the name of the user are stored together in the connection database from a prior network authentication for the client device; and the name of the user and the room assigned to the user are stored together in the property management database from a prior room check-in procedure for the user. 7. A method of claim 1, further comprising returning a result to the media device that does not allow the connection between the media device and the client device in the event that a unique identifier for the client device is not received from the database. 8. A method of claim 1, further comprising querying at least one database with the identifying information for the media device and receiving the unique identifier for the media device in return. 9. A method of managing network connections, comprising:
receiving a connection request from a client device at a media device; granting the connection request if a unique identifier for the client device matches a unique identifier for the media device; and denying the connection request if the unique identifier for the client device does not match the unique identifier for the media device or if a unique identifier for the client device cannot be found. 10. The method of claim 9, wherein:
the unique identifier for the client device is a room number assigned to a user of the client device; and the unique identifier for the media device is a room number for a room in which the media device is located. 11. The method of claim 10, further comprising:
in response to receiving the connection request, transmitting a communication from the media device to a server, the communication including identifying information for the client device and for the media device and including a request for permission to allow the connection between the media device and the client device; receiving a responsive communication from the server; and granting or denying the connection request based on the responsive communication. 12. The method of claim 11, wherein the server processes the communication from the media device by querying a connection database with the identifying information for the client device and receiving the room number assigned to the user in return. 13. The method of claim 11, wherein the server processes the communication from the media device by querying a connection database with the identifying information for the client device and receiving a name of the user in return, and querying a property management database with the name of the user and receiving the room number assigned to the user in return. 14. A system for managing streaming media connections, comprising
at least one database configured to store client device identifying information in association with unique identifiers for client device users; and a connection management module configured to:
receive a communication from a media device that requests permission to allow a connection between the media device and a client device;
processes the communication by querying at least one database with the identifying information for the client device;
if a unique identifier for the client device is received from the database, compare the unique identifier for the client device with a unique identifier for the media device;
in the event that the unique identifier for the client device matches the unique identifier for the media device, return a result to the media device that allows the connection between the media device and the client device; and
in the event that the unique identifier for the client device does not match the unique identifier for the media device, return a result to the media device that does not allow the connection between the media device and the client device. 15. The system of claim 14, wherein the connection management module is further configured to:
receive a network authentication request from the client device; process the network authentication request in the event that the client device provides qualifying network credentials; store the qualifying network credentials in a connection database in association with identifying information for the client device. 16. The system of claim 15, wherein:
the qualifying network credentials include a room number assigned to a user of the client device; the connection module queries at least one database by querying the connection database with the identifying information for the client device and receives the room number assigned to the user in return; and the connection module compares the unique identifier for the client device with a unique identifier for the media device by comparing the room number assigned to the user with a room number assigned to media device. 17. The system of claim 15, further comprising:
a property management module configured to process a room check-in procedure for the user including storing in a property management database a name of the user together with a room number assigned to the user; wherein the qualifying network credentials include a name of the user of the client device; the connection module queries at least one database by querying the property management database with the identifying information for the client device, receiving the name of the user in return, querying the connection database with the name of the user, and receiving the room number assigned to the user in return; and the connection module compares the unique identifier for the client device with a unique identifier for the media device by comparing the room number assigned to the user with a room number assigned to media device. 18. The system of claim 14, wherein the connection management module is further configured to return a result to the media device that does not allow the connection between the media device and the client device in the event that a unique identifier for the client device is not received from the database. 19. The system of claim 14, wherein the connection management module is further configured to query at least one database with the identifying information for the media device and receive the unique identifier for the media device in return. 20. The system of claim 14, wherein the media device is configured to connect to a streaming media source in the event that that the connection management module allows the connection between the media device and the client device. | 2,400 |
8,228 | 8,228 | 15,385,635 | 2,465 | Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing a CIC value field in signaling information of a communication to provide an identification of the ingress network to an egress or receiving network of a long distance telecommunications network. The system and method provides for the provisioning of a signaling CIC for an ingress trunkgroup or network to a telecommunications network for downstream signaling purposes by overriding a received CIC value with a provisioned CIC value specific to the ingress network. This provisioned CIC value identifies the ingress network to the long distance network to the egress network for use by the egress network. | 1. A method for routing a communication in a telecommunications network, the method comprising:
receiving a communication from an ingress network to a telecommunications network, the communication comprising a upstream carrier identification code (CIC) value associated with an upstream network; removing the upstream CIC value from the communication; inserting a provisioned ingress network specific CIC value into a signaling information of the communication; and transmitting the communication to an egress network of the telecommunications network with the provisioned ingress network specific CIC value in the signaling information of the communication. 2. The method of claim 1 wherein the communication comprises a time-division multiplex (TDM)-based networking communication and the signaling information comprises an SS7 ISUP IAM message. 3. The method of claim 2 wherein the signaling information further comprises a carrier identification parameter (CIP) field of the SS7 ISUP IAM message. 4. The method of claim 1 wherein the communication comprises an Internet Protocol (IP)-based networking communication and the signaling information comprises a Session Initiation Protocol (SIP) INVITE message. 5. The method of claim 4 wherein the signaling information further comprises a request uniform resource indicator (R-URI) header of the SIP INVITE message. 6. The method of claim 1 further comprising:
identifying the ingress network to the telecommunications network by receiving the communication on a trunkgroup connection to the telecommunications network, the trunkgroup associated with the ingress network. 7. The method of claim 5 further comprising:
provisioning the ingress network specific CIC value based on an identification of the ingress network associated with the trunkgroup, the ingress network specific CIC value unique to the trunkgroup. 8. A networking device comprising:
at least one communication port for receiving a communication from an ingress network to a telecommunications network, the communication comprising a upstream carrier identification code (CIC) value associated with an upstream network; a processing device; and a computer-readable medium connected to the processing device configured to store information and instructions that, when executed by the processing device, performs the operations of:
inserting a provisioned ingress network specific CIC value into a signaling information of the communication; and
transmitting the communication to an egress network of the telecommunications network with the provisioned ingress network specific CIC value in the signaling information of the communication. 9. The networking device of claim 8 wherein the processing device further performs the operations of:
detecting the upstream CIC value of the communication; and
removing the upstream CIC value from the communication prior to inserting the provisioned ingress network specific CIC value into the signaling information of the communication 10. The networking device of claim 8 wherein the communication comprises a time-division multiplex (TDM)-based networking communication and the signaling information comprises an SS7 ISUP IAM message. 11. The networking device of claim 10 wherein the signaling information further comprises a carrier identification parameter (CIP) field of the SS7 ISUP IAM message. 12. The networking device of claim 8 wherein the communication comprises an Internet Protocol (IP)-based networking communication and the signaling information comprises a Session Initiation Protocol (SIP) INVITE message. 13. The networking device of claim 12 wherein the signaling information further comprises a request uniform resource indicator (R-URI) header of the SIP INVITE message. 14. The networking device of claim 8 wherein the processing device further performs the operations of:
identifying the ingress network to the telecommunications network by receiving the communication on a trunkgroup connection to the telecommunications network, the trunkgroup associated with the ingress network. 15. The networking device of claim 14 wherein the processing device further performs the operations of:
provisioning the ingress network specific CIC value based on an identification of the ingress network associated with the trunkgroup, the ingress network specific CIC value unique to the trunkgroup. 16. A telecommunications network comprising:
an ingress device receiving a communication from an ingress network to a telecommunications network, the communication comprising a upstream carrier identification code (CIC) value associated with an upstream network; and a routing engine in communication with the ingress device providing an egress network identification for the received communication, wherein the ingress device:
removes the upstream CIC value from the communication;
inserts a provisioned ingress network specific CIC value into a signaling information of the communication; and
transmits the communication to the egress network based at least on the received egress network identification with the provisioned ingress network specific CIC value in the signaling information of the communication. 17. The telecommunications network of claim 16 wherein the communication comprises a time-division multiplex (TDM)-based networking communication and the signaling information comprises an SS7 ISUP IAM message. 18. The telecommunications network of claim 17 wherein the signaling information further comprises a carrier identification parameter (CIP) field of the SS7 ISUP IAM message. 19. The telecommunications network of claim 16 wherein the communication comprises an Internet Protocol (IP)-based networking communication and the signaling information comprises a Session Initiation Protocol (SIP) INVITE message. 20. The telecommunications network of claim 19 wherein the signaling information further comprises a request uniform resource indicator (R-URI) header of the SIP INVITE message. | Aspects of the present disclosure involve systems, methods, computer program products, and the like, for utilizing a CIC value field in signaling information of a communication to provide an identification of the ingress network to an egress or receiving network of a long distance telecommunications network. The system and method provides for the provisioning of a signaling CIC for an ingress trunkgroup or network to a telecommunications network for downstream signaling purposes by overriding a received CIC value with a provisioned CIC value specific to the ingress network. This provisioned CIC value identifies the ingress network to the long distance network to the egress network for use by the egress network.1. A method for routing a communication in a telecommunications network, the method comprising:
receiving a communication from an ingress network to a telecommunications network, the communication comprising a upstream carrier identification code (CIC) value associated with an upstream network; removing the upstream CIC value from the communication; inserting a provisioned ingress network specific CIC value into a signaling information of the communication; and transmitting the communication to an egress network of the telecommunications network with the provisioned ingress network specific CIC value in the signaling information of the communication. 2. The method of claim 1 wherein the communication comprises a time-division multiplex (TDM)-based networking communication and the signaling information comprises an SS7 ISUP IAM message. 3. The method of claim 2 wherein the signaling information further comprises a carrier identification parameter (CIP) field of the SS7 ISUP IAM message. 4. The method of claim 1 wherein the communication comprises an Internet Protocol (IP)-based networking communication and the signaling information comprises a Session Initiation Protocol (SIP) INVITE message. 5. The method of claim 4 wherein the signaling information further comprises a request uniform resource indicator (R-URI) header of the SIP INVITE message. 6. The method of claim 1 further comprising:
identifying the ingress network to the telecommunications network by receiving the communication on a trunkgroup connection to the telecommunications network, the trunkgroup associated with the ingress network. 7. The method of claim 5 further comprising:
provisioning the ingress network specific CIC value based on an identification of the ingress network associated with the trunkgroup, the ingress network specific CIC value unique to the trunkgroup. 8. A networking device comprising:
at least one communication port for receiving a communication from an ingress network to a telecommunications network, the communication comprising a upstream carrier identification code (CIC) value associated with an upstream network; a processing device; and a computer-readable medium connected to the processing device configured to store information and instructions that, when executed by the processing device, performs the operations of:
inserting a provisioned ingress network specific CIC value into a signaling information of the communication; and
transmitting the communication to an egress network of the telecommunications network with the provisioned ingress network specific CIC value in the signaling information of the communication. 9. The networking device of claim 8 wherein the processing device further performs the operations of:
detecting the upstream CIC value of the communication; and
removing the upstream CIC value from the communication prior to inserting the provisioned ingress network specific CIC value into the signaling information of the communication 10. The networking device of claim 8 wherein the communication comprises a time-division multiplex (TDM)-based networking communication and the signaling information comprises an SS7 ISUP IAM message. 11. The networking device of claim 10 wherein the signaling information further comprises a carrier identification parameter (CIP) field of the SS7 ISUP IAM message. 12. The networking device of claim 8 wherein the communication comprises an Internet Protocol (IP)-based networking communication and the signaling information comprises a Session Initiation Protocol (SIP) INVITE message. 13. The networking device of claim 12 wherein the signaling information further comprises a request uniform resource indicator (R-URI) header of the SIP INVITE message. 14. The networking device of claim 8 wherein the processing device further performs the operations of:
identifying the ingress network to the telecommunications network by receiving the communication on a trunkgroup connection to the telecommunications network, the trunkgroup associated with the ingress network. 15. The networking device of claim 14 wherein the processing device further performs the operations of:
provisioning the ingress network specific CIC value based on an identification of the ingress network associated with the trunkgroup, the ingress network specific CIC value unique to the trunkgroup. 16. A telecommunications network comprising:
an ingress device receiving a communication from an ingress network to a telecommunications network, the communication comprising a upstream carrier identification code (CIC) value associated with an upstream network; and a routing engine in communication with the ingress device providing an egress network identification for the received communication, wherein the ingress device:
removes the upstream CIC value from the communication;
inserts a provisioned ingress network specific CIC value into a signaling information of the communication; and
transmits the communication to the egress network based at least on the received egress network identification with the provisioned ingress network specific CIC value in the signaling information of the communication. 17. The telecommunications network of claim 16 wherein the communication comprises a time-division multiplex (TDM)-based networking communication and the signaling information comprises an SS7 ISUP IAM message. 18. The telecommunications network of claim 17 wherein the signaling information further comprises a carrier identification parameter (CIP) field of the SS7 ISUP IAM message. 19. The telecommunications network of claim 16 wherein the communication comprises an Internet Protocol (IP)-based networking communication and the signaling information comprises a Session Initiation Protocol (SIP) INVITE message. 20. The telecommunications network of claim 19 wherein the signaling information further comprises a request uniform resource indicator (R-URI) header of the SIP INVITE message. | 2,400 |
8,229 | 8,229 | 15,198,727 | 2,484 | An apparatus for high-speed video is described herein. The apparatus includes a camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images. The apparatus also includes a controller to interleave the plurality of images in chronological order and a view synthesis unit to synthesize a camera view from a virtual camera for each image of the plurality of images. Additionally, the apparatus includes a post-processing unit to remove any remaining artifacts from the plurality of images. | 1. An apparatus for high-speed video, comprising:
a camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images; a controller to interleave the plurality of images in chronological order; a view synthesis unit to synthesize a camera view from a virtual camera for each image of the plurality of images; and a post-processing unit to remove any remaining artifacts from the plurality of images. 2. The apparatus of claim 1, wherein post processing removes holes caused by synthesizing a camera view from a virtual camera. 3. The apparatus of claim 1, wherein post processing removes the remaining artifacts due to holes filled incoherently during view synthesis. 4. The apparatus of claim 1, wherein color mapping is used to reconcile color differences between each image. 5. The apparatus of claim 1, wherein the resulting frame rate is N times larger than the frame rate of a single camera. 6. The apparatus of claim 1, wherein each camera image has a different perspective compared to other camera images and synthesizing a camera view from each image results in a single view point. 7. The apparatus of claim 1, wherein the camera array is arranged to enable high-speed video, depth applications, and post capture photography. 8. The apparatus of claim 1, wherein a frame rate of a video rendered using the plurality of images is an adaptive frame rate, spatio-temporally varying in each frame, based on the amount of motion in regions of the synthesized camera views. 9. The apparatus of claim 1, wherein a perspective of the virtual camera is positioned at the center of the camera array. 10. The apparatus of claim 1, wherein a perspective of the virtual camera is selected to be as close as possible to all cameras of the camera array. 11. The apparatus of claim 1, wherein the view synthesis unit is to synthesize camera views via content aware warping. 12. A method for high-speed video from a camera array, comprising:
capturing a plurality of frames using the camera array, wherein each camera of the camera array is to capture a frame at a different time offset; stacking the plurality of frames in chronological order; synthesizing a view from a single perspective for each frame of the plurality of frames; and processing the synthesized camera views to remove artifacts in the images to render a slow motion video. 13. The method of claim 12, wherein synthesizing the view includes hole-filling or inpainting for each frame. 14. The method of claim 12, wherein synthesizing the view includes content aware warping. 15. The method of claim 12, wherein synthesizing the view includes content aware warping, and wherein content aware warping comprises:
obtaining a point correspondence between a frame and the single perspective; calculate a disparity to minimize a sum of squared differences between distortion terms; generating the synthesized view based on the disparity. 16. The method of claim 12, wherein synthesizing the view includes content aware warping that synthesizes a view based on a dense disparity map or a sparse point correspondence. 17. A system for high speed video from a camera array, comprising:
a display; a camera array; a memory that is to store instructions and that is communicatively coupled to the camera array and the display; and a processor communicatively coupled to the camera array, the display, and the memory, wherein when the processor is to execute the instructions, the processor is to:
capture a plurality of frames using the camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images;
interleave the plurality of images in an order of capture;
synthesize a view from a single perspective for each image of the plurality of images; and
process the synthesized camera views to remove artifacts in the images. 18. The system of claim 17, wherein processing the synthesized camera views removes holes caused by synthesizing a camera view from a virtual camera. 19. The system of claim 17, wherein processing the synthesized camera views removes the remaining artifacts due to holes filled incoherently during view synthesis. 20. The system of claim 17, wherein processing the synthesized camera views comprises color mapping that is to reconcile color differences between each image. 21. The system of claim 17, wherein an effective frame rate is N times larger than a frame rate of a single camera of the camera array. 22. The system of claim 17, wherein the camera array is arranged to enable high-speed video, depth image capture, and post-capture photography. 23. The system of claim 17, wherein the frame rate of the synthesized camera views is an adaptive frame rate, spatio-temporally varying across the synthesized camera views, based on the amount of motion in regions of the synthesized camera views. 24. A tangible, non-transitory, computer-readable medium comprising instructions that, when executed by a processor, direct the processor to:
capture a plurality of frames using the camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images; stack the plurality of images in chronological order; synthesize a view from a single perspective for each image of the plurality of images; and process the synthesized camera views to remove artifacts in the images to render a slow motion video. 25. The computer readable medium of claim 24, wherein processing the synthesized camera view comprises obtaining highly moving regions as indicated by a mask from the synthesized view, and obtaining all remaining regions from a closest previous synthesized frame from a reference camera and blending a highly moving region and a remaining region for each frame. | An apparatus for high-speed video is described herein. The apparatus includes a camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images. The apparatus also includes a controller to interleave the plurality of images in chronological order and a view synthesis unit to synthesize a camera view from a virtual camera for each image of the plurality of images. Additionally, the apparatus includes a post-processing unit to remove any remaining artifacts from the plurality of images.1. An apparatus for high-speed video, comprising:
a camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images; a controller to interleave the plurality of images in chronological order; a view synthesis unit to synthesize a camera view from a virtual camera for each image of the plurality of images; and a post-processing unit to remove any remaining artifacts from the plurality of images. 2. The apparatus of claim 1, wherein post processing removes holes caused by synthesizing a camera view from a virtual camera. 3. The apparatus of claim 1, wherein post processing removes the remaining artifacts due to holes filled incoherently during view synthesis. 4. The apparatus of claim 1, wherein color mapping is used to reconcile color differences between each image. 5. The apparatus of claim 1, wherein the resulting frame rate is N times larger than the frame rate of a single camera. 6. The apparatus of claim 1, wherein each camera image has a different perspective compared to other camera images and synthesizing a camera view from each image results in a single view point. 7. The apparatus of claim 1, wherein the camera array is arranged to enable high-speed video, depth applications, and post capture photography. 8. The apparatus of claim 1, wherein a frame rate of a video rendered using the plurality of images is an adaptive frame rate, spatio-temporally varying in each frame, based on the amount of motion in regions of the synthesized camera views. 9. The apparatus of claim 1, wherein a perspective of the virtual camera is positioned at the center of the camera array. 10. The apparatus of claim 1, wherein a perspective of the virtual camera is selected to be as close as possible to all cameras of the camera array. 11. The apparatus of claim 1, wherein the view synthesis unit is to synthesize camera views via content aware warping. 12. A method for high-speed video from a camera array, comprising:
capturing a plurality of frames using the camera array, wherein each camera of the camera array is to capture a frame at a different time offset; stacking the plurality of frames in chronological order; synthesizing a view from a single perspective for each frame of the plurality of frames; and processing the synthesized camera views to remove artifacts in the images to render a slow motion video. 13. The method of claim 12, wherein synthesizing the view includes hole-filling or inpainting for each frame. 14. The method of claim 12, wherein synthesizing the view includes content aware warping. 15. The method of claim 12, wherein synthesizing the view includes content aware warping, and wherein content aware warping comprises:
obtaining a point correspondence between a frame and the single perspective; calculate a disparity to minimize a sum of squared differences between distortion terms; generating the synthesized view based on the disparity. 16. The method of claim 12, wherein synthesizing the view includes content aware warping that synthesizes a view based on a dense disparity map or a sparse point correspondence. 17. A system for high speed video from a camera array, comprising:
a display; a camera array; a memory that is to store instructions and that is communicatively coupled to the camera array and the display; and a processor communicatively coupled to the camera array, the display, and the memory, wherein when the processor is to execute the instructions, the processor is to:
capture a plurality of frames using the camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images;
interleave the plurality of images in an order of capture;
synthesize a view from a single perspective for each image of the plurality of images; and
process the synthesized camera views to remove artifacts in the images. 18. The system of claim 17, wherein processing the synthesized camera views removes holes caused by synthesizing a camera view from a virtual camera. 19. The system of claim 17, wherein processing the synthesized camera views removes the remaining artifacts due to holes filled incoherently during view synthesis. 20. The system of claim 17, wherein processing the synthesized camera views comprises color mapping that is to reconcile color differences between each image. 21. The system of claim 17, wherein an effective frame rate is N times larger than a frame rate of a single camera of the camera array. 22. The system of claim 17, wherein the camera array is arranged to enable high-speed video, depth image capture, and post-capture photography. 23. The system of claim 17, wherein the frame rate of the synthesized camera views is an adaptive frame rate, spatio-temporally varying across the synthesized camera views, based on the amount of motion in regions of the synthesized camera views. 24. A tangible, non-transitory, computer-readable medium comprising instructions that, when executed by a processor, direct the processor to:
capture a plurality of frames using the camera array, wherein each camera of the camera array is to capture an image at a different time offset resulting in a plurality of images; stack the plurality of images in chronological order; synthesize a view from a single perspective for each image of the plurality of images; and process the synthesized camera views to remove artifacts in the images to render a slow motion video. 25. The computer readable medium of claim 24, wherein processing the synthesized camera view comprises obtaining highly moving regions as indicated by a mask from the synthesized view, and obtaining all remaining regions from a closest previous synthesized frame from a reference camera and blending a highly moving region and a remaining region for each frame. | 2,400 |
8,230 | 8,230 | 15,043,212 | 2,419 | A controller assigns variable length addresses to addressable elements that are connected to a network. The variable length addresses are determined based on probabilities that packets are addressed to the corresponding addressable element. The controller transmits, to the addressable elements via the network, a routing table indicating the variable length addresses assigned to the addressable elements. Routers or addressable elements receive the routing table and route one or more packets over the network to an addressable element using variable length addresses included in a header of the one or more packets. | 1. A method for assigning addresses to addressable elements connected to a network, the network including at least one router, the method comprising:
assigning variable length addresses to the addressable elements, wherein the variable length addresses are determined based on probabilities that packets are addressed to the addressable elements; and transmitting, to the at least one router, a routing table indicating the variable length addresses assigned to the addressable elements. 2. The method of claim 1, wherein:
assigning the variable length addresses to the addressable elements comprises encoding fixed length addresses of the addressable elements as the variable length addresses, and the variable length addresses are represented by values associated with branches of a code tree and the fixed length addresses are leaves of the code tree. 3. The method of claim 2, wherein the fixed length addresses of the addressable elements are encoded as the variable length addresses according to an instantaneous code so that concatenated variable length addresses are not separated by delimiters. 4. The method of claim 3, wherein encoding the fixed length addresses of the addressable elements as variable length addresses comprises Huffman encoding the fixed length addresses as variable length addresses. 5. The method of claim 2, further comprising:
receiving information indicating frequencies that packets are addressed to the addressable elements; and determining the probabilities that packets are addressed to the corresponding addressable elements based on the frequencies. 6. The method of claim 5, wherein the information indicating the frequencies is received from counters associated with the addressable elements. 7. The method of claim 6, wherein assigning the variable length addresses comprises modifying previously assigned variable length addresses in response to receiving the information indicating the frequencies. 8. The method of claim 7, further comprising:
transmitting a request to pause transmission of packets to the addressable elements over the network; transmitting a modified routing table indicating the modified variable length addresses; receiving at least one acknowledgment from the at least one router in response to transmitting the modified routing table; and transmitting instructions to begin transmitting packets to the addressable elements according to the modified routing table after a time interval to allow in-flight packets to reach their destination addressable elements. 9. An apparatus to assign addresses to addressable elements connected to a network, the network including at least one router, the apparatus comprising:
a processor to assign variable length addresses to the addressable elements, wherein the variable length addresses are determined based on probabilities that packets are addressed to the addressable elements; and a transceiver to transmit, to the at least one router, a routing table indicating the variable length addresses assigned to the addressable elements. 10. The apparatus of claim 9, wherein:
the processor is to encode fixed length addresses of the addressable elements as the variable length addresses, and the variable length addresses are represented by values associated with branches of a code tree and the fixed length addresses are leaves of the code tree. 11. The apparatus of claim 10, wherein the processor is to encode the fixed length addresses as variable length addresses according to an instantaneous code so that concatenated variable length addresses are not separated by delimiters. 12. The apparatus of claim 11, wherein the processor is to perform Huffman encoding to encode the fixed length addresses as variable length addresses. 13. The apparatus of claim 10, wherein:
the transceiver is to receive information indicating frequencies that packets are addressed to the addressable elements; and the processor is to determine the probabilities that packets are addressed to the corresponding addressable elements based on the frequencies. 14. The apparatus of claim 13, wherein the transceiver is to receive the information indicating the frequencies from counters associated with the addressable elements. 15. The apparatus of claim 14, wherein the processor is to modify previously assigned variable length addresses in response to the transceiver receiving the information indicating the frequencies. 16. The apparatus of claim 15, wherein the transceiver is to:
transmit a request to pause transmission of packets to the addressable elements over the network, transmit a modified routing table indicating the modified variable length addresses, and receive at least one acknowledgment from the at least one router in response to transmitting the modified routing table. 17. The apparatus of claim 16, wherein the transceiver is to transmit instructions to begin transmitting packets to the addressable elements according to the modified routing table after a time interval to allow in-flight packets to reach their destination addressable elements. 18. A non-transitory computer readable medium embodying a set of executable instructions for assigning addresses to addressable elements connected to a network, the network including at least one router, the set of executable instructions to manipulate a processor to:
assign variable length addresses to the addressable elements, wherein the variable length addresses are determined based on probabilities that packets are addressed to the corresponding addressable element; and transmit, to the at least one router, a routing table indicating the variable length addresses assigned to the addressable elements. 19. The non-transitory computer readable medium of claim 18, wherein the set of executable instructions is to manipulate the processor to:
receive information indicating frequencies that packets are addressed to the addressable elements; determine the probabilities that packets are addressed to the corresponding addressable elements based on the frequencies; and modify previously assigned variable length addresses in response to receiving the information indicating the frequencies. 20. The non-transitory computer readable medium of claim 19, wherein the set of executable instructions is to manipulate the processor to:
transmit a request to pause transmission of packets to the addressable elements over the network; transmit a modified routing table indicating the modified variable length addresses; and transmit instructions to begin transmitting packets to the addressable elements according to the modified routing table after a time interval to allow in-flight packets to reach their destination addressable elements. | A controller assigns variable length addresses to addressable elements that are connected to a network. The variable length addresses are determined based on probabilities that packets are addressed to the corresponding addressable element. The controller transmits, to the addressable elements via the network, a routing table indicating the variable length addresses assigned to the addressable elements. Routers or addressable elements receive the routing table and route one or more packets over the network to an addressable element using variable length addresses included in a header of the one or more packets.1. A method for assigning addresses to addressable elements connected to a network, the network including at least one router, the method comprising:
assigning variable length addresses to the addressable elements, wherein the variable length addresses are determined based on probabilities that packets are addressed to the addressable elements; and transmitting, to the at least one router, a routing table indicating the variable length addresses assigned to the addressable elements. 2. The method of claim 1, wherein:
assigning the variable length addresses to the addressable elements comprises encoding fixed length addresses of the addressable elements as the variable length addresses, and the variable length addresses are represented by values associated with branches of a code tree and the fixed length addresses are leaves of the code tree. 3. The method of claim 2, wherein the fixed length addresses of the addressable elements are encoded as the variable length addresses according to an instantaneous code so that concatenated variable length addresses are not separated by delimiters. 4. The method of claim 3, wherein encoding the fixed length addresses of the addressable elements as variable length addresses comprises Huffman encoding the fixed length addresses as variable length addresses. 5. The method of claim 2, further comprising:
receiving information indicating frequencies that packets are addressed to the addressable elements; and determining the probabilities that packets are addressed to the corresponding addressable elements based on the frequencies. 6. The method of claim 5, wherein the information indicating the frequencies is received from counters associated with the addressable elements. 7. The method of claim 6, wherein assigning the variable length addresses comprises modifying previously assigned variable length addresses in response to receiving the information indicating the frequencies. 8. The method of claim 7, further comprising:
transmitting a request to pause transmission of packets to the addressable elements over the network; transmitting a modified routing table indicating the modified variable length addresses; receiving at least one acknowledgment from the at least one router in response to transmitting the modified routing table; and transmitting instructions to begin transmitting packets to the addressable elements according to the modified routing table after a time interval to allow in-flight packets to reach their destination addressable elements. 9. An apparatus to assign addresses to addressable elements connected to a network, the network including at least one router, the apparatus comprising:
a processor to assign variable length addresses to the addressable elements, wherein the variable length addresses are determined based on probabilities that packets are addressed to the addressable elements; and a transceiver to transmit, to the at least one router, a routing table indicating the variable length addresses assigned to the addressable elements. 10. The apparatus of claim 9, wherein:
the processor is to encode fixed length addresses of the addressable elements as the variable length addresses, and the variable length addresses are represented by values associated with branches of a code tree and the fixed length addresses are leaves of the code tree. 11. The apparatus of claim 10, wherein the processor is to encode the fixed length addresses as variable length addresses according to an instantaneous code so that concatenated variable length addresses are not separated by delimiters. 12. The apparatus of claim 11, wherein the processor is to perform Huffman encoding to encode the fixed length addresses as variable length addresses. 13. The apparatus of claim 10, wherein:
the transceiver is to receive information indicating frequencies that packets are addressed to the addressable elements; and the processor is to determine the probabilities that packets are addressed to the corresponding addressable elements based on the frequencies. 14. The apparatus of claim 13, wherein the transceiver is to receive the information indicating the frequencies from counters associated with the addressable elements. 15. The apparatus of claim 14, wherein the processor is to modify previously assigned variable length addresses in response to the transceiver receiving the information indicating the frequencies. 16. The apparatus of claim 15, wherein the transceiver is to:
transmit a request to pause transmission of packets to the addressable elements over the network, transmit a modified routing table indicating the modified variable length addresses, and receive at least one acknowledgment from the at least one router in response to transmitting the modified routing table. 17. The apparatus of claim 16, wherein the transceiver is to transmit instructions to begin transmitting packets to the addressable elements according to the modified routing table after a time interval to allow in-flight packets to reach their destination addressable elements. 18. A non-transitory computer readable medium embodying a set of executable instructions for assigning addresses to addressable elements connected to a network, the network including at least one router, the set of executable instructions to manipulate a processor to:
assign variable length addresses to the addressable elements, wherein the variable length addresses are determined based on probabilities that packets are addressed to the corresponding addressable element; and transmit, to the at least one router, a routing table indicating the variable length addresses assigned to the addressable elements. 19. The non-transitory computer readable medium of claim 18, wherein the set of executable instructions is to manipulate the processor to:
receive information indicating frequencies that packets are addressed to the addressable elements; determine the probabilities that packets are addressed to the corresponding addressable elements based on the frequencies; and modify previously assigned variable length addresses in response to receiving the information indicating the frequencies. 20. The non-transitory computer readable medium of claim 19, wherein the set of executable instructions is to manipulate the processor to:
transmit a request to pause transmission of packets to the addressable elements over the network; transmit a modified routing table indicating the modified variable length addresses; and transmit instructions to begin transmitting packets to the addressable elements according to the modified routing table after a time interval to allow in-flight packets to reach their destination addressable elements. | 2,400 |
8,231 | 8,231 | 14,822,137 | 2,465 | Efficient and highly-scalable network solutions are provided that utilize incremental scaling of switches, and devices connected to those switches, in an environment such as a data center. Embodiments may utilize multiple tiers of switches. Sets of switches in two different tiers may be initially connected to each other utilizing multiple connections. As network capacity needs within the computing environment increase, additional switches may be added to tiers. To connect the added switches to the switch network, the redundant connections may be utilized. Moving connections from one switch to another switch can free up ports to connect added switches in one of the tiers of switches to the switch network. The tiers of switches can be based on Clos networks, where the tiers of switches are fully connected, or other high radix or fat tree topologies that include oversubscription between tiers. | 1. (canceled) 2. A method, comprising:
providing a first set of switches, a second set of switches, a third set of switches, and a fourth set of switches in a data center; connecting at least two ports of each switch of the first set of switches with at least two ports of each switch of the second set of switches; connecting each switch of the first set of switches with each switch of the third set of switches; receiving a request to adjust an arraignment of connections of the first set of switches, the second set of switches, the third set of switches, and the fourth set of switches disconnecting, in a determined order, each switch of the second set of switches from numbered port locations with a corresponding switch and port of the first set of switches; and connecting, with respect to the determined order, the disconnected switches with a respective switch of the fourth set of switches in an equivalent number port location. 3. The method of claim 2, further comprising:
providing a fifth set of switches; and connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches. 4. The method of claim 3, wherein connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches forms a fat tree network topology with or without oversubscription, wherein the fat tree network topology is a re-arrangeably non-blocking network topology. 5. The method of claim 3, wherein connecting each switch of the fifth set of switches with ports in the second set of switches, the third set of switches, and the fourth set of switches, further includes:
detecting an available port of a switch of one of the second set of switches, third set of switches, or fourth set of switches, wherein a port is available when the port goes from a connected state to a disconnected state; and connecting to a respective port of a respective switch of the second set of switches, third set of switches, or fourth set of switches. 6. The method of claim 3, wherein each of the switch of the first set of switches, the second set of switches, third set of switches, fourth set of switches, or the fifth set of switches comprises a commodity network switch or application-specific integrated circuit (ASIC). 7. The method of claim 3, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack, wherein a number of switches of the first set of switches equals a number of switches in the fifth set of switches, wherein a portion of the first set of switches are edge switches, a portion of the second set of switches are spine switches, a portion of the third set of switches are edge switches, a portion of the fourth set of switches are spine switches, and wherein a portion of the fifth set of switches are edge switches. 8. The method of claim 7, wherein connecting each edge switch of the third set of switches with each spine switch of the second set of switches and each spine switch of the fourth set of switches results in a formation of a Clos network topology. 9. The method of claim 2, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack. 10. The method of claim 2, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack. 11. A switch network in a data center, comprising:
a first set of switches, each switch in the first set of switches including at least two ports; a second set of, each switch in the second set of switches including at least two ports, wherein at least two ports of each switch of the first set of switches are connected with at least two ports of each switch of the second set of switches a third set of switches connected with each switch of the first set switches utilizing one of the ports of the at least two ports between a respective switch of the first set of switches and a respective switch of the second set of switches, wherein one of the at least two connections is disconnected, in a determined order, from a port of the respective switch of the second set of switches and reconnected with a port of the respective switch of the third set of switches; and a fourth set of switches connected, with respect to the determined order, with each disconnected switch of the second set of switches in an equivalent number port location. 12. The switch network of claim 11, comprising:
a fifth set of switches, wherein each switch of the fifth set of switches is connected with each switch of the second set of switches, the third set of switches, and the fourth set of switches. 13. The switch network of claim 12, wherein connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches forms a fat tree network topology with or without oversubscription, wherein the fat tree network topology is a re-arrangeably non-blocking network topology. 14. The switch network of claim 12, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack, wherein a number of switches of the first set of switches equals a number of switches in the fifth set of switches, wherein a portion of the first set of switches are edge switches, a portion of the second set of switches are spine switches, a portion of the third set of switches are edge switches, a portion of the fourth set of switches are spine switches, and wherein a portion of the fifth set of switches are edge switches. 15. The switch network of claim 14, wherein connecting each edge switch of the third set of switches with each spine switch of the second set of switches and each spine switch of the fourth set of switches results in a formation of a Clos network topology. 16. The switch network of claim 11, wherein each switch of the first set of switches, the second set of switches, and the third set of switches comprises a commodity network switch or application-specific integrated circuit (ASIC). 17. A computing system, comprising:
a computing device processor; a first set of switches, a second set of switches, a third set of switches, and a fourth set of switches in a data center; and a memory device including instructions that, when executed by the computing device processor, cause the computing system to:
connect at least two ports of each switch of the first set of switches with at least two ports of each switch of the second set of switches;
connect each switch of the first set of switches with each switch of the third set of switches;
receive a request to adjust an arraignment of connections of the first set of switches, the second set of switches, the third set of switches, and the fourth set of switches;
disconnect, in a determined order, each switch of the second set of switches from numbered port locations with a corresponding switch and port of the first set of switches; and
connect, with respect to the determined order, disconnected switches of the second set of switches with a respective switch of the fourth set of switches in an equivalent number port location. 18. The computing system of claim 17, further including a fifth set of switches, wherein the instructions, when executed further enable the computing system to:
connect each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches. 19. The computing system of claim 18, wherein connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches forms a fat tree network topology with or without oversubscription, wherein the fat tree network topology is a re-arrangeably non-blocking network topology. 20. The computing system of claim 18, wherein the instructions, when executed to connect each switch of the fifth set of switches with ports in the second set of switches, the third set of switches, and the fourth set of switches, further enable the computing system to:
detect an available port of a switch of one of the second set of switches, third set of switches, or fourth set of switches, wherein a port is available when the port goes from a connected state to a disconnected state; and connect to a respective port of a respective switch of the second set of switches, third set of switches, or fourth set of switches. 21. The computing system of claim 18, wherein each of the switch of the first set, the second set, third set, fourth set, or fifth set of switches comprises a commodity network switch or application-specific integrated circuit (ASIC). | Efficient and highly-scalable network solutions are provided that utilize incremental scaling of switches, and devices connected to those switches, in an environment such as a data center. Embodiments may utilize multiple tiers of switches. Sets of switches in two different tiers may be initially connected to each other utilizing multiple connections. As network capacity needs within the computing environment increase, additional switches may be added to tiers. To connect the added switches to the switch network, the redundant connections may be utilized. Moving connections from one switch to another switch can free up ports to connect added switches in one of the tiers of switches to the switch network. The tiers of switches can be based on Clos networks, where the tiers of switches are fully connected, or other high radix or fat tree topologies that include oversubscription between tiers.1. (canceled) 2. A method, comprising:
providing a first set of switches, a second set of switches, a third set of switches, and a fourth set of switches in a data center; connecting at least two ports of each switch of the first set of switches with at least two ports of each switch of the second set of switches; connecting each switch of the first set of switches with each switch of the third set of switches; receiving a request to adjust an arraignment of connections of the first set of switches, the second set of switches, the third set of switches, and the fourth set of switches disconnecting, in a determined order, each switch of the second set of switches from numbered port locations with a corresponding switch and port of the first set of switches; and connecting, with respect to the determined order, the disconnected switches with a respective switch of the fourth set of switches in an equivalent number port location. 3. The method of claim 2, further comprising:
providing a fifth set of switches; and connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches. 4. The method of claim 3, wherein connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches forms a fat tree network topology with or without oversubscription, wherein the fat tree network topology is a re-arrangeably non-blocking network topology. 5. The method of claim 3, wherein connecting each switch of the fifth set of switches with ports in the second set of switches, the third set of switches, and the fourth set of switches, further includes:
detecting an available port of a switch of one of the second set of switches, third set of switches, or fourth set of switches, wherein a port is available when the port goes from a connected state to a disconnected state; and connecting to a respective port of a respective switch of the second set of switches, third set of switches, or fourth set of switches. 6. The method of claim 3, wherein each of the switch of the first set of switches, the second set of switches, third set of switches, fourth set of switches, or the fifth set of switches comprises a commodity network switch or application-specific integrated circuit (ASIC). 7. The method of claim 3, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack, wherein a number of switches of the first set of switches equals a number of switches in the fifth set of switches, wherein a portion of the first set of switches are edge switches, a portion of the second set of switches are spine switches, a portion of the third set of switches are edge switches, a portion of the fourth set of switches are spine switches, and wherein a portion of the fifth set of switches are edge switches. 8. The method of claim 7, wherein connecting each edge switch of the third set of switches with each spine switch of the second set of switches and each spine switch of the fourth set of switches results in a formation of a Clos network topology. 9. The method of claim 2, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack. 10. The method of claim 2, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack. 11. A switch network in a data center, comprising:
a first set of switches, each switch in the first set of switches including at least two ports; a second set of, each switch in the second set of switches including at least two ports, wherein at least two ports of each switch of the first set of switches are connected with at least two ports of each switch of the second set of switches a third set of switches connected with each switch of the first set switches utilizing one of the ports of the at least two ports between a respective switch of the first set of switches and a respective switch of the second set of switches, wherein one of the at least two connections is disconnected, in a determined order, from a port of the respective switch of the second set of switches and reconnected with a port of the respective switch of the third set of switches; and a fourth set of switches connected, with respect to the determined order, with each disconnected switch of the second set of switches in an equivalent number port location. 12. The switch network of claim 11, comprising:
a fifth set of switches, wherein each switch of the fifth set of switches is connected with each switch of the second set of switches, the third set of switches, and the fourth set of switches. 13. The switch network of claim 12, wherein connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches forms a fat tree network topology with or without oversubscription, wherein the fat tree network topology is a re-arrangeably non-blocking network topology. 14. The switch network of claim 12, wherein a portion of the first set of switches are top of rack (TOR) switches connected to a plurality of host computing devices in a server rack, wherein a number of switches of the first set of switches equals a number of switches in the fifth set of switches, wherein a portion of the first set of switches are edge switches, a portion of the second set of switches are spine switches, a portion of the third set of switches are edge switches, a portion of the fourth set of switches are spine switches, and wherein a portion of the fifth set of switches are edge switches. 15. The switch network of claim 14, wherein connecting each edge switch of the third set of switches with each spine switch of the second set of switches and each spine switch of the fourth set of switches results in a formation of a Clos network topology. 16. The switch network of claim 11, wherein each switch of the first set of switches, the second set of switches, and the third set of switches comprises a commodity network switch or application-specific integrated circuit (ASIC). 17. A computing system, comprising:
a computing device processor; a first set of switches, a second set of switches, a third set of switches, and a fourth set of switches in a data center; and a memory device including instructions that, when executed by the computing device processor, cause the computing system to:
connect at least two ports of each switch of the first set of switches with at least two ports of each switch of the second set of switches;
connect each switch of the first set of switches with each switch of the third set of switches;
receive a request to adjust an arraignment of connections of the first set of switches, the second set of switches, the third set of switches, and the fourth set of switches;
disconnect, in a determined order, each switch of the second set of switches from numbered port locations with a corresponding switch and port of the first set of switches; and
connect, with respect to the determined order, disconnected switches of the second set of switches with a respective switch of the fourth set of switches in an equivalent number port location. 18. The computing system of claim 17, further including a fifth set of switches, wherein the instructions, when executed further enable the computing system to:
connect each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches. 19. The computing system of claim 18, wherein connecting each switch of the fifth set of switches with each switch of the second set of switches, the third set of switches, and the fourth set of switches forms a fat tree network topology with or without oversubscription, wherein the fat tree network topology is a re-arrangeably non-blocking network topology. 20. The computing system of claim 18, wherein the instructions, when executed to connect each switch of the fifth set of switches with ports in the second set of switches, the third set of switches, and the fourth set of switches, further enable the computing system to:
detect an available port of a switch of one of the second set of switches, third set of switches, or fourth set of switches, wherein a port is available when the port goes from a connected state to a disconnected state; and connect to a respective port of a respective switch of the second set of switches, third set of switches, or fourth set of switches. 21. The computing system of claim 18, wherein each of the switch of the first set, the second set, third set, fourth set, or fifth set of switches comprises a commodity network switch or application-specific integrated circuit (ASIC). | 2,400 |
8,232 | 8,232 | 14,673,391 | 2,462 | A wireless terminal receives signaling information, pertaining to a reference signal transmission in at least one specifically designated sub frame, the signaling information including a list, the list including base station identities. The terminal determines, from at least one of the base station identities in the list, the time-frequency resources associated with a reference signal transmission intended for observed time difference of arrival (OTDOA) measurements from a transmitting base station associated with said one base station identity. The time of arrival of a transmission from the transmitting base station, relative to reference timing, is measured. The wireless terminal can receive a command from a serving cell to start performing inter-frequency OTDOA measurement on a frequency layer containing reference signals, the frequency layer distinct from the serving frequency layer, the serving frequency layer not containing positioning reference signals. The wireless terminal can perform OTDOA measurements subsequent to the reception of the command on a carrier frequency different from the serving cell carrier frequency. A base station transmitter can jointly schedule a reference signal transmission from a plurality of base station transmitters for the purpose of OTD estimation enhancement, and transmit identical reference signals from the plurality of base station transmitters, the reference signals being identical both in the signal sequence and time-frequency resources used for transmission. | 1. A method in a first wireless base station including
exchanging system timing information with a second base station; and scheduling transmission of OTDOA reference signals using the timing information, the transmission being scheduled such that the transmission of OTDOA reference signals from the first and second base stations substantially overlap in time, and the OTDOA reference signals from the first and second base stations being substantially different. 2. The method of claim 1, wherein the system timing information includes reference system times corresponding to the OTDOA subframes. 3. The method of claim 1, further including signaling a measurement pattern to a wireless terminal based on the timing information. 4. The method of claim 3, wherein the signaling the measurement pattern includes signaling a relationship between the measurement pattern and the second base station identity to the wireless terminal. 5. The method of claim 3, wherein the measurement pattern includes an offset of subframes on which the OTDOA reference signals are transmitted. 6. The method of claim 3, wherein the measurement pattern includes a periodicity of the OTDOA subframes. 7. The method of claim 1, wherein the exchanging system timing information includes reading at least a portion of a broadcast by the second base station, the broadcast including at least one of a primary broadcast channel and a system information block. 8. The method of claim 1, wherein the exchanging system timing information includes requesting from the second base station a time interval until a next transmission of an OTDOA reference signal from the second base station. 9. The method of claim 1, wherein the system timing information is exchanged over at least one of an S1 interface and an X2 interface. 10. A method in a plurality of base station transmitters including
jointly scheduling a reference signal transmission from a plurality of base station transmitters for the purpose of OTD estimation enhancement; and transmitting identical reference signals from the plurality of base station transmitters, the reference signals being identical both in the signal sequence and time-frequency resources used for transmission. 11. The method of claim 10, wherein the time-frequency resources used for the OTDOA signal and the sequence used are established by at least one of a physical cell identity (PCID), a global cell identity (GCID), a system frame number (SFN), and sub frame index. 12. The method of claim 10, further including
subdividing a set of possible PCIDs that can be assigned to the plurality of base station transmitters into at least first and second disjoint sets, the possible PCIDs each associated with an index, and wherein the at least first and second disjoint sets comprise PCIDs allocated to transmitters that are colocated; transmitting identical OTDOA reference signals from transmitters with PCIDs belonging to the same one of said at least first and second disjoint sets; and signaling a mode of transmission to a mobile station. | A wireless terminal receives signaling information, pertaining to a reference signal transmission in at least one specifically designated sub frame, the signaling information including a list, the list including base station identities. The terminal determines, from at least one of the base station identities in the list, the time-frequency resources associated with a reference signal transmission intended for observed time difference of arrival (OTDOA) measurements from a transmitting base station associated with said one base station identity. The time of arrival of a transmission from the transmitting base station, relative to reference timing, is measured. The wireless terminal can receive a command from a serving cell to start performing inter-frequency OTDOA measurement on a frequency layer containing reference signals, the frequency layer distinct from the serving frequency layer, the serving frequency layer not containing positioning reference signals. The wireless terminal can perform OTDOA measurements subsequent to the reception of the command on a carrier frequency different from the serving cell carrier frequency. A base station transmitter can jointly schedule a reference signal transmission from a plurality of base station transmitters for the purpose of OTD estimation enhancement, and transmit identical reference signals from the plurality of base station transmitters, the reference signals being identical both in the signal sequence and time-frequency resources used for transmission.1. A method in a first wireless base station including
exchanging system timing information with a second base station; and scheduling transmission of OTDOA reference signals using the timing information, the transmission being scheduled such that the transmission of OTDOA reference signals from the first and second base stations substantially overlap in time, and the OTDOA reference signals from the first and second base stations being substantially different. 2. The method of claim 1, wherein the system timing information includes reference system times corresponding to the OTDOA subframes. 3. The method of claim 1, further including signaling a measurement pattern to a wireless terminal based on the timing information. 4. The method of claim 3, wherein the signaling the measurement pattern includes signaling a relationship between the measurement pattern and the second base station identity to the wireless terminal. 5. The method of claim 3, wherein the measurement pattern includes an offset of subframes on which the OTDOA reference signals are transmitted. 6. The method of claim 3, wherein the measurement pattern includes a periodicity of the OTDOA subframes. 7. The method of claim 1, wherein the exchanging system timing information includes reading at least a portion of a broadcast by the second base station, the broadcast including at least one of a primary broadcast channel and a system information block. 8. The method of claim 1, wherein the exchanging system timing information includes requesting from the second base station a time interval until a next transmission of an OTDOA reference signal from the second base station. 9. The method of claim 1, wherein the system timing information is exchanged over at least one of an S1 interface and an X2 interface. 10. A method in a plurality of base station transmitters including
jointly scheduling a reference signal transmission from a plurality of base station transmitters for the purpose of OTD estimation enhancement; and transmitting identical reference signals from the plurality of base station transmitters, the reference signals being identical both in the signal sequence and time-frequency resources used for transmission. 11. The method of claim 10, wherein the time-frequency resources used for the OTDOA signal and the sequence used are established by at least one of a physical cell identity (PCID), a global cell identity (GCID), a system frame number (SFN), and sub frame index. 12. The method of claim 10, further including
subdividing a set of possible PCIDs that can be assigned to the plurality of base station transmitters into at least first and second disjoint sets, the possible PCIDs each associated with an index, and wherein the at least first and second disjoint sets comprise PCIDs allocated to transmitters that are colocated; transmitting identical OTDOA reference signals from transmitters with PCIDs belonging to the same one of said at least first and second disjoint sets; and signaling a mode of transmission to a mobile station. | 2,400 |
8,233 | 8,233 | 13,631,189 | 2,455 | Elastic packaging of application configuration may include selecting at least one configurable attribute from an application model hierarchy, generating at least one formula for the selected at least one configurable attribute, the at least one formula including interface parameters, and tag the generated at least one formula with the selected at least one configurable attribute in an application deployment package, the application deployment package including an application to be deployed on a cloud computer. | 1. A client computer comprising:
a memory including code segments that when executed by a processor cause the processor to:
select at least one configurable attribute from an application model hierarchy;
generate at least one formula for the selected at least one configurable attribute, the at least one formula including interface parameters; and
tag the generated at least one formula with the selected at least one configurable attribute in an application deployment package, the application deployment package including an application to be deployed on a cloud computer. 2. The client computer of claim 1, wherein the code segments that when executed by the processor further cause the processor to:
browse a configuration repository for at least one existing formula, wherein generating at least one formula for the selected at least one configurable attribute includes selecting from the at least one existing formula. 3. The client computer of claim 1, wherein generating at least one formula for the selected at least one configurable attribute includes using graphical tool including one of a curve fitting tool or regression analysis tool. 4. The client computer of claim 1, wherein generating at least one formula for the selected at least one configurable attribute includes providing a user interface for entering a predetermined formula. 5. The client computer of claim 1, wherein the interface parameters include at least one run-time variable including one of allocated memory, disk size, CPU capacity, and network type. 6. The client computer of claim 5, wherein the at least one formula is based on observed application behavior in a modeled network including the run-time variable. 7. The client computer of claim 1, wherein selecting the at least one configurable attribute from the application model hierarchy includes expanding a tree to select a specific resource, the tree being configured to display resources associated with the application model hierarchy. 8. The client computer of claim 1, wherein
tagging the generated at least one formula with the selected at least one configurable attribute in an application deployment package includes adding the at least one formula to a configuration file associated with the application deployment package, and the configuration file is transmitted together with the application deployment package to the cloud computer. 9. The client computer of claim 1, wherein the code segments that when executed by the processor further cause the processor to:
tag, by a user having administrator privileges, default formulas for use if an application does not have an associated formula. 10. A non-transitory computer readable medium including code segments stored thereon that when executed by a processor cause the processor to:
select at least one configurable attribute from an application model hierarchy; generate at least one formula for the selected at least one configurable attribute, the at least one formula including interface parameters; and tag the generated at least one formula with the selected at least one configurable attribute in an application deployment package, the application deployment package including an application to be deployed on a cloud computer. 11. The non-transitory computer readable medium of claim 10, wherein the code segments that when executed by the processor further cause the processor to:
browse a configuration repository for at least one existing formula, wherein generating at least one formula for the selected at least one configurable attribute includes selecting from the at least one existing formula. 12. The non-transitory computer readable medium of claim 10, wherein generating at least one formula for the selected at least one configurable attribute includes using graphical tool including one of a curve fitting tool or regression analysis tool. 13. The non-transitory computer readable medium of claim 10, wherein selecting the at least one configurable attribute from the application model hierarchy includes expanding a tree to select a specific resource, the tree being configured to display resources associated with the application model hierarchy. 14. The non-transitory computer readable medium of claim 10, wherein
tagging the generated at least one formula with the selected at least one configurable attribute in an application deployment package includes adding the at least one formula to a configuration file associated with the application deployment package, and the configuration file is transmitted together with the application deployment package to the cloud computer. 15. The non-transitory computer readable medium of claim 10, wherein the code segments that when executed by the processor further cause the processor to:
tag, by a user having administrator privileges, default formulas for use if an application does not have an associated formula. 16. A cloud computing device comprising:
a memory including code segments that when executed by a processor cause the processor to: determine if one of (1) an application is being installed for the first time and (2) resources associated with a virtual machine have changed; and apply a configuration to the application if one of (1) the application is being installed for the first time and (2) the resources associated with a virtual machine have changed, the configuration being based on a formula and run-time variable associated with the virtual machine. 17. The cloud computing device of claim 16, wherein applying the configuration to the application includes identifying relevant configurations to be applied for the application based on a service tier and a middleware type. 18. The cloud computing device of claim 16, wherein applying the configuration to the application includes:
identifying a default configuration and an application specific configuration; applying the default configuration if the application specific configuration cannot be identified; and applying the application specific configuration if the application specific configuration is identified. | Elastic packaging of application configuration may include selecting at least one configurable attribute from an application model hierarchy, generating at least one formula for the selected at least one configurable attribute, the at least one formula including interface parameters, and tag the generated at least one formula with the selected at least one configurable attribute in an application deployment package, the application deployment package including an application to be deployed on a cloud computer.1. A client computer comprising:
a memory including code segments that when executed by a processor cause the processor to:
select at least one configurable attribute from an application model hierarchy;
generate at least one formula for the selected at least one configurable attribute, the at least one formula including interface parameters; and
tag the generated at least one formula with the selected at least one configurable attribute in an application deployment package, the application deployment package including an application to be deployed on a cloud computer. 2. The client computer of claim 1, wherein the code segments that when executed by the processor further cause the processor to:
browse a configuration repository for at least one existing formula, wherein generating at least one formula for the selected at least one configurable attribute includes selecting from the at least one existing formula. 3. The client computer of claim 1, wherein generating at least one formula for the selected at least one configurable attribute includes using graphical tool including one of a curve fitting tool or regression analysis tool. 4. The client computer of claim 1, wherein generating at least one formula for the selected at least one configurable attribute includes providing a user interface for entering a predetermined formula. 5. The client computer of claim 1, wherein the interface parameters include at least one run-time variable including one of allocated memory, disk size, CPU capacity, and network type. 6. The client computer of claim 5, wherein the at least one formula is based on observed application behavior in a modeled network including the run-time variable. 7. The client computer of claim 1, wherein selecting the at least one configurable attribute from the application model hierarchy includes expanding a tree to select a specific resource, the tree being configured to display resources associated with the application model hierarchy. 8. The client computer of claim 1, wherein
tagging the generated at least one formula with the selected at least one configurable attribute in an application deployment package includes adding the at least one formula to a configuration file associated with the application deployment package, and the configuration file is transmitted together with the application deployment package to the cloud computer. 9. The client computer of claim 1, wherein the code segments that when executed by the processor further cause the processor to:
tag, by a user having administrator privileges, default formulas for use if an application does not have an associated formula. 10. A non-transitory computer readable medium including code segments stored thereon that when executed by a processor cause the processor to:
select at least one configurable attribute from an application model hierarchy; generate at least one formula for the selected at least one configurable attribute, the at least one formula including interface parameters; and tag the generated at least one formula with the selected at least one configurable attribute in an application deployment package, the application deployment package including an application to be deployed on a cloud computer. 11. The non-transitory computer readable medium of claim 10, wherein the code segments that when executed by the processor further cause the processor to:
browse a configuration repository for at least one existing formula, wherein generating at least one formula for the selected at least one configurable attribute includes selecting from the at least one existing formula. 12. The non-transitory computer readable medium of claim 10, wherein generating at least one formula for the selected at least one configurable attribute includes using graphical tool including one of a curve fitting tool or regression analysis tool. 13. The non-transitory computer readable medium of claim 10, wherein selecting the at least one configurable attribute from the application model hierarchy includes expanding a tree to select a specific resource, the tree being configured to display resources associated with the application model hierarchy. 14. The non-transitory computer readable medium of claim 10, wherein
tagging the generated at least one formula with the selected at least one configurable attribute in an application deployment package includes adding the at least one formula to a configuration file associated with the application deployment package, and the configuration file is transmitted together with the application deployment package to the cloud computer. 15. The non-transitory computer readable medium of claim 10, wherein the code segments that when executed by the processor further cause the processor to:
tag, by a user having administrator privileges, default formulas for use if an application does not have an associated formula. 16. A cloud computing device comprising:
a memory including code segments that when executed by a processor cause the processor to: determine if one of (1) an application is being installed for the first time and (2) resources associated with a virtual machine have changed; and apply a configuration to the application if one of (1) the application is being installed for the first time and (2) the resources associated with a virtual machine have changed, the configuration being based on a formula and run-time variable associated with the virtual machine. 17. The cloud computing device of claim 16, wherein applying the configuration to the application includes identifying relevant configurations to be applied for the application based on a service tier and a middleware type. 18. The cloud computing device of claim 16, wherein applying the configuration to the application includes:
identifying a default configuration and an application specific configuration; applying the default configuration if the application specific configuration cannot be identified; and applying the application specific configuration if the application specific configuration is identified. | 2,400 |
8,234 | 8,234 | 14,881,180 | 2,439 | Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered. | 1. A method for detecting unauthorized electronic forms, comprising:
obtaining an electronic form including at least one input field; analyzing the obtained electronic form against a record of an authorized electronic form by comparing input fields of the obtained electronic form with input fields of the authorized electronic form for correlations; and, causing the taking of protective action in accordance with the correlations between the input fields of the obtained electronic form. 2. The method of claim 1, wherein the electronic form includes HTML data. 3. The method of claim 1, wherein the analyzing includes identifying an electronic form from the record of the authorized form according to an associated Uniform Resource Locator. 4. The method of claim 1, wherein the obtained electronic form includes active content. 5. The method of claim 4, wherein the active content includes Javascript. 6. The method of claim 4, wherein the analyzing additionally comprises:
obtaining the electronic form by rendering the electronic form prior the comparing against the record of the authorized electronic form. 7. The method of claim 2, wherein the correlations include matches of the input fields of the obtained electronic form with the input fields of the authorized electronic form; and, the causing the taking of protective action in accordance with the correlations occurs when the correlations fail to meet a predetermined standard. 8. The method of claim 1, wherein the taking protective action includes blocking access to the form. 9. The method of claim 1, wherein the taking protective action includes displaying a message. 10. The method of claim 1, wherein the taking protective action includes notifying a system administrator. 11. The method of claim 1, wherein the taking protective action includes disabling use of the affected machine. 12. The method of claim 1, wherein the taking protective action includes disconnecting the affected machine from the network. 13. A computer system for detecting unauthorized electronic forms received via a network, comprising:
a database for storing records of electronic forms, the electronic forms including input fields; a storage medium for storing computer components; and, a computerized processor for executing the computer components comprising:
a computer module configured for:
obtaining an electronic form including at least one input field;
analyzing the obtained electronic form against a record of an authorized electronic form from the database, by comparing input fields of the obtained electronic form with input fields of the authorized electronic form for correlations; and,
causing the taking of protective action in accordance with the correlations between the input fields of the obtained electronic form. 14. The computer system of claim 13, wherein the computer module is configured such that the analyzing includes identifying an electronic form from the record of the authorized form according to an associated Uniform Resource Locator in the database. 15. The computer system of claim 14, wherein the computer module is configured such that the correlations include matches of the input fields of the obtained electronic form with the input fields of the authorized electronic form; and, the causing the taking of protective action in accordance with the correlations occurs when the correlations fail to meet a predetermined standard. 16. The computer system of claim 15, wherein the computer module includes an agent. 17. The computer system of claim 15, additionally comprising at least one machine in electronic communication with the database over the network, for obtaining data associated with electronic forms over the network. 18. A computer usable non-transitory storage medium having a computer program embodied thereon for causing a suitable programmed system to detect unauthorized electronic forms, accessible via a network, by performing the following steps when such program is executed on the system, the steps comprising:
obtaining an electronic form including at least one input field; analyzing the obtained electronic form against a record of an authorized electronic form by comparing input fields of the obtained electronic form with input fields of the authorized electronic form for correlations; and, causing the taking of protective action in accordance with the correlations between the input fields of the obtained electronic form. | Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.1. A method for detecting unauthorized electronic forms, comprising:
obtaining an electronic form including at least one input field; analyzing the obtained electronic form against a record of an authorized electronic form by comparing input fields of the obtained electronic form with input fields of the authorized electronic form for correlations; and, causing the taking of protective action in accordance with the correlations between the input fields of the obtained electronic form. 2. The method of claim 1, wherein the electronic form includes HTML data. 3. The method of claim 1, wherein the analyzing includes identifying an electronic form from the record of the authorized form according to an associated Uniform Resource Locator. 4. The method of claim 1, wherein the obtained electronic form includes active content. 5. The method of claim 4, wherein the active content includes Javascript. 6. The method of claim 4, wherein the analyzing additionally comprises:
obtaining the electronic form by rendering the electronic form prior the comparing against the record of the authorized electronic form. 7. The method of claim 2, wherein the correlations include matches of the input fields of the obtained electronic form with the input fields of the authorized electronic form; and, the causing the taking of protective action in accordance with the correlations occurs when the correlations fail to meet a predetermined standard. 8. The method of claim 1, wherein the taking protective action includes blocking access to the form. 9. The method of claim 1, wherein the taking protective action includes displaying a message. 10. The method of claim 1, wherein the taking protective action includes notifying a system administrator. 11. The method of claim 1, wherein the taking protective action includes disabling use of the affected machine. 12. The method of claim 1, wherein the taking protective action includes disconnecting the affected machine from the network. 13. A computer system for detecting unauthorized electronic forms received via a network, comprising:
a database for storing records of electronic forms, the electronic forms including input fields; a storage medium for storing computer components; and, a computerized processor for executing the computer components comprising:
a computer module configured for:
obtaining an electronic form including at least one input field;
analyzing the obtained electronic form against a record of an authorized electronic form from the database, by comparing input fields of the obtained electronic form with input fields of the authorized electronic form for correlations; and,
causing the taking of protective action in accordance with the correlations between the input fields of the obtained electronic form. 14. The computer system of claim 13, wherein the computer module is configured such that the analyzing includes identifying an electronic form from the record of the authorized form according to an associated Uniform Resource Locator in the database. 15. The computer system of claim 14, wherein the computer module is configured such that the correlations include matches of the input fields of the obtained electronic form with the input fields of the authorized electronic form; and, the causing the taking of protective action in accordance with the correlations occurs when the correlations fail to meet a predetermined standard. 16. The computer system of claim 15, wherein the computer module includes an agent. 17. The computer system of claim 15, additionally comprising at least one machine in electronic communication with the database over the network, for obtaining data associated with electronic forms over the network. 18. A computer usable non-transitory storage medium having a computer program embodied thereon for causing a suitable programmed system to detect unauthorized electronic forms, accessible via a network, by performing the following steps when such program is executed on the system, the steps comprising:
obtaining an electronic form including at least one input field; analyzing the obtained electronic form against a record of an authorized electronic form by comparing input fields of the obtained electronic form with input fields of the authorized electronic form for correlations; and, causing the taking of protective action in accordance with the correlations between the input fields of the obtained electronic form. | 2,400 |
8,235 | 8,235 | 14,662,376 | 2,425 | A Scalable Video Coding (SVC) process is provided for scalable video coding that takes into account color gamut primaries along with spatial resolution. The process provides for re-sampling using video color data obtained from an encoder or decoder process of a base layer (BL) in a multi-layer system to enable improved encoding and decoding in an enhancement layer (EL) or higher layers taking into account color conversion between layers. Examples of applicable SVC include MPEG-4 Advanced Video Coding (AVC) and High Efficiency Video Coding (HEVC). With the SVC process, video data expressed in one color gamut space can be used for prediction in encoding with a possibly different color space, and accommodation for different spatial resolution and bit-depth can be made as well. | 1. A method for scalable video coding comprising:
receiving sampling signals from a video of the first coding layer and providing an output signal to a second coding layer that codes video with an enhanced resolution having a higher resolution than the base resolution; selecting a picture from the input samples of the video signal in the first coding layer for coding video with the base resolution; selecting either a plurality of filters or a mapping formula that converts a set of primary color values for a pixel in the picture with a primary color gamut in the first coding layer to a different set of color values making up a target color gamut that is suitable for presentation on a display used for the second coding layer that conforms to the target color gamut. 2. The method of claim 1,
wherein in addition to color gamut scaling from the primary color gamut to the target color gamut, spatial scaling is provided. 3. The method of claim 2,
wherein the spatial scaling and color gamut scaling are applied in order with one of the spatial scaling and color gamut being applied first, and then the other. 4. The method of claim 3,
wherein spatial scaling is applied, and wherein when the color gamut scaling is applied for a tone mapping function in an encoder side, the tone mapping function occurs after spatial scaling. 5. The method of claim 4,
wherein a reverse order of the spatial scaling and the tone mapping are applied at a decoder side. 6. The method of claim 2, wherein a flag is provided in a bitstream of the video, to indicate the order in the color gamut scaling and the spatial scaling are provided. 7. The method of claim 1,
wherein a different mapping would be applied to different regions of a frame for the picture. 8. The method of claim 7,
wherein the different mapping in the different frame regions is done by at least one of the following: (a) signaling linear or non-linear three dimensional look up table (3DLUT) color mapping parameters with an adaptive quad-tree structure; (b) signaling mapping parameters in the slice or tile headers to create the same spatial freedom for correcting the color tones; (c) signaling to reuse collocated partitioning and color mapping parameters from previous frames; and (d) using an adaptive quad-tree partitioning to adaptively signal filter parameters in the case that spatial scalability is also applied. 9. The method of claim 1,
wherein the primary color gamut and target color gamut are assigned different sequences for a Base Layer (BL) and an Enhancement Layer (EL). 10. The method of claim 1,
when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from a vector of three color values in one color gamut space to a corresponding vector of three color values in a different gamut space, and wherein the mapping at the encoder is applied on a three-color-component grid that is different than a grid a Base Layer (BL) is on. 11. The method of claim 10,
wherein a relative location of luma and chroma samples in vertical and horizontal dimensions are signaled to a decoder to enable the decoder to adjust the sample locations to reverse the one used for the tone mapping in a forward direction. 12. The method of claim 1,
when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from one color gamut space to the same gamut space. 13. A system for scalable video coding comprising:
a first coding layer comprising modules for coding video with a base resolution; a second coding layer comprising modules for coding video with an enhanced resolution having a higher resolution than the base resolution; an upsampling unit receiving sampling signals from the first coding layer and providing an output signal to the second coding layer after an upsampling process, wherein the upsampling unit output signal enables more efficient coding in the second coding layer, wherein the first coding layer modules comprise:
a sampling module that provides sampling signals of a video for the first coding layer;
a picture selection module that selects a picture from the input samples of the video signal from the sampling module;
a color conversion module that selects either a plurality of filters or a mapping formula for converting a set of primary color values for a pixel in the picture with a primary color gamut in the first coding layer to a different set of color values making up a target color gamut that is suitable for presentation on a display used for the second coding layer that conforms to the target color gamut for providing to the upsampling unit. 14. The system of claim 13, wherein the first coding layer modules further comprise:
a spatial scaling module that provides spatial scaling separate from the color conversion from the first coding layer for providing to the second coding layer. 15. The system of claim 14,
wherein when the color gamut scaling is applied for a tone mapping function in an encoder side, the tone mapping occurs after the spatial scaling, and wherein a reverse order of the spatial scaling and the tone mapping are applied at a decoder side. 16. The system of claim 14, wherein a flag is provided in a bitstream of the video to indicate the order in the color gamut scaling and the spatial scaling are provided. 17. The system of claim 13,
wherein a different mapping would be applied to different regions of a frame, for the picture, and wherein the different mapping in the different frame regions is done by at least one of the following: (a) signaling linear or non-linear three dimensional look up table (3DLUT) color mapping parameters with an adaptive quad-tree structure; (b) signaling mapping parameters in the slice or tile headers to create the same spatial freedom for correcting the color tones; (c) signaling to reuse collocated partitioning and color mapping parameters from previous frames; and (d) using an adaptive quad-tree partitioning to adaptively signal filter parameters in the case that spatial scalability is also applied. 18. The system of claim 13,
wherein when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from a vector of three color values in one color gamut space to a corresponding vector of three color values in a different gamut space, and wherein the mapping at the encoder is applied on a three-color-component grid that is different than a grid a Base Layer (BL) is on. 19. The system of claim 18,
wherein a relative location of luma and chroma samples in vertical and horizontal dimensions are signaled to a decoder to enable the decoder to adjust the sample locations to reverse the one used for the tone mapping in a forward direction. 20. The system of claim 13,
when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from one color gamut space to the same gamut space. | A Scalable Video Coding (SVC) process is provided for scalable video coding that takes into account color gamut primaries along with spatial resolution. The process provides for re-sampling using video color data obtained from an encoder or decoder process of a base layer (BL) in a multi-layer system to enable improved encoding and decoding in an enhancement layer (EL) or higher layers taking into account color conversion between layers. Examples of applicable SVC include MPEG-4 Advanced Video Coding (AVC) and High Efficiency Video Coding (HEVC). With the SVC process, video data expressed in one color gamut space can be used for prediction in encoding with a possibly different color space, and accommodation for different spatial resolution and bit-depth can be made as well.1. A method for scalable video coding comprising:
receiving sampling signals from a video of the first coding layer and providing an output signal to a second coding layer that codes video with an enhanced resolution having a higher resolution than the base resolution; selecting a picture from the input samples of the video signal in the first coding layer for coding video with the base resolution; selecting either a plurality of filters or a mapping formula that converts a set of primary color values for a pixel in the picture with a primary color gamut in the first coding layer to a different set of color values making up a target color gamut that is suitable for presentation on a display used for the second coding layer that conforms to the target color gamut. 2. The method of claim 1,
wherein in addition to color gamut scaling from the primary color gamut to the target color gamut, spatial scaling is provided. 3. The method of claim 2,
wherein the spatial scaling and color gamut scaling are applied in order with one of the spatial scaling and color gamut being applied first, and then the other. 4. The method of claim 3,
wherein spatial scaling is applied, and wherein when the color gamut scaling is applied for a tone mapping function in an encoder side, the tone mapping function occurs after spatial scaling. 5. The method of claim 4,
wherein a reverse order of the spatial scaling and the tone mapping are applied at a decoder side. 6. The method of claim 2, wherein a flag is provided in a bitstream of the video, to indicate the order in the color gamut scaling and the spatial scaling are provided. 7. The method of claim 1,
wherein a different mapping would be applied to different regions of a frame for the picture. 8. The method of claim 7,
wherein the different mapping in the different frame regions is done by at least one of the following: (a) signaling linear or non-linear three dimensional look up table (3DLUT) color mapping parameters with an adaptive quad-tree structure; (b) signaling mapping parameters in the slice or tile headers to create the same spatial freedom for correcting the color tones; (c) signaling to reuse collocated partitioning and color mapping parameters from previous frames; and (d) using an adaptive quad-tree partitioning to adaptively signal filter parameters in the case that spatial scalability is also applied. 9. The method of claim 1,
wherein the primary color gamut and target color gamut are assigned different sequences for a Base Layer (BL) and an Enhancement Layer (EL). 10. The method of claim 1,
when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from a vector of three color values in one color gamut space to a corresponding vector of three color values in a different gamut space, and wherein the mapping at the encoder is applied on a three-color-component grid that is different than a grid a Base Layer (BL) is on. 11. The method of claim 10,
wherein a relative location of luma and chroma samples in vertical and horizontal dimensions are signaled to a decoder to enable the decoder to adjust the sample locations to reverse the one used for the tone mapping in a forward direction. 12. The method of claim 1,
when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from one color gamut space to the same gamut space. 13. A system for scalable video coding comprising:
a first coding layer comprising modules for coding video with a base resolution; a second coding layer comprising modules for coding video with an enhanced resolution having a higher resolution than the base resolution; an upsampling unit receiving sampling signals from the first coding layer and providing an output signal to the second coding layer after an upsampling process, wherein the upsampling unit output signal enables more efficient coding in the second coding layer, wherein the first coding layer modules comprise:
a sampling module that provides sampling signals of a video for the first coding layer;
a picture selection module that selects a picture from the input samples of the video signal from the sampling module;
a color conversion module that selects either a plurality of filters or a mapping formula for converting a set of primary color values for a pixel in the picture with a primary color gamut in the first coding layer to a different set of color values making up a target color gamut that is suitable for presentation on a display used for the second coding layer that conforms to the target color gamut for providing to the upsampling unit. 14. The system of claim 13, wherein the first coding layer modules further comprise:
a spatial scaling module that provides spatial scaling separate from the color conversion from the first coding layer for providing to the second coding layer. 15. The system of claim 14,
wherein when the color gamut scaling is applied for a tone mapping function in an encoder side, the tone mapping occurs after the spatial scaling, and wherein a reverse order of the spatial scaling and the tone mapping are applied at a decoder side. 16. The system of claim 14, wherein a flag is provided in a bitstream of the video to indicate the order in the color gamut scaling and the spatial scaling are provided. 17. The system of claim 13,
wherein a different mapping would be applied to different regions of a frame, for the picture, and wherein the different mapping in the different frame regions is done by at least one of the following: (a) signaling linear or non-linear three dimensional look up table (3DLUT) color mapping parameters with an adaptive quad-tree structure; (b) signaling mapping parameters in the slice or tile headers to create the same spatial freedom for correcting the color tones; (c) signaling to reuse collocated partitioning and color mapping parameters from previous frames; and (d) using an adaptive quad-tree partitioning to adaptively signal filter parameters in the case that spatial scalability is also applied. 18. The system of claim 13,
wherein when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from a vector of three color values in one color gamut space to a corresponding vector of three color values in a different gamut space, and wherein the mapping at the encoder is applied on a three-color-component grid that is different than a grid a Base Layer (BL) is on. 19. The system of claim 18,
wherein a relative location of luma and chroma samples in vertical and horizontal dimensions are signaled to a decoder to enable the decoder to adjust the sample locations to reverse the one used for the tone mapping in a forward direction. 20. The system of claim 13,
when the color gamut scaling is applied for a tone mapping function, wherein the tone mapping is a function mapping from one color gamut space to the same gamut space. | 2,400 |
8,236 | 8,236 | 15,350,853 | 2,468 | The present disclosure relates to communication schemes for combining 5G communication systems with IoT technology to support higher data transmission rate as post-4G systems and systems for the same. The present disclosure may be used in intelligent services (e.g., smart home, smart building, smart city, smart car, or connected car, health-care, digital education, retail business, security and safety-related services, etc.) based on the 5G communication technology and IoT-related techniques. Disclosed is a method for transmitting a scheduling request (SR) by a user equipment (UE) in a cellular communication system. The transmitting method may comprises receiving configuration information related to transmission of the SR from an enhanced node B (eNB), determining a value of a timer for prohibiting an SR transmission based on the received configuration information, and transmitting a set of SRs, wherein the timer may start at the time of transmission of a first SR of the SR set. | 1. A method for transmitting a scheduling request (SR) by a user equipment (UE) in a cellular communication system, the method comprising:
receiving configuration information related to transmission of the SR from an enhanced node B (eNB); determining a value of a timer for prohibiting an SR transmission based on the received configuration information; and transmitting a set of SRs, wherein the timer starts at the time of transmission of a first SR of the SR set. 2. The method of claim 1, further comprising increasing a counter at each SR set transmitted. 3. The method of claim 2, wherein a dsr-TransMax of the counter is received, included in SchedulingRequestConfig. 4. The method of claim 1, wherein the timer value is determined based on an sr-ProhibitTimer that is received, included in a MAC-MainConfig. 5. The method of claim 4, wherein the timer value is determined to be the product of a value of the sr-ProhibitTimer and a transmission period of the SR. 6. The method of claim 1, wherein the timer value is equal or larger than a time when the set is transmitted. 7. The method of claim 1, wherein another set different from the set is transmitted after the timer value elapses. 8. A user equipment (UE) transmitting a scheduling request (SR) in a cellular communication system, the UE comprising:
a transceiver receiving configuration information related to transmission of the SR from an enhanced node B (eNB); and a processor determining a timer value for prohibiting an SR transmission based on the received configuration information and controlling the transceiver to send a set of SRs, wherein the timer starts at the time of transmission of a first SR of the SR set. 9. The UE of claim 8, wherein the processor increases a counter at each SR set transmitted. 10. The UE of claim 9, wherein a dsr-TransMax of the counter is received, included in SchedulingRequestConfig. 11. The UE of claim 8, wherein the timer value is determined based on an sr-ProhibitTimer that is received, included in a MAC-MainConfig. 12. The UE of claim 11, wherein the timer value is determined to be the product of a value of the sr-ProhibitTimer and a transmission period of the SR. 13. The UE of claim 8, wherein the timer value is equal or larger than a time when the set is transmitted. 14. The UE of claim 8, wherein another set different from the set is transmitted after the timer value elapses. 15. A method for receiving a scheduling request (SR) by an enhanced node B (eNB) in a cellular communication system, the method comprising:
transmitting configuration information related to transmission of the SR to a user equipment (UE); determining a value of a timer for prohibiting an SR transmission; and receiving a set of SRs, wherein the timer starts at the time of transmission of a first SR of the SR set. 16. The method of claim 15, further comprising increasing a counter at each SR set transmitted. 17. The method of claim 16, wherein a dsr-TransMax of the counter is transferred, included in SchedulingRequestConfig. 18. The method of claim 15, wherein the timer value is determined based on an sr-ProhibitTimer that is transferred, included in a MAC-MainConfig. 19. The method of claim 18, wherein the timer value is determined to be the product of a value of the sr-ProhibitTimer and a transmission period of the SR. 20. The method of claim 15, wherein another set different from the set is transmitted after the timer value elapses. | The present disclosure relates to communication schemes for combining 5G communication systems with IoT technology to support higher data transmission rate as post-4G systems and systems for the same. The present disclosure may be used in intelligent services (e.g., smart home, smart building, smart city, smart car, or connected car, health-care, digital education, retail business, security and safety-related services, etc.) based on the 5G communication technology and IoT-related techniques. Disclosed is a method for transmitting a scheduling request (SR) by a user equipment (UE) in a cellular communication system. The transmitting method may comprises receiving configuration information related to transmission of the SR from an enhanced node B (eNB), determining a value of a timer for prohibiting an SR transmission based on the received configuration information, and transmitting a set of SRs, wherein the timer may start at the time of transmission of a first SR of the SR set.1. A method for transmitting a scheduling request (SR) by a user equipment (UE) in a cellular communication system, the method comprising:
receiving configuration information related to transmission of the SR from an enhanced node B (eNB); determining a value of a timer for prohibiting an SR transmission based on the received configuration information; and transmitting a set of SRs, wherein the timer starts at the time of transmission of a first SR of the SR set. 2. The method of claim 1, further comprising increasing a counter at each SR set transmitted. 3. The method of claim 2, wherein a dsr-TransMax of the counter is received, included in SchedulingRequestConfig. 4. The method of claim 1, wherein the timer value is determined based on an sr-ProhibitTimer that is received, included in a MAC-MainConfig. 5. The method of claim 4, wherein the timer value is determined to be the product of a value of the sr-ProhibitTimer and a transmission period of the SR. 6. The method of claim 1, wherein the timer value is equal or larger than a time when the set is transmitted. 7. The method of claim 1, wherein another set different from the set is transmitted after the timer value elapses. 8. A user equipment (UE) transmitting a scheduling request (SR) in a cellular communication system, the UE comprising:
a transceiver receiving configuration information related to transmission of the SR from an enhanced node B (eNB); and a processor determining a timer value for prohibiting an SR transmission based on the received configuration information and controlling the transceiver to send a set of SRs, wherein the timer starts at the time of transmission of a first SR of the SR set. 9. The UE of claim 8, wherein the processor increases a counter at each SR set transmitted. 10. The UE of claim 9, wherein a dsr-TransMax of the counter is received, included in SchedulingRequestConfig. 11. The UE of claim 8, wherein the timer value is determined based on an sr-ProhibitTimer that is received, included in a MAC-MainConfig. 12. The UE of claim 11, wherein the timer value is determined to be the product of a value of the sr-ProhibitTimer and a transmission period of the SR. 13. The UE of claim 8, wherein the timer value is equal or larger than a time when the set is transmitted. 14. The UE of claim 8, wherein another set different from the set is transmitted after the timer value elapses. 15. A method for receiving a scheduling request (SR) by an enhanced node B (eNB) in a cellular communication system, the method comprising:
transmitting configuration information related to transmission of the SR to a user equipment (UE); determining a value of a timer for prohibiting an SR transmission; and receiving a set of SRs, wherein the timer starts at the time of transmission of a first SR of the SR set. 16. The method of claim 15, further comprising increasing a counter at each SR set transmitted. 17. The method of claim 16, wherein a dsr-TransMax of the counter is transferred, included in SchedulingRequestConfig. 18. The method of claim 15, wherein the timer value is determined based on an sr-ProhibitTimer that is transferred, included in a MAC-MainConfig. 19. The method of claim 18, wherein the timer value is determined to be the product of a value of the sr-ProhibitTimer and a transmission period of the SR. 20. The method of claim 15, wherein another set different from the set is transmitted after the timer value elapses. | 2,400 |
8,237 | 8,237 | 13,703,808 | 2,465 | The invention proposes a method of transmitting a multimedia broadcast multicast service reception status message, wherein a terminal receives a radio resource control message from a base station; determines whether the radio resource control message satisfies a predetermined condition; and if the radio resource control message satisfies the predetermined condition, then the terminal transmits the multimedia broadcast multicast service reception status message to the base station, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal With the technical solution of the invention, the base station can obtain a reception status message, transmitted by the terminal, of at least one multimedia broadcast multicast service at the terminal side to thereby count the number of broadcast or multicast receiving users of the multimedia broadcast multicast service in operation and perform other relevant processes. | 1. A method of transmitting a multimedia broadcast multicast service reception status message in a terminal of a wireless communication network, the method comprising:
receiving a radio resource control message from a base station; determining whether the radio resource control message satisfies a predetermined condition; and if the radio resource control message satisfies the predetermined condition, transmitting the multimedia broadcast multicast service reception status message to the base station, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. 2. The method according to claim 1, wherein the predetermined condition comprises:
that the radio resource control message is received for a first time after the terminal is powered on or received from a new base station for a first time when the terminal is handed over to a new cell, and indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message. 3. The method according to claim 1, wherein the predetermined condition comprises:
that indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and indication information in a previously received radio resource control message indicates that the terminal is not required to transmit a multimedia broadcast multicast service reception status message. 4. The method according to claim 1, wherein the predetermined condition comprises:
that the radio resource control message comprises indication information, and the indication information indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and a previously received radio resource control message does not comprise indication information. 5. The method according to claim 2, wherein the radio resource control message is a multicast broadcast single frequency network area configuration message, and the receiving further comprises:
receiving the multicast broadcast single frequency network area configuration message from the base station over a multicast control channel. 6. The method according to claim 5, wherein:
the indication information in the multicast broadcast single frequency network area configuration message comprises a session identifier corresponding to at least one multimedia broadcast multicast service. 7. A method, in a base station of a wireless communication network, of requesting for a transmission of a multimedia broadcast multicast service reception status message, the method comprising:
transmitting a radio resource control message to a terminal, the radio resource control message comprising indication information for identifying at least one multimedia broadcast multicast service requiring the terminal to transmit a reception status. 8. The method according to claim 7, wherein after the transmitting, the method further comprises:
receiving a multimedia broadcast multicast service reception status message from the terminal, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. 9. The method according to claim 8, wherein the multimedia broadcast multicast service reception status message comprises a session identifier of the multimedia broadcast multicast service being received by the terminal, so as to identify the corresponding multimedia broadcast multicast service. 10. The method according to claim 8, wherein the radio resource control message is a multicast broadcast single frequency network area configuration message, and the transmitting further comprises:
transmitting the multicast broadcast single frequency network area configuration message to the terminal over a multicast control channel. 11. The method according to claim 10, wherein the indication information in the multicast broadcast single frequency network area configuration message comprises a session identifier corresponding to the at least one multimedia broadcast multicast service. 12. An apparatus for transmitting a multimedia broadcast multicast service reception status message in a terminal of a wireless communication network, comprising:
a radio resource control message receiver, configured to receive a radio resource control message from a base station; a predetermined condition determining module, configured to determine whether the radio resource control message satisfies a predetermined condition; and a multimedia broadcast multicast service reception status message transmitter, configured to transmit the multimedia broadcast multicast service reception status message to the base station when the radio resource control message satisfies the predetermined condition; wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. 13. The apparatus according to claim 12, wherein the predetermined condition comprises any one of:
that the radio resource control message is received for a first time after the terminal is powered on or received from a new base station for a first time when the terminal is handed over to a new cell, and indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message; that indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and indication information in a previously received radio resource control message indicates that the terminal is not required to transmit a multimedia broadcast multicast service reception status message; that the radio resource control message comprises indication information, and the indication information indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and a previously received radio resource control message does not comprise indication information. 14. An apparatus, in a base station of a wireless communication network, for requesting for a transmission of a multimedia broadcast multicast service reception status message, comprising:
a radio resource control message transmitter, configured to transmit a radio resource control message to a terminal, the radio resource control message comprising indication information for identifying at least one multimedia broadcast multicast service requiring the terminal to transmit a reception status. 15. The apparatus according to claim 14, wherein further comprising:
a multimedia broadcast multicast service reception status message receiver, configured to receive the multimedia broadcast multicast service reception status message from the terminal, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. | The invention proposes a method of transmitting a multimedia broadcast multicast service reception status message, wherein a terminal receives a radio resource control message from a base station; determines whether the radio resource control message satisfies a predetermined condition; and if the radio resource control message satisfies the predetermined condition, then the terminal transmits the multimedia broadcast multicast service reception status message to the base station, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal With the technical solution of the invention, the base station can obtain a reception status message, transmitted by the terminal, of at least one multimedia broadcast multicast service at the terminal side to thereby count the number of broadcast or multicast receiving users of the multimedia broadcast multicast service in operation and perform other relevant processes.1. A method of transmitting a multimedia broadcast multicast service reception status message in a terminal of a wireless communication network, the method comprising:
receiving a radio resource control message from a base station; determining whether the radio resource control message satisfies a predetermined condition; and if the radio resource control message satisfies the predetermined condition, transmitting the multimedia broadcast multicast service reception status message to the base station, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. 2. The method according to claim 1, wherein the predetermined condition comprises:
that the radio resource control message is received for a first time after the terminal is powered on or received from a new base station for a first time when the terminal is handed over to a new cell, and indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message. 3. The method according to claim 1, wherein the predetermined condition comprises:
that indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and indication information in a previously received radio resource control message indicates that the terminal is not required to transmit a multimedia broadcast multicast service reception status message. 4. The method according to claim 1, wherein the predetermined condition comprises:
that the radio resource control message comprises indication information, and the indication information indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and a previously received radio resource control message does not comprise indication information. 5. The method according to claim 2, wherein the radio resource control message is a multicast broadcast single frequency network area configuration message, and the receiving further comprises:
receiving the multicast broadcast single frequency network area configuration message from the base station over a multicast control channel. 6. The method according to claim 5, wherein:
the indication information in the multicast broadcast single frequency network area configuration message comprises a session identifier corresponding to at least one multimedia broadcast multicast service. 7. A method, in a base station of a wireless communication network, of requesting for a transmission of a multimedia broadcast multicast service reception status message, the method comprising:
transmitting a radio resource control message to a terminal, the radio resource control message comprising indication information for identifying at least one multimedia broadcast multicast service requiring the terminal to transmit a reception status. 8. The method according to claim 7, wherein after the transmitting, the method further comprises:
receiving a multimedia broadcast multicast service reception status message from the terminal, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. 9. The method according to claim 8, wherein the multimedia broadcast multicast service reception status message comprises a session identifier of the multimedia broadcast multicast service being received by the terminal, so as to identify the corresponding multimedia broadcast multicast service. 10. The method according to claim 8, wherein the radio resource control message is a multicast broadcast single frequency network area configuration message, and the transmitting further comprises:
transmitting the multicast broadcast single frequency network area configuration message to the terminal over a multicast control channel. 11. The method according to claim 10, wherein the indication information in the multicast broadcast single frequency network area configuration message comprises a session identifier corresponding to the at least one multimedia broadcast multicast service. 12. An apparatus for transmitting a multimedia broadcast multicast service reception status message in a terminal of a wireless communication network, comprising:
a radio resource control message receiver, configured to receive a radio resource control message from a base station; a predetermined condition determining module, configured to determine whether the radio resource control message satisfies a predetermined condition; and a multimedia broadcast multicast service reception status message transmitter, configured to transmit the multimedia broadcast multicast service reception status message to the base station when the radio resource control message satisfies the predetermined condition; wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. 13. The apparatus according to claim 12, wherein the predetermined condition comprises any one of:
that the radio resource control message is received for a first time after the terminal is powered on or received from a new base station for a first time when the terminal is handed over to a new cell, and indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message; that indication information in the radio resource control message indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and indication information in a previously received radio resource control message indicates that the terminal is not required to transmit a multimedia broadcast multicast service reception status message; that the radio resource control message comprises indication information, and the indication information indicates that the terminal is required to transmit the multimedia broadcast multicast service reception status message, and a previously received radio resource control message does not comprise indication information. 14. An apparatus, in a base station of a wireless communication network, for requesting for a transmission of a multimedia broadcast multicast service reception status message, comprising:
a radio resource control message transmitter, configured to transmit a radio resource control message to a terminal, the radio resource control message comprising indication information for identifying at least one multimedia broadcast multicast service requiring the terminal to transmit a reception status. 15. The apparatus according to claim 14, wherein further comprising:
a multimedia broadcast multicast service reception status message receiver, configured to receive the multimedia broadcast multicast service reception status message from the terminal, wherein the multimedia broadcast multicast service reception status message is used for identifying a multimedia broadcast multicast service being received by the terminal. | 2,400 |
8,238 | 8,238 | 15,008,818 | 2,443 | A method and system for providing a communication stream for associating messages are described. A communication stream receives various message types including messages, posts, events, tasks, and comments, and presents them to users. Private messages relating to one or more messages may be sent between and among one or more users. | 1. A computer-implemented method for providing a communication stream for messages, the method comprising:
receiving a request to create the communication stream, the request specifying users, including at least a first user; responsive to the request, creating the communication stream, the creating including assigning a stream identifier to the communication stream; receiving a request specifying a second user, and in response to the request, adding the second user to the communication stream; receiving a request specifying a third user, and in response to the request, adding the third user to the communication stream; receiving a non-private message from the first user, the non-private message referencing the stream identifier; associating the non-private message with the communication stream; providing a representation of the communication stream, including the non-private message, to the users; receiving a private message from the second user, the private message referencing the non-private message, referencing the stream identifier, and referencing a third user; associating the private message with the communication stream, and with the non-private message associated with the communication stream; providing a representation of the communication stream, including the non-private message and the private message, to the third user; and providing a representation of the communication stream, including the non-private message sans the private message, to the first user. 2. The computer-implemented method of claim 1, the method further comprising providing a representation of the communication stream, including the non-private message and the private message, to the second user. 3. The computer-implemented method of claim 1, the method further comprising an email application including the communication stream. 4. The computer-implemented method of claim 1, the method further comprising, responsive to a request to assign a topic identifier to a message, assigning the topic identifier to the message. 5. The computer-implemented method of claim 4, the method further comprising receiving a request to select one or more messages, and in response to the request to select the one or more messages, selecting the one or more messages. 6. The computer-implemented method of claim 5, wherein the selecting references the topic identifier. 7. The computer-implemented method of claim 1, the method further comprising, receiving a request to transmit a message to an email address, and in response, transmitting the message to the email address. 8-9. (canceled) 10. The computer-implemented method of claim 1, wherein the stream identifier includes an email address. 11. The computer-implemented method of claim 10, wherein the request to create the communication stream is included in an email message addressed to the stream identifier. 12. The computer-implemented method of claim 11, the method further comprising transforming the email message to a message. 13. The computer-implemented method of claim 11, wherein the email message includes commands for creating the communication stream. 14. The computer-implemented method of claim 13, wherein one or more of the commands for creating the communication stream are erroneous. 15. The computer-implemented method of claim 14, wherein the email message includes a return address corresponding to a sender, the method further comprising transmitting to the return address, a message identifying errors corresponding to the commands for creating the communication stream. 16. The computer-implemented method of claim 1, wherein a message includes a message type, the message type identifying at least one of a post, a task, an event, a document, a comment, and a message. 17. The computer-implemented method of claim 16, the method further comprising determining the message type automatically. 18-25. (canceled) 26. The computer-implemented method of claim 1, wherein the specifying the users further comprises instructions for limiting access of a user to the communication stream. 27-34. (canceled) 35. A computer-implemented method for providing a communication stream for messages, the method comprising:
providing a presentation of an email message to a user, the presentation including a link for initiating a communication stream, the email message identifying one or more users including a first user and a second user, and including a body; in response to activating the link:
creating the communication stream, the creating including assigning a stream identifier to the communication stream;
creating a post to the communication stream based on the body; and
notifying the users. 36. The computer-implemented method of claim 35, the method further comprising:
including in the notifying the users, an invitation to subscribe to the communication stream; receiving a request from the second user to subscribe to the communication stream; and responsive to the request, subscribing, and providing a presentation of the communication stream including the post to, the second user. 37. The computer-implemented method of claim 35, wherein the link is activated by the first user. 38. A computer-implemented system for providing a communication stream for messages, the computer-implemented system comprising:
a processor; storage; a memory for holding processor instructions, the processor instructions comprising:
a first service for providing a user interface for accessing the communication stream;
a second service for creating and managing the communication stream; and
a third service for identifying and managing a private message. 39. The computer-implemented system of claim 38, the computer-implemented system further comprising a fourth service for creating and assigning a tag to a message. 40. (canceled) 41. The computer-implemented system of claim 38, the computer-implemented system further comprising an email server. 42. The computer-implemented system of claim 38, wherein the first service further comprises providing a user interface for accessing an email server. 43-44. (canceled) | A method and system for providing a communication stream for associating messages are described. A communication stream receives various message types including messages, posts, events, tasks, and comments, and presents them to users. Private messages relating to one or more messages may be sent between and among one or more users.1. A computer-implemented method for providing a communication stream for messages, the method comprising:
receiving a request to create the communication stream, the request specifying users, including at least a first user; responsive to the request, creating the communication stream, the creating including assigning a stream identifier to the communication stream; receiving a request specifying a second user, and in response to the request, adding the second user to the communication stream; receiving a request specifying a third user, and in response to the request, adding the third user to the communication stream; receiving a non-private message from the first user, the non-private message referencing the stream identifier; associating the non-private message with the communication stream; providing a representation of the communication stream, including the non-private message, to the users; receiving a private message from the second user, the private message referencing the non-private message, referencing the stream identifier, and referencing a third user; associating the private message with the communication stream, and with the non-private message associated with the communication stream; providing a representation of the communication stream, including the non-private message and the private message, to the third user; and providing a representation of the communication stream, including the non-private message sans the private message, to the first user. 2. The computer-implemented method of claim 1, the method further comprising providing a representation of the communication stream, including the non-private message and the private message, to the second user. 3. The computer-implemented method of claim 1, the method further comprising an email application including the communication stream. 4. The computer-implemented method of claim 1, the method further comprising, responsive to a request to assign a topic identifier to a message, assigning the topic identifier to the message. 5. The computer-implemented method of claim 4, the method further comprising receiving a request to select one or more messages, and in response to the request to select the one or more messages, selecting the one or more messages. 6. The computer-implemented method of claim 5, wherein the selecting references the topic identifier. 7. The computer-implemented method of claim 1, the method further comprising, receiving a request to transmit a message to an email address, and in response, transmitting the message to the email address. 8-9. (canceled) 10. The computer-implemented method of claim 1, wherein the stream identifier includes an email address. 11. The computer-implemented method of claim 10, wherein the request to create the communication stream is included in an email message addressed to the stream identifier. 12. The computer-implemented method of claim 11, the method further comprising transforming the email message to a message. 13. The computer-implemented method of claim 11, wherein the email message includes commands for creating the communication stream. 14. The computer-implemented method of claim 13, wherein one or more of the commands for creating the communication stream are erroneous. 15. The computer-implemented method of claim 14, wherein the email message includes a return address corresponding to a sender, the method further comprising transmitting to the return address, a message identifying errors corresponding to the commands for creating the communication stream. 16. The computer-implemented method of claim 1, wherein a message includes a message type, the message type identifying at least one of a post, a task, an event, a document, a comment, and a message. 17. The computer-implemented method of claim 16, the method further comprising determining the message type automatically. 18-25. (canceled) 26. The computer-implemented method of claim 1, wherein the specifying the users further comprises instructions for limiting access of a user to the communication stream. 27-34. (canceled) 35. A computer-implemented method for providing a communication stream for messages, the method comprising:
providing a presentation of an email message to a user, the presentation including a link for initiating a communication stream, the email message identifying one or more users including a first user and a second user, and including a body; in response to activating the link:
creating the communication stream, the creating including assigning a stream identifier to the communication stream;
creating a post to the communication stream based on the body; and
notifying the users. 36. The computer-implemented method of claim 35, the method further comprising:
including in the notifying the users, an invitation to subscribe to the communication stream; receiving a request from the second user to subscribe to the communication stream; and responsive to the request, subscribing, and providing a presentation of the communication stream including the post to, the second user. 37. The computer-implemented method of claim 35, wherein the link is activated by the first user. 38. A computer-implemented system for providing a communication stream for messages, the computer-implemented system comprising:
a processor; storage; a memory for holding processor instructions, the processor instructions comprising:
a first service for providing a user interface for accessing the communication stream;
a second service for creating and managing the communication stream; and
a third service for identifying and managing a private message. 39. The computer-implemented system of claim 38, the computer-implemented system further comprising a fourth service for creating and assigning a tag to a message. 40. (canceled) 41. The computer-implemented system of claim 38, the computer-implemented system further comprising an email server. 42. The computer-implemented system of claim 38, wherein the first service further comprises providing a user interface for accessing an email server. 43-44. (canceled) | 2,400 |
8,239 | 8,239 | 15,696,442 | 2,425 | Disclosed herein is an information processing apparatus which cooperates with a terminal apparatus to configure a home network system, including: a frame visual attribute setting section configured to set a frame visual attribute to a window provided on a screen to display a reproduced piece of content; a publication section configured to publish a command adapted to request notification of the frame visual attribute set to the window from the terminal apparatus to the terminal apparatus; and a notification section configured to notify the terminal apparatus of the frame visual attribute of the window in response to calling of the command from the terminal apparatus. | 1. (canceled) 2. A reception apparatus, comprising:
circuitry configured to
process a plurality of content for concurrent display to a user on a first display;
extract signature data from one of the plurality of content in response to a request received from a terminal apparatus,
provide the signature data to an automatic content recognition (ACR) server,
receive a response from the ACR server, and
provide the response to the terminal apparatus, including a second display, via a home network, wherein
the first display is separate from the second display. 3. The reception apparatus according to claim 2, wherein the terminal apparatus is configured to acquire an application based on the response. 4. The reception apparatus according to claim 3, wherein the circuitry is configured to:
forward a plurality of different ACR responses that is associated with the application to the terminal apparatus. 5. The reception apparatus according to claim 2, wherein the circuitry is configured to provide the response to the terminal apparatus via fee home network when the response is received by the circuitry. 6. The reception apparatus according to claim 2, wherein the circuitry is configured to:
receive a request for a device description, the device description defining a URL used to invoke an action for a service; and provide the device description to the terminal apparatus in response to receiving the request. 7. The reception apparatus according to claim 2, wherein the response from the ACR server is associated with a segment of the at least one of the plurality of content from which the signature data is extracted. 8. The reception apparatus according to claim 2, wherein
the circuitry is configured to provide a plurality of responses from the ACR server to the terminal apparatus, and
each of the responses corresponds to a different one of the concurrently displayed plurality of content. 9. The reception apparatus according to claim 2, wherein fee response causes the terminal apparatus to execute an application that displays supplemental content on the second display in synchronization with the display of the one of fee plurality of content to the user on the first display. 10. A method for prowling information to a terminal apparatus, the method comprising:
processing, by circuitry of a reception apparatus, a plurality of content for concurrent display to a user on a first display; extracting, by the circuitry, signature data from one of the plurality of content in response to a request received from the terminal apparatus, providing fee signature data to an automatic content recognition (ACR) server, receiving, by the circuitry, a response from the ACR server, and providing, by the circuitry, the response to the terminal apparatus, including a second display, via a home network, wherein the second display is separate from the first display. 11. The method according to claim 10, wherein the terminal apparatus is configured to acquire an application based on the response. 12. The method according to chum 11, further comprising: forwarding a plurality of different ACR responses that is associated with the application to the terminal apparatus. 13. The method according to chum 10, wherein the step of providing the response comprises:
providing the response to the terminal apparatus via the home network when the response is received by the circuitry. 14. The method according to claim 10, further comprising;
receiving a request for a device description, the device description defining a URL used to invoke an action for a service; and providing the device description to the terminal apparatus in response to receiving the request. 15. The method according to claim 10, wherein the response from the ACR server is associated with a segment of the at least one of the plurality of content from which the signature data is extracted. 16. The method according to claim 10, further comprising:
providing a plurality of responses from the ACR server to the terminal apparatus, wherein each of the responses corresponds to a different one of the concurrently displayed plurality of content. 17. The method according to claim 10, wherein the response causes the terminal apparatus to execute an application that displays supplemental content on the second display in synchronization with the display of the one of the plurality of content to the user on the first display. 18. A non-transitory computer-readable medium storing a program which when executed by a computer causes the computer to perform a method for providing information to a terminal apparatus, the method comprising;
processing a plurality of content for concurrent display to a user on a first display; extracting signature data from one of the plurality of content in response to a request received from the terminal apparatus. providing the signature data to an automatic content recognition (ACR) server, receiving a response from the ACR server, and providing the response to the terminal apparatus, including a second display, via a home network, wherein the first display is separate from the second display. | Disclosed herein is an information processing apparatus which cooperates with a terminal apparatus to configure a home network system, including: a frame visual attribute setting section configured to set a frame visual attribute to a window provided on a screen to display a reproduced piece of content; a publication section configured to publish a command adapted to request notification of the frame visual attribute set to the window from the terminal apparatus to the terminal apparatus; and a notification section configured to notify the terminal apparatus of the frame visual attribute of the window in response to calling of the command from the terminal apparatus.1. (canceled) 2. A reception apparatus, comprising:
circuitry configured to
process a plurality of content for concurrent display to a user on a first display;
extract signature data from one of the plurality of content in response to a request received from a terminal apparatus,
provide the signature data to an automatic content recognition (ACR) server,
receive a response from the ACR server, and
provide the response to the terminal apparatus, including a second display, via a home network, wherein
the first display is separate from the second display. 3. The reception apparatus according to claim 2, wherein the terminal apparatus is configured to acquire an application based on the response. 4. The reception apparatus according to claim 3, wherein the circuitry is configured to:
forward a plurality of different ACR responses that is associated with the application to the terminal apparatus. 5. The reception apparatus according to claim 2, wherein the circuitry is configured to provide the response to the terminal apparatus via fee home network when the response is received by the circuitry. 6. The reception apparatus according to claim 2, wherein the circuitry is configured to:
receive a request for a device description, the device description defining a URL used to invoke an action for a service; and provide the device description to the terminal apparatus in response to receiving the request. 7. The reception apparatus according to claim 2, wherein the response from the ACR server is associated with a segment of the at least one of the plurality of content from which the signature data is extracted. 8. The reception apparatus according to claim 2, wherein
the circuitry is configured to provide a plurality of responses from the ACR server to the terminal apparatus, and
each of the responses corresponds to a different one of the concurrently displayed plurality of content. 9. The reception apparatus according to claim 2, wherein fee response causes the terminal apparatus to execute an application that displays supplemental content on the second display in synchronization with the display of the one of fee plurality of content to the user on the first display. 10. A method for prowling information to a terminal apparatus, the method comprising:
processing, by circuitry of a reception apparatus, a plurality of content for concurrent display to a user on a first display; extracting, by the circuitry, signature data from one of the plurality of content in response to a request received from the terminal apparatus, providing fee signature data to an automatic content recognition (ACR) server, receiving, by the circuitry, a response from the ACR server, and providing, by the circuitry, the response to the terminal apparatus, including a second display, via a home network, wherein the second display is separate from the first display. 11. The method according to claim 10, wherein the terminal apparatus is configured to acquire an application based on the response. 12. The method according to chum 11, further comprising: forwarding a plurality of different ACR responses that is associated with the application to the terminal apparatus. 13. The method according to chum 10, wherein the step of providing the response comprises:
providing the response to the terminal apparatus via the home network when the response is received by the circuitry. 14. The method according to claim 10, further comprising;
receiving a request for a device description, the device description defining a URL used to invoke an action for a service; and providing the device description to the terminal apparatus in response to receiving the request. 15. The method according to claim 10, wherein the response from the ACR server is associated with a segment of the at least one of the plurality of content from which the signature data is extracted. 16. The method according to claim 10, further comprising:
providing a plurality of responses from the ACR server to the terminal apparatus, wherein each of the responses corresponds to a different one of the concurrently displayed plurality of content. 17. The method according to claim 10, wherein the response causes the terminal apparatus to execute an application that displays supplemental content on the second display in synchronization with the display of the one of the plurality of content to the user on the first display. 18. A non-transitory computer-readable medium storing a program which when executed by a computer causes the computer to perform a method for providing information to a terminal apparatus, the method comprising;
processing a plurality of content for concurrent display to a user on a first display; extracting signature data from one of the plurality of content in response to a request received from the terminal apparatus. providing the signature data to an automatic content recognition (ACR) server, receiving a response from the ACR server, and providing the response to the terminal apparatus, including a second display, via a home network, wherein the first display is separate from the second display. | 2,400 |
8,240 | 8,240 | 14,038,069 | 2,463 | Apparatuses and methods for tapping serial communications and transforming the serial data into a format appropriate for routable networks are significant for purposes of security and troubleshooting, especially in critical infrastructure networks. Communication taps should be completely passive such that any failure would not interrupt the serial communications. Furthermore, automatic determination of unspecified serial protocol frames allow general implementation across various networks, or across devices within a single network, without the need to customize for each implementation. | 1. An apparatus to passively tap bi-directional serial communications having serial protocol frames that are unspecified to the apparatus, the apparatus characterized by:
Passive, serial-communications, interception circuitry comprising at least two serial communications pass-throughs and a processor, each serial communications pass-through connected to the processor and interfaced to a serial communication cable through which the bi-directional serial communications are transmitted between at least two devices; The processor executing programming to determine serial protocol frames according to characteristics of the serial communications, to wrap the serial protocol frames in a routable protocol, thereby forming a routable packet, and to transmit the routable packets to one or more routable addresses through an interface connecting the processor to a routable network. 2. The apparatus of claim 1, further comprising a pair of serial ports directly connected to the serial communication cable and wherein the passive, serial-communications, interception circuitry has an impedance greater than that of the serial communication cable. 3. The apparatus of claim 1, wherein each pass-through comprises an inductive coupling configured to induce a voltage in the interception circuitry in response to a current in the serial communication cable. 4. The apparatus of claim 1, wherein each pass-through comprises a capacitive coupling. 5. The apparatus of claim 1, wherein the characteristics of serial communications comprise timing-based signals, and the processing device executes further programming to associate timing gaps between the timing-based signals with frame edges that define the serial protocol frames. 6. The apparatus of claim 1, wherein the characteristics of serial communications comprise frame synchronization delimiters and length fields and the processing device executes further programming to define the beginning and the length of serial protocol frames according to the frame synchronization delimiters and length fields, respectively. 7. The apparatus of claim 1, wherein the characteristics of serial communications comprise frame synchronization delimiters and frame end delimiters and the processing device executes further programming to define the beginning and the end of serial protocol frames according to the frame synchronization delimiters and frame end delimiters, respectively. 8. The apparatus of claim 1, wherein the characteristics of serial communications comprise time variance between signals and the processing device executes further programming to identify a baseline time gap in the signals and to define statistically significant deviations from the baseline time gap as the beginnings and the ends of serial protocol frames. 9. The apparatus of claim 1, wherein the characteristics of serial communications comprise byte frequency and the processing device executes further programming to identify statistically significant occurrences of byte frequency patterns and to define the statistically significant occurrences with the beginnings and the ends of serial protocol frames. 10. The apparatus of claim 1, wherein the characteristics of serial communications comprise byte frequency as well as time variance between signals and the processing device executes further programming to identify statistically significant occurrences of byte frequency patterns, to identify a baseline time gap in the signals, and to define statistically significant deviations from the baseline time gap combined with statistically significant occurrences of byte patterns as the beginnings and the ends of the serial protocol frames. 11. The apparatus of claim 1, wherein the unspecified serial protocol frames are based on a process control serial protocol. 12. The apparatus of claim 1, further comprising storage circuitry storing the programming, wherein the pass-throughs, the processor, the storage circuitry, and the interface are assembled as an embedded system. 13. A method to passively tap bi-directional serial communications, which have serial protocol frames that are unspecified, transmitted through a serial communication cable between at least two devices, the method executed by a processor and characterized by the steps of:
Passively intercepting the serial communications through at least two serial communications pass-throughs connected to the processor and to the serial communication cable; Determining serial protocol frames according to characteristics of the serial communications; Forming routable packets by wrapping the serial protocol frames in a routable protocol; and Transmitting the routable packets to one or more routable addresses through an interface connecting the processor to a routable network. 14. The method of claim 13, wherein the characteristics of serial communications comprise timing-based signals, and said determining comprises associating timing gaps between the timing-based signals with frame edges that define the serial protocol frames. 15. The method of claim 13, wherein the characteristics of serial communications comprise frame synchronization delimiters and length fields and said determining comprises defining the beginning and the length of serial protocol frames according to the frame synchronization delimiters and length fields, respectively. 16. The method of claim 13, wherein the characteristics of serial communications comprise frame synchronization delimiters and frame end delimiters and said determining comprises defining the beginning and the end of serial protocol frames according to the frame synchronization delimiters and frame end delimiters, respectively. 17. The method of claim 13, wherein the characteristics of serial communications comprise time variance between signals and said determining comprises to identifying a baseline time gap in the signals and defining statistically significant deviations from the baseline time gap as the beginnings and the ends of serial protocol frames. 18. The method of claim 13, wherein the characteristics of serial communications comprise byte frequency and said determining comprises identifying statistically significant occurrences of byte frequency patterns and defining the occurrences of byte frequency patterns with the beginnings and the ends of serial protocol frames. 19. The method of claim 13, wherein the characteristics of serial communications comprise byte frequency as well as time variance between signals and said determining comprises identifying statistically significant occurrences of byte frequency patterns, identifying a baseline time gap in the signals, and defining statistically significant deviations from the baseline time gap combined with statistically significant occurrences of byte patterns as the beginnings and the ends of the serial protocol frames. 20. The method of claim 13, wherein the unspecified serial protocol frames are based on a process control serial protocol. | Apparatuses and methods for tapping serial communications and transforming the serial data into a format appropriate for routable networks are significant for purposes of security and troubleshooting, especially in critical infrastructure networks. Communication taps should be completely passive such that any failure would not interrupt the serial communications. Furthermore, automatic determination of unspecified serial protocol frames allow general implementation across various networks, or across devices within a single network, without the need to customize for each implementation.1. An apparatus to passively tap bi-directional serial communications having serial protocol frames that are unspecified to the apparatus, the apparatus characterized by:
Passive, serial-communications, interception circuitry comprising at least two serial communications pass-throughs and a processor, each serial communications pass-through connected to the processor and interfaced to a serial communication cable through which the bi-directional serial communications are transmitted between at least two devices; The processor executing programming to determine serial protocol frames according to characteristics of the serial communications, to wrap the serial protocol frames in a routable protocol, thereby forming a routable packet, and to transmit the routable packets to one or more routable addresses through an interface connecting the processor to a routable network. 2. The apparatus of claim 1, further comprising a pair of serial ports directly connected to the serial communication cable and wherein the passive, serial-communications, interception circuitry has an impedance greater than that of the serial communication cable. 3. The apparatus of claim 1, wherein each pass-through comprises an inductive coupling configured to induce a voltage in the interception circuitry in response to a current in the serial communication cable. 4. The apparatus of claim 1, wherein each pass-through comprises a capacitive coupling. 5. The apparatus of claim 1, wherein the characteristics of serial communications comprise timing-based signals, and the processing device executes further programming to associate timing gaps between the timing-based signals with frame edges that define the serial protocol frames. 6. The apparatus of claim 1, wherein the characteristics of serial communications comprise frame synchronization delimiters and length fields and the processing device executes further programming to define the beginning and the length of serial protocol frames according to the frame synchronization delimiters and length fields, respectively. 7. The apparatus of claim 1, wherein the characteristics of serial communications comprise frame synchronization delimiters and frame end delimiters and the processing device executes further programming to define the beginning and the end of serial protocol frames according to the frame synchronization delimiters and frame end delimiters, respectively. 8. The apparatus of claim 1, wherein the characteristics of serial communications comprise time variance between signals and the processing device executes further programming to identify a baseline time gap in the signals and to define statistically significant deviations from the baseline time gap as the beginnings and the ends of serial protocol frames. 9. The apparatus of claim 1, wherein the characteristics of serial communications comprise byte frequency and the processing device executes further programming to identify statistically significant occurrences of byte frequency patterns and to define the statistically significant occurrences with the beginnings and the ends of serial protocol frames. 10. The apparatus of claim 1, wherein the characteristics of serial communications comprise byte frequency as well as time variance between signals and the processing device executes further programming to identify statistically significant occurrences of byte frequency patterns, to identify a baseline time gap in the signals, and to define statistically significant deviations from the baseline time gap combined with statistically significant occurrences of byte patterns as the beginnings and the ends of the serial protocol frames. 11. The apparatus of claim 1, wherein the unspecified serial protocol frames are based on a process control serial protocol. 12. The apparatus of claim 1, further comprising storage circuitry storing the programming, wherein the pass-throughs, the processor, the storage circuitry, and the interface are assembled as an embedded system. 13. A method to passively tap bi-directional serial communications, which have serial protocol frames that are unspecified, transmitted through a serial communication cable between at least two devices, the method executed by a processor and characterized by the steps of:
Passively intercepting the serial communications through at least two serial communications pass-throughs connected to the processor and to the serial communication cable; Determining serial protocol frames according to characteristics of the serial communications; Forming routable packets by wrapping the serial protocol frames in a routable protocol; and Transmitting the routable packets to one or more routable addresses through an interface connecting the processor to a routable network. 14. The method of claim 13, wherein the characteristics of serial communications comprise timing-based signals, and said determining comprises associating timing gaps between the timing-based signals with frame edges that define the serial protocol frames. 15. The method of claim 13, wherein the characteristics of serial communications comprise frame synchronization delimiters and length fields and said determining comprises defining the beginning and the length of serial protocol frames according to the frame synchronization delimiters and length fields, respectively. 16. The method of claim 13, wherein the characteristics of serial communications comprise frame synchronization delimiters and frame end delimiters and said determining comprises defining the beginning and the end of serial protocol frames according to the frame synchronization delimiters and frame end delimiters, respectively. 17. The method of claim 13, wherein the characteristics of serial communications comprise time variance between signals and said determining comprises to identifying a baseline time gap in the signals and defining statistically significant deviations from the baseline time gap as the beginnings and the ends of serial protocol frames. 18. The method of claim 13, wherein the characteristics of serial communications comprise byte frequency and said determining comprises identifying statistically significant occurrences of byte frequency patterns and defining the occurrences of byte frequency patterns with the beginnings and the ends of serial protocol frames. 19. The method of claim 13, wherein the characteristics of serial communications comprise byte frequency as well as time variance between signals and said determining comprises identifying statistically significant occurrences of byte frequency patterns, identifying a baseline time gap in the signals, and defining statistically significant deviations from the baseline time gap combined with statistically significant occurrences of byte patterns as the beginnings and the ends of the serial protocol frames. 20. The method of claim 13, wherein the unspecified serial protocol frames are based on a process control serial protocol. | 2,400 |
8,241 | 8,241 | 15,438,958 | 2,473 | A switch receiving Ethernet packets is disclosed, including TCP packets and/or non-TCP packets. The Ethernet packets are forwarded to at least two ports by forwarding each TCP Present application relates to a switch receiving Ethernet packets, including TCP packets and/or non-TCP packets, and forwarding the Ethernet packets to at least two ports by forwarding each of the TCP packets to any one of the at least two ports and forwarding each stream of non-TCP packets to one corresponding port of the at least two ports. | 1. A switch arranged to receive Ethernet packets, wherein the Ethernet packets comprise transmission control protocol, TCP, packets and/or non-TCP packets, and to forward the Ethernet packets to at least two ports, wherein the switch is configured to:
forward each of the TCP packets to any one of the at least two ports; and forward each stream of non-TCP packets to one corresponding port of the at least two ports. 2. The switch according to claim 1, wherein the switch is configured to:
forward two TCP packets of the same stream of TCP packets to two different ports of the at least two ports; and/or forward non-TCP packets of the same stream of non-TCP packets to the same port of the at least two ports. 3. The switch according to claim 1, wherein the switch is configured to:
forward TCP packets by alternately distributing the TCP packets among the at least two ports; and/or forward streams of non-TCP packets by alternately distributing the streams of non-TCP packets among the at least two ports. 4. The switch according to claim 1, wherein the switch is configured to receive the Ethernet packets with a first data rate and to forward the Ethernet packets with a second data rate, wherein the first data rate is higher than the second data rate. 5. The switch according to claim 1, wherein each of the Ethernet packets comprises a corresponding mark, wherein the mark of each Ethernet packet:
allows determining a port of the at least two ports, to which the corresponding Ethernet packet will be forwarded; marks one port of the at least two ports, to which the corresponding Ethernet packet will be forwarded; and/or identifies VLAN of the corresponding Ethernet packet. 6. The switch according to claim 5, wherein the switch is configured to decide, for each Ethernet packet, on a port of the at least two ports, to which the corresponding Ethernet packet will be forwarded, based on the mark of the corresponding Ethernet packet. 7. The switch according to claim 5, wherein the switch is configured to:
extract a corresponding mark from each of the TCP packets and forward each of the TCP packets to one of the at least two ports according to the corresponding mark; and/or extract corresponding marks from each non-TCP packet of a corresponding stream of the non-TCP packets and forward each non-TCP packet of the corresponding stream of the non-TCP packets to one of the at least two ports according to the corresponding marks. 8. The switch according to claim 5, wherein the switch is configured to remove the mark of each Ethernet packet before the forwarding of the corresponding Ethernet packet. 9. A method for receiving Ethernet packets, wherein the Ethernet packets comprise transmission control protocol, TCP, packets and/or non-TCP packets, and to forward the Ethernet packets to at least two ports, wherein the method comprises:
forwarding each TCP packets to any one of the at least two ports; and forwarding each stream of non-TCP packets to one corresponding port of the at least two ports. 10. A device arranged to receive Ethernet packets, wherein the Ethernet packets comprise transmission control protocol, TCP, packets and/or non-TCP packets, and to provide the Ethernet packets to a switch for forwarding the Ethernet packets to at least two ports, wherein the device is configured to:
generate a corresponding mark for each TCP packet such that the corresponding mark allows determining one of the at least two ports, to which the TCP packet will be forwarded; and generate a corresponding mark for each non-TCP packet of each corresponding stream of non-TCP packets such that the corresponding mark of each non-TCP packet of the corresponding stream allows determining one of the at least two ports, to which the corresponding stream of non-TCP packets will be forwarded. 11. The device according to claim 10, wherein the device is configured to:
generate a corresponding mark for each TCP packet such that two TCP packets of the same stream of TCP packets will be forwarded to two different ports of the at least two ports; and generate a corresponding mark for each non-TCP packet of the same stream of non-TCP packets such that the non-TCP packets of the same stream of non-TCP packets will be distributed to the same port of the at least two ports. 12. The device according to claim 10, wherein the device is configured to generate the mark of each Ethernet packet as a least significant bit of a XOR-sum of at least two of the following:
a source address of a network layer of the Ethernet; a destination address of the network layer of the Ethernet; a source address of a transport layer of the Ethernet; a destination address of the transport layer of the Ethernet. 13. The device according to claim 10, wherein the device is configured to add the corresponding mark to each Ethernet packet. | A switch receiving Ethernet packets is disclosed, including TCP packets and/or non-TCP packets. The Ethernet packets are forwarded to at least two ports by forwarding each TCP Present application relates to a switch receiving Ethernet packets, including TCP packets and/or non-TCP packets, and forwarding the Ethernet packets to at least two ports by forwarding each of the TCP packets to any one of the at least two ports and forwarding each stream of non-TCP packets to one corresponding port of the at least two ports.1. A switch arranged to receive Ethernet packets, wherein the Ethernet packets comprise transmission control protocol, TCP, packets and/or non-TCP packets, and to forward the Ethernet packets to at least two ports, wherein the switch is configured to:
forward each of the TCP packets to any one of the at least two ports; and forward each stream of non-TCP packets to one corresponding port of the at least two ports. 2. The switch according to claim 1, wherein the switch is configured to:
forward two TCP packets of the same stream of TCP packets to two different ports of the at least two ports; and/or forward non-TCP packets of the same stream of non-TCP packets to the same port of the at least two ports. 3. The switch according to claim 1, wherein the switch is configured to:
forward TCP packets by alternately distributing the TCP packets among the at least two ports; and/or forward streams of non-TCP packets by alternately distributing the streams of non-TCP packets among the at least two ports. 4. The switch according to claim 1, wherein the switch is configured to receive the Ethernet packets with a first data rate and to forward the Ethernet packets with a second data rate, wherein the first data rate is higher than the second data rate. 5. The switch according to claim 1, wherein each of the Ethernet packets comprises a corresponding mark, wherein the mark of each Ethernet packet:
allows determining a port of the at least two ports, to which the corresponding Ethernet packet will be forwarded; marks one port of the at least two ports, to which the corresponding Ethernet packet will be forwarded; and/or identifies VLAN of the corresponding Ethernet packet. 6. The switch according to claim 5, wherein the switch is configured to decide, for each Ethernet packet, on a port of the at least two ports, to which the corresponding Ethernet packet will be forwarded, based on the mark of the corresponding Ethernet packet. 7. The switch according to claim 5, wherein the switch is configured to:
extract a corresponding mark from each of the TCP packets and forward each of the TCP packets to one of the at least two ports according to the corresponding mark; and/or extract corresponding marks from each non-TCP packet of a corresponding stream of the non-TCP packets and forward each non-TCP packet of the corresponding stream of the non-TCP packets to one of the at least two ports according to the corresponding marks. 8. The switch according to claim 5, wherein the switch is configured to remove the mark of each Ethernet packet before the forwarding of the corresponding Ethernet packet. 9. A method for receiving Ethernet packets, wherein the Ethernet packets comprise transmission control protocol, TCP, packets and/or non-TCP packets, and to forward the Ethernet packets to at least two ports, wherein the method comprises:
forwarding each TCP packets to any one of the at least two ports; and forwarding each stream of non-TCP packets to one corresponding port of the at least two ports. 10. A device arranged to receive Ethernet packets, wherein the Ethernet packets comprise transmission control protocol, TCP, packets and/or non-TCP packets, and to provide the Ethernet packets to a switch for forwarding the Ethernet packets to at least two ports, wherein the device is configured to:
generate a corresponding mark for each TCP packet such that the corresponding mark allows determining one of the at least two ports, to which the TCP packet will be forwarded; and generate a corresponding mark for each non-TCP packet of each corresponding stream of non-TCP packets such that the corresponding mark of each non-TCP packet of the corresponding stream allows determining one of the at least two ports, to which the corresponding stream of non-TCP packets will be forwarded. 11. The device according to claim 10, wherein the device is configured to:
generate a corresponding mark for each TCP packet such that two TCP packets of the same stream of TCP packets will be forwarded to two different ports of the at least two ports; and generate a corresponding mark for each non-TCP packet of the same stream of non-TCP packets such that the non-TCP packets of the same stream of non-TCP packets will be distributed to the same port of the at least two ports. 12. The device according to claim 10, wherein the device is configured to generate the mark of each Ethernet packet as a least significant bit of a XOR-sum of at least two of the following:
a source address of a network layer of the Ethernet; a destination address of the network layer of the Ethernet; a source address of a transport layer of the Ethernet; a destination address of the transport layer of the Ethernet. 13. The device according to claim 10, wherein the device is configured to add the corresponding mark to each Ethernet packet. | 2,400 |
8,242 | 8,242 | 14,645,759 | 2,454 | Systems and methods for intelligent workload routing are disclosed. According to one embodiment, a system for intelligent workload routing may include a first processing platform having a first characteristic; a second processing platform having a second characteristic; and a workload router in communication with the first processing platform and the second processing platform the workload router receiving a message comprising a workload request and routing the workload request to one of the first processing platform and the second processing platform based on at least one of a workload request characteristic, the first characteristic and the second characteristic. | 1. A system for intelligent workload routing, comprising:
a first processing platform having a first characteristic; a second processing platform having a second characteristic; and a workload router in communication with the first processing platform and the second processing platform the workload router receiving a message comprising a workload request and routing the workload request to one of the first processing platform and the second processing platform based on at least one of a workload request characteristic, the first characteristic and the second characteristic. 2. The system of claim 1, wherein the first processing platform comprises a mainframe computer. 3. The system of claim 1, wherein the second processing platform comprises at least one clustered server. 4. The system of claim 1, further comprising at least one client device that sends the message to the workload router. 5. The system of claim 4, wherein the at least one client device comprises an automated teller machine. 6. The system of claim 1, wherein the workload router further routes the workload request based on at least one routing rule. 7. The system of claim 6, wherein routing rule comprises at least of a platform override rule, a message-type filter rule, a load balance rule, a default destination rule, a queue-depth load balance rule, a compute-cost cap rule, a latency minimization rule, a processing platform unavailability rule, a health metric rule, a prioritization rule, and a predictive rule. 8. The system of claim 1, wherein the workload router routes the workload to a data center comprising one of the first processing platform and the second processing platform. 9. A method for intelligent workload routing, comprising:
a workload router comprising at least one computer processor receiving a message comprising a workload request; the workload router identifying one of a plurality of processing platforms to route the workload request; and the workload router routing the message to the identified processing platform. 10. The method of claim 1, wherein the plurality of processing platforms comprises a mainframe computer and a clustered server. 11. The method of claim 9, wherein the message is received from a client device. 12. The method of claim 11, wherein the client device comprises an automated teller machine. 13. The method of claim 9, wherein the step of the workload router identifying one of a plurality of processing platforms to route the workload request comprises:
the workload router determining a message type of the workload request. 14. The method of claim 13, wherein the message type of the workload request is determined from an identifier in the message. 15. The method of claim 14, wherein the identifier identifies a priority of the workload request. 16. The method of claim 9, wherein the step of the workload router identifying one of a plurality of processing platforms to route the workload request comprises:
the workload router applying at least one routing rule to identify the processing platform. 17. The method of claim 16 wherein the routing rule is based on a status of at least one of the processing platforms. 18. The method of claim 16, wherein the routing rule is based on a utilization rate of at least one of the processing platforms. 19. The method of claim 16, wherein the routing rule routes the workload request to the processing platform identified in the message. 20. The method of claim 16, wherein the routing rule routes the workload request to a processing platform to balance a load among a plurality of the processing platforms. 21. The method of claim 16, wherein the routing rule routes the workload request to the processing platform with the lowest latency. 22. The method of claim 16, wherein the routing rule routes the workload request to the processing platform that will complete it first. 23. The method of claim 16, wherein the routing rule routes the workload request to the processing platform that similar message requests have been routed. 24. The method of claim 16, wherein the routing rule routes the workload request to a processing platform based on an anticipated workload. 25. The method of claim 9, wherein the workload router routes the workload to a data center comprising the identified processing platform. | Systems and methods for intelligent workload routing are disclosed. According to one embodiment, a system for intelligent workload routing may include a first processing platform having a first characteristic; a second processing platform having a second characteristic; and a workload router in communication with the first processing platform and the second processing platform the workload router receiving a message comprising a workload request and routing the workload request to one of the first processing platform and the second processing platform based on at least one of a workload request characteristic, the first characteristic and the second characteristic.1. A system for intelligent workload routing, comprising:
a first processing platform having a first characteristic; a second processing platform having a second characteristic; and a workload router in communication with the first processing platform and the second processing platform the workload router receiving a message comprising a workload request and routing the workload request to one of the first processing platform and the second processing platform based on at least one of a workload request characteristic, the first characteristic and the second characteristic. 2. The system of claim 1, wherein the first processing platform comprises a mainframe computer. 3. The system of claim 1, wherein the second processing platform comprises at least one clustered server. 4. The system of claim 1, further comprising at least one client device that sends the message to the workload router. 5. The system of claim 4, wherein the at least one client device comprises an automated teller machine. 6. The system of claim 1, wherein the workload router further routes the workload request based on at least one routing rule. 7. The system of claim 6, wherein routing rule comprises at least of a platform override rule, a message-type filter rule, a load balance rule, a default destination rule, a queue-depth load balance rule, a compute-cost cap rule, a latency minimization rule, a processing platform unavailability rule, a health metric rule, a prioritization rule, and a predictive rule. 8. The system of claim 1, wherein the workload router routes the workload to a data center comprising one of the first processing platform and the second processing platform. 9. A method for intelligent workload routing, comprising:
a workload router comprising at least one computer processor receiving a message comprising a workload request; the workload router identifying one of a plurality of processing platforms to route the workload request; and the workload router routing the message to the identified processing platform. 10. The method of claim 1, wherein the plurality of processing platforms comprises a mainframe computer and a clustered server. 11. The method of claim 9, wherein the message is received from a client device. 12. The method of claim 11, wherein the client device comprises an automated teller machine. 13. The method of claim 9, wherein the step of the workload router identifying one of a plurality of processing platforms to route the workload request comprises:
the workload router determining a message type of the workload request. 14. The method of claim 13, wherein the message type of the workload request is determined from an identifier in the message. 15. The method of claim 14, wherein the identifier identifies a priority of the workload request. 16. The method of claim 9, wherein the step of the workload router identifying one of a plurality of processing platforms to route the workload request comprises:
the workload router applying at least one routing rule to identify the processing platform. 17. The method of claim 16 wherein the routing rule is based on a status of at least one of the processing platforms. 18. The method of claim 16, wherein the routing rule is based on a utilization rate of at least one of the processing platforms. 19. The method of claim 16, wherein the routing rule routes the workload request to the processing platform identified in the message. 20. The method of claim 16, wherein the routing rule routes the workload request to a processing platform to balance a load among a plurality of the processing platforms. 21. The method of claim 16, wherein the routing rule routes the workload request to the processing platform with the lowest latency. 22. The method of claim 16, wherein the routing rule routes the workload request to the processing platform that will complete it first. 23. The method of claim 16, wherein the routing rule routes the workload request to the processing platform that similar message requests have been routed. 24. The method of claim 16, wherein the routing rule routes the workload request to a processing platform based on an anticipated workload. 25. The method of claim 9, wherein the workload router routes the workload to a data center comprising the identified processing platform. | 2,400 |
8,243 | 8,243 | 14,901,054 | 2,447 | The invention concerns a method for adapting the behavior of a cache located along the transmission path between a client terminal and a server, such a client terminal being able to receive from the server content parts of a multimedia content,
comprising:
upon request, by a first client terminal, for a content part not stored in the cache, storing said content part in said cache and recording at least one characteristic of the reception of said content part by the cache, upon transmission to the first client terminal; upon subsequent request, by a second client terminal, for the same content part as the one stored in said cache, controlling the data sending rate, based on the recorded characteristic, while delivering the stored content part from said cache to the second client terminal. | 1. Method for adapting the behavior of a cache located along the transmission path between a client terminal and a server, such a client terminal being able to receive from the server content parts of a multimedia content, comprising:
upon request, by a first client terminal, for a content part not stored in the cache, storing said content part in said cache and recording at least one characteristic of the reception of said content part by the cache, upon transmission to the first client terminal; upon subsequent request, by a second client terminal, for the same content part as the one stored in said cache, controlling the data sending rate, based on the recorded characteristic, while delivering the stored content part from said cache to said second client terminal. 2. Method according to claim 1, wherein, while delivering said content part stored in the cache to the second client terminal, the data sending rate of said content part is adapted such that the considered characteristic measured on the data flow sent by the cache equals the recorded characteristic. 3. Method according to claim 1, wherein the data sending rate of said content part is scaling up or scaling down based on at least one performance criterion. 4. Method according to claim 1, wherein said recorded characteristic corresponds to the number of bytes received per time interval by the cache. 5. Method according to claim 1, wherein said characteristic is derived from the arrival time of data packets forming said content part. 6. Method according to claim 1, wherein said characteristic is recorded as observed by the cache. 7. Method according to claim 1, comprising the further step of detecting whether the content part is sensitive to transmission conditions along the transmission path or not. 8. Method according to claim 7, wherein the step of detecting relies on an inspection of the request sent by said first client terminal. 9. Method according to claim 7, wherein the recording of the characteristic is triggered when the content part is sensitive to transmission conditions. 10. Cache located along the transmission path between a client terminal and a server, such a client terminal being able to receive from the server content parts of a multimedia content,
wherein it comprises:
storage module for storing—upon request, by a first client terminal, for a content part not stored in the cache—said content part;
a recording module for recording—upon said request—at least one characteristic of reception of said content part upon transmission to the first client terminal;
a controlling module for controlling—upon subsequent request, by a second client terminal, for the same content part as the one stored in said cache—the data sending rate based on the recorded characteristic, while delivering the stored content part from said cache to said second client terminal. 11. Cache according to claim 10, wherein said controlling module is configured to adapt the data sending rate of said content part such that the considered characteristic measured on the data sending rate equals the recorded characteristic, while delivering said content part stored in the cache to the second client terminal. 12. Cache according to claim 10, wherein said controlling module is configured to scale up or to scale down the data sending rate based on at least one performance criterion. | The invention concerns a method for adapting the behavior of a cache located along the transmission path between a client terminal and a server, such a client terminal being able to receive from the server content parts of a multimedia content,
comprising:
upon request, by a first client terminal, for a content part not stored in the cache, storing said content part in said cache and recording at least one characteristic of the reception of said content part by the cache, upon transmission to the first client terminal; upon subsequent request, by a second client terminal, for the same content part as the one stored in said cache, controlling the data sending rate, based on the recorded characteristic, while delivering the stored content part from said cache to the second client terminal.1. Method for adapting the behavior of a cache located along the transmission path between a client terminal and a server, such a client terminal being able to receive from the server content parts of a multimedia content, comprising:
upon request, by a first client terminal, for a content part not stored in the cache, storing said content part in said cache and recording at least one characteristic of the reception of said content part by the cache, upon transmission to the first client terminal; upon subsequent request, by a second client terminal, for the same content part as the one stored in said cache, controlling the data sending rate, based on the recorded characteristic, while delivering the stored content part from said cache to said second client terminal. 2. Method according to claim 1, wherein, while delivering said content part stored in the cache to the second client terminal, the data sending rate of said content part is adapted such that the considered characteristic measured on the data flow sent by the cache equals the recorded characteristic. 3. Method according to claim 1, wherein the data sending rate of said content part is scaling up or scaling down based on at least one performance criterion. 4. Method according to claim 1, wherein said recorded characteristic corresponds to the number of bytes received per time interval by the cache. 5. Method according to claim 1, wherein said characteristic is derived from the arrival time of data packets forming said content part. 6. Method according to claim 1, wherein said characteristic is recorded as observed by the cache. 7. Method according to claim 1, comprising the further step of detecting whether the content part is sensitive to transmission conditions along the transmission path or not. 8. Method according to claim 7, wherein the step of detecting relies on an inspection of the request sent by said first client terminal. 9. Method according to claim 7, wherein the recording of the characteristic is triggered when the content part is sensitive to transmission conditions. 10. Cache located along the transmission path between a client terminal and a server, such a client terminal being able to receive from the server content parts of a multimedia content,
wherein it comprises:
storage module for storing—upon request, by a first client terminal, for a content part not stored in the cache—said content part;
a recording module for recording—upon said request—at least one characteristic of reception of said content part upon transmission to the first client terminal;
a controlling module for controlling—upon subsequent request, by a second client terminal, for the same content part as the one stored in said cache—the data sending rate based on the recorded characteristic, while delivering the stored content part from said cache to said second client terminal. 11. Cache according to claim 10, wherein said controlling module is configured to adapt the data sending rate of said content part such that the considered characteristic measured on the data sending rate equals the recorded characteristic, while delivering said content part stored in the cache to the second client terminal. 12. Cache according to claim 10, wherein said controlling module is configured to scale up or to scale down the data sending rate based on at least one performance criterion. | 2,400 |
8,244 | 8,244 | 15,000,660 | 2,485 | A device and method of transmitting full-frame images and sub-sampled images over a communication interface are provided. The device comprises: a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor configured to: receive full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces; synchronize the full-frame images in pairs; scale a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and, transmit the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled. | 1. A device comprising:
a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor configured to:
receive full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces;
synchronize the full-frame images in pairs;
scale a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and,
transmit the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled. 2. The device of claim 1, further comprising a memory and the image streaming processor is further configured to store at least the second subset of the pairs of the full-frame images in the memory prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 3. The device of claim 1, further comprising an image converter configured to convert the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images to an output data format prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 4. The device of claim 1, wherein a bandwidth of the output communication interface is less than a bandwidth supporting a frame rate corresponding to a live preview of the full-frame images from each of the first camera device and the second camera device. 5. The device of claim 4, wherein the output communication interface comprises a Universal Serial Bus interface. 6. The device of claim 1, wherein the image streaming processor is further configured to scale the first subset of the pairs of the full-frame images to produce the set of pairs of sub-scaled images by one or more of reducing a size and reducing a resolution of the first subset of the pairs of the full-frame images. 7. The device of claim 1, wherein the image streaming processor is further configured to transmit the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by interleaving the pairs of sub-scaled images and the second subset of the pairs of the full-frame images. 8. The device of claim 1, wherein the image streaming processor is further configured to transmit the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by:
separating each full-frame image in the second subset of the pairs of the full-frame images into sub-portions of a size compatible with a protocol of the output communication interface; and, interleaving the pairs of sub-scaled images with the sub-portions of the second subset of the pairs of the full-frame images in a serial data stream. 9. The device of claim 1, wherein paired full-frame images from each of the first camera device and the second camera device comprise stereo images. 10. The device of claim 1, further comprising a host device comprising: a respective communication interface, physically and communicatively mated with the output communication interface; a display device; and an image processor configured to:
receive the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the respective communication interface, from the output communication interface; render at least a subset of the set of pairs of sub-scaled images at the display device; and, process the second subset of the pairs of the full-frame images to determine dimensions of items represented in the second subset of the pairs of the full-frame images. 11. A method comprising:
at a device comprising: a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor, receiving, at the image streaming processor, full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces; synchronizing, at the image streaming processor, the full-frame images in pairs; scaling, at the image streaming processor, a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and, transmitting, using the image streaming processor, the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled. 12. The method of claim 11, wherein the device further comprises a memory, and method further comprises storing, using image streaming processor, at least the second subset of the pairs of the full-frame images in the memory prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 13. The method of claim 11, wherein the device further comprises an image converter, and the method further comprises converting, using the image converter, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images to an output data format prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 14. The method of claim 11, wherein a bandwidth of the output communication interface is less than a bandwidth supporting a frame rate corresponding to a live preview of the full-frame images from each of the first camera device and the second camera device. 15. The method of claim 11, further comprising scaling, using the image streaming processor, the first subset of the pairs of the full-frame images to produce the set of pairs of sub-scaled images by one or more of reducing a size and reducing a resolution of the first subset of the pairs of the full-frame images. 16. The method of claim 11, further comprising transmitting, using the image streaming processor, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by interleaving the pairs of sub-scaled images and the second subset of the pairs of the full-frame images. 17. The method of claim 11, further comprising transmitting, using the image streaming processor, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by:
separating each full-frame image in the second subset of the pairs of the full-frame images into sub-portions of a size compatible with a protocol of the output communication interface; and, interleaving the pairs of sub-scaled images with the sub-portions of the second subset of the pairs of the full-frame images in a serial data stream. 18. The method of claim 11, wherein paired full-frame images from each of the first camera device and the second camera device comprise stereo images. 19. The method of claim 11, wherein the device further comprises a host device comprising: a respective communication interface, physically and communicatively mated with the output communication interface; a display device; and an image processor, and the method further comprises:
receiving, at the image processor, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the respective communication interface, from the output communication interface; rendering, at the image processor, at least a subset of the set of pairs of sub-scaled images at the display device; and, processing, at the image processor, the second subset of the pairs of the full-frame images to determine dimensions of items represented in the second subset of the pairs of the full-frame images. 20. A non-transitory computer-readable medium storing a computer program, wherein execution of the computer program is for:
at a device comprising: a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor, receiving, at the image streaming processor, full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces; synchronizing, at the image streaming processor, the full-frame images in pairs; scaling, at the image streaming processor, a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and, transmitting, using the image streaming processor, the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled. | A device and method of transmitting full-frame images and sub-sampled images over a communication interface are provided. The device comprises: a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor configured to: receive full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces; synchronize the full-frame images in pairs; scale a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and, transmit the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled.1. A device comprising:
a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor configured to:
receive full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces;
synchronize the full-frame images in pairs;
scale a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and,
transmit the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled. 2. The device of claim 1, further comprising a memory and the image streaming processor is further configured to store at least the second subset of the pairs of the full-frame images in the memory prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 3. The device of claim 1, further comprising an image converter configured to convert the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images to an output data format prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 4. The device of claim 1, wherein a bandwidth of the output communication interface is less than a bandwidth supporting a frame rate corresponding to a live preview of the full-frame images from each of the first camera device and the second camera device. 5. The device of claim 4, wherein the output communication interface comprises a Universal Serial Bus interface. 6. The device of claim 1, wherein the image streaming processor is further configured to scale the first subset of the pairs of the full-frame images to produce the set of pairs of sub-scaled images by one or more of reducing a size and reducing a resolution of the first subset of the pairs of the full-frame images. 7. The device of claim 1, wherein the image streaming processor is further configured to transmit the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by interleaving the pairs of sub-scaled images and the second subset of the pairs of the full-frame images. 8. The device of claim 1, wherein the image streaming processor is further configured to transmit the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by:
separating each full-frame image in the second subset of the pairs of the full-frame images into sub-portions of a size compatible with a protocol of the output communication interface; and, interleaving the pairs of sub-scaled images with the sub-portions of the second subset of the pairs of the full-frame images in a serial data stream. 9. The device of claim 1, wherein paired full-frame images from each of the first camera device and the second camera device comprise stereo images. 10. The device of claim 1, further comprising a host device comprising: a respective communication interface, physically and communicatively mated with the output communication interface; a display device; and an image processor configured to:
receive the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the respective communication interface, from the output communication interface; render at least a subset of the set of pairs of sub-scaled images at the display device; and, process the second subset of the pairs of the full-frame images to determine dimensions of items represented in the second subset of the pairs of the full-frame images. 11. A method comprising:
at a device comprising: a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor, receiving, at the image streaming processor, full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces; synchronizing, at the image streaming processor, the full-frame images in pairs; scaling, at the image streaming processor, a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and, transmitting, using the image streaming processor, the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled. 12. The method of claim 11, wherein the device further comprises a memory, and method further comprises storing, using image streaming processor, at least the second subset of the pairs of the full-frame images in the memory prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 13. The method of claim 11, wherein the device further comprises an image converter, and the method further comprises converting, using the image converter, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images to an output data format prior to transmitting the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface. 14. The method of claim 11, wherein a bandwidth of the output communication interface is less than a bandwidth supporting a frame rate corresponding to a live preview of the full-frame images from each of the first camera device and the second camera device. 15. The method of claim 11, further comprising scaling, using the image streaming processor, the first subset of the pairs of the full-frame images to produce the set of pairs of sub-scaled images by one or more of reducing a size and reducing a resolution of the first subset of the pairs of the full-frame images. 16. The method of claim 11, further comprising transmitting, using the image streaming processor, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by interleaving the pairs of sub-scaled images and the second subset of the pairs of the full-frame images. 17. The method of claim 11, further comprising transmitting, using the image streaming processor, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the output communication interface by:
separating each full-frame image in the second subset of the pairs of the full-frame images into sub-portions of a size compatible with a protocol of the output communication interface; and, interleaving the pairs of sub-scaled images with the sub-portions of the second subset of the pairs of the full-frame images in a serial data stream. 18. The method of claim 11, wherein paired full-frame images from each of the first camera device and the second camera device comprise stereo images. 19. The method of claim 11, wherein the device further comprises a host device comprising: a respective communication interface, physically and communicatively mated with the output communication interface; a display device; and an image processor, and the method further comprises:
receiving, at the image processor, the set of pairs of sub-scaled images and the second subset of the pairs of the full-frame images over the respective communication interface, from the output communication interface; rendering, at the image processor, at least a subset of the set of pairs of sub-scaled images at the display device; and, processing, at the image processor, the second subset of the pairs of the full-frame images to determine dimensions of items represented in the second subset of the pairs of the full-frame images. 20. A non-transitory computer-readable medium storing a computer program, wherein execution of the computer program is for:
at a device comprising: a first camera device and a second camera device; one or more camera communication interfaces in communication with the first camera device and the second camera device; an output communication interface; and, an image streaming processor, receiving, at the image streaming processor, full-frame images from each of the first camera device and the second camera device using the one or more camera communication interfaces; synchronizing, at the image streaming processor, the full-frame images in pairs; scaling, at the image streaming processor, a first subset of the pairs of the full-frame images to produce a set of pairs of sub-scaled images; and, transmitting, using the image streaming processor, the set of pairs of sub-scaled images and a second subset of the pairs of the full-frame images over the output communication interface, the second subset of the pairs of the full-frame images remaining unscaled. | 2,400 |
8,245 | 8,245 | 14,098,817 | 2,484 | A vehicular vision system includes a camera disposed at a vehicle and having a field of view. The camera is operable to capture image data. The camera includes a pixelated array of photosensing elements. A lens array may be disposed at the pixelated array of photosensing elements. The lens array includes an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of the pixelated array of photosensing elements. An image processor is operable to process captured image data and, responsive at least in part to image processing of captured image data, the vehicular vision system is operable to determine distance to an object present in the field of view of the camera. | 1. A vehicular vision system, said vehicular vision system comprising:
a camera disposed at a vehicle and having a field of view, wherein said camera is operable to capture image data, and wherein said camera comprises an imager having a pixelated array of photosensing elements; and wherein said camera comprises a lens array disposed at said pixelated array of photosensing elements, wherein said lens array comprises an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of said pixelated array of photosensing elements; an image processor operable to process captured image data; and wherein, responsive at least in part to image processing of captured image data captured by photosensing elements associated with different lens elements of said lens array, said vehicular vision system is operable to determine distance to an object present in the field of view of said camera. 2. The vehicular vision system of claim 1, comprising a plurality of cameras having respective imagers and lens arrays. 3. The vehicular vision system of claim 2, wherein said plurality of cameras and imagers and lens arrays form a light field array. 4. The vehicular vision system of claim 3, wherein said light field array is a type of Stanford light field array. 5. The vehicular vision system of claim 3, wherein, responsive to image processing of captured image data, said image processor acquires depth information of a scene in view of said light field array. 6. The vehicular vision system of claim 5, wherein said image processor processes a depth map of a scene in view of said light field array out of the scene's depth information. 7. The vehicular vision system of claim 6, wherein said depth map comprises an input to a driver assistant system of the vehicle. 8. The vehicular vision system of claim 7, wherein said camera has an exterior field of view exterior of the vehicle. 9. The vehicular vision system of claim 5, wherein said camera has an interior field of view inside a cabin of the vehicle, and wherein said light field depth information is used for an input to at least one of (i) a head tracking system for tracking the head of a driver of the vehicle and (ii) an eye tracking system for tracking the eyes of a driver of the vehicle. 10. The vehicular vision system of claim 1, wherein said lens array comprises at least four lens elements, each for imaging light onto respective sub-arrays of at least about 500,000 photosensing elements. 11. The vehicular vision system of claim 10, wherein said lens array comprises at least four hundred lens elements, each for imaging light onto respective sub-arrays of at least about 5,000 photosensing elements. 12. The vehicular vision system of claim 10, wherein a virtual view point of said camera is adjustable, and wherein said image processor is operable to determine distance to the object present in the exterior field of view of said camera by comparing image data captured at different virtual view points. 13. The vehicular vision system of claim 12, wherein said camera has an interior field of view inside a cabin of the vehicle, and wherein said image processing of captured image data is used for an input to at least one of (i) a head tracking system for tracking the head of a driver of the vehicle and (ii) an eye tracking system for tracking the eyes of a driver of the vehicle. 14. A vehicular vision system, said vehicular vision system comprising:
a plurality of cameras disposed at a vehicle and having respective fields of view, wherein said cameras are operable to capture image data, and wherein said cameras each comprise an imager having a pixelated array of photosensing elements; and an image processor operable to process captured image data; wherein said plurality of cameras form a Stanford light field array; wherein, responsive to image processing of captured image data, said image processor acquires depth information of a scene in view of said Stanford light field array; wherein said image processor processes a depth map of a scene in view of said Stanford light field array out of the scene's depth information; and wherein said depth map comprises an input to a driver assistant system of the vehicle. 15. The vehicular vision system of claim 14, wherein said camera has an exterior field of view exterior of the vehicle. 16. The vehicular vision system of claim 14, wherein, responsive at least in part to image processing of captured image data captured by said Stanford light field array, said vehicular vision system is operable to determine distance to an object present in the fields of view of said cameras. 17. The vehicular vision system of claim 14, wherein each of said cameras comprises a lens array disposed at said pixelated array of photosensing elements, wherein said lens array comprises an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of said pixelated array of photosensing elements. 18. A vehicular vision system, said vehicular vision system comprising:
a camera disposed at a vehicle and having an exterior field of view, wherein said camera is operable to capture image data, and wherein said camera comprises an imager having a pixelated array of photosensing elements; and wherein said camera comprises a lens array disposed at said pixelated array of photosensing elements, wherein said lens array comprises an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of said pixelated array of photosensing elements; an image processor operable to process captured image data; wherein, responsive at least in part to image processing of captured image data captured by photosensing elements associated with different lens elements of said lens array, said vehicular vision system is operable to determine distance to an object present in the exterior field of view of said camera; wherein a virtual view point of said camera is adjustable, and wherein said image processor, responsive at least in part to image processing of captured image data, is operable to determine distance to the object present in the exterior field of view of said camera by comparing image data captured at different virtual view points. 19. The vehicular vision system of claim 18, comprising a plurality of cameras having respective pixelated arrays of photosensing elements and lens arrays, wherein said plurality of cameras and imagers and lens arrays form a Stanford light field array. 20. The vehicular vision system of claim 18, wherein, responsive to image processing of captured image data, said image processor at least one of (i) acquires depth information of a scene in view of said camera and (ii) acquires depth information of a scene in view of said camera and wherein said image processor processes a depth map of a scene in view of said camera out of the scene's depth information. | A vehicular vision system includes a camera disposed at a vehicle and having a field of view. The camera is operable to capture image data. The camera includes a pixelated array of photosensing elements. A lens array may be disposed at the pixelated array of photosensing elements. The lens array includes an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of the pixelated array of photosensing elements. An image processor is operable to process captured image data and, responsive at least in part to image processing of captured image data, the vehicular vision system is operable to determine distance to an object present in the field of view of the camera.1. A vehicular vision system, said vehicular vision system comprising:
a camera disposed at a vehicle and having a field of view, wherein said camera is operable to capture image data, and wherein said camera comprises an imager having a pixelated array of photosensing elements; and wherein said camera comprises a lens array disposed at said pixelated array of photosensing elements, wherein said lens array comprises an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of said pixelated array of photosensing elements; an image processor operable to process captured image data; and wherein, responsive at least in part to image processing of captured image data captured by photosensing elements associated with different lens elements of said lens array, said vehicular vision system is operable to determine distance to an object present in the field of view of said camera. 2. The vehicular vision system of claim 1, comprising a plurality of cameras having respective imagers and lens arrays. 3. The vehicular vision system of claim 2, wherein said plurality of cameras and imagers and lens arrays form a light field array. 4. The vehicular vision system of claim 3, wherein said light field array is a type of Stanford light field array. 5. The vehicular vision system of claim 3, wherein, responsive to image processing of captured image data, said image processor acquires depth information of a scene in view of said light field array. 6. The vehicular vision system of claim 5, wherein said image processor processes a depth map of a scene in view of said light field array out of the scene's depth information. 7. The vehicular vision system of claim 6, wherein said depth map comprises an input to a driver assistant system of the vehicle. 8. The vehicular vision system of claim 7, wherein said camera has an exterior field of view exterior of the vehicle. 9. The vehicular vision system of claim 5, wherein said camera has an interior field of view inside a cabin of the vehicle, and wherein said light field depth information is used for an input to at least one of (i) a head tracking system for tracking the head of a driver of the vehicle and (ii) an eye tracking system for tracking the eyes of a driver of the vehicle. 10. The vehicular vision system of claim 1, wherein said lens array comprises at least four lens elements, each for imaging light onto respective sub-arrays of at least about 500,000 photosensing elements. 11. The vehicular vision system of claim 10, wherein said lens array comprises at least four hundred lens elements, each for imaging light onto respective sub-arrays of at least about 5,000 photosensing elements. 12. The vehicular vision system of claim 10, wherein a virtual view point of said camera is adjustable, and wherein said image processor is operable to determine distance to the object present in the exterior field of view of said camera by comparing image data captured at different virtual view points. 13. The vehicular vision system of claim 12, wherein said camera has an interior field of view inside a cabin of the vehicle, and wherein said image processing of captured image data is used for an input to at least one of (i) a head tracking system for tracking the head of a driver of the vehicle and (ii) an eye tracking system for tracking the eyes of a driver of the vehicle. 14. A vehicular vision system, said vehicular vision system comprising:
a plurality of cameras disposed at a vehicle and having respective fields of view, wherein said cameras are operable to capture image data, and wherein said cameras each comprise an imager having a pixelated array of photosensing elements; and an image processor operable to process captured image data; wherein said plurality of cameras form a Stanford light field array; wherein, responsive to image processing of captured image data, said image processor acquires depth information of a scene in view of said Stanford light field array; wherein said image processor processes a depth map of a scene in view of said Stanford light field array out of the scene's depth information; and wherein said depth map comprises an input to a driver assistant system of the vehicle. 15. The vehicular vision system of claim 14, wherein said camera has an exterior field of view exterior of the vehicle. 16. The vehicular vision system of claim 14, wherein, responsive at least in part to image processing of captured image data captured by said Stanford light field array, said vehicular vision system is operable to determine distance to an object present in the fields of view of said cameras. 17. The vehicular vision system of claim 14, wherein each of said cameras comprises a lens array disposed at said pixelated array of photosensing elements, wherein said lens array comprises an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of said pixelated array of photosensing elements. 18. A vehicular vision system, said vehicular vision system comprising:
a camera disposed at a vehicle and having an exterior field of view, wherein said camera is operable to capture image data, and wherein said camera comprises an imager having a pixelated array of photosensing elements; and wherein said camera comprises a lens array disposed at said pixelated array of photosensing elements, wherein said lens array comprises an array of lens elements for imaging light onto respective sub-arrays of photosensing elements of said pixelated array of photosensing elements; an image processor operable to process captured image data; wherein, responsive at least in part to image processing of captured image data captured by photosensing elements associated with different lens elements of said lens array, said vehicular vision system is operable to determine distance to an object present in the exterior field of view of said camera; wherein a virtual view point of said camera is adjustable, and wherein said image processor, responsive at least in part to image processing of captured image data, is operable to determine distance to the object present in the exterior field of view of said camera by comparing image data captured at different virtual view points. 19. The vehicular vision system of claim 18, comprising a plurality of cameras having respective pixelated arrays of photosensing elements and lens arrays, wherein said plurality of cameras and imagers and lens arrays form a Stanford light field array. 20. The vehicular vision system of claim 18, wherein, responsive to image processing of captured image data, said image processor at least one of (i) acquires depth information of a scene in view of said camera and (ii) acquires depth information of a scene in view of said camera and wherein said image processor processes a depth map of a scene in view of said camera out of the scene's depth information. | 2,400 |
8,246 | 8,246 | 14,586,691 | 2,458 | A contact center is operated by reference to response time statistics and social media analytics. A method for identifying a user population's sensitivity to response time delay comprises monitoring social network messaging activity to identify user messages associated with the user population. In some embodiments, the activity relates to at least one of an entity or a product or service associated with the entity. The user population may be selected on the basis of a socio-demographic characteristic or on the basis of observable social networking behavior and/or sentiment over a prior selection phase. The method further includes selecting a loyalty transition boundary identified by detecting a difference in aggregate sentiment between a first group of users receiving a response delayed by a first time period and a second group of users receiving a response delayed by a second time period greater than the first time period. | 1. A computer implemented method for determining sensitivity of a user population to response time delays, comprising:
monitoring social network messaging activity of the user population to identify user messages created by members of the user population; subdividing the user population into N groups, where N is an integer greater than one; scheduling respective responses to corresponding identified user messages of the user population according to group, wherein responses to user messages of any group are delayed by a time delay different than those of each of the other groups; and determining if a loyalty transition boundary exists between any two groups of users. 2. The method according to claim 1, further including assigning users of a social network channel to the user population based on at least one of
a socio-demographic characteristic identified by reference to a stored user profile, user behavior observed in activity monitored on one or more social networks, or user sentiment observed in activity monitored on one or more social networks. 3. The method according to claim 2, wherein the user population is a first user population, the method further comprising
assigning users to a second user population based on at least one of
a socio-demographic characteristic identified by reference to a stored user profile,
user behavior observed from activity monitored on one or more social networks, or
user sentiment observed from activity monitored on one or more social networks;
monitoring social network messaging activity of the second user population to identify user messages; subdividing the second user population into M groups, where M is an integer greater than one; scheduling respective responses to corresponding identified user messages of the second user population according to group, wherein responses to user messages of any group of the second user population are delayed by a time delay different than those of each of the other groups of the second user population; and determining if a loyalty transition boundary exists between any two groups of users of the second user population. 4. The method according to claim 2, wherein each identified user message relates to at least one of an entity or a product or service associated with the entity, and
wherein each user profile includes at least one of
an indication of a user's sentiment toward the entity at one or more points in time;
an indication of a user's sentiment toward a competitor of the entity at one or more points in time; or
an indication of a user's sentiment toward a particular product or service offered by the entity or a competitor of the entity at one or more points in time,
wherein each indication of user sentiment is derived from the monitored social network messaging activity. 5. The method according to claim 4, wherein determining existence of a loyalty transition boundary comprises
evaluating the user profiles of users of a first of the N groups to compute a first aggregate sentiment score; evaluating the user profiles of users of a second of the N groups to compute a second aggregate sentiment score; and detecting a statistically significant difference, between the first aggregate sentiment score and the second aggregate sentiment score. 6. The method according to claim 4, wherein the monitored activity includes at least one of posts, comments, likes, or tags expressed by the at least some of the users via one or more social network channels. 7. The method according to claim 6, wherein the loyalty transition boundary corresponds to a time beyond which sentiment shifts in a direction that is at least one of:
away from the entity; toward a competitor of the entity; away from a product or service offered by the entity; or toward a product or service offered by a competitor of the entity. 8. The method according to claim 1, wherein scheduling a response comprises forwarding a comment or inquiry by a customer or prospective customer to a contact center agent. 9. A computer implemented method for assessing response time sensitivity in a user population, comprising:
monitoring social network messaging activity to identify user messages relating to at least one of an entity or a product or service associated with the entity; scheduling a response to each message of a first group of identified user messages, to occur after expiration of a first time delay, at contact center; scheduling a response to each message of a second group of identified user messages, to occur after expiration of a second time delay greater than the first time delay, at the contact center; determining if a loyalty transition boundary exists between groups of users receiving responses between expiration of the first and second time delays, respectively; and if a loyalty transition boundary is not determined to exist, iteratively scheduling responses to messages of at least one additional group of identified user messages, to occur after expiration of a time delay incrementally greater than a preceding time delay until at least one loyalty transition boundary is detected. 10. The method according to claim 9, wherein scheduling responses to messages of the first and second groups of identified user messages comprises identifying messages of a first identifiable group. 11. The method according to claim 10, wherein the first identifiable group is a socio-demographic group identified by reference to at least one of respective user profiles, observable user social network messaging behavior, or a social network sentiment indicator derived from observable social network messaging activity. 12. The method according to claim 9, further comprising
automatically generating and storing a user profile for at least some of the users, wherein each generated and stored user profile includes an indication of response time delay. 13. The method according to claim 12, wherein each user profile further includes at least one of a socio-demographic or a relationship status identifier. 14. The method according to claim 12, wherein each user profile further includes at least one of
an indication of a user's sentiment toward the entity at one or more points in time; an indication of a user's sentiment toward a competitor of the entity at one or more points in time; or an indication of a user's sentiment toward a particular product or service offered by the entity or a competitor of the entity at one or more points in time, wherein each indication of user sentiment is derived from the monitored social network messaging activity. 15. The method according to claim 14, wherein determining existence of a loyalty transition boundary comprises
evaluating the user profiles of users of the first group to compute a first aggregate sentiment score; evaluating the user profiles of users of the second group to compute a second aggregate sentiment score; and detecting a statistically significant difference, between the first aggregate sentiment score and the second aggregate sentiment score. 16. The method according to claim 9, wherein the loyalty transition boundary corresponds to a time beyond which sentiment shifts in a direction that is at least one of:
away from the entity; toward a competitor of the entity; away from a product or service offered by the entity; or toward a product or service offered by a competitor of the entity. 17. The method according to claim 16, further comprising:
selecting a loyalty transition boundary from the detected at least one loyalty transition boundary; identifying a social network message, outside of the first, second or at least one additional group of identified user messages, relating to at least one of the entity or a product or service furnished by the entity; and forwarding the identified social network message to a communication terminal of a contact center agent for response prior to crossing of the selected loyalty transition boundary. 18. A computer implemented method, comprising
monitoring social network messaging activity to identify user messages relating to at least one of an entity or a product or service associated with the entity; selecting a loyalty transition boundary, the loyalty transition boundary being identified by detecting a difference in aggregate sentiment between a first group of users receiving a response delayed by a first time period and a second group of users receiving a response delayed by a second time period greater than the first time period. 19. The method according to claim 18, further comprising
forwarding the identified social network message to a communication terminal of a contact center agent for response prior to crossing of the selected loyalty transition boundary. 20. The method according to claim 18, wherein the loyalty transition boundary corresponds to a time beyond which sentiment shifts in a direction that is at least one of:
away from the entity; toward a competitor of the entity; away from a product or service offered by the entity; or toward a product or service offered by a competitor of the entity. 21. The method according to claim 18, wherein selecting a loyalty transition boundary includes accessing a profile of an originator of the identified social network message, wherein the accessed profile includes at least one of
an indication of the originator's sentiment toward the entity at one or more points in time; an indication of the originator's sentiment toward a competitor of the entity at one or more points in time; or an indication of the originator's sentiment toward a product or service offered by the entity or by a competitor of the entity at one or more points in time. 22. A system comprising:
a contact center comprising at least one processor, memory, and a network interface,
wherein the contact center is configured to monitor at least one social network channel for messages from a user population and relating to at least one of an entity or a product or service of the entity, and
wherein the contact center is further configured to forward at least some messages to respective communication terminals for corresponding agents to respond to the at least some messages; and
a response time selection module comprising instructions, stored in the memory and executable by the at least one processor, for
selecting a loyalty transition boundary identified by detecting a difference in aggregate sentiment between groups of users receiving a response delayed by a respectively different period. 23. The system according to claim 22, further comprising a loyalty transition boundary detection module comprising instructions, stored in the memory and executable by the at least one processor, for
scheduling a response to each message of a first group of user messages, to occur after expiration of a first time period; scheduling a response to each message of a second group of user messages, to occur after expiration of a second time period; and determining if a loyalty transition boundary exists between groups of users receiving responses to the first and second groups of user messages, respectively. 24. The system according to claim 23, wherein the loyalty transition detecton module further comprises instructions stored in the memory and executable by the at least one processor for
if a loyalty transition boundary is not determined to exist between respective groups of users receiving responses to the first and second groups of user messages, iteratively scheduling responses to messages of at least one additional group of identified user messages, to occur after expiration of a time delay incrementally greater than a preceding time delay until at least one loyalty transition boundary is detected. 25. The system according to claim 23, wherein the instructions for determining include instructions for
evaluating user profiles of users of the first group to compute a first aggregate sentiment score; evaluating user profiles of users of the second group to compute a second aggregate sentiment score; and detecting a statistically significant difference, between the first aggregate sentiment score and the second aggregate sentiment score. 26. The system according to claim 23, wherein the loyalty transition detection module further comprises instructions stored in the memory and executable by the at least one processor for
subdividing the user population into N groups, where N is an integer greater than one; and scheduling respective responses to corresponding identified user messages of the user population according to group, wherein responses to user messages of any group are delayed by a time delay different than those of each of the other groups. | A contact center is operated by reference to response time statistics and social media analytics. A method for identifying a user population's sensitivity to response time delay comprises monitoring social network messaging activity to identify user messages associated with the user population. In some embodiments, the activity relates to at least one of an entity or a product or service associated with the entity. The user population may be selected on the basis of a socio-demographic characteristic or on the basis of observable social networking behavior and/or sentiment over a prior selection phase. The method further includes selecting a loyalty transition boundary identified by detecting a difference in aggregate sentiment between a first group of users receiving a response delayed by a first time period and a second group of users receiving a response delayed by a second time period greater than the first time period.1. A computer implemented method for determining sensitivity of a user population to response time delays, comprising:
monitoring social network messaging activity of the user population to identify user messages created by members of the user population; subdividing the user population into N groups, where N is an integer greater than one; scheduling respective responses to corresponding identified user messages of the user population according to group, wherein responses to user messages of any group are delayed by a time delay different than those of each of the other groups; and determining if a loyalty transition boundary exists between any two groups of users. 2. The method according to claim 1, further including assigning users of a social network channel to the user population based on at least one of
a socio-demographic characteristic identified by reference to a stored user profile, user behavior observed in activity monitored on one or more social networks, or user sentiment observed in activity monitored on one or more social networks. 3. The method according to claim 2, wherein the user population is a first user population, the method further comprising
assigning users to a second user population based on at least one of
a socio-demographic characteristic identified by reference to a stored user profile,
user behavior observed from activity monitored on one or more social networks, or
user sentiment observed from activity monitored on one or more social networks;
monitoring social network messaging activity of the second user population to identify user messages; subdividing the second user population into M groups, where M is an integer greater than one; scheduling respective responses to corresponding identified user messages of the second user population according to group, wherein responses to user messages of any group of the second user population are delayed by a time delay different than those of each of the other groups of the second user population; and determining if a loyalty transition boundary exists between any two groups of users of the second user population. 4. The method according to claim 2, wherein each identified user message relates to at least one of an entity or a product or service associated with the entity, and
wherein each user profile includes at least one of
an indication of a user's sentiment toward the entity at one or more points in time;
an indication of a user's sentiment toward a competitor of the entity at one or more points in time; or
an indication of a user's sentiment toward a particular product or service offered by the entity or a competitor of the entity at one or more points in time,
wherein each indication of user sentiment is derived from the monitored social network messaging activity. 5. The method according to claim 4, wherein determining existence of a loyalty transition boundary comprises
evaluating the user profiles of users of a first of the N groups to compute a first aggregate sentiment score; evaluating the user profiles of users of a second of the N groups to compute a second aggregate sentiment score; and detecting a statistically significant difference, between the first aggregate sentiment score and the second aggregate sentiment score. 6. The method according to claim 4, wherein the monitored activity includes at least one of posts, comments, likes, or tags expressed by the at least some of the users via one or more social network channels. 7. The method according to claim 6, wherein the loyalty transition boundary corresponds to a time beyond which sentiment shifts in a direction that is at least one of:
away from the entity; toward a competitor of the entity; away from a product or service offered by the entity; or toward a product or service offered by a competitor of the entity. 8. The method according to claim 1, wherein scheduling a response comprises forwarding a comment or inquiry by a customer or prospective customer to a contact center agent. 9. A computer implemented method for assessing response time sensitivity in a user population, comprising:
monitoring social network messaging activity to identify user messages relating to at least one of an entity or a product or service associated with the entity; scheduling a response to each message of a first group of identified user messages, to occur after expiration of a first time delay, at contact center; scheduling a response to each message of a second group of identified user messages, to occur after expiration of a second time delay greater than the first time delay, at the contact center; determining if a loyalty transition boundary exists between groups of users receiving responses between expiration of the first and second time delays, respectively; and if a loyalty transition boundary is not determined to exist, iteratively scheduling responses to messages of at least one additional group of identified user messages, to occur after expiration of a time delay incrementally greater than a preceding time delay until at least one loyalty transition boundary is detected. 10. The method according to claim 9, wherein scheduling responses to messages of the first and second groups of identified user messages comprises identifying messages of a first identifiable group. 11. The method according to claim 10, wherein the first identifiable group is a socio-demographic group identified by reference to at least one of respective user profiles, observable user social network messaging behavior, or a social network sentiment indicator derived from observable social network messaging activity. 12. The method according to claim 9, further comprising
automatically generating and storing a user profile for at least some of the users, wherein each generated and stored user profile includes an indication of response time delay. 13. The method according to claim 12, wherein each user profile further includes at least one of a socio-demographic or a relationship status identifier. 14. The method according to claim 12, wherein each user profile further includes at least one of
an indication of a user's sentiment toward the entity at one or more points in time; an indication of a user's sentiment toward a competitor of the entity at one or more points in time; or an indication of a user's sentiment toward a particular product or service offered by the entity or a competitor of the entity at one or more points in time, wherein each indication of user sentiment is derived from the monitored social network messaging activity. 15. The method according to claim 14, wherein determining existence of a loyalty transition boundary comprises
evaluating the user profiles of users of the first group to compute a first aggregate sentiment score; evaluating the user profiles of users of the second group to compute a second aggregate sentiment score; and detecting a statistically significant difference, between the first aggregate sentiment score and the second aggregate sentiment score. 16. The method according to claim 9, wherein the loyalty transition boundary corresponds to a time beyond which sentiment shifts in a direction that is at least one of:
away from the entity; toward a competitor of the entity; away from a product or service offered by the entity; or toward a product or service offered by a competitor of the entity. 17. The method according to claim 16, further comprising:
selecting a loyalty transition boundary from the detected at least one loyalty transition boundary; identifying a social network message, outside of the first, second or at least one additional group of identified user messages, relating to at least one of the entity or a product or service furnished by the entity; and forwarding the identified social network message to a communication terminal of a contact center agent for response prior to crossing of the selected loyalty transition boundary. 18. A computer implemented method, comprising
monitoring social network messaging activity to identify user messages relating to at least one of an entity or a product or service associated with the entity; selecting a loyalty transition boundary, the loyalty transition boundary being identified by detecting a difference in aggregate sentiment between a first group of users receiving a response delayed by a first time period and a second group of users receiving a response delayed by a second time period greater than the first time period. 19. The method according to claim 18, further comprising
forwarding the identified social network message to a communication terminal of a contact center agent for response prior to crossing of the selected loyalty transition boundary. 20. The method according to claim 18, wherein the loyalty transition boundary corresponds to a time beyond which sentiment shifts in a direction that is at least one of:
away from the entity; toward a competitor of the entity; away from a product or service offered by the entity; or toward a product or service offered by a competitor of the entity. 21. The method according to claim 18, wherein selecting a loyalty transition boundary includes accessing a profile of an originator of the identified social network message, wherein the accessed profile includes at least one of
an indication of the originator's sentiment toward the entity at one or more points in time; an indication of the originator's sentiment toward a competitor of the entity at one or more points in time; or an indication of the originator's sentiment toward a product or service offered by the entity or by a competitor of the entity at one or more points in time. 22. A system comprising:
a contact center comprising at least one processor, memory, and a network interface,
wherein the contact center is configured to monitor at least one social network channel for messages from a user population and relating to at least one of an entity or a product or service of the entity, and
wherein the contact center is further configured to forward at least some messages to respective communication terminals for corresponding agents to respond to the at least some messages; and
a response time selection module comprising instructions, stored in the memory and executable by the at least one processor, for
selecting a loyalty transition boundary identified by detecting a difference in aggregate sentiment between groups of users receiving a response delayed by a respectively different period. 23. The system according to claim 22, further comprising a loyalty transition boundary detection module comprising instructions, stored in the memory and executable by the at least one processor, for
scheduling a response to each message of a first group of user messages, to occur after expiration of a first time period; scheduling a response to each message of a second group of user messages, to occur after expiration of a second time period; and determining if a loyalty transition boundary exists between groups of users receiving responses to the first and second groups of user messages, respectively. 24. The system according to claim 23, wherein the loyalty transition detecton module further comprises instructions stored in the memory and executable by the at least one processor for
if a loyalty transition boundary is not determined to exist between respective groups of users receiving responses to the first and second groups of user messages, iteratively scheduling responses to messages of at least one additional group of identified user messages, to occur after expiration of a time delay incrementally greater than a preceding time delay until at least one loyalty transition boundary is detected. 25. The system according to claim 23, wherein the instructions for determining include instructions for
evaluating user profiles of users of the first group to compute a first aggregate sentiment score; evaluating user profiles of users of the second group to compute a second aggregate sentiment score; and detecting a statistically significant difference, between the first aggregate sentiment score and the second aggregate sentiment score. 26. The system according to claim 23, wherein the loyalty transition detection module further comprises instructions stored in the memory and executable by the at least one processor for
subdividing the user population into N groups, where N is an integer greater than one; and scheduling respective responses to corresponding identified user messages of the user population according to group, wherein responses to user messages of any group are delayed by a time delay different than those of each of the other groups. | 2,400 |
8,247 | 8,247 | 14,132,565 | 2,456 | A system, method, apparatus, and computer program product for enabling management of a converged infrastructure are disclosed. A method may include determining components of the converged infrastructure whose configurations need to be modified in order to modify the configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure. The method may also include modifying the configuration of each of the determined components to modify the configuration of the converged infrastructure in accordance with the received command. | 1. A method for enabling management of a converged infrastructure, the method comprising:
determining a plurality of components of the converged infrastructure whose configurations need to be modified in order to modify a configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure; and modifying the configuration of each of the plurality of components to modify the configuration of the converged infrastructure in accordance with the received command, wherein at least one method operation is performed by a processor. 2. The method of claim 1, wherein the received command comprises an abstracted command referencing the converged infrastructure as a single logical entity without individually referencing any of the plurality of components. 3. The method of claim 1, wherein the received command comprises an abstracted command referencing a type of component, and wherein the plurality of components comprise a plurality of components of the type. 4. The method of claim 1, wherein the received command comprises a command entered to a user interface configured to enable a user to manage the converged infrastructure through a set of abstracted commands enabling management of the converged infrastructure as a single logical entity. 5. The method of claim 1, further comprising:
determining a pre-stored access credential associated with at least one of the plurality of components; and using the determined pre-stored access credential to access the at least one of the plurality of components prior to modifying the configuration of the at least one of the plurality of components. 6. The method of claim 1, wherein components of the converged infrastructure are mapped to a hierarchical tree, the method further comprising:
determining, based at least in part on the received command, a launch point within the hierarchical tree to execute an operation to modify configuration of at least one of the plurality of components; and executing the operation to modify configuration of the at least one of the plurality of components at the determined launch point. 7. The method of claim 1, wherein the received command comprises a command entered via a command line interface (CLI). 8. The method of claim 7, further comprising:
receiving one or more characters entered via the CLI, wherein the one or more characters comprises a subset of characters forming the received command; determining a command corresponding to the one or more characters; and presenting the determined command to the user as a suggested command; wherein receiving the command comprises receiving a selection of the suggested command. 9. The method of claim 1, further comprising:
receiving an indication of a command selected from a plurality of selectable commands on a graphical user interface (GUI), wherein the received command is the command selected from the plurality of selectable commands. 10. The method of claim 1, wherein:
the received command comprises a command to modify a configuration of each of the plurality of converged infrastructures; and determining the plurality of components comprises determining a plurality of components on each of the plurality of converged infrastructures whose configurations need to be modified in order to modify the configuration of the plurality of converged infrastructures in accordance with the received command. 11. A system for enabling management of a converged infrastructure through, the system comprising:
at least one processor; and at least one memory storing computer program code, wherein the at least one memory and stored computer program code are configured, with the at least one processor, to cause the system to at least:
determine a plurality of components of the converged infrastructure whose configurations need to be modified in order to modify a configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure; and
modify the configuration of each of the plurality of components to modify the configuration of the converged infrastructure in accordance with the received command. 12. The system of claim 11, wherein the received command comprises an abstracted command referencing the converged infrastructure as a single logical entity without individually referencing any of the plurality of components. 13. The system of claim 11, wherein the received command comprises an abstracted command referencing a type of component, and wherein the plurality of components comprise a plurality of components of the type. 14. The system of claim 11, wherein the received command comprises a command entered to a user interface configured to enable a user to manage the converged infrastructure through a set of abstracted commands enabling management of the converged infrastructure as a single logical entity. 15. The system of claim 11, wherein the at least one memory and stored computer program code are configured, with the at least one processor, to further cause the system to:
determine a pre-stored access credential associated with at least one of the plurality of components; and use the determined pre-stored access credential to access the at least one of the plurality of components prior to modifying the configuration of the at least one of the plurality of components. 16. The system of claim 11, wherein the received command comprises a command entered via a command line interface (CLI). 17. The system of claim 11, wherein the at least one memory and stored computer program code are configured, with the at least one processor, to further cause the system to:
receive an indication of a command selected from a plurality of selectable commands on a graphical user interface (GUI), wherein the received command is the command selected from the plurality of selectable commands. 18. A computer program product for enabling management of a converged infrastructure, the computer program product comprising at least one non-transitory computer-readable storage medium having program instructions stored thereon, which when executed by at least one processor, cause the at least one processor to perform a method comprising:
determining a plurality of components of the converged infrastructure whose configurations need to be modified in order to modify a configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure; and modifying the configuration of each of the plurality of components to modify the configuration of the converged infrastructure in accordance with the received command. 19. The computer program product of claim 18, wherein the received command comprises a command entered to a user interface configured to enable a user to manage the converged infrastructure through a set of abstracted commands enabling management of the converged infrastructure as a single logical entity. 20. The computer program product of claim 18, wherein the method further comprises:
determining a pre-stored access credential associated with at least one of the plurality of components; and using the determined pre-stored access credential to access the at least one of the plurality of components prior to modifying the configuration of the at least one of the plurality of components. | A system, method, apparatus, and computer program product for enabling management of a converged infrastructure are disclosed. A method may include determining components of the converged infrastructure whose configurations need to be modified in order to modify the configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure. The method may also include modifying the configuration of each of the determined components to modify the configuration of the converged infrastructure in accordance with the received command.1. A method for enabling management of a converged infrastructure, the method comprising:
determining a plurality of components of the converged infrastructure whose configurations need to be modified in order to modify a configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure; and modifying the configuration of each of the plurality of components to modify the configuration of the converged infrastructure in accordance with the received command, wherein at least one method operation is performed by a processor. 2. The method of claim 1, wherein the received command comprises an abstracted command referencing the converged infrastructure as a single logical entity without individually referencing any of the plurality of components. 3. The method of claim 1, wherein the received command comprises an abstracted command referencing a type of component, and wherein the plurality of components comprise a plurality of components of the type. 4. The method of claim 1, wherein the received command comprises a command entered to a user interface configured to enable a user to manage the converged infrastructure through a set of abstracted commands enabling management of the converged infrastructure as a single logical entity. 5. The method of claim 1, further comprising:
determining a pre-stored access credential associated with at least one of the plurality of components; and using the determined pre-stored access credential to access the at least one of the plurality of components prior to modifying the configuration of the at least one of the plurality of components. 6. The method of claim 1, wherein components of the converged infrastructure are mapped to a hierarchical tree, the method further comprising:
determining, based at least in part on the received command, a launch point within the hierarchical tree to execute an operation to modify configuration of at least one of the plurality of components; and executing the operation to modify configuration of the at least one of the plurality of components at the determined launch point. 7. The method of claim 1, wherein the received command comprises a command entered via a command line interface (CLI). 8. The method of claim 7, further comprising:
receiving one or more characters entered via the CLI, wherein the one or more characters comprises a subset of characters forming the received command; determining a command corresponding to the one or more characters; and presenting the determined command to the user as a suggested command; wherein receiving the command comprises receiving a selection of the suggested command. 9. The method of claim 1, further comprising:
receiving an indication of a command selected from a plurality of selectable commands on a graphical user interface (GUI), wherein the received command is the command selected from the plurality of selectable commands. 10. The method of claim 1, wherein:
the received command comprises a command to modify a configuration of each of the plurality of converged infrastructures; and determining the plurality of components comprises determining a plurality of components on each of the plurality of converged infrastructures whose configurations need to be modified in order to modify the configuration of the plurality of converged infrastructures in accordance with the received command. 11. A system for enabling management of a converged infrastructure through, the system comprising:
at least one processor; and at least one memory storing computer program code, wherein the at least one memory and stored computer program code are configured, with the at least one processor, to cause the system to at least:
determine a plurality of components of the converged infrastructure whose configurations need to be modified in order to modify a configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure; and
modify the configuration of each of the plurality of components to modify the configuration of the converged infrastructure in accordance with the received command. 12. The system of claim 11, wherein the received command comprises an abstracted command referencing the converged infrastructure as a single logical entity without individually referencing any of the plurality of components. 13. The system of claim 11, wherein the received command comprises an abstracted command referencing a type of component, and wherein the plurality of components comprise a plurality of components of the type. 14. The system of claim 11, wherein the received command comprises a command entered to a user interface configured to enable a user to manage the converged infrastructure through a set of abstracted commands enabling management of the converged infrastructure as a single logical entity. 15. The system of claim 11, wherein the at least one memory and stored computer program code are configured, with the at least one processor, to further cause the system to:
determine a pre-stored access credential associated with at least one of the plurality of components; and use the determined pre-stored access credential to access the at least one of the plurality of components prior to modifying the configuration of the at least one of the plurality of components. 16. The system of claim 11, wherein the received command comprises a command entered via a command line interface (CLI). 17. The system of claim 11, wherein the at least one memory and stored computer program code are configured, with the at least one processor, to further cause the system to:
receive an indication of a command selected from a plurality of selectable commands on a graphical user interface (GUI), wherein the received command is the command selected from the plurality of selectable commands. 18. A computer program product for enabling management of a converged infrastructure, the computer program product comprising at least one non-transitory computer-readable storage medium having program instructions stored thereon, which when executed by at least one processor, cause the at least one processor to perform a method comprising:
determining a plurality of components of the converged infrastructure whose configurations need to be modified in order to modify a configuration of the converged infrastructure in accordance with a received command to modify the configuration of the converged infrastructure; and modifying the configuration of each of the plurality of components to modify the configuration of the converged infrastructure in accordance with the received command. 19. The computer program product of claim 18, wherein the received command comprises a command entered to a user interface configured to enable a user to manage the converged infrastructure through a set of abstracted commands enabling management of the converged infrastructure as a single logical entity. 20. The computer program product of claim 18, wherein the method further comprises:
determining a pre-stored access credential associated with at least one of the plurality of components; and using the determined pre-stored access credential to access the at least one of the plurality of components prior to modifying the configuration of the at least one of the plurality of components. | 2,400 |
8,248 | 8,248 | 14,894,377 | 2,426 | A method and an apparatus for visually representing metadata associated to media data are described. The method comprises: visually representing a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata. | 1. A method for visually representing metadata associated to media data, each item of the metadata being provided with at least one notation indicating a corresponding sample of the media data, the method comprising:
visually representing a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata. 2. The method of claim 1, wherein the position of each item of the metadata on one of the plurality of lines is aligned with the position of each item of the metadata on another one of the plurality of lines based on characteristic of the each item of the metadata. 3. The method of claim 1, wherein the representation of each item of the metadata is a dot or a graphical bar. 4. The method of claim 3, wherein the representation of each item of the metadata is a dot having a same size or a graphical bar having a same size. 5. The method of claim 1, wherein the representation of the at least one notation is a text entry. 6. The method of claim 1, further comprising visually representing a timeline in associated to the representation of the metadata. 7. The method of claim 6, wherein the timeline is represented by a continuous line or by a plurality of graphical bars. 8. The method of claim 6, wherein the position of each item of the metadata is aligned with a corresponding position on the timeline based on temporal characteristic of the each item of the metadata. 9. The method of claim 6, wherein each item of the metadata with at least one common notation is aligned with a same corresponding position on the timeline based on temporal characteristic of these each item of the metadata with at least one common notation. 10. The method of claim 1, further comprising visually representing a representation for each sample of the media data, wherein each sample of the media data is visually represented along one of the plurality of lines, along which is visually represented the each item of the metadata with the at least one common notation corresponding to the said sample of the media data. 11. The method of claim 1, wherein each item of the metadata comprises camera metadata, a slate report, or a script report. 12. The method of claim 1, further comprising collecting the metadata associated to the media data. 13. The method of claim 12, further comprising analyzing the collected metadata associated to the media data. 14. An apparatus configured to visually represent metadata associated to media data, each item of the metadata being provided with at least one notation indicating a corresponding sample of the media data, the apparatus comprising:
a representing unit for visually representing a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata. 15. The apparatus of claim 14, further comprising a metadata collector for collecting metadata. 16. A computer readable medium having stored therein instructions for visually representing metadata associated to media data, each item of the metadata being provided with at least one notation indicating a corresponding sample of the media data, which when executed by a computer, cause the computer to:
visually represent a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata. | A method and an apparatus for visually representing metadata associated to media data are described. The method comprises: visually representing a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata.1. A method for visually representing metadata associated to media data, each item of the metadata being provided with at least one notation indicating a corresponding sample of the media data, the method comprising:
visually representing a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata. 2. The method of claim 1, wherein the position of each item of the metadata on one of the plurality of lines is aligned with the position of each item of the metadata on another one of the plurality of lines based on characteristic of the each item of the metadata. 3. The method of claim 1, wherein the representation of each item of the metadata is a dot or a graphical bar. 4. The method of claim 3, wherein the representation of each item of the metadata is a dot having a same size or a graphical bar having a same size. 5. The method of claim 1, wherein the representation of the at least one notation is a text entry. 6. The method of claim 1, further comprising visually representing a timeline in associated to the representation of the metadata. 7. The method of claim 6, wherein the timeline is represented by a continuous line or by a plurality of graphical bars. 8. The method of claim 6, wherein the position of each item of the metadata is aligned with a corresponding position on the timeline based on temporal characteristic of the each item of the metadata. 9. The method of claim 6, wherein each item of the metadata with at least one common notation is aligned with a same corresponding position on the timeline based on temporal characteristic of these each item of the metadata with at least one common notation. 10. The method of claim 1, further comprising visually representing a representation for each sample of the media data, wherein each sample of the media data is visually represented along one of the plurality of lines, along which is visually represented the each item of the metadata with the at least one common notation corresponding to the said sample of the media data. 11. The method of claim 1, wherein each item of the metadata comprises camera metadata, a slate report, or a script report. 12. The method of claim 1, further comprising collecting the metadata associated to the media data. 13. The method of claim 12, further comprising analyzing the collected metadata associated to the media data. 14. An apparatus configured to visually represent metadata associated to media data, each item of the metadata being provided with at least one notation indicating a corresponding sample of the media data, the apparatus comprising:
a representing unit for visually representing a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata. 15. The apparatus of claim 14, further comprising a metadata collector for collecting metadata. 16. A computer readable medium having stored therein instructions for visually representing metadata associated to media data, each item of the metadata being provided with at least one notation indicating a corresponding sample of the media data, which when executed by a computer, cause the computer to:
visually represent a representation for each item of the metadata and for the at least one notation of each item of the metadata, wherein the representation for the at least one notation is associated to the representation for the corresponding item of the metadata, and wherein each item of the metadata with at least one common notation is visually represented along one of a plurality of lines at one of a plurality of positions, each one position being selected based on the characteristic of the each item of the metadata. | 2,400 |
8,249 | 8,249 | 15,039,963 | 2,438 | A method is presented that enables a server to make use of client or third party resources. The client request data contains data about the network location of the client. The server may store this location data of each client. Before or after execution of the request, the server determines if the server is in or close to an overload situation. If the server is not in an overload situation, no further changes are needed. If the server is in or close to an overload situation, the server selects a new location in the network from the database with all client locations. The server allocates a new instance of the server function at a resource provider on (or close to) this new location. The server may select one or more clients from the database. The selected clients are transparently redirected to the offloaded server function. Subsequent requests from clients are handled by the offloaded server function. The offloaded server function employs the same functionality and thus may decide to offload a server function to another network location. | 1. A method for handling server overload, comprising:
providing a part or all of the functionality of a server application by a server function; said server function comprising one or more offloadable server functions that provide a part or all of the functionality of the server application, and which may be loaded on other resources; providing resource providers able to provide resources for hosting said offloadable server functions; detecting a server load by a load detection function constructed to determine if the server function is in or close to an overload situation; and redirect detected client requests to the offloaded server function on a selected resource in response to a load detection function detecting an overload situation. 2. The method according to claim 1, wherein the server further comprises a resource provider lookup function to select a resource from said resource providers. 3. The method according to claim 1, wherein the selection is provided by a client request advertisement indicating a selectable resource. 4. The method according to claim 1 wherein the offloaded server function is executable on a resource provider and wherein the offloaded server function in turn comprises offloadable server functions that provide a part or all of the functionality of the server application, and which may be loaded on other resources in another network location. 5. The method according to claim 1, further comprising;
retrieving addresses of communication devices that are close to attack sources at the upstream; transmitting the offloaded server function to a resource provider in a defense position at the upstream. 6. The method according to claim 5, wherein the resource provider lookup function comprises an attack source determining function able to extract the address of a communication device to be chosen as an upstream defense position from the candidates of upstream communication device close to the attack sources retrieved by the resource provider lookup function. 7. The method according to claim 1, wherein the resource providers comprise at least one of physical and virtual resources. 8. The method according to claim 1, wherein the physical resources comprise at least one of CPU load, and communication bandwidth. 9. The method according to claim 1, wherein the non-physical resources comprise at least one of a number of database reads per time unit, a number of database writes per time unit, a number of requests per time unit, and a number of simultaneous sessions. 10. The method according to claim 1, the information processing system comprising system control means, interface means and client application means, the method comprising next steps when the system is overloaded or threatens to be overloaded:
it is detected whether the system control means, the interface means or the relevant client application means are or are threatened to be overloaded; it is detected whether the requested access will load the system control means, the interface means or the relevant client application means; if the requested access is not deemed to contribute to the overload of the relevant system means, the requested access is judged to be admissible and/or if the requested access is deemed to load the relevant system means, the requested access is judged to be not-admissible. 11. The method according to claim 1, several clients requesting for access to the information processing system and service level indicators being assigned to those clients, the method comprising that if the kind of requested access is deemed to contribute to the system overload, the requested access of clients having a relative high service level indicator is given preference or priority over clients having a relative low service level indicator. 12. The method according to claim 1, the requested access, deemed to contribute to the system overload, is judged to be admissible for clients having a relative high service level indicator and/or not-admissible for clients having a relative low service level indicator. 13. A system for handling an access request to an information processing system, comprising processing means and memory means, whereby the apparatus is communicatively connected to the information processing system, whereby the apparatus is further connected to a network for transmitting the access request, characterised by that the apparatus is adapted to perform the steps of claim 1. 14. A non-transitory computer-readable medium having a computer program embodied thereon for handling an access request to an information processing system, the computer program including instructions that cause a processor to perform the method of claim 1. | A method is presented that enables a server to make use of client or third party resources. The client request data contains data about the network location of the client. The server may store this location data of each client. Before or after execution of the request, the server determines if the server is in or close to an overload situation. If the server is not in an overload situation, no further changes are needed. If the server is in or close to an overload situation, the server selects a new location in the network from the database with all client locations. The server allocates a new instance of the server function at a resource provider on (or close to) this new location. The server may select one or more clients from the database. The selected clients are transparently redirected to the offloaded server function. Subsequent requests from clients are handled by the offloaded server function. The offloaded server function employs the same functionality and thus may decide to offload a server function to another network location.1. A method for handling server overload, comprising:
providing a part or all of the functionality of a server application by a server function; said server function comprising one or more offloadable server functions that provide a part or all of the functionality of the server application, and which may be loaded on other resources; providing resource providers able to provide resources for hosting said offloadable server functions; detecting a server load by a load detection function constructed to determine if the server function is in or close to an overload situation; and redirect detected client requests to the offloaded server function on a selected resource in response to a load detection function detecting an overload situation. 2. The method according to claim 1, wherein the server further comprises a resource provider lookup function to select a resource from said resource providers. 3. The method according to claim 1, wherein the selection is provided by a client request advertisement indicating a selectable resource. 4. The method according to claim 1 wherein the offloaded server function is executable on a resource provider and wherein the offloaded server function in turn comprises offloadable server functions that provide a part or all of the functionality of the server application, and which may be loaded on other resources in another network location. 5. The method according to claim 1, further comprising;
retrieving addresses of communication devices that are close to attack sources at the upstream; transmitting the offloaded server function to a resource provider in a defense position at the upstream. 6. The method according to claim 5, wherein the resource provider lookup function comprises an attack source determining function able to extract the address of a communication device to be chosen as an upstream defense position from the candidates of upstream communication device close to the attack sources retrieved by the resource provider lookup function. 7. The method according to claim 1, wherein the resource providers comprise at least one of physical and virtual resources. 8. The method according to claim 1, wherein the physical resources comprise at least one of CPU load, and communication bandwidth. 9. The method according to claim 1, wherein the non-physical resources comprise at least one of a number of database reads per time unit, a number of database writes per time unit, a number of requests per time unit, and a number of simultaneous sessions. 10. The method according to claim 1, the information processing system comprising system control means, interface means and client application means, the method comprising next steps when the system is overloaded or threatens to be overloaded:
it is detected whether the system control means, the interface means or the relevant client application means are or are threatened to be overloaded; it is detected whether the requested access will load the system control means, the interface means or the relevant client application means; if the requested access is not deemed to contribute to the overload of the relevant system means, the requested access is judged to be admissible and/or if the requested access is deemed to load the relevant system means, the requested access is judged to be not-admissible. 11. The method according to claim 1, several clients requesting for access to the information processing system and service level indicators being assigned to those clients, the method comprising that if the kind of requested access is deemed to contribute to the system overload, the requested access of clients having a relative high service level indicator is given preference or priority over clients having a relative low service level indicator. 12. The method according to claim 1, the requested access, deemed to contribute to the system overload, is judged to be admissible for clients having a relative high service level indicator and/or not-admissible for clients having a relative low service level indicator. 13. A system for handling an access request to an information processing system, comprising processing means and memory means, whereby the apparatus is communicatively connected to the information processing system, whereby the apparatus is further connected to a network for transmitting the access request, characterised by that the apparatus is adapted to perform the steps of claim 1. 14. A non-transitory computer-readable medium having a computer program embodied thereon for handling an access request to an information processing system, the computer program including instructions that cause a processor to perform the method of claim 1. | 2,400 |
8,250 | 8,250 | 13,877,263 | 2,498 | A VPN box is connected upstream of a field device. The VPN box uses a secret cryptographic key of the field device for authentication when setting up a VPN tunnel and/or when setting up a cryptographically protected communication link. | 1-6. (canceled) 7: A method for secure data transmission between a first communication device and a second communication device, the method which comprises:
assigning a box for setting up and operating a Virtual Private Network (VPN) link to at least one of the first and second communication devices; determining, with the box, a secret key of the respectively assigned communication device while setting up the VPN link; setting up, with the box, a session key for the VPN link on a basis of the secret key; and securely transmitting data via the VPN link. 8: The method according to claim 7, which comprises determining the secret key via a physically protected communication link between the assigned communication device and the box. 9: The method according to claim 7, which comprises:
using the secret key by the box to decrypt a further key stored on the box; and setting up the session key on the basis of the decrypted further key. 10: A method for secure data transmission between a first communication device and a second communication device, the method which comprises:
assigning a box for setting up and operating a Virtual Private Network (VPN) link to at least one of the first and second communication devices; authenticating, with the box, the respectively assigned communication device; determining, with the box, a key assigned to the authenticated communication device; setting up, with the box, a session key for the VPN link on a basis of the assigned key; and securely transmitting data via the VPN link. 11: A system for secure data transmission, comprising:
a first communication device and a second communication device forming communication partners for the secure data transmission; a box assigned to at least one of said first and second communication devices for setting up and operating a Virtual Private Network (VPN) link; said box being configured to determine a secret key of the assigned communication device during a setup of the VPN link; said box being configured to set up a session key for the VPN link on a basis of the secret key; wherein the data is securely transmitted via the VPN link. 12: A system for secure data transmission, comprising:
a first communication device and a second communication device forming communication partners for the secure data transmission; a box assigned to at least one of said first and second communication devices for setting up and operating a Virtual Private Network (VPN) link; said box being configured to authenticate the respectively assigned communication device; said box being configured to determine a key assigned to the authenticated communication device; said box being configured to set up a session key for the VPN link on a basis of the assigned key; wherein the data is securely transmitted via the VPN link. | A VPN box is connected upstream of a field device. The VPN box uses a secret cryptographic key of the field device for authentication when setting up a VPN tunnel and/or when setting up a cryptographically protected communication link.1-6. (canceled) 7: A method for secure data transmission between a first communication device and a second communication device, the method which comprises:
assigning a box for setting up and operating a Virtual Private Network (VPN) link to at least one of the first and second communication devices; determining, with the box, a secret key of the respectively assigned communication device while setting up the VPN link; setting up, with the box, a session key for the VPN link on a basis of the secret key; and securely transmitting data via the VPN link. 8: The method according to claim 7, which comprises determining the secret key via a physically protected communication link between the assigned communication device and the box. 9: The method according to claim 7, which comprises:
using the secret key by the box to decrypt a further key stored on the box; and setting up the session key on the basis of the decrypted further key. 10: A method for secure data transmission between a first communication device and a second communication device, the method which comprises:
assigning a box for setting up and operating a Virtual Private Network (VPN) link to at least one of the first and second communication devices; authenticating, with the box, the respectively assigned communication device; determining, with the box, a key assigned to the authenticated communication device; setting up, with the box, a session key for the VPN link on a basis of the assigned key; and securely transmitting data via the VPN link. 11: A system for secure data transmission, comprising:
a first communication device and a second communication device forming communication partners for the secure data transmission; a box assigned to at least one of said first and second communication devices for setting up and operating a Virtual Private Network (VPN) link; said box being configured to determine a secret key of the assigned communication device during a setup of the VPN link; said box being configured to set up a session key for the VPN link on a basis of the secret key; wherein the data is securely transmitted via the VPN link. 12: A system for secure data transmission, comprising:
a first communication device and a second communication device forming communication partners for the secure data transmission; a box assigned to at least one of said first and second communication devices for setting up and operating a Virtual Private Network (VPN) link; said box being configured to authenticate the respectively assigned communication device; said box being configured to determine a key assigned to the authenticated communication device; said box being configured to set up a session key for the VPN link on a basis of the assigned key; wherein the data is securely transmitted via the VPN link. | 2,400 |
8,251 | 8,251 | 15,621,465 | 2,446 | Techniques for managing configuration of virtual switches in a virtual machine network are disclosed. In an embodiment, a virtual machine network that includes virtual switches is configured to revert back to a saved network configuration if a configuration change causes the connection between the VM management system and a managed node to be lost. For example, before any configuration changes are made, the active configuration is saved. If the new configuration supports a working connection between the managed node and the VM management system, then the saved configuration is no longer needed and can be flushed from memory. If, however, the new configuration causes the managed node to be disconnected from the VM management system, then the system reverts back to the saved configuration that was previously known to work. The saved configuration is used to reestablish the connection so that the network continues to function. | 1. A non-transitory computer-readable storage medium containing program instructions for managing the configuration of virtual switches from a central virtual machine management system in a virtual machine network, wherein execution of the program instructions by one or more processors causes the one or more processors to perform steps comprising:
establishing a communications connection between a virtual switch and a virtual machine management system using a first configuration; saving the first configuration; changing the configuration from the first configuration to a second configuration via the virtual machine management system; determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed; if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed, then flushing the saved first configuration; and if it is determined that the virtual machine management system is not able to communicate with the virtual switch after the configuration is changed, then changing the configuration from the second configuration back to the first configuration using the saved configuration and reconnecting the virtual machine management system to the virtual switch using the first configuration. 2. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch. 3. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received. 4. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period. 5. The non-transitory computer-readable storage medium of claim 4, wherein preconfigured time out period is in the range of 5-60 seconds. 6. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period and wherein the configuration is a Layer 2 Ethernet configuration and wherein changing a configuration involves changing a configuration of a virtual distributed switch. 7. The non-transitory computer-readable storage medium of claim 1, wherein the configuration is a Layer 2 configuration. 8. The non-transitory computer-readable storage medium of claim 1, wherein the configuration is a Layer 2 Ethernet configuration. 9. The non-transitory computer-readable storage medium of claim 1, wherein changing a configuration involves changing a configuration of a virtual standard switch. 10. The non-transitory computer-readable storage medium of claim 1, wherein changing a configuration involves changing a configuration of a virtual distributed switch. 11. The non-transitory computer-readable storage medium of claim 1, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated. 12. The non-transitory computer-readable storage medium of claim 1, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated and then flushed from the host computing device if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed. 13. The non-transitory computer-readable storage medium of claim 1, wherein communications connection established between the virtual switch and the virtual machine management system utilizes Ethernet. 14. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises determining if the virtual machine management system is able to communicate with the virtual switch using Ethernet. 15. A method for managing the configuration of virtual switches from a central virtual machine management system in a virtual machine network, the method comprising:
establishing a communications connection between a virtual switch and a virtual machine management system using a first configuration; saving the first configuration; changing the configuration from the first configuration to a second configuration via the virtual machine management system; determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed; if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed, then flushing the saved first configuration; and if it is determined that the virtual machine management system is not able to communicate with the virtual switch after the configuration is changed, then changing the configuration from the second configuration back to the first configuration using the saved configuration and reconnecting the virtual machine management system to the virtual switch using the first configuration. 16. The method of claim 15, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period. 17. The method of claim 15, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated and then flushed from the host computing device if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed. 18. A computer system comprising:
at least one host computing device, the host computing device including a processor and memory for running instantiated virtual machines and instantiated virtual switches thereon; and a virtual machine management system configured to manage the virtual machines and virtual switches; the at least one computing device and the virtual machine management system being configured to:
establish a communications connection between a virtual switch and a virtual machine management system using a first configuration;
save the first configuration;
change the configuration from the first configuration to a second configuration via the virtual machine management system;
determine if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed;
if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed, then flush the saved first configuration; and
if it is determined that the virtual machine management system is not able to communicate with the virtual switch after the configuration is changed, then change the configuration from the second configuration back to the first configuration using the saved configuration and reconnect the virtual machine management system to the virtual switch using the first configuration. 19. The computer system of claim 18, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period. 20. The computer system of claim 18, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated and then flushed from the host computing device if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed. | Techniques for managing configuration of virtual switches in a virtual machine network are disclosed. In an embodiment, a virtual machine network that includes virtual switches is configured to revert back to a saved network configuration if a configuration change causes the connection between the VM management system and a managed node to be lost. For example, before any configuration changes are made, the active configuration is saved. If the new configuration supports a working connection between the managed node and the VM management system, then the saved configuration is no longer needed and can be flushed from memory. If, however, the new configuration causes the managed node to be disconnected from the VM management system, then the system reverts back to the saved configuration that was previously known to work. The saved configuration is used to reestablish the connection so that the network continues to function.1. A non-transitory computer-readable storage medium containing program instructions for managing the configuration of virtual switches from a central virtual machine management system in a virtual machine network, wherein execution of the program instructions by one or more processors causes the one or more processors to perform steps comprising:
establishing a communications connection between a virtual switch and a virtual machine management system using a first configuration; saving the first configuration; changing the configuration from the first configuration to a second configuration via the virtual machine management system; determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed; if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed, then flushing the saved first configuration; and if it is determined that the virtual machine management system is not able to communicate with the virtual switch after the configuration is changed, then changing the configuration from the second configuration back to the first configuration using the saved configuration and reconnecting the virtual machine management system to the virtual switch using the first configuration. 2. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch. 3. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received. 4. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period. 5. The non-transitory computer-readable storage medium of claim 4, wherein preconfigured time out period is in the range of 5-60 seconds. 6. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period and wherein the configuration is a Layer 2 Ethernet configuration and wherein changing a configuration involves changing a configuration of a virtual distributed switch. 7. The non-transitory computer-readable storage medium of claim 1, wherein the configuration is a Layer 2 configuration. 8. The non-transitory computer-readable storage medium of claim 1, wherein the configuration is a Layer 2 Ethernet configuration. 9. The non-transitory computer-readable storage medium of claim 1, wherein changing a configuration involves changing a configuration of a virtual standard switch. 10. The non-transitory computer-readable storage medium of claim 1, wherein changing a configuration involves changing a configuration of a virtual distributed switch. 11. The non-transitory computer-readable storage medium of claim 1, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated. 12. The non-transitory computer-readable storage medium of claim 1, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated and then flushed from the host computing device if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed. 13. The non-transitory computer-readable storage medium of claim 1, wherein communications connection established between the virtual switch and the virtual machine management system utilizes Ethernet. 14. The non-transitory computer-readable storage medium of claim 1, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises determining if the virtual machine management system is able to communicate with the virtual switch using Ethernet. 15. A method for managing the configuration of virtual switches from a central virtual machine management system in a virtual machine network, the method comprising:
establishing a communications connection between a virtual switch and a virtual machine management system using a first configuration; saving the first configuration; changing the configuration from the first configuration to a second configuration via the virtual machine management system; determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed; if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed, then flushing the saved first configuration; and if it is determined that the virtual machine management system is not able to communicate with the virtual switch after the configuration is changed, then changing the configuration from the second configuration back to the first configuration using the saved configuration and reconnecting the virtual machine management system to the virtual switch using the first configuration. 16. The method of claim 15, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period. 17. The method of claim 15, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated and then flushed from the host computing device if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed. 18. A computer system comprising:
at least one host computing device, the host computing device including a processor and memory for running instantiated virtual machines and instantiated virtual switches thereon; and a virtual machine management system configured to manage the virtual machines and virtual switches; the at least one computing device and the virtual machine management system being configured to:
establish a communications connection between a virtual switch and a virtual machine management system using a first configuration;
save the first configuration;
change the configuration from the first configuration to a second configuration via the virtual machine management system;
determine if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed;
if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed, then flush the saved first configuration; and
if it is determined that the virtual machine management system is not able to communicate with the virtual switch after the configuration is changed, then change the configuration from the second configuration back to the first configuration using the saved configuration and reconnect the virtual machine management system to the virtual switch using the first configuration. 19. The computer system of claim 18, wherein determining if the virtual machine management system is able to communicate with the virtual switch after the configuration is changed comprises monitoring a configuration message protocol between the virtual machine management system and the virtual switch to see if a certain confirming message is received within a preconfigured time out period. 20. The computer system of claim 18, wherein the first configuration is saved at a host computing device on which the virtual switch is instantiated and then flushed from the host computing device if it is determined that the virtual machine management system is able to communicate with the virtual switch after the configuration is changed. | 2,400 |
8,252 | 8,252 | 15,406,807 | 2,447 | When a sender is drafting an email, a system herein can determine whether a user in a distribution list is out-of-office. The email application can identify a distribution list to a server along with a target date, such as a meeting date of an email invite. The server can check an out-of-office status for the contacts associated with the distribution list, and return a notification to the email application. The notification can indicate the number of out-of-office users. It can also indicate which users are out-of-office and suggest dependent users to fill in as alternatives. | 1. A system for assisting with email composition based on distribution lists having out-of-office users, the system comprising:
an email application on a non-transitory, computer-readable medium, the email application being executed on the first user device; a server that securely communicates with the email application, wherein the server performs stages including:
receiving, from the email application, identification of a distribution list in a draft email;
determining an out-of-office status for each of the email recipients associated with the distribution list; and
prior to the email application sending the email, sending a notification to the email application indicating that a first email recipient in the distribution list is out of office and causing the email application to display an out-of-office alert on the first user device. 2. The system of claim 1, wherein the server performs further stages comprising:
sending a management agent to the first user device for installation, the management agent allowing the email application to communicate with the server. 3. The system of claim 1, wherein the email is a meeting invite, and wherein the server performs further stages comprising:
determining a ranking for the first email recipient relative to other email recipients in the distribution list; and sending the ranking to the user device as part of the notification, wherein the out-of-office alert is displayed based on the ranking exceeding a threshold. 4. The system of claim 1, wherein the server performs further stages comprising:
retrieving a dependency user that is associated with the first user in a database; identifying the dependency user in the notification; and causing the email application to prompt the sender about adding the dependency user as an additional email recipient prior to the draft email being sent. 5. The system of claim 4, further comprising a secure email gateway performs stages including:
receiving a reply email sent on behalf of the first user; identifying the reply email as an out-of-office reply that lists an alternate contact; and sending information associated with the alternate contact to the server to be stored as the dependency user. 6. The system of claim 4, wherein retrieving the dependency user includes retrieving a history of dependency users for the first user, wherein the server sends the history of dependency users as part of the notification. 7. The system of claim 1, wherein the email application automatically expands the distribution list in a background process and separately sends the associated email recipients to the server for determining the out-of-office status. 8. A non-transitory, computer-readable medium containing instructions executed by at least one processor to assist with email composition, the stages comprising:
receiving, from an email application executing on a user device, a distribution list of email recipients selected by a sender while composing an email; determining an out-of-office status for each of the email recipients; and prior to the email application sending the email, sending a notification to the email application of the user device that a first email recipient is out of office, causing the email application to display an out-of-office alert on the first user device. 9. The non-transitory, computer-readable medium of claim 8, wherein the email is a meeting invite, and wherein the at least one processor performs further stages comprising:
determining a ranking for the first user based a user profile associated with the first user; and sending the ranking to the user device as part of the notification, wherein the out-of-office alert is displayed based on the ranking exceeding a threshold. 10. The non-transitory, computer-readable medium of claim 9, wherein the ranking of the first user is done relative to rankings of the other email recipients. 11. The non-transitory, computer-readable medium of claim 8, the stages further comprising:
retrieving a dependency user that is associated with the first user in a database; identifying the dependency user in the notification; and causing the email application to prompt the sender about adding the dependency user as an additional email recipient prior to the email being sent. 12. The non-transitory, computer-readable medium of claim 11, the stages further comprising:
receiving, at a secure email gateway, a reply email sent on behalf of the first user; identifying the reply email as an out-of-office reply that lists an alternate contact and sending the alternate contact to the server from the secure email gateway, wherein the management server stores the alternate contact as the dependency user in association with the first user. 13. The non-transitory, computer-readable medium of claim 11, wherein retrieving the dependency user includes retrieving a history of dependency users for the first user, wherein the management server sends the history of dependency users as part of the notification. 14. The non-transitory, computer-readable medium of claim 8, the stages further comprising:
sending a management agent to a first user device for installation, the management agent causing an email application to communicate with a management server, wherein the management agent causes the email application to expand the distribution list, wherein receiving the distribution list of email recipients includes receiving, from the management agent, separate identification of each of the email recipients. 15. A method for providing alerts to assist in email composition, comprising:
receiving, at a server, identification of a distribution list added to a draft email in an email application executing on a user device; identifying email recipients associated with the distribution list; determining, at the server, an out-of-office status for each of the identified email recipients based on stored out-of-office information; and prior to the email application sending the email, sending a notification from the server to the email application that a first email recipient is out of office, causing the email application to display an out-of-office alert. 16. The method of claim 15, further comprising:
determining a ranking for the first user based a user profile associated with the first user; and sending the ranking to the user device as part of the notification, wherein the email is a meeting invite and the out-of-office alert is displayed based on the ranking exceeding a threshold. 17. The method of claim 16, wherein the ranking of the first user is determined relative to rankings of the other email recipients associated with the distribution list. 18. The method of claim 15, further comprising:
retrieving a dependency user that is associated with the first user in a database; identifying the dependency user in the notification, causing the email application to add the dependency user as an additional email recipient prior to the email being sent. 19. The method of claim 18, further comprising:
receiving, at a secure email gateway, a reply email that is automatically generated based on settings for the first user; identifying, at the secure email gateway, the email as, an out of office reply that lists an alternate contact; sending the alternate contact to the server from the secure email gateway; and storing the alternate contact as the dependency user in association with the first user. 20. The method of claim 15, wherein identifying the email recipients includes automatically expanding the distribution list within the email application. | When a sender is drafting an email, a system herein can determine whether a user in a distribution list is out-of-office. The email application can identify a distribution list to a server along with a target date, such as a meeting date of an email invite. The server can check an out-of-office status for the contacts associated with the distribution list, and return a notification to the email application. The notification can indicate the number of out-of-office users. It can also indicate which users are out-of-office and suggest dependent users to fill in as alternatives.1. A system for assisting with email composition based on distribution lists having out-of-office users, the system comprising:
an email application on a non-transitory, computer-readable medium, the email application being executed on the first user device; a server that securely communicates with the email application, wherein the server performs stages including:
receiving, from the email application, identification of a distribution list in a draft email;
determining an out-of-office status for each of the email recipients associated with the distribution list; and
prior to the email application sending the email, sending a notification to the email application indicating that a first email recipient in the distribution list is out of office and causing the email application to display an out-of-office alert on the first user device. 2. The system of claim 1, wherein the server performs further stages comprising:
sending a management agent to the first user device for installation, the management agent allowing the email application to communicate with the server. 3. The system of claim 1, wherein the email is a meeting invite, and wherein the server performs further stages comprising:
determining a ranking for the first email recipient relative to other email recipients in the distribution list; and sending the ranking to the user device as part of the notification, wherein the out-of-office alert is displayed based on the ranking exceeding a threshold. 4. The system of claim 1, wherein the server performs further stages comprising:
retrieving a dependency user that is associated with the first user in a database; identifying the dependency user in the notification; and causing the email application to prompt the sender about adding the dependency user as an additional email recipient prior to the draft email being sent. 5. The system of claim 4, further comprising a secure email gateway performs stages including:
receiving a reply email sent on behalf of the first user; identifying the reply email as an out-of-office reply that lists an alternate contact; and sending information associated with the alternate contact to the server to be stored as the dependency user. 6. The system of claim 4, wherein retrieving the dependency user includes retrieving a history of dependency users for the first user, wherein the server sends the history of dependency users as part of the notification. 7. The system of claim 1, wherein the email application automatically expands the distribution list in a background process and separately sends the associated email recipients to the server for determining the out-of-office status. 8. A non-transitory, computer-readable medium containing instructions executed by at least one processor to assist with email composition, the stages comprising:
receiving, from an email application executing on a user device, a distribution list of email recipients selected by a sender while composing an email; determining an out-of-office status for each of the email recipients; and prior to the email application sending the email, sending a notification to the email application of the user device that a first email recipient is out of office, causing the email application to display an out-of-office alert on the first user device. 9. The non-transitory, computer-readable medium of claim 8, wherein the email is a meeting invite, and wherein the at least one processor performs further stages comprising:
determining a ranking for the first user based a user profile associated with the first user; and sending the ranking to the user device as part of the notification, wherein the out-of-office alert is displayed based on the ranking exceeding a threshold. 10. The non-transitory, computer-readable medium of claim 9, wherein the ranking of the first user is done relative to rankings of the other email recipients. 11. The non-transitory, computer-readable medium of claim 8, the stages further comprising:
retrieving a dependency user that is associated with the first user in a database; identifying the dependency user in the notification; and causing the email application to prompt the sender about adding the dependency user as an additional email recipient prior to the email being sent. 12. The non-transitory, computer-readable medium of claim 11, the stages further comprising:
receiving, at a secure email gateway, a reply email sent on behalf of the first user; identifying the reply email as an out-of-office reply that lists an alternate contact and sending the alternate contact to the server from the secure email gateway, wherein the management server stores the alternate contact as the dependency user in association with the first user. 13. The non-transitory, computer-readable medium of claim 11, wherein retrieving the dependency user includes retrieving a history of dependency users for the first user, wherein the management server sends the history of dependency users as part of the notification. 14. The non-transitory, computer-readable medium of claim 8, the stages further comprising:
sending a management agent to a first user device for installation, the management agent causing an email application to communicate with a management server, wherein the management agent causes the email application to expand the distribution list, wherein receiving the distribution list of email recipients includes receiving, from the management agent, separate identification of each of the email recipients. 15. A method for providing alerts to assist in email composition, comprising:
receiving, at a server, identification of a distribution list added to a draft email in an email application executing on a user device; identifying email recipients associated with the distribution list; determining, at the server, an out-of-office status for each of the identified email recipients based on stored out-of-office information; and prior to the email application sending the email, sending a notification from the server to the email application that a first email recipient is out of office, causing the email application to display an out-of-office alert. 16. The method of claim 15, further comprising:
determining a ranking for the first user based a user profile associated with the first user; and sending the ranking to the user device as part of the notification, wherein the email is a meeting invite and the out-of-office alert is displayed based on the ranking exceeding a threshold. 17. The method of claim 16, wherein the ranking of the first user is determined relative to rankings of the other email recipients associated with the distribution list. 18. The method of claim 15, further comprising:
retrieving a dependency user that is associated with the first user in a database; identifying the dependency user in the notification, causing the email application to add the dependency user as an additional email recipient prior to the email being sent. 19. The method of claim 18, further comprising:
receiving, at a secure email gateway, a reply email that is automatically generated based on settings for the first user; identifying, at the secure email gateway, the email as, an out of office reply that lists an alternate contact; sending the alternate contact to the server from the secure email gateway; and storing the alternate contact as the dependency user in association with the first user. 20. The method of claim 15, wherein identifying the email recipients includes automatically expanding the distribution list within the email application. | 2,400 |
8,253 | 8,253 | 15,069,623 | 2,426 | There is provided a system and method for the synchronizing on-air commercial programming with interactive applications, providing interactive content synchronized with on-air television programming. There is provided a system comprising a client device with a display device and an input device and running a synchronization application. The client device receives digital data transmitted from a server, and transmits user feedback information generated from user interactions with the digital data back to the server. The digital data are interactive advertisements, such as online social games, that increase users' awareness of the advertised products or messages. The digital data are delivered to the user's client device in synchronization with the broadcasting of on-air television commercials. | 1-20. (canceled) 21: A method for synchronizing interactive application content with broadcasting program information, the method comprising:
detecting a light and/or an audio frequency signal emitted from a television receiving and showing a broadcast from a television broadcasting station; beginning to accept a digital data from a server, in response to the detecting of the light and/or an audio frequency signal; receiving the digital data from the server into a client device in synchronization with broadcasting of an on-air commercial programming through a television transmitted from a television broadcasting station; providing an interactive environment on a display of the client device using the digital data; transmitting a user feedback information generated from a user action within the interactive environment to the server; and terminating the reception of the digital data by the client device in synchronization with a return of regular noncommercial programming to the television from the television broadcasting station. 22: The method of claim 21, wherein the digital data is an offer to win coupons or other prizes by accessing a social networking website, a broadcaster website or an advertiser website to claim coupons or other prizes. 23: The method of claim 21, wherein the digital data comprises a social miniature game allowing multiple users to compete for coupons or prizes. 24: The method of claim 21, wherein the client device comprises an application allowing a user to send product coupons or prizes to other users. 25: The method of claim 21, wherein the client device comprises an application allowing a user of the client device to communicate with other users in order to persuade them to buy a product. 26: The method of claim 21, wherein the digital data comprises an interactive advertisement prompting a user with questions to answer before allowing the user to claim coupons or prizes. 27: The method of claim 21, wherein the digital data comprises a single-player miniature game that allows a user to win coupons if the user wins the miniature game. 28: A client device for synchronizing interactive application content with broadcasting program information, the client device comprising:
a display screen; the client device configured to:
detect a light and/or an audio frequency signal emitted from a television receiving a broadcast from a television broadcasting station;
begin to accept a digital data from a server, in response to detecting the light and/or an audio frequency signal;
receive the digital data from the server into a client device in synchronization with broadcasting of an on-air commercial programming through a television transmitted from a television broadcasting station;
provide an interactive environment on the display screen of the client device using the digital data;
transmit an user feedback information generated from a user action within the interactive environment to the server; and
terminate the reception of the digital data by the client device in synchronization with a return of regular noncommercial programming to the television from the television broadcasting station. 29: The client device of claim 28, wherein the digital data is an offer to win coupons or other prizes by accessing a social networking website, a broadcaster website or an advertiser website to claim coupons or other prizes. 30: The client device of claim 28, wherein the digital data comprises a social miniature game allowing multiple users to compete for coupons or prizes. 31: The client device of claim 28, wherein the client device comprises an application allowing a user to send product coupons or prizes to other users. 32: The client device of claim 28, wherein the client device comprises an application allowing a user of the client device to communicate with other users in order to persuade them to buy a product. 33: The client device of claim 28, wherein the digital data comprises an interactive advertisement prompting a user with questions to answer before allowing the user to claim coupons or prizes. 34: The client device of claim 28, wherein the digital data comprises a single-player miniature game that allows a user to win coupons if the user wins the miniature game. | There is provided a system and method for the synchronizing on-air commercial programming with interactive applications, providing interactive content synchronized with on-air television programming. There is provided a system comprising a client device with a display device and an input device and running a synchronization application. The client device receives digital data transmitted from a server, and transmits user feedback information generated from user interactions with the digital data back to the server. The digital data are interactive advertisements, such as online social games, that increase users' awareness of the advertised products or messages. The digital data are delivered to the user's client device in synchronization with the broadcasting of on-air television commercials.1-20. (canceled) 21: A method for synchronizing interactive application content with broadcasting program information, the method comprising:
detecting a light and/or an audio frequency signal emitted from a television receiving and showing a broadcast from a television broadcasting station; beginning to accept a digital data from a server, in response to the detecting of the light and/or an audio frequency signal; receiving the digital data from the server into a client device in synchronization with broadcasting of an on-air commercial programming through a television transmitted from a television broadcasting station; providing an interactive environment on a display of the client device using the digital data; transmitting a user feedback information generated from a user action within the interactive environment to the server; and terminating the reception of the digital data by the client device in synchronization with a return of regular noncommercial programming to the television from the television broadcasting station. 22: The method of claim 21, wherein the digital data is an offer to win coupons or other prizes by accessing a social networking website, a broadcaster website or an advertiser website to claim coupons or other prizes. 23: The method of claim 21, wherein the digital data comprises a social miniature game allowing multiple users to compete for coupons or prizes. 24: The method of claim 21, wherein the client device comprises an application allowing a user to send product coupons or prizes to other users. 25: The method of claim 21, wherein the client device comprises an application allowing a user of the client device to communicate with other users in order to persuade them to buy a product. 26: The method of claim 21, wherein the digital data comprises an interactive advertisement prompting a user with questions to answer before allowing the user to claim coupons or prizes. 27: The method of claim 21, wherein the digital data comprises a single-player miniature game that allows a user to win coupons if the user wins the miniature game. 28: A client device for synchronizing interactive application content with broadcasting program information, the client device comprising:
a display screen; the client device configured to:
detect a light and/or an audio frequency signal emitted from a television receiving a broadcast from a television broadcasting station;
begin to accept a digital data from a server, in response to detecting the light and/or an audio frequency signal;
receive the digital data from the server into a client device in synchronization with broadcasting of an on-air commercial programming through a television transmitted from a television broadcasting station;
provide an interactive environment on the display screen of the client device using the digital data;
transmit an user feedback information generated from a user action within the interactive environment to the server; and
terminate the reception of the digital data by the client device in synchronization with a return of regular noncommercial programming to the television from the television broadcasting station. 29: The client device of claim 28, wherein the digital data is an offer to win coupons or other prizes by accessing a social networking website, a broadcaster website or an advertiser website to claim coupons or other prizes. 30: The client device of claim 28, wherein the digital data comprises a social miniature game allowing multiple users to compete for coupons or prizes. 31: The client device of claim 28, wherein the client device comprises an application allowing a user to send product coupons or prizes to other users. 32: The client device of claim 28, wherein the client device comprises an application allowing a user of the client device to communicate with other users in order to persuade them to buy a product. 33: The client device of claim 28, wherein the digital data comprises an interactive advertisement prompting a user with questions to answer before allowing the user to claim coupons or prizes. 34: The client device of claim 28, wherein the digital data comprises a single-player miniature game that allows a user to win coupons if the user wins the miniature game. | 2,400 |
8,254 | 8,254 | 14,927,827 | 2,454 | Technologies are described related to communication interfaces for wearable devices. User experience with wearable devices may be enhanced through tailored views for communications, calendar items, actions associated with those, where the views and presentations may be dynamically selected and adjusted based on context, user, location, and device capabilities. Smart notifications and user-friendly note taking, functionality may be enabled also based on context, user, location, and device capabilities. Other scenarios may be unlocked based on proximity and/or sensor data. | 1. A wearable computing device to provide prioritized and categorized presentation of communications, the wearable computing device comprising:
a communication module configured to communicate wirelessly with one or more other computing devices; a memory; and one or more processors coupled to the memory and the communication module, the one or more processors executing a communication application in conjunction with instructions stored in the memory, wherein the communication application includes:
an interface module configured to:
receive one or more explicit rules and configurations;
analyze attributes of a communication and history of interactions of a recipient of the communication;
determine a category and a priority level for the communication based on the one or more rules and configurations, one or more attributes of the wearable computing device, and an inference based on the analysis; and
determine one or more actions based on the communication and a category and a priority level for the one or more actions; and
a display module configured to:
display the communication according to the determined category and priority level for the communication; and
display the one or more actions according to the determined category and priority level for the one or more actions. 2. The wearable computing device of claim 1, wherein the communication and the one or more actions are displayed in form of cards, and wherein an order and content of the cards are determined based on a context of the recipient and the communication. 3. The wearable computing device of claim 2, wherein the context is determined based on one or more of a location of the recipient, a status of the recipient, and a number and a type of other computing devices actively used by the recipient. 4. The wearable computing device of claim 1, wherein the interface module is configured provide a continuous experience when a notification is received or acted on across multiple computing devices associated with the recipient. 5. The wearable computing device of claim 4, wherein the continuous experience includes one or more of displaying and clearing the notification based on user activity across the multiple computing devices associated with the recipient. 6. The wearable computing device of claim 1, wherein the interface module is configured to determine the category and the priority level of the communication and the one or more actions based on one or more of sender information, a subject of the communication, content of the communication, one or more tags associated with the communication, a recipient availability, a recipient activity, a recipient location, as recipient interaction with previous content in a conversation or previous conversations with a sender of the communication, implied due dates and tasks in the content of the communication, other recipients of the communication, and usage of other communication applications. 7. The wearable computing device of claim 1, wherein the communication is one of an email, a calendar item, a text message, a task, and a note. 8. The wearable computing device of claim 1, wherein the one or more other computing devices include a desktop computer associated with the recipient, a laptop computer associated with the recipient, a handheld computer associated with the recipient, a vehicle computer associated with the recipient, a smart phone associated with the recipient, and a server. 9. The wearable computing device of claim 1, wherein the interface module is further configured to present an incentive message to the recipient upon completion of review of all unseen communications. 10. A method executed at one or more computing devices to provide prioritized and categorized presentation of communications on a wearable device, the method comprising:
receiving one or more explicit rules and configurations; analyzing attributes of a communication and history of interactions of a user associated with the communication; determining, a category and a priority level for the communication based on the one or more rules and configurations, one or more wearable device attributes, and an inference based on the analysis; determining whether to present to communication; and presenting the communication according to the determined category and priority level. 11. The method of claim 10, further comprising:
determining salient information for the user in the communication; and displaying the salient information in form of a card notification on the wearable device. 12. The method of claim 11, wherein determining the salient information is based on one or more of:
formatting of content of the communication, one or more tags in the communication, a mention of the user's name in the content, a position of a tag associated with the user, a portion of the content around the mention of the user's name, one or more implied due dates and tasks in the content, one or more images in the content, and one or more charts in the content. 13. The method of claim 10, further comprising:
activating a notetaking functionality in response to one of a gesture, an audio command, and a hardware element activation on the wearable device; recording an audio note dictated by the user; converting the recorded audio note to text; and forwarding the text to a predefined destination. 14. The method of claim 13, wherein the predefined destination is one or more of an email inbox of the user, an email inbox of one or more people designated by the user, and a data storage location. 15. The method of claim 13, further comprising:
enabling the user to assign one or more attributes to the text prior to forwarding to the predefined destination. 16. The method of claim 13, further comprising:
displaying the forwarded text in form of an email to the user, wherein a subject line of the email is one of an indication that the email is a recorded audio note and a first portion of the recorded audio note. 17. The method of claim 16, further comprising:
displaying one or more actions to be selected in conjunction with the email to the user. 18. A computer-readable memory device with instructions stored thereon to provide communication interfaces on wearable devices, the instructions comprising:
receiving one or more explicit rules and configurations; analyzing attributes of a communication and history of interactions of a recipient of the communication; determining a category and a priority level for the communication based on the one or more rules and configurations, one or more attributes of the wearable computing device, and an inference based on the analysis; determining one or more actions based on the communication and a category and a priority level for the one or more actions; displaying the communication according to the determined category and priority level for the communication; and displaying the one or more actions according to the determined category and priority level for the one or more actions. 19. The computer-readable memory device of claim 18, wherein the instructions further comprise:
determining an upcoming meeting to be attended by the recipient; determining a location and a movement of the recipient; and displaying a reminder notification to the recipient based on a time of the upcoming meeting, the location and the movement of the recipient. 20. The computer-readable memory device of claim 19, wherein the instructions further comprise:
if the recipient is determined to be late to the upcoming meeting, presenting the recipient with an option to transmit a message to one or more attendees of the meeting about arriving late. | Technologies are described related to communication interfaces for wearable devices. User experience with wearable devices may be enhanced through tailored views for communications, calendar items, actions associated with those, where the views and presentations may be dynamically selected and adjusted based on context, user, location, and device capabilities. Smart notifications and user-friendly note taking, functionality may be enabled also based on context, user, location, and device capabilities. Other scenarios may be unlocked based on proximity and/or sensor data.1. A wearable computing device to provide prioritized and categorized presentation of communications, the wearable computing device comprising:
a communication module configured to communicate wirelessly with one or more other computing devices; a memory; and one or more processors coupled to the memory and the communication module, the one or more processors executing a communication application in conjunction with instructions stored in the memory, wherein the communication application includes:
an interface module configured to:
receive one or more explicit rules and configurations;
analyze attributes of a communication and history of interactions of a recipient of the communication;
determine a category and a priority level for the communication based on the one or more rules and configurations, one or more attributes of the wearable computing device, and an inference based on the analysis; and
determine one or more actions based on the communication and a category and a priority level for the one or more actions; and
a display module configured to:
display the communication according to the determined category and priority level for the communication; and
display the one or more actions according to the determined category and priority level for the one or more actions. 2. The wearable computing device of claim 1, wherein the communication and the one or more actions are displayed in form of cards, and wherein an order and content of the cards are determined based on a context of the recipient and the communication. 3. The wearable computing device of claim 2, wherein the context is determined based on one or more of a location of the recipient, a status of the recipient, and a number and a type of other computing devices actively used by the recipient. 4. The wearable computing device of claim 1, wherein the interface module is configured provide a continuous experience when a notification is received or acted on across multiple computing devices associated with the recipient. 5. The wearable computing device of claim 4, wherein the continuous experience includes one or more of displaying and clearing the notification based on user activity across the multiple computing devices associated with the recipient. 6. The wearable computing device of claim 1, wherein the interface module is configured to determine the category and the priority level of the communication and the one or more actions based on one or more of sender information, a subject of the communication, content of the communication, one or more tags associated with the communication, a recipient availability, a recipient activity, a recipient location, as recipient interaction with previous content in a conversation or previous conversations with a sender of the communication, implied due dates and tasks in the content of the communication, other recipients of the communication, and usage of other communication applications. 7. The wearable computing device of claim 1, wherein the communication is one of an email, a calendar item, a text message, a task, and a note. 8. The wearable computing device of claim 1, wherein the one or more other computing devices include a desktop computer associated with the recipient, a laptop computer associated with the recipient, a handheld computer associated with the recipient, a vehicle computer associated with the recipient, a smart phone associated with the recipient, and a server. 9. The wearable computing device of claim 1, wherein the interface module is further configured to present an incentive message to the recipient upon completion of review of all unseen communications. 10. A method executed at one or more computing devices to provide prioritized and categorized presentation of communications on a wearable device, the method comprising:
receiving one or more explicit rules and configurations; analyzing attributes of a communication and history of interactions of a user associated with the communication; determining, a category and a priority level for the communication based on the one or more rules and configurations, one or more wearable device attributes, and an inference based on the analysis; determining whether to present to communication; and presenting the communication according to the determined category and priority level. 11. The method of claim 10, further comprising:
determining salient information for the user in the communication; and displaying the salient information in form of a card notification on the wearable device. 12. The method of claim 11, wherein determining the salient information is based on one or more of:
formatting of content of the communication, one or more tags in the communication, a mention of the user's name in the content, a position of a tag associated with the user, a portion of the content around the mention of the user's name, one or more implied due dates and tasks in the content, one or more images in the content, and one or more charts in the content. 13. The method of claim 10, further comprising:
activating a notetaking functionality in response to one of a gesture, an audio command, and a hardware element activation on the wearable device; recording an audio note dictated by the user; converting the recorded audio note to text; and forwarding the text to a predefined destination. 14. The method of claim 13, wherein the predefined destination is one or more of an email inbox of the user, an email inbox of one or more people designated by the user, and a data storage location. 15. The method of claim 13, further comprising:
enabling the user to assign one or more attributes to the text prior to forwarding to the predefined destination. 16. The method of claim 13, further comprising:
displaying the forwarded text in form of an email to the user, wherein a subject line of the email is one of an indication that the email is a recorded audio note and a first portion of the recorded audio note. 17. The method of claim 16, further comprising:
displaying one or more actions to be selected in conjunction with the email to the user. 18. A computer-readable memory device with instructions stored thereon to provide communication interfaces on wearable devices, the instructions comprising:
receiving one or more explicit rules and configurations; analyzing attributes of a communication and history of interactions of a recipient of the communication; determining a category and a priority level for the communication based on the one or more rules and configurations, one or more attributes of the wearable computing device, and an inference based on the analysis; determining one or more actions based on the communication and a category and a priority level for the one or more actions; displaying the communication according to the determined category and priority level for the communication; and displaying the one or more actions according to the determined category and priority level for the one or more actions. 19. The computer-readable memory device of claim 18, wherein the instructions further comprise:
determining an upcoming meeting to be attended by the recipient; determining a location and a movement of the recipient; and displaying a reminder notification to the recipient based on a time of the upcoming meeting, the location and the movement of the recipient. 20. The computer-readable memory device of claim 19, wherein the instructions further comprise:
if the recipient is determined to be late to the upcoming meeting, presenting the recipient with an option to transmit a message to one or more attendees of the meeting about arriving late. | 2,400 |
8,255 | 8,255 | 13,381,217 | 2,421 | The present invention relates to a method for provisioning a multimedia service to a multimedia rendering device RD by a multi media application server. The multimedia application server is coupled to the rendering device over a communication network, The method of the present invention further comprises the step of determining at least one additional multimedia service associated with the multimedia service provisioned by the multimedia application server to the rendering device and the subsequent step of selecting an additional multimedia service of the at least one additional multimedia service by a communications device associated with the multimedia service provisioned to the rendering device or selected by the rendering device. | 1. Method for provisioning a multimedia service to a multimedia rendering device (RD) by a multi media application server (IPTV-AS), said multimedia application server (IPTV-AS), being coupled to said rendering device (RD) over a communication network (CN-1), wherein said method further comprises the step of:
a. determining at least one additional multimedia service associated with said multimedia service provisioned by said multimedia application server (IPTV-AS), to said rendering device (RD); and b. selecting an additional multimedia service of said at least one additional multimedia service by a communications device (CD, CD1, CD2) associated with said multimedia service provisioned to said rendering device (RD) or by said rendering device (RD). 2. Method according to claim 1, wherein said method further comprises the step of:
c. provisioning said additional multimedia service of said at least one additional multimedia service selected by said communications device associated with said multimedia service provisioned to said rendering device (RD) or by said rendering device to said respective communications device or said rendering device. 3. Method according to claim 1, wherein said step of determining said additional multimedia service is based on a request of a communications device associated with said multimedia service provisioned to said rendering device (RD) or said rendering device (RD). 4. Method according to claim 2, wherein said step of provisioning said additional multimedia service is provisioning said service over said communications network (CN1). 5. Method according to claim 2, wherein said step of provisioning said additional multimedia service is provisioning said service over a second communications network (CN2) coupling said communications device (CD, CD1, CD2)) to said application server (IPTV-AS) 6. Multimedia system for provisioning multimedia services to a multimedia rendering device (RD), said multimedia system comprising a multimedia application server (IPTV-AS) for provisioning said multimedia service to said multimedia Rendering device (RD), said multimedia application server (IPTV-AS) being coupled to said rendering device (RD) over a communication network (CN1), wherein said system further comprises:
a. an additional multimedia service determination part (SPDP), adapted to determine an additional multimedia service associated with said multimedia service; and b. a selecting part (MMSP), adapted to select an additional multimedia service of said at least one additional multimedia service by a communications device associated with said multimedia service provisioned to said rendering device (RD) or by said rendering device (RD). 7. Multimedia system according to claim 6, wherein said system further comprises:
c. an additional multimedia service provisioning part (ASPP), adapted to provision said additional multimedia service of said at least one additional multimedia service to a communications device associated with said multimedia service provisioned to said rendering device (RD) or to said rendering Device (RD). 8. Application server (IPTV-AS), for use in Multimedia system according to claim 6, comprising a service provisioning part (SPP), adapted to provision a multimedia service to said rendering device (RD), wherein said Application server (IPTV-AS) further comprises:
a. an additional multimedia service determination part (SPDP), adapted to determine an additional multimedia service associated with said multimedia service; and b. a selecting part (MMSP), adapted to select an additional multimedia service of said at least one additional multimedia service by a communications device associated with said multimedia service provisioned to said rendering device (RD). 9. Application server (IPTV-AS), according to claim 8, wherein said Application server (IPTV-AS) further comprises:
c. an additional multimedia service provisioning part (ASPP), adapted to provision said additional multimedia service of said at least one additional multimedia service to a communications device associated with said multimedia service provisioned to said rendering device. 10. Further Application server for use in Multimedia system according to claim 6, wherein said further Application server comprises:
a. an additional multimedia service determination part (SPDP), (second application server (AS2)) adapted to determine an additional multimedia service associated with said multimedia service; and b. a selecting part (MMSP), adapted to select an additional multimedia service of said at least one additional multimedia service by a communications device associated with said multimedia service provisioned to said rendering device (RD). 11. Further Application server, according to claim 10, wherein said further Application server further comprises:
c. an additional multimedia service provisioning part (ASPP), adapted to provision said additional multimedia service of said at least one additional multimedia service to a communications device associated with said multimedia service provisioned to said rendering device (RD). 12. Communication device (CD, CD1, CD2) for use in system according to claim 6, wherein said communications device comprises:
a. a communicating part, adapted to request said application server to determine an additional multimedia service associated with said multimedia service; and b. a selecting part, adapted to select an additional multimedia service from said at least one additional multimedia service; and c. a presenting part, adapted to present said additional multimedia service selected. | The present invention relates to a method for provisioning a multimedia service to a multimedia rendering device RD by a multi media application server. The multimedia application server is coupled to the rendering device over a communication network, The method of the present invention further comprises the step of determining at least one additional multimedia service associated with the multimedia service provisioned by the multimedia application server to the rendering device and the subsequent step of selecting an additional multimedia service of the at least one additional multimedia service by a communications device associated with the multimedia service provisioned to the rendering device or selected by the rendering device.1. Method for provisioning a multimedia service to a multimedia rendering device (RD) by a multi media application server (IPTV-AS), said multimedia application server (IPTV-AS), being coupled to said rendering device (RD) over a communication network (CN-1), wherein said method further comprises the step of:
a. determining at least one additional multimedia service associated with said multimedia service provisioned by said multimedia application server (IPTV-AS), to said rendering device (RD); and b. selecting an additional multimedia service of said at least one additional multimedia service by a communications device (CD, CD1, CD2) associated with said multimedia service provisioned to said rendering device (RD) or by said rendering device (RD). 2. Method according to claim 1, wherein said method further comprises the step of:
c. provisioning said additional multimedia service of said at least one additional multimedia service selected by said communications device associated with said multimedia service provisioned to said rendering device (RD) or by said rendering device to said respective communications device or said rendering device. 3. Method according to claim 1, wherein said step of determining said additional multimedia service is based on a request of a communications device associated with said multimedia service provisioned to said rendering device (RD) or said rendering device (RD). 4. Method according to claim 2, wherein said step of provisioning said additional multimedia service is provisioning said service over said communications network (CN1). 5. Method according to claim 2, wherein said step of provisioning said additional multimedia service is provisioning said service over a second communications network (CN2) coupling said communications device (CD, CD1, CD2)) to said application server (IPTV-AS) 6. Multimedia system for provisioning multimedia services to a multimedia rendering device (RD), said multimedia system comprising a multimedia application server (IPTV-AS) for provisioning said multimedia service to said multimedia Rendering device (RD), said multimedia application server (IPTV-AS) being coupled to said rendering device (RD) over a communication network (CN1), wherein said system further comprises:
a. an additional multimedia service determination part (SPDP), adapted to determine an additional multimedia service associated with said multimedia service; and b. a selecting part (MMSP), adapted to select an additional multimedia service of said at least one additional multimedia service by a communications device associated with said multimedia service provisioned to said rendering device (RD) or by said rendering device (RD). 7. Multimedia system according to claim 6, wherein said system further comprises:
c. an additional multimedia service provisioning part (ASPP), adapted to provision said additional multimedia service of said at least one additional multimedia service to a communications device associated with said multimedia service provisioned to said rendering device (RD) or to said rendering Device (RD). 8. Application server (IPTV-AS), for use in Multimedia system according to claim 6, comprising a service provisioning part (SPP), adapted to provision a multimedia service to said rendering device (RD), wherein said Application server (IPTV-AS) further comprises:
a. an additional multimedia service determination part (SPDP), adapted to determine an additional multimedia service associated with said multimedia service; and b. a selecting part (MMSP), adapted to select an additional multimedia service of said at least one additional multimedia service by a communications device associated with said multimedia service provisioned to said rendering device (RD). 9. Application server (IPTV-AS), according to claim 8, wherein said Application server (IPTV-AS) further comprises:
c. an additional multimedia service provisioning part (ASPP), adapted to provision said additional multimedia service of said at least one additional multimedia service to a communications device associated with said multimedia service provisioned to said rendering device. 10. Further Application server for use in Multimedia system according to claim 6, wherein said further Application server comprises:
a. an additional multimedia service determination part (SPDP), (second application server (AS2)) adapted to determine an additional multimedia service associated with said multimedia service; and b. a selecting part (MMSP), adapted to select an additional multimedia service of said at least one additional multimedia service by a communications device associated with said multimedia service provisioned to said rendering device (RD). 11. Further Application server, according to claim 10, wherein said further Application server further comprises:
c. an additional multimedia service provisioning part (ASPP), adapted to provision said additional multimedia service of said at least one additional multimedia service to a communications device associated with said multimedia service provisioned to said rendering device (RD). 12. Communication device (CD, CD1, CD2) for use in system according to claim 6, wherein said communications device comprises:
a. a communicating part, adapted to request said application server to determine an additional multimedia service associated with said multimedia service; and b. a selecting part, adapted to select an additional multimedia service from said at least one additional multimedia service; and c. a presenting part, adapted to present said additional multimedia service selected. | 2,400 |
8,256 | 8,256 | 15,826,522 | 2,459 | There is disclosed a collector routine and process for collection of an IT infrastructure components' data characteristics including performance, availability and capacity characteristics of and events at IT infrastructure components. The collector routine cooperates with a monitor service. | 1. A computer-implemented method, operable in a data network and operable on a host comprising hardware including memory and at least one processor, the data network comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, the method comprising, by a collector routine operating in the host:
an operations process:
on a continuous basis, assessing data characteristics of the host by the collector routine operating in the host,
on a continuous basis, the collector routine generating data messages from the data characteristics as assessed,
on a continuous basis, the collector routine storing the data messages as generated in a persistent, time-framed buffer,
on a continuous basis, the collector routine transmitting each data message as stored to a predefined monitor service, and
on a continuous basis, the collector routine receiving response messages from the monitor service in response to receipt of each transmitted data message;
a recovery process:
on a continuous basis, the collector routine sensing failed transmission to the monitor service and thereafter transmitting subsequent data messages to a selected proxy from a plurality of proxies connected to the monitor service for re-transmission to the monitor service, instead of transmitting to the monitor service, and
on a continuous basis, the collector routine receiving response messages from the selected proxy originating from the monitor service in response to receipt by the monitor service of each re-transmitted data message. 2. The method of claim 1 further comprising the collector routine, during a start-up process, performing a discovery operation to discover available proxies. 3. The method of claim 2 further comprising, in the recovery process when the collector routine needs to transmit to a proxy, the collector routine selecting from the available proxies comprising a random selection and testing of the randomly selected proxy for its capability at that time to relay data messages to the monitor service. 4. The method of claim 1 further comprising, during the recovery process, the collector routine ending the recovery process after re-establishing a connection with the monitor service. 5. The method of claim 1 further comprising on a continuous basis, the collector routine removing each data message from the buffer upon its successful transmission to at least one of the monitor service or the selected proxy. 6. The method of claim 1 further comprising the collector routine restarting transmission to the monitor service. 7. The method of claim 1 wherein the host comprises one of a server, a storage device, a networking device and an application. 8. The method of claim 1 further comprising the collector routine removing from the buffer data message older than a specified age. 9. The method of claim 1 further comprising, in the recovery process, the collector routine re-transmitting data messages which were subject of a prior transmission failure. 10. The method of claim 1 further comprising discontinuing use of the proxy and recommencing communications with the monitor service without the proxy. 11. The method of claim 1 wherein the data characteristics include performance, availability and capacity characteristics. 12. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a collector routine as an agentless computer-implemented method in a host, the method comprising
an operations process:
on a continuous basis, assessing data characteristics of the host by the collector routine operating in the host,
on a continuous basis, the collector routine generating data messages from the data characteristics as assessed,
on a continuous basis, the collector routine storing the data messages as generated in a persistent, time-framed buffer,
on a continuous basis, the collector routine transmitting each data message as stored to a predefined monitor service, and
on a continuous basis, the collector routine receiving response messages from the monitor service in response to receipt of each transmitted data message;
a recovery process:
on a continuous basis, the collector routine sensing failed transmission to the monitor service and thereafter transmitting subsequent data messages to a selected proxy from a plurality of proxies connected to the monitor service for re-transmission to the monitor service, instead of transmitting to the monitor service,
on a continuous basis, the collector routine receiving response messages from the selected proxy originating from the monitor service in response to receipt by the monitor service of each re-transmitted data message, and
on a continuous basis, the collector routine re-transmitting data messages which were subject of a prior transmission failure. 13. The computer program product of claim 12 further comprising the collector routine, during a start-up process, performing a discovery operation to discover available proxies. 14. The computer program product of claim 13 further comprising, in the recovery process when the collector routine needs to transmit to a proxy, the collector routine selecting from the available proxies comprising a random selection and testing of the randomly selected proxy for its capability at that time to relay data messages to the monitor service. 15. The computer program product of claim 12 further comprising, during the recovery process, the collector routine ending the recovery process after re-establishing a connection with the monitor service. 16. The computer program product of claim 12 further comprising on a continuous basis, the collector routine removing each data message from the buffer upon its successful transmission to at least one of the monitor service or the selected proxy. 17. The computer program product of claim 12 further comprising the collector routine restarting transmission to the monitor service. 18. The computer program product of claim 12 wherein the host comprises one of a server, a storage device, a networking device and an application. 19. The computer program product of claim 12 further comprising the collector routine removing from the buffer data messages older than a specified age. 20. The computer program product of claim 12 further comprising, in the recovery process, the collector routine re-transmitting data messages which were subject of a prior transmission failure. 21. The computer program product of claim 12 further comprising discontinuing use of the proxy and recommencing communications with the monitor service without the proxy. 22. The computer program product of claim 12 wherein the data characteristics include performance, availability and capacity characteristics. | There is disclosed a collector routine and process for collection of an IT infrastructure components' data characteristics including performance, availability and capacity characteristics of and events at IT infrastructure components. The collector routine cooperates with a monitor service.1. A computer-implemented method, operable in a data network and operable on a host comprising hardware including memory and at least one processor, the data network comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, the method comprising, by a collector routine operating in the host:
an operations process:
on a continuous basis, assessing data characteristics of the host by the collector routine operating in the host,
on a continuous basis, the collector routine generating data messages from the data characteristics as assessed,
on a continuous basis, the collector routine storing the data messages as generated in a persistent, time-framed buffer,
on a continuous basis, the collector routine transmitting each data message as stored to a predefined monitor service, and
on a continuous basis, the collector routine receiving response messages from the monitor service in response to receipt of each transmitted data message;
a recovery process:
on a continuous basis, the collector routine sensing failed transmission to the monitor service and thereafter transmitting subsequent data messages to a selected proxy from a plurality of proxies connected to the monitor service for re-transmission to the monitor service, instead of transmitting to the monitor service, and
on a continuous basis, the collector routine receiving response messages from the selected proxy originating from the monitor service in response to receipt by the monitor service of each re-transmitted data message. 2. The method of claim 1 further comprising the collector routine, during a start-up process, performing a discovery operation to discover available proxies. 3. The method of claim 2 further comprising, in the recovery process when the collector routine needs to transmit to a proxy, the collector routine selecting from the available proxies comprising a random selection and testing of the randomly selected proxy for its capability at that time to relay data messages to the monitor service. 4. The method of claim 1 further comprising, during the recovery process, the collector routine ending the recovery process after re-establishing a connection with the monitor service. 5. The method of claim 1 further comprising on a continuous basis, the collector routine removing each data message from the buffer upon its successful transmission to at least one of the monitor service or the selected proxy. 6. The method of claim 1 further comprising the collector routine restarting transmission to the monitor service. 7. The method of claim 1 wherein the host comprises one of a server, a storage device, a networking device and an application. 8. The method of claim 1 further comprising the collector routine removing from the buffer data message older than a specified age. 9. The method of claim 1 further comprising, in the recovery process, the collector routine re-transmitting data messages which were subject of a prior transmission failure. 10. The method of claim 1 further comprising discontinuing use of the proxy and recommencing communications with the monitor service without the proxy. 11. The method of claim 1 wherein the data characteristics include performance, availability and capacity characteristics. 12. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a collector routine as an agentless computer-implemented method in a host, the method comprising
an operations process:
on a continuous basis, assessing data characteristics of the host by the collector routine operating in the host,
on a continuous basis, the collector routine generating data messages from the data characteristics as assessed,
on a continuous basis, the collector routine storing the data messages as generated in a persistent, time-framed buffer,
on a continuous basis, the collector routine transmitting each data message as stored to a predefined monitor service, and
on a continuous basis, the collector routine receiving response messages from the monitor service in response to receipt of each transmitted data message;
a recovery process:
on a continuous basis, the collector routine sensing failed transmission to the monitor service and thereafter transmitting subsequent data messages to a selected proxy from a plurality of proxies connected to the monitor service for re-transmission to the monitor service, instead of transmitting to the monitor service,
on a continuous basis, the collector routine receiving response messages from the selected proxy originating from the monitor service in response to receipt by the monitor service of each re-transmitted data message, and
on a continuous basis, the collector routine re-transmitting data messages which were subject of a prior transmission failure. 13. The computer program product of claim 12 further comprising the collector routine, during a start-up process, performing a discovery operation to discover available proxies. 14. The computer program product of claim 13 further comprising, in the recovery process when the collector routine needs to transmit to a proxy, the collector routine selecting from the available proxies comprising a random selection and testing of the randomly selected proxy for its capability at that time to relay data messages to the monitor service. 15. The computer program product of claim 12 further comprising, during the recovery process, the collector routine ending the recovery process after re-establishing a connection with the monitor service. 16. The computer program product of claim 12 further comprising on a continuous basis, the collector routine removing each data message from the buffer upon its successful transmission to at least one of the monitor service or the selected proxy. 17. The computer program product of claim 12 further comprising the collector routine restarting transmission to the monitor service. 18. The computer program product of claim 12 wherein the host comprises one of a server, a storage device, a networking device and an application. 19. The computer program product of claim 12 further comprising the collector routine removing from the buffer data messages older than a specified age. 20. The computer program product of claim 12 further comprising, in the recovery process, the collector routine re-transmitting data messages which were subject of a prior transmission failure. 21. The computer program product of claim 12 further comprising discontinuing use of the proxy and recommencing communications with the monitor service without the proxy. 22. The computer program product of claim 12 wherein the data characteristics include performance, availability and capacity characteristics. | 2,400 |
8,257 | 8,257 | 15,098,471 | 2,435 | Provided is a Central Processing Unit (CPU) and a method to verify mainboard data. The CPU comprises: an on-die Read-Only Memory (ROM) for storing trusted root digest information, wherein the trusted root digest information is not allowed to be modified; and a core for, during a power-up process, computing digest information of a trusted root data stored in a mainboard using a digest algorithm, comparing the digest information with the trusted root digest information, and performing a signature verification algorithm with the trusted root data to verify the integrity of mainboard data if the digest information coincides with the trusted root digest information. | 1. A Central Processing Unit (CPU), comprises:
an on-die Read-Only Memory (ROM) for storing trusted root digest information, wherein the trusted root digest information is not allowed to be modified; and a core for, during a power-up process, computing digest information of a trusted root data stored in a mainboard using a digest algorithm, comparing the digest information with the trusted root digest information, and performing a signature verification algorithm with the trusted root data to verify the integrity of mainboard data if the digest information coincides with the trusted root digest information. 2. The CPU of claim 1, wherein the on-die ROM comprises a plurality of fuses for burning candidate trusted root digest information with different priority levels, respectively, and
the core adopts a candidate trusted root digest information with the highest priority level burnt in the fuses as the trusted root digest information. 3. The CPU of claim 1, wherein the signature verification algorithm is based on an asymmetric encryption/decryption algorithm, the mainboard data is encrypted with a private key based on the asymmetric encryption/decryption algorithm, and the trusted root data comprises a public key corresponding to the private key. 4. The CPU of claim 1, wherein the core comprises a hardware circuit for performing the digest algorithm. 5. The CPU of claim 1, wherein the CPU further stores digest instructions, and
the core performs the digest algorithm by executing the digest instructions. 6. The CPU of claim 1, wherein the core comprises a hardware circuit for performing the signature verification algorithm. 7. The CPU of claim 1, wherein the CPU further stores signature verification instructions, and
the core performs the signature verification algorithm by executing the signature verification instructions. 8. The CPU of claim 1, wherein the mainboard data comprises a ucode patch of the CPU, and the core computes the digest information once a specific instruction is received during the power-up process. 9. A method to verify mainboard data, comprises:
reading a trusted root data from a mainboard during a power-up process; computing digest information of the trusted root data using a digest algorithm; comparing the digest information with trusted root digest information stored in an on-die Read-Only Memory (ROM) of a Central Processing Unit (CPU), wherein the trusted root digest information is not allowed to be modified; reading mainboard data from the mainboard if the digest information coincides with the trusted root digest information; and performing a signature verification algorithm with the trusted root data to verify the integrity of the mainboard data. 10. The method of claim 9, wherein the on-die ROM comprises a plurality of fuses for burning candidate trusted root digest information with different priority levels, respectively, and the method further comprises:
adopting a candidate trusted root digest information with the highest priority level burnt in the fuses as the trusted root digest information. 11. The method of claim 9, wherein the signature verification algorithm is based on an asymmetric encryption/decryption algorithm, the mainboard data is encrypted with a private key based on the asymmetric encryption/decryption algorithm, and the trusted root data comprises a public key corresponding to the private key. 12. The method of claim 9, wherein the digest algorithm is performed by a hardware circuit in the CPU. 13. The method of claim 9, wherein the digest algorithm is performed by executing digest instructions stored in the CPU. 14. The method of claim 9, wherein the signature verification algorithm is performed by a hardware circuit in the CPU. 15. The method of claim 9, wherein the signature verification algorithm is performed by executing signature verification instructions stored in the CPU. 16. The method of claim 9, wherein the mainboard data comprises a ucode patch of the CPU, and the said step of reading the trusted root data from the mainboard is performed once a specific instruction is received during the power-up process. | Provided is a Central Processing Unit (CPU) and a method to verify mainboard data. The CPU comprises: an on-die Read-Only Memory (ROM) for storing trusted root digest information, wherein the trusted root digest information is not allowed to be modified; and a core for, during a power-up process, computing digest information of a trusted root data stored in a mainboard using a digest algorithm, comparing the digest information with the trusted root digest information, and performing a signature verification algorithm with the trusted root data to verify the integrity of mainboard data if the digest information coincides with the trusted root digest information.1. A Central Processing Unit (CPU), comprises:
an on-die Read-Only Memory (ROM) for storing trusted root digest information, wherein the trusted root digest information is not allowed to be modified; and a core for, during a power-up process, computing digest information of a trusted root data stored in a mainboard using a digest algorithm, comparing the digest information with the trusted root digest information, and performing a signature verification algorithm with the trusted root data to verify the integrity of mainboard data if the digest information coincides with the trusted root digest information. 2. The CPU of claim 1, wherein the on-die ROM comprises a plurality of fuses for burning candidate trusted root digest information with different priority levels, respectively, and
the core adopts a candidate trusted root digest information with the highest priority level burnt in the fuses as the trusted root digest information. 3. The CPU of claim 1, wherein the signature verification algorithm is based on an asymmetric encryption/decryption algorithm, the mainboard data is encrypted with a private key based on the asymmetric encryption/decryption algorithm, and the trusted root data comprises a public key corresponding to the private key. 4. The CPU of claim 1, wherein the core comprises a hardware circuit for performing the digest algorithm. 5. The CPU of claim 1, wherein the CPU further stores digest instructions, and
the core performs the digest algorithm by executing the digest instructions. 6. The CPU of claim 1, wherein the core comprises a hardware circuit for performing the signature verification algorithm. 7. The CPU of claim 1, wherein the CPU further stores signature verification instructions, and
the core performs the signature verification algorithm by executing the signature verification instructions. 8. The CPU of claim 1, wherein the mainboard data comprises a ucode patch of the CPU, and the core computes the digest information once a specific instruction is received during the power-up process. 9. A method to verify mainboard data, comprises:
reading a trusted root data from a mainboard during a power-up process; computing digest information of the trusted root data using a digest algorithm; comparing the digest information with trusted root digest information stored in an on-die Read-Only Memory (ROM) of a Central Processing Unit (CPU), wherein the trusted root digest information is not allowed to be modified; reading mainboard data from the mainboard if the digest information coincides with the trusted root digest information; and performing a signature verification algorithm with the trusted root data to verify the integrity of the mainboard data. 10. The method of claim 9, wherein the on-die ROM comprises a plurality of fuses for burning candidate trusted root digest information with different priority levels, respectively, and the method further comprises:
adopting a candidate trusted root digest information with the highest priority level burnt in the fuses as the trusted root digest information. 11. The method of claim 9, wherein the signature verification algorithm is based on an asymmetric encryption/decryption algorithm, the mainboard data is encrypted with a private key based on the asymmetric encryption/decryption algorithm, and the trusted root data comprises a public key corresponding to the private key. 12. The method of claim 9, wherein the digest algorithm is performed by a hardware circuit in the CPU. 13. The method of claim 9, wherein the digest algorithm is performed by executing digest instructions stored in the CPU. 14. The method of claim 9, wherein the signature verification algorithm is performed by a hardware circuit in the CPU. 15. The method of claim 9, wherein the signature verification algorithm is performed by executing signature verification instructions stored in the CPU. 16. The method of claim 9, wherein the mainboard data comprises a ucode patch of the CPU, and the said step of reading the trusted root data from the mainboard is performed once a specific instruction is received during the power-up process. | 2,400 |
8,258 | 8,258 | 15,042,911 | 2,481 | A system includes a video recorder configured to record video data, a sensor configured to sense movement of an object and output sensor data representative of the movement of the object, a transformer configured to transform the sensor data into a haptic output signal, a haptic output device configured to generate a haptic effect to a user based on the haptic output signal, a display configured to display a video, and a processor configured to synchronize the video data and the haptic output signal, and output the video data to the display and the haptic output signal to the haptic output device so that the haptic effect is synchronized with the video displayed on the display. | 1. A method for playing haptic encoded media, the method comprising:
receiving media data which includes at least video or audio data recorded at a remote capture device; receiving haptic data which includes at least acceleration or magnitude components recorded at the remote capture device; filtering the acceleration or magnitude components to create filtered haptic data; synchronizing the media data and the filtered haptic data to create the haptic encoded media; and playing the haptic encoded media on an electronic playback device which includes a haptic output device. 2. The method according to claim 1, wherein the electronic playback device is a mobile phone or tablet device. 3. The method according to claim 1, wherein the electronic playback device includes a codec configured to synchronize the media data and the haptic data. 4. The method according to claim 1, wherein the remote capture device includes a sensor that comprises an accelerometer, a gyroscope, or a contact pressure sensor. 5. The method according to claim 1, wherein the media data is received during the rendering of the synchronized media data and haptic data. 6. The method according to claim 1, wherein the media data received from the remote capture device is rendered in real-time. 7. The method according to claim 1, wherein the media data and the haptic data are simultaneously received. 8. A non-transitory computer readable storage medium storing one or more programs configured to be executed by a processor, the one or more programs comprising instructions for:
receiving media data which includes at least video or audio data recorded at a remote capture device; receiving haptic data which includes at least acceleration or magnitude components recorded at the remote capture device; filtering the acceleration or magnitude components to create filtered haptic data; synchronizing the media data and the filtered haptic data to create the haptic encoded media; and playing the haptic encoded media on an electronic playback device which includes a haptic output device. 9. The non-transitory computer readable storage medium according to claim 8, wherein the electronic playback device is a mobile phone or tablet device. 10. The non-transitory computer readable storage medium according to claim 8, wherein the electronic playback device includes a codec configured to synchronize the media data and the haptic data. 11. The non-transitory computer readable storage medium according to claim 8, wherein the remote capture device includes a sensor that comprises an accelerometer, a gyroscope, or a contact pressure sensor. 12. The non-transitory computer readable storage medium according to claim 8, wherein the media data is received during the rendering of the synchronized media data and haptic data. 13. The non-transitory computer readable storage medium according to claim 8, wherein the media data received from the remote capture device is rendered in real-time. 14. The non-transitory computer readable storage medium according to claim 8, wherein the media data and the haptic data are simultaneously received. 15. A system comprising:
a processor; and a memory storing one or more programs for execution by the processor, the one or more programs including instructions for: receiving media data which includes at least video or audio data recorded at a remote capture device; receiving haptic data which includes at least acceleration or magnitude components recorded at the remote capture device; filtering the acceleration or magnitude components to create filtered haptic data; synchronizing the media data and the filtered haptic data to create the haptic encoded media; and playing the haptic encoded media on an electronic playback device which includes a haptic output device. 16. The system according to claim 15, wherein the electronic playback device is a mobile phone or tablet device. 17. The system according to claim 15, wherein the electronic playback device includes a codec configured to synchronize the media data and the haptic data. 18. The system according to claim 15, wherein the remote capture device includes a sensor that comprises an accelerometer, a gyroscope, or a contact pressure sensor. 19. The system according to claim 15, wherein the media data is received during the rendering of the synchronized media data and haptic data. 20. The system according to claim 15, wherein the media data received from the remote capture device is rendered in real-time. | A system includes a video recorder configured to record video data, a sensor configured to sense movement of an object and output sensor data representative of the movement of the object, a transformer configured to transform the sensor data into a haptic output signal, a haptic output device configured to generate a haptic effect to a user based on the haptic output signal, a display configured to display a video, and a processor configured to synchronize the video data and the haptic output signal, and output the video data to the display and the haptic output signal to the haptic output device so that the haptic effect is synchronized with the video displayed on the display.1. A method for playing haptic encoded media, the method comprising:
receiving media data which includes at least video or audio data recorded at a remote capture device; receiving haptic data which includes at least acceleration or magnitude components recorded at the remote capture device; filtering the acceleration or magnitude components to create filtered haptic data; synchronizing the media data and the filtered haptic data to create the haptic encoded media; and playing the haptic encoded media on an electronic playback device which includes a haptic output device. 2. The method according to claim 1, wherein the electronic playback device is a mobile phone or tablet device. 3. The method according to claim 1, wherein the electronic playback device includes a codec configured to synchronize the media data and the haptic data. 4. The method according to claim 1, wherein the remote capture device includes a sensor that comprises an accelerometer, a gyroscope, or a contact pressure sensor. 5. The method according to claim 1, wherein the media data is received during the rendering of the synchronized media data and haptic data. 6. The method according to claim 1, wherein the media data received from the remote capture device is rendered in real-time. 7. The method according to claim 1, wherein the media data and the haptic data are simultaneously received. 8. A non-transitory computer readable storage medium storing one or more programs configured to be executed by a processor, the one or more programs comprising instructions for:
receiving media data which includes at least video or audio data recorded at a remote capture device; receiving haptic data which includes at least acceleration or magnitude components recorded at the remote capture device; filtering the acceleration or magnitude components to create filtered haptic data; synchronizing the media data and the filtered haptic data to create the haptic encoded media; and playing the haptic encoded media on an electronic playback device which includes a haptic output device. 9. The non-transitory computer readable storage medium according to claim 8, wherein the electronic playback device is a mobile phone or tablet device. 10. The non-transitory computer readable storage medium according to claim 8, wherein the electronic playback device includes a codec configured to synchronize the media data and the haptic data. 11. The non-transitory computer readable storage medium according to claim 8, wherein the remote capture device includes a sensor that comprises an accelerometer, a gyroscope, or a contact pressure sensor. 12. The non-transitory computer readable storage medium according to claim 8, wherein the media data is received during the rendering of the synchronized media data and haptic data. 13. The non-transitory computer readable storage medium according to claim 8, wherein the media data received from the remote capture device is rendered in real-time. 14. The non-transitory computer readable storage medium according to claim 8, wherein the media data and the haptic data are simultaneously received. 15. A system comprising:
a processor; and a memory storing one or more programs for execution by the processor, the one or more programs including instructions for: receiving media data which includes at least video or audio data recorded at a remote capture device; receiving haptic data which includes at least acceleration or magnitude components recorded at the remote capture device; filtering the acceleration or magnitude components to create filtered haptic data; synchronizing the media data and the filtered haptic data to create the haptic encoded media; and playing the haptic encoded media on an electronic playback device which includes a haptic output device. 16. The system according to claim 15, wherein the electronic playback device is a mobile phone or tablet device. 17. The system according to claim 15, wherein the electronic playback device includes a codec configured to synchronize the media data and the haptic data. 18. The system according to claim 15, wherein the remote capture device includes a sensor that comprises an accelerometer, a gyroscope, or a contact pressure sensor. 19. The system according to claim 15, wherein the media data is received during the rendering of the synchronized media data and haptic data. 20. The system according to claim 15, wherein the media data received from the remote capture device is rendered in real-time. | 2,400 |
8,259 | 8,259 | 13,939,438 | 2,483 | A remote observation or surveillance device for simultaneous 360 degree imaging comprising a housing defining an internal chamber wherein each side wall includes a viewing window, a means for mounting having a slot, configuration of slots, track or combination thereof, a plurality of camera mounting brackets slidably and/or adjustably affixed to the mounting means through the slot or track, each bracket being adjustably affixed to a camera, wherein the cameras are configured to provide simultaneous 360 degree live or recorded imaging. The cameras can be configured to provide any combination of viewing angles and degrees of magnification or zoom. The device may also comprise a processor or server in operable communication with the cameras, which is configured to control the cameras and/or store and archive video, imaging, and/or audio data. | 1. A device for surveillance imaging approximately 360 degrees comprising:
a housing defining an internal chamber and including a viewing window on each side wall, wherein the internal chamber of the housing comprises,
(a) a means for mounting an electronic component, wherein the mounting means includes a slot, configuration of slots, track or combination thereof;
(b) a plurality of camera mounting brackets comprising one end having a camera mount configured to adjustably affix a camera, and another end configured to be slidably and/or adjustably affixed to the mounting means through the slot or configuration of slots in the mounting means; and
(c) a camera adjustably affixed to each bracket camera mount, wherein the cameras are configured to allow approximately 360 degree viewing or imaging simultaneously. 2. The device of claim 1, further comprising at least one of a computer processor or server, a microphone, a loud speaker, a projector, a local area network (LAN) connection, a wireless local area network (WLAN) connection, a wi-fi internet transmitter, a digital video recorder, a power panel, a patch panel, a climate control unit or a combination thereof. 3. The device of claim 2, wherein the processor or server is configured to capture and/or store imaging data from the cameras. 4. The device of claim 1, wherein the mounting means comprises at least one of a mounting platform having a top surface and a bottom surface and at least one slot or configuration of slots extending therethrough; a rail configured to form a slot, configuration of slots or track; a plurality of rails configured to form a slot, configuration of slots or track; or a combination of thereof. 5. The device of claim 4, wherein the mounting platform is affixed within the housing in a substantially horizontal plane near the top of the viewing window, near the bottom of the viewing window or both. 6. The device of claim 5, wherein the housing comprises two mounting platforms, each affixed within the housing in a substantially horizontal plane, wherein the mounting platforms define three compartments within the internal chamber of the housing. 7. The device of claim 1, comprising at least one of an analog camera, a digital camera or a combination thereof. 8. The device of claim 1, wherein the housing has at least three side walls, each comprising a viewing window 9. The device of claim 7, wherein the viewing window in the side walls is of a sufficient size to allow viewing of approximately 360 degrees. 10. The device of claim 1, wherein the housing is cylindrical, and wherein the side wall comprises a viewing window sufficient to provide for 360 degree imaging. 11. The device of claim 1, wherein the camera mounting bracket comprises a shaft which extends through the slot in the mounting platform, and is received by a fastener configured to rest on a surface of the means for mounting a camera mounting bracket, and to movably affix the camera in a position along the slot in the mounting platform. 12. The device of claim 4, wherein the slots in the mounting platform are in an “I-I-I” configuration as shown in FIGS. 12 and 13. 13. The device of claim 11, wherein the fastener is configured to be reversibly loosened and tightened, wherein when loosened the camera mounting bracket can be slid along the length of the slot in the mounting platform, and when tightened the camera is secured into position. 14. The device of claim 1, wherein the mounting platform is affixed in the internal chamber of the housing near the top of the viewing window, near the bottom of the viewing window or both. 15. The device of claim 14, wherein the mounting platform is affixed near the top of the viewing window within the housing. 16. The device of claim 14, wherein the mounting platform is secured within the housing at a height sufficient to align the viewing windows with the viewing angle of the cameras. 17. The device of claim 14, wherein the camera mounting brackets are slidably and/or adjustably affixed to the mounting platform near the top of the viewing window of the housing, near the bottom of the viewing window of the housing or both. 18. The device of claim 1, further comprising a door hingely connected a side wall. 19. An integrated 360 degree surveillance system comprising the device of claim 1, a computer processor or server, a wireless internet transmitter, and a remote display, wherein the cameras capture video or images simultaneously from substantially 360 degrees of viewing, the processor or server comprises a program or application configured to control camera function and store video or image data, and wherein the internet transmitter transmits the video or image data information to a remote display. 20. A device for surveillance imaging approximately 360 degrees comprising:
a housing defining an internal chamber and including a viewing window on each side wall, wherein the internal chamber of the housing comprises,
(a) a mounting platform comprising a slot or configuration of slots extending therethrough, wherein the mounting platform is affixed near the top of the viewing window, near the bottom of the viewing window or both;
(b) a plurality of camera mounting brackets comprising one end having a camera mount configured to adjustably affix a camera, and another end configured to be slidably and/or adjustably affixed to the mounting platform through the slot or configuration of slots in the mounting platform;
(c) a camera adjustably affixed to each bracket camera mount, wherein the cameras are configured to provide for approximately 360 degree viewing or imaging simultaneously; and
(d) a computer processor or server configured to receive, store and archive video and imaging data from the cameras. | A remote observation or surveillance device for simultaneous 360 degree imaging comprising a housing defining an internal chamber wherein each side wall includes a viewing window, a means for mounting having a slot, configuration of slots, track or combination thereof, a plurality of camera mounting brackets slidably and/or adjustably affixed to the mounting means through the slot or track, each bracket being adjustably affixed to a camera, wherein the cameras are configured to provide simultaneous 360 degree live or recorded imaging. The cameras can be configured to provide any combination of viewing angles and degrees of magnification or zoom. The device may also comprise a processor or server in operable communication with the cameras, which is configured to control the cameras and/or store and archive video, imaging, and/or audio data.1. A device for surveillance imaging approximately 360 degrees comprising:
a housing defining an internal chamber and including a viewing window on each side wall, wherein the internal chamber of the housing comprises,
(a) a means for mounting an electronic component, wherein the mounting means includes a slot, configuration of slots, track or combination thereof;
(b) a plurality of camera mounting brackets comprising one end having a camera mount configured to adjustably affix a camera, and another end configured to be slidably and/or adjustably affixed to the mounting means through the slot or configuration of slots in the mounting means; and
(c) a camera adjustably affixed to each bracket camera mount, wherein the cameras are configured to allow approximately 360 degree viewing or imaging simultaneously. 2. The device of claim 1, further comprising at least one of a computer processor or server, a microphone, a loud speaker, a projector, a local area network (LAN) connection, a wireless local area network (WLAN) connection, a wi-fi internet transmitter, a digital video recorder, a power panel, a patch panel, a climate control unit or a combination thereof. 3. The device of claim 2, wherein the processor or server is configured to capture and/or store imaging data from the cameras. 4. The device of claim 1, wherein the mounting means comprises at least one of a mounting platform having a top surface and a bottom surface and at least one slot or configuration of slots extending therethrough; a rail configured to form a slot, configuration of slots or track; a plurality of rails configured to form a slot, configuration of slots or track; or a combination of thereof. 5. The device of claim 4, wherein the mounting platform is affixed within the housing in a substantially horizontal plane near the top of the viewing window, near the bottom of the viewing window or both. 6. The device of claim 5, wherein the housing comprises two mounting platforms, each affixed within the housing in a substantially horizontal plane, wherein the mounting platforms define three compartments within the internal chamber of the housing. 7. The device of claim 1, comprising at least one of an analog camera, a digital camera or a combination thereof. 8. The device of claim 1, wherein the housing has at least three side walls, each comprising a viewing window 9. The device of claim 7, wherein the viewing window in the side walls is of a sufficient size to allow viewing of approximately 360 degrees. 10. The device of claim 1, wherein the housing is cylindrical, and wherein the side wall comprises a viewing window sufficient to provide for 360 degree imaging. 11. The device of claim 1, wherein the camera mounting bracket comprises a shaft which extends through the slot in the mounting platform, and is received by a fastener configured to rest on a surface of the means for mounting a camera mounting bracket, and to movably affix the camera in a position along the slot in the mounting platform. 12. The device of claim 4, wherein the slots in the mounting platform are in an “I-I-I” configuration as shown in FIGS. 12 and 13. 13. The device of claim 11, wherein the fastener is configured to be reversibly loosened and tightened, wherein when loosened the camera mounting bracket can be slid along the length of the slot in the mounting platform, and when tightened the camera is secured into position. 14. The device of claim 1, wherein the mounting platform is affixed in the internal chamber of the housing near the top of the viewing window, near the bottom of the viewing window or both. 15. The device of claim 14, wherein the mounting platform is affixed near the top of the viewing window within the housing. 16. The device of claim 14, wherein the mounting platform is secured within the housing at a height sufficient to align the viewing windows with the viewing angle of the cameras. 17. The device of claim 14, wherein the camera mounting brackets are slidably and/or adjustably affixed to the mounting platform near the top of the viewing window of the housing, near the bottom of the viewing window of the housing or both. 18. The device of claim 1, further comprising a door hingely connected a side wall. 19. An integrated 360 degree surveillance system comprising the device of claim 1, a computer processor or server, a wireless internet transmitter, and a remote display, wherein the cameras capture video or images simultaneously from substantially 360 degrees of viewing, the processor or server comprises a program or application configured to control camera function and store video or image data, and wherein the internet transmitter transmits the video or image data information to a remote display. 20. A device for surveillance imaging approximately 360 degrees comprising:
a housing defining an internal chamber and including a viewing window on each side wall, wherein the internal chamber of the housing comprises,
(a) a mounting platform comprising a slot or configuration of slots extending therethrough, wherein the mounting platform is affixed near the top of the viewing window, near the bottom of the viewing window or both;
(b) a plurality of camera mounting brackets comprising one end having a camera mount configured to adjustably affix a camera, and another end configured to be slidably and/or adjustably affixed to the mounting platform through the slot or configuration of slots in the mounting platform;
(c) a camera adjustably affixed to each bracket camera mount, wherein the cameras are configured to provide for approximately 360 degree viewing or imaging simultaneously; and
(d) a computer processor or server configured to receive, store and archive video and imaging data from the cameras. | 2,400 |
8,260 | 8,260 | 14,878,177 | 2,458 | This invention discloses a method and apparatus for providing reliable read receipts for messages communicated in an instant messaging system. Upon receiving an instant message via the instant messaging system, an embodiment of the invention displays a notification message or redacted version of the instant message (instead of the instant message) on a user device, such as a personal computer or a smartphone. The notification message or redacted message contains visual cues that invite a user to click, tap, or swipe on it to view the full content of the instant message. Upon receiving the responsive user action, the invention replaces the notification message or redacted message with the full instant message. And immediately after that, the invention sends a confirmation signal to the instant messaging system to indicate that a user has read the message. Meanwhile, the invention determines whether the instant message is an ephemeral message or not. If it is an ephemeral message, the invention receives a calculated ephemeral period from the instant messaging system and remove the instant message from the display after the ephemeral period has passed since receiving the user action. | 1. A method implemented on a user device for providing read receipts for messages communicated in an instant messaging system, the method comprising:
receiving a message via the instant messaging system; displaying a dummy message on a display of the user device; receiving a user action responsive to the dummy message; upon receiving the user action, removing the dummy message from the display and displaying the message on the display; and sending a confirmation signal to the instant messaging system to indicate that a user has read the message. 2. The method of claim 1, wherein the dummy message is a notification message that has a visual cue for inviting the user action. 3. The method of claim 2, wherein the visual cue comprises words. 4. The method of claim 1, wherein the dummy message is a redacted version of the message. 5. The method of claim 4, wherein the message is a text message and the redacted version of the message reveals only a predetermined number of words of the text message. 6. The method of claim 4, wherein the message contains an image and the redacted version of the message comprises the image redacted by a black circle in the middle of the image. 7. The method of claim 1, wherein the dummy message is highlighted in a color that's different from other messages. 8. The method of claim 1, wherein the user action is one of a mouse click, a finger tap on a touch screen of the display, and a finger swipe on the touch screen. 9. The method of claim 1 further comprising removing the message from the display after a predetermined period of time has passed since receiving the user action. 10. The method of claim 1, wherein the user device is a personal computer. 11. The method of claim 1, wherein the user device is a mobile device. 12. A personal computing device comprising:
a display; a memory for storing instructions; and a processor which, upon executing the instructions, performs a process comprising:
receiving a message from an instant messaging system;
displaying a dummy message on the display;
receiving a user action responsive to the dummy message;
upon receiving the user action, removing the dummy message from the display and displaying the message on the display; and
sending a confirmation signal to the instant messaging system to indicate that a user has read the message. 13. The personal computing device of claim 12, wherein the user action is one of a mouse click, a finger tap on a touch screen of the display, and a finger swipe on the touch screen. 14. The personal computing device of claim 13, wherein the process further comprises removing the message from the display after a predetermined period of time has passed since receiving the user action. 15. The personal computing device of claim 14, wherein the dummy message is a notification message that has a visual cue for inviting the user action. 16. The personal computing device of claim 14, wherein the dummy message is a redacted version of the message. 17. The personal computing device of claim 16, wherein the message contains an image and the redacted version of the message comprises the image redacted by a black circle in the middle of the image. 18. A non-transient computer readable medium programmed with computer readable code that upon execution by a processor of a mobile device causes the processor to:
display a notification message on a display of the mobile device in response to the mobile device's receipt of an instant message from a server, wherein the notification message invites a user action; receive the user action responsive to the notification message; replace the notification message with the instant message on the display upon receiving the user action; and send a confirmation signal to the server to indicate that a user has read the instant message. 19. The non-transient computer readable medium of claim 18, wherein execution by the processor further causes the processor to remove the instant message from the display after a predetermined period of time has passed since receiving the user action. 20. The non-transient computer readable medium of claim 18, wherein the user action is one of a mouse click, a finger tap on a touch screen of the display, and a finger swipe on the touch screen. | This invention discloses a method and apparatus for providing reliable read receipts for messages communicated in an instant messaging system. Upon receiving an instant message via the instant messaging system, an embodiment of the invention displays a notification message or redacted version of the instant message (instead of the instant message) on a user device, such as a personal computer or a smartphone. The notification message or redacted message contains visual cues that invite a user to click, tap, or swipe on it to view the full content of the instant message. Upon receiving the responsive user action, the invention replaces the notification message or redacted message with the full instant message. And immediately after that, the invention sends a confirmation signal to the instant messaging system to indicate that a user has read the message. Meanwhile, the invention determines whether the instant message is an ephemeral message or not. If it is an ephemeral message, the invention receives a calculated ephemeral period from the instant messaging system and remove the instant message from the display after the ephemeral period has passed since receiving the user action.1. A method implemented on a user device for providing read receipts for messages communicated in an instant messaging system, the method comprising:
receiving a message via the instant messaging system; displaying a dummy message on a display of the user device; receiving a user action responsive to the dummy message; upon receiving the user action, removing the dummy message from the display and displaying the message on the display; and sending a confirmation signal to the instant messaging system to indicate that a user has read the message. 2. The method of claim 1, wherein the dummy message is a notification message that has a visual cue for inviting the user action. 3. The method of claim 2, wherein the visual cue comprises words. 4. The method of claim 1, wherein the dummy message is a redacted version of the message. 5. The method of claim 4, wherein the message is a text message and the redacted version of the message reveals only a predetermined number of words of the text message. 6. The method of claim 4, wherein the message contains an image and the redacted version of the message comprises the image redacted by a black circle in the middle of the image. 7. The method of claim 1, wherein the dummy message is highlighted in a color that's different from other messages. 8. The method of claim 1, wherein the user action is one of a mouse click, a finger tap on a touch screen of the display, and a finger swipe on the touch screen. 9. The method of claim 1 further comprising removing the message from the display after a predetermined period of time has passed since receiving the user action. 10. The method of claim 1, wherein the user device is a personal computer. 11. The method of claim 1, wherein the user device is a mobile device. 12. A personal computing device comprising:
a display; a memory for storing instructions; and a processor which, upon executing the instructions, performs a process comprising:
receiving a message from an instant messaging system;
displaying a dummy message on the display;
receiving a user action responsive to the dummy message;
upon receiving the user action, removing the dummy message from the display and displaying the message on the display; and
sending a confirmation signal to the instant messaging system to indicate that a user has read the message. 13. The personal computing device of claim 12, wherein the user action is one of a mouse click, a finger tap on a touch screen of the display, and a finger swipe on the touch screen. 14. The personal computing device of claim 13, wherein the process further comprises removing the message from the display after a predetermined period of time has passed since receiving the user action. 15. The personal computing device of claim 14, wherein the dummy message is a notification message that has a visual cue for inviting the user action. 16. The personal computing device of claim 14, wherein the dummy message is a redacted version of the message. 17. The personal computing device of claim 16, wherein the message contains an image and the redacted version of the message comprises the image redacted by a black circle in the middle of the image. 18. A non-transient computer readable medium programmed with computer readable code that upon execution by a processor of a mobile device causes the processor to:
display a notification message on a display of the mobile device in response to the mobile device's receipt of an instant message from a server, wherein the notification message invites a user action; receive the user action responsive to the notification message; replace the notification message with the instant message on the display upon receiving the user action; and send a confirmation signal to the server to indicate that a user has read the instant message. 19. The non-transient computer readable medium of claim 18, wherein execution by the processor further causes the processor to remove the instant message from the display after a predetermined period of time has passed since receiving the user action. 20. The non-transient computer readable medium of claim 18, wherein the user action is one of a mouse click, a finger tap on a touch screen of the display, and a finger swipe on the touch screen. | 2,400 |
8,261 | 8,261 | 15,571,500 | 2,466 | Latency reduction techniques for radio access networks are described. In various embodiments, a reduced transmission time interval (rTTI) may be implemented in order to reduce air interface latency in a radio access network. In some embodiments, an rTTI block may be defined, and some operations may be performed in rTTI block-wise fashion in order to reduce the marginal overhead associated with implementation of the rTTI. In various embodiments in which an rTTI is implemented, DM-RS granularity may be improved by use of techniques that enable data and reference signals to be multiplexed within a same OFDM symbol. In some embodiments, a current transmission time interval (TTI) may be maintained, and latency reduction may be achieved via the use of novel techniques for one or more of code block (CB) segmentation, uplink (UL) resource element (RE) mapping and HARQ cycle timing. Other embodiments are described and claimed. | 1. An apparatus, comprising:
at least one memory; and logic, at least a portion of which is implemented in circuitry coupled to the at least one memory, the logic to:
access, at user equipment (UE), control information for a reduced transmission time interval (rTTI) block comprising a plurality of rTTIs including one or more rTTIs assigned to the UE;
identify resources of each of the one or more rTTIs based on the control information; and
wirelessly communicate with an evolved node B (eNB) via resources of at least one of the one or more rTTIs. 2. The apparatus of claim 1, the logic to:
identify an rTTI block sharing format for the rTTI block; and identify the one or more rTTIs assigned to the UE based on the rTTI block sharing format. 3. The apparatus of claim 1, the logic to:
identify, from among multiple defined rTTI block sizes, an rTTI block size associated with the rTTI block; and identifying the plurality of rTTIs based on the rTTI block size. 4. The apparatus of claim 1, the rTTI block to comprise a duration of one subframe. 5. The apparatus of claim 1, the control information to comprise rTTI block-wise downlink scheduling information identifying allocated physical downlink shared channel (PDSCH) resources of multiple rTTIs of the rTTI block, the rTTI block-wise downlink scheduling information to comprise a format matching a physical downlink control channel (PDCCH) downlink control information (DCI) format. 6. The apparatus of claim 5, the logic to:
process data received from the eNB via the PDSCH resources of the multiple rTTIs of the rTTI block; and generate an rTTI block-wise hybrid automatic repeat request (HARQ) feedback message for transmission over a physical uplink control channel (PUCCH) to provide HARQ feedback for the data. 7. The apparatus of claim 6, the rTTI block-wise HARQ feedback message to contain:
for each of the multiple rTTIs, respective individual HARQ feedback for data received via the allocated PDSCH resources of that rTTI; or a single collective acknowledgment (ACK) or negative acknowledgment (NACK) of all of the data received via the allocated PDSCH resources of the multiple rTTIs. 8. The apparatus of claim 1, the control information to be comprised in signals received via resources of a first rTTI of the rTTI block. 9. A system, comprising:
the apparatus of claim 1; at least one radio frequency (RF) transceiver; and at least one RF antenna. 10. An apparatus, comprising:
at least one memory; and logic, at least a portion of which is implemented in circuitry coupled to the at least one memory, the logic to:
assign one or more reduced transmit time intervals (rTTIs) to user equipment (UE), the one or more rTTIs to be comprised among a plurality of rTTIs of an rTTI block;
allocate resources of each of the one or more rTTIs for communication with the UE; and
generate control information for transmission during a first rTTI of the rTTI block, the control information to indicate the allocated resources of each of the one or more rTTIs. 11. The apparatus of claim 10, the logic to assign each of the plurality of rTTIs to the UE. 12. The apparatus of claim 10, the logic to:
assign the one or more rTTIs to the UE according to a pattern associated with an rTTI block sharing format; and assign one or more other rTTIs comprised among the plurality of rTTIs to a second UE according to the pattern associated with the rTTI block sharing format. 13. The apparatus of claim 10, the rTTI block to comprise a size selected from among multiple permissible rTTI block sizes. 14. The apparatus of claim 10, the rTTI block to comprise a duration of one subframe, each of the plurality of rTTIs to comprise a duration of one slot. 15. The apparatus of claim 10, the allocated resources to comprise resources of a physical downlink shared channel (PDSCH). 16. The apparatus of claim 10, the allocated resources to comprise resources of a physical uplink shared channel (PUSCH). 17. The apparatus of claim 10, the logic to:
generate rTTI block-wise hybrid automatic repeat request (HARQ) feedback for data received from the UE via the allocated resources; or process received rTTI block-wise HARQ feedback for data transmitted to the UE via the allocated resources. 18. At least one computer-readable storage medium comprising a set of instructions that, in response to being executed at user equipment (UE), cause the UE to:
identify control information for a reduced transmission time interval (rTTI) block comprising a plurality of rTTIs including one or more rTTIs assigned to a user equipment (UE), the control information to be comprised in signals received via resources of a first rTTI of the rTTI block; identify resources of each of the one or more rTTIs based on the control information; and wirelessly communicate with an evolved node B (eNB) via resources of at least one of the one or more rTTIs. 19. The at least one computer-readable storage medium of claim 18, the control information to comprise rTTI block-wise uplink scheduling information. 20. The at least one computer-readable storage medium of claim 19, comprising instructions that, in response to being executed at the UE, cause the UE to transmit data to the eNB over a physical uplink shared channel (PUSCH) via resources of multiple rTTIs assigned to the UE. 21. The at least one computer-readable storage medium of claim 20, comprising instructions that, in response to being executed at the UE, cause the UE to receive rTTI block-wise HARQ feedback for the data over a physical HARQ indicator channel (PHICH). 22. The at least one computer-readable storage medium of claim 21, the rTTI block-wise HARQ feedback to comprise:
for each of the multiple rTTIs, respective individual HARQ feedback for data transmitted over the PUSCH during that rTTI; or a single collective acknowledgment (ACK) or negative acknowledgment (NACK) of all of the data transmitted over the PUSCH during the multiple rTTIs. 23. The at least one computer-readable storage medium of claim 18, the control information to comprise rTTI block-wise downlink scheduling information identifying allocated physical downlink shared channel (PDSCH) resources of each of the one or more rTTIs assigned to the UE. 24. The at least one computer-readable storage medium of claim 18, the rTTI block to comprise a duration of 1 ms. 25. The at least one computer-readable storage medium of claim 18, each of the plurality of rTTIs to comprise a duration of 500 μs. | Latency reduction techniques for radio access networks are described. In various embodiments, a reduced transmission time interval (rTTI) may be implemented in order to reduce air interface latency in a radio access network. In some embodiments, an rTTI block may be defined, and some operations may be performed in rTTI block-wise fashion in order to reduce the marginal overhead associated with implementation of the rTTI. In various embodiments in which an rTTI is implemented, DM-RS granularity may be improved by use of techniques that enable data and reference signals to be multiplexed within a same OFDM symbol. In some embodiments, a current transmission time interval (TTI) may be maintained, and latency reduction may be achieved via the use of novel techniques for one or more of code block (CB) segmentation, uplink (UL) resource element (RE) mapping and HARQ cycle timing. Other embodiments are described and claimed.1. An apparatus, comprising:
at least one memory; and logic, at least a portion of which is implemented in circuitry coupled to the at least one memory, the logic to:
access, at user equipment (UE), control information for a reduced transmission time interval (rTTI) block comprising a plurality of rTTIs including one or more rTTIs assigned to the UE;
identify resources of each of the one or more rTTIs based on the control information; and
wirelessly communicate with an evolved node B (eNB) via resources of at least one of the one or more rTTIs. 2. The apparatus of claim 1, the logic to:
identify an rTTI block sharing format for the rTTI block; and identify the one or more rTTIs assigned to the UE based on the rTTI block sharing format. 3. The apparatus of claim 1, the logic to:
identify, from among multiple defined rTTI block sizes, an rTTI block size associated with the rTTI block; and identifying the plurality of rTTIs based on the rTTI block size. 4. The apparatus of claim 1, the rTTI block to comprise a duration of one subframe. 5. The apparatus of claim 1, the control information to comprise rTTI block-wise downlink scheduling information identifying allocated physical downlink shared channel (PDSCH) resources of multiple rTTIs of the rTTI block, the rTTI block-wise downlink scheduling information to comprise a format matching a physical downlink control channel (PDCCH) downlink control information (DCI) format. 6. The apparatus of claim 5, the logic to:
process data received from the eNB via the PDSCH resources of the multiple rTTIs of the rTTI block; and generate an rTTI block-wise hybrid automatic repeat request (HARQ) feedback message for transmission over a physical uplink control channel (PUCCH) to provide HARQ feedback for the data. 7. The apparatus of claim 6, the rTTI block-wise HARQ feedback message to contain:
for each of the multiple rTTIs, respective individual HARQ feedback for data received via the allocated PDSCH resources of that rTTI; or a single collective acknowledgment (ACK) or negative acknowledgment (NACK) of all of the data received via the allocated PDSCH resources of the multiple rTTIs. 8. The apparatus of claim 1, the control information to be comprised in signals received via resources of a first rTTI of the rTTI block. 9. A system, comprising:
the apparatus of claim 1; at least one radio frequency (RF) transceiver; and at least one RF antenna. 10. An apparatus, comprising:
at least one memory; and logic, at least a portion of which is implemented in circuitry coupled to the at least one memory, the logic to:
assign one or more reduced transmit time intervals (rTTIs) to user equipment (UE), the one or more rTTIs to be comprised among a plurality of rTTIs of an rTTI block;
allocate resources of each of the one or more rTTIs for communication with the UE; and
generate control information for transmission during a first rTTI of the rTTI block, the control information to indicate the allocated resources of each of the one or more rTTIs. 11. The apparatus of claim 10, the logic to assign each of the plurality of rTTIs to the UE. 12. The apparatus of claim 10, the logic to:
assign the one or more rTTIs to the UE according to a pattern associated with an rTTI block sharing format; and assign one or more other rTTIs comprised among the plurality of rTTIs to a second UE according to the pattern associated with the rTTI block sharing format. 13. The apparatus of claim 10, the rTTI block to comprise a size selected from among multiple permissible rTTI block sizes. 14. The apparatus of claim 10, the rTTI block to comprise a duration of one subframe, each of the plurality of rTTIs to comprise a duration of one slot. 15. The apparatus of claim 10, the allocated resources to comprise resources of a physical downlink shared channel (PDSCH). 16. The apparatus of claim 10, the allocated resources to comprise resources of a physical uplink shared channel (PUSCH). 17. The apparatus of claim 10, the logic to:
generate rTTI block-wise hybrid automatic repeat request (HARQ) feedback for data received from the UE via the allocated resources; or process received rTTI block-wise HARQ feedback for data transmitted to the UE via the allocated resources. 18. At least one computer-readable storage medium comprising a set of instructions that, in response to being executed at user equipment (UE), cause the UE to:
identify control information for a reduced transmission time interval (rTTI) block comprising a plurality of rTTIs including one or more rTTIs assigned to a user equipment (UE), the control information to be comprised in signals received via resources of a first rTTI of the rTTI block; identify resources of each of the one or more rTTIs based on the control information; and wirelessly communicate with an evolved node B (eNB) via resources of at least one of the one or more rTTIs. 19. The at least one computer-readable storage medium of claim 18, the control information to comprise rTTI block-wise uplink scheduling information. 20. The at least one computer-readable storage medium of claim 19, comprising instructions that, in response to being executed at the UE, cause the UE to transmit data to the eNB over a physical uplink shared channel (PUSCH) via resources of multiple rTTIs assigned to the UE. 21. The at least one computer-readable storage medium of claim 20, comprising instructions that, in response to being executed at the UE, cause the UE to receive rTTI block-wise HARQ feedback for the data over a physical HARQ indicator channel (PHICH). 22. The at least one computer-readable storage medium of claim 21, the rTTI block-wise HARQ feedback to comprise:
for each of the multiple rTTIs, respective individual HARQ feedback for data transmitted over the PUSCH during that rTTI; or a single collective acknowledgment (ACK) or negative acknowledgment (NACK) of all of the data transmitted over the PUSCH during the multiple rTTIs. 23. The at least one computer-readable storage medium of claim 18, the control information to comprise rTTI block-wise downlink scheduling information identifying allocated physical downlink shared channel (PDSCH) resources of each of the one or more rTTIs assigned to the UE. 24. The at least one computer-readable storage medium of claim 18, the rTTI block to comprise a duration of 1 ms. 25. The at least one computer-readable storage medium of claim 18, each of the plurality of rTTIs to comprise a duration of 500 μs. | 2,400 |
8,262 | 8,262 | 13,929,188 | 2,458 | Methods and systems for generating and executing a database process are described. One example method includes receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application. | 1. A computer-implemented method for performing actions on an application on a virtual server in a cloud system using an infrastructure protocol, the method executed by one or more processors, the method comprising:
receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application. 2. The method of claim 1, wherein receiving the request is performed by a communication proxy separate from the virtual server. 3. The method of claim 1, further comprising:
identifying one or more tenants associated with the virtual server in the cloud system; determining one or more network addresses, each network address uniquely associated with one of the one or more tenants; identifying a particular network address associated with the request; and determining a particular tenant associated with the particular network address, wherein the application is associated with the particular tenant. 4. The method of claim 3, further comprising:
identifying a requested resource associated with the request, the requested resource associated with the application and the particular tenant and identified in the request in a generic format; and transforming the request to identify the requested resource in a format specific to the particular tenant. 5. The method of claim 4, wherein the requested resource is a database table and transforming the request comprises transforming a table name associated with the database table into a table name specific to the particular tenant. 6. The method of claim 4, wherein the requested resource is a web page and transforming the request comprises transforming a Uniform Resource Locator (URL) associated with the web page into a URL specific to the particular tenant. 7. The method of claim 3, wherein the determined network address is an Internet Protocol (IP) address. 8. The method of claim 1, further comprising providing usage statistics associated with the application resources. 9. The method of claim 8, wherein providing usage statistics associated with the application resources includes providing at least one of: requests per second, memory usage, or concurrent connections. 10. The method of claim 8, wherein providing usage statistics associated with the application resources includes updating a standard file system location that indicates usage statistics for a virtual server. 11. The method of claim 8, wherein providing usage statistics associated with the application resources includes providing Simple Network Management Protocol (SNMP) messages that indicate the usage statistics. 12. A computer storage medium encoded with a computer program, the program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application. 13. The computer storage medium of claim 12, wherein receiving the request is performed by a communication proxy separate from the virtual server. 14. The computer storage medium of claim 12, wherein the operations further comprise:
identifying one or more tenants associated with the virtual server in the cloud system; determining one or more network addresses, each network address uniquely associated with one of the one or more tenants; identifying a particular network address associated with the request; and determining a particular tenant associated with the particular network address, wherein the application is associated with the particular tenant. 15. The computer storage medium of claim 14, wherein the operations further comprise:
identifying a requested resource associated with the request, the requested resource associated with the application and the particular tenant and identified in the request in a generic format; and transforming the request to identify the requested resource in a format specific to the particular tenant. 16. The computer storage medium of claim 15, wherein the requested resource is a database table and transforming the request comprises transforming a table name associated with the database table into a table name specific to the particular tenant. 17. The computer storage medium of claim 16, wherein the requested resource is a web page and transforming the request comprises transforming a Uniform Resource Locator (URL) associated with the web page into a URL specific to the particular tenant. 18. The computer storage medium of claim 12, wherein the operations further comprise providing usage statistics associated with the application resources. 19. The computer storage medium of claim 18, wherein providing usage statistics associated with the application resources includes:
providing at least one of: requests per second, memory usage, or concurrent connections; updating a standard file system location that indicates usage statistics for a virtual server; and providing Simple Network Management Protocol (SNMP) messages that indicate the usage statistics. 20. A system of one or more computers configured to perform operations comprising:
receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application. 21. The system of claim 20, wherein receiving the request is performed by a communication proxy separate from the virtual server. 22. The system of claim 20, wherein the operations further comprise:
identifying one or more tenants associated with the virtual server in the cloud system; determining one or more network addresses, each network address uniquely associated with one of the one or more tenants; identifying a particular network address associated with the request; and determining a particular tenant associated with the particular network address, wherein the application is associated with the particular tenant. 23. The system of claim 22, wherein the operations further comprise:
identifying a requested resource associated with the request, the requested resource associated with the application and the particular tenant and identified in the request in a generic format; and transforming the request to identify the requested resource in a format specific to the particular tenant. 24. The system of claim 23, wherein the requested resource is a database table and transforming the request comprises transforming a table name associated with the database table into a table name specific to the particular tenant. 25. The system of claim 23, wherein the requested resource is a web page and transforming the request comprises transforming a Uniform Resource Locator (URL) associated with the web page into a URL specific to the particular tenant. 26. The system of claim 21, wherein the operations further comprise providing usage statistics associated with the application resources. 27. The system of claim 26, wherein providing usage statistics associated with the application resources includes:
providing at least one of: requests per second, memory usage, or concurrent connections; updating a standard file system location that indicates usage statistics for a virtual server; and providing Simple Network Management Protocol (SNMP) messages that indicate the usage statistics. | Methods and systems for generating and executing a database process are described. One example method includes receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application.1. A computer-implemented method for performing actions on an application on a virtual server in a cloud system using an infrastructure protocol, the method executed by one or more processors, the method comprising:
receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application. 2. The method of claim 1, wherein receiving the request is performed by a communication proxy separate from the virtual server. 3. The method of claim 1, further comprising:
identifying one or more tenants associated with the virtual server in the cloud system; determining one or more network addresses, each network address uniquely associated with one of the one or more tenants; identifying a particular network address associated with the request; and determining a particular tenant associated with the particular network address, wherein the application is associated with the particular tenant. 4. The method of claim 3, further comprising:
identifying a requested resource associated with the request, the requested resource associated with the application and the particular tenant and identified in the request in a generic format; and transforming the request to identify the requested resource in a format specific to the particular tenant. 5. The method of claim 4, wherein the requested resource is a database table and transforming the request comprises transforming a table name associated with the database table into a table name specific to the particular tenant. 6. The method of claim 4, wherein the requested resource is a web page and transforming the request comprises transforming a Uniform Resource Locator (URL) associated with the web page into a URL specific to the particular tenant. 7. The method of claim 3, wherein the determined network address is an Internet Protocol (IP) address. 8. The method of claim 1, further comprising providing usage statistics associated with the application resources. 9. The method of claim 8, wherein providing usage statistics associated with the application resources includes providing at least one of: requests per second, memory usage, or concurrent connections. 10. The method of claim 8, wherein providing usage statistics associated with the application resources includes updating a standard file system location that indicates usage statistics for a virtual server. 11. The method of claim 8, wherein providing usage statistics associated with the application resources includes providing Simple Network Management Protocol (SNMP) messages that indicate the usage statistics. 12. A computer storage medium encoded with a computer program, the program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application. 13. The computer storage medium of claim 12, wherein receiving the request is performed by a communication proxy separate from the virtual server. 14. The computer storage medium of claim 12, wherein the operations further comprise:
identifying one or more tenants associated with the virtual server in the cloud system; determining one or more network addresses, each network address uniquely associated with one of the one or more tenants; identifying a particular network address associated with the request; and determining a particular tenant associated with the particular network address, wherein the application is associated with the particular tenant. 15. The computer storage medium of claim 14, wherein the operations further comprise:
identifying a requested resource associated with the request, the requested resource associated with the application and the particular tenant and identified in the request in a generic format; and transforming the request to identify the requested resource in a format specific to the particular tenant. 16. The computer storage medium of claim 15, wherein the requested resource is a database table and transforming the request comprises transforming a table name associated with the database table into a table name specific to the particular tenant. 17. The computer storage medium of claim 16, wherein the requested resource is a web page and transforming the request comprises transforming a Uniform Resource Locator (URL) associated with the web page into a URL specific to the particular tenant. 18. The computer storage medium of claim 12, wherein the operations further comprise providing usage statistics associated with the application resources. 19. The computer storage medium of claim 18, wherein providing usage statistics associated with the application resources includes:
providing at least one of: requests per second, memory usage, or concurrent connections; updating a standard file system location that indicates usage statistics for a virtual server; and providing Simple Network Management Protocol (SNMP) messages that indicate the usage statistics. 20. A system of one or more computers configured to perform operations comprising:
receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application. 21. The system of claim 20, wherein receiving the request is performed by a communication proxy separate from the virtual server. 22. The system of claim 20, wherein the operations further comprise:
identifying one or more tenants associated with the virtual server in the cloud system; determining one or more network addresses, each network address uniquely associated with one of the one or more tenants; identifying a particular network address associated with the request; and determining a particular tenant associated with the particular network address, wherein the application is associated with the particular tenant. 23. The system of claim 22, wherein the operations further comprise:
identifying a requested resource associated with the request, the requested resource associated with the application and the particular tenant and identified in the request in a generic format; and transforming the request to identify the requested resource in a format specific to the particular tenant. 24. The system of claim 23, wherein the requested resource is a database table and transforming the request comprises transforming a table name associated with the database table into a table name specific to the particular tenant. 25. The system of claim 23, wherein the requested resource is a web page and transforming the request comprises transforming a Uniform Resource Locator (URL) associated with the web page into a URL specific to the particular tenant. 26. The system of claim 21, wherein the operations further comprise providing usage statistics associated with the application resources. 27. The system of claim 26, wherein providing usage statistics associated with the application resources includes:
providing at least one of: requests per second, memory usage, or concurrent connections; updating a standard file system location that indicates usage statistics for a virtual server; and providing Simple Network Management Protocol (SNMP) messages that indicate the usage statistics. | 2,400 |
8,263 | 8,263 | 14,840,896 | 2,455 | A method includes publishing, by a server, an application program interface (API). The method also includes deploying the published API and a helper agent to a client system. The helper agent is configured to bind to the published API on the client system and send a plurality of feedback metrics about the client system to the server. The plurality of feedback metrics indicate at least one use of the published API by the client system. The method also includes receiving, from the helper agent, the plurality of feedback metrics about the client system. The method further includes analyzing, using a processor, the plurality of feedback metrics about the client system. | 1. A method, comprising:
publishing, by a server, an application program interface (API); deploying the published API and a helper agent to a client system, wherein the helper agent is configured to:
bind to the published API on the client system; and
send a plurality of feedback metrics about the client system to the server, the plurality of feedback metrics indicating at least one use of the published API by the client system;
receiving, from the helper agent, the plurality of feedback metrics about the client system; and analyzing, using a processor, the plurality of feedback metrics about the client system. 2. The method of claim 1, further comprising:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system does not use the at least one feature of the published API; and in response to determining that the client system does not use the at least one feature of the published API, modifying the at least one feature of the published API without alerting a system administrator for the client system and without impacting the client system. 3. The method of claim 1, further comprising:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; and in response to determining that the client system uses the at least one feature of the published API:
determining not to modify the published API; and
not modifying the published API. 4. The method of claim 1, further comprising:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; determining that the proposed modification is high priority; and in response to determining that the proposed modification is high priority:
modifying the at least one feature of the published API; and
alerting a system administrator for the client system that the at least one feature of the published API has been modified. 5. The method of claim 1, wherein the helper agent is further configured to:
scan an application on the client system associated with the published API; and in response to scanning the application on the client system:
generate a certification report comprising at least one feature of the published API used in the application and a dependency tree list of the at least one feature of the published API used in the application; and
send the certification report and the dependency tree list to the server. 6. The method of claim 1, further comprising saving the plurality of feedback metrics in a database,
wherein analyzing the plurality of feedback metrics about the client system further comprises:
retrieving all feedback metrics associated with the client system from the database; and
analyzing the retrieved metrics. 7. The method of claim 1, further comprising systematically polling the helper agent for real-time feedback metrics about the client system,
wherein the helper agent is further configured to send a plurality of real-time feedback metrics about the client system to the server when the helper agent is polled. 8. A computer configured to access a storage device, the computer comprising:
a processor; and a non-transitory, computer-readable storage medium storing computer-readable instructions that when executed by the processor cause the computer to perform:
publishing, by a server, an application program interface (API);
deploying the published API and a helper agent to a client system, wherein the helper agent is configured to:
bind to the published API on the client system; and
send a plurality of feedback metrics about the client system to the server, the plurality of feedback metrics indicating at least one use of the published API by the client system;
receiving, from the helper agent, the plurality of feedback metrics about the client system; and
analyzing, using the processor, the plurality of feedback metrics about the client system. 9. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system does not use the at least one feature of the published API; and in response to determining that the client system does not use the at least one feature of the published API, modifying the at least one feature of the published API without alerting a system administrator for the client system and without impacting the client system. 10. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; and in response to determining that the client system uses the at least one feature of the published API:
determining not to modify the published API; and
not modifying the published API. 11. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; determining that the proposed modification is high priority; and in response to determining that the proposed modification is high priority:
modifying the at least one feature of the published API; and
alerting a system administrator for the client system that the at least one feature of the published API has been modified. 12. The computer of claim 8, wherein the helper agent is further configured to:
scan an application on the client system associated with the published API; and in response to scanning the application on the client system:
generate a certification report comprising at least one feature of the published API used in the application and a dependency tree list of the at least one feature of the published API used in the application; and
send the certification report and the dependency tree list to the server. 13. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform saving the plurality of feedback metrics in a database,
wherein analyzing the plurality of feedback metrics about the client system further comprises:
retrieving all feedback metrics associated with the client system from the database; and
analyzing the retrieved metrics. 14. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform systematically polling the helper agent for real-time feedback metrics about the client system,
wherein the helper agent is further configured to send a plurality of real-time feedback metrics about the client system to the server when the helper agent is polled. 15. A computer program product comprising:
a computer-readable storage medium having computer-readable program code embodied therewith, the computer-readable program code comprising:
computer-readable program code configured to publish, by a server, an application program interface (API);
computer-readable program code configured to deploy the published API and a helper agent to a client system, wherein the helper agent is configured to:
bind to the published API on the client system; and
send a plurality of feedback metrics about the client system to the server, the plurality of feedback metrics indicating at least one use of the published API by the client system;
computer-readable program code configured to receive, from the helper agent, the plurality of feedback metrics about the client system; and
computer-readable program code configured to analyze, using a processor, the plurality of feedback metrics about the client system. 16. The computer program product of claim 15, wherein the computer-readable program code further comprises:
computer-readable program code configured to generate a proposed modification to at least one feature of the published API; computer-readable program code configured to determine, based on the plurality of feedback metrics, that the client system does not use the at least one feature of the published API; and computer-readable program code configured to, in response to determining that the client system does not use the at least one feature of the published API, modify the at least one feature of the published API without alerting a system administrator for the client system and without impacting the client system. 17. The computer program product of claim 15, wherein the computer-readable program code further comprises:
computer-readable program code configured to generate a proposed modification to at least one feature of the published API; computer-readable program code configured to determine, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; and computer-readable program code configured to, in response to determining that the client system uses the at least one feature of the published API:
determine not to modify the published API; and
not modify the published API. 18. The computer program product of claim 15, wherein the computer-readable program code further comprises:
computer-readable program code configured to generate a proposed modification to at least one feature of the published API; computer-readable program code configured to determine, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; computer-readable program code configured to determine that the proposed modification is high priority; and computer-readable program code configured to, in response to determining that the proposed modification is high priority:
modify the at least one feature of the published API; and
alert a system administrator for the client system that the at least one feature of the published API has been modified. 19. The computer program product of claim 15, wherein the helper agent is further configured to:
scan an application on the client system associated with the published API; and in response to scanning the application on the client system:
generate a certification report comprising at least one feature of the published API used in the application and a dependency tree list of the at least one feature of the published API used in the application; and
send the certification report and the dependency tree list to the server. 20. The computer program product of claim 15, wherein the computer-readable program code further comprises computer-readable program code configured to save the plurality of feedback metrics in a database,
wherein the computer-readable program code configured to analyze the plurality of feedback metrics about the client system further comprises:
computer-readable program code configured to retrieve all feedback metrics associated with the client system from the database; and
computer-readable program code configured to analyze the retrieved metrics. | A method includes publishing, by a server, an application program interface (API). The method also includes deploying the published API and a helper agent to a client system. The helper agent is configured to bind to the published API on the client system and send a plurality of feedback metrics about the client system to the server. The plurality of feedback metrics indicate at least one use of the published API by the client system. The method also includes receiving, from the helper agent, the plurality of feedback metrics about the client system. The method further includes analyzing, using a processor, the plurality of feedback metrics about the client system.1. A method, comprising:
publishing, by a server, an application program interface (API); deploying the published API and a helper agent to a client system, wherein the helper agent is configured to:
bind to the published API on the client system; and
send a plurality of feedback metrics about the client system to the server, the plurality of feedback metrics indicating at least one use of the published API by the client system;
receiving, from the helper agent, the plurality of feedback metrics about the client system; and analyzing, using a processor, the plurality of feedback metrics about the client system. 2. The method of claim 1, further comprising:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system does not use the at least one feature of the published API; and in response to determining that the client system does not use the at least one feature of the published API, modifying the at least one feature of the published API without alerting a system administrator for the client system and without impacting the client system. 3. The method of claim 1, further comprising:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; and in response to determining that the client system uses the at least one feature of the published API:
determining not to modify the published API; and
not modifying the published API. 4. The method of claim 1, further comprising:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; determining that the proposed modification is high priority; and in response to determining that the proposed modification is high priority:
modifying the at least one feature of the published API; and
alerting a system administrator for the client system that the at least one feature of the published API has been modified. 5. The method of claim 1, wherein the helper agent is further configured to:
scan an application on the client system associated with the published API; and in response to scanning the application on the client system:
generate a certification report comprising at least one feature of the published API used in the application and a dependency tree list of the at least one feature of the published API used in the application; and
send the certification report and the dependency tree list to the server. 6. The method of claim 1, further comprising saving the plurality of feedback metrics in a database,
wherein analyzing the plurality of feedback metrics about the client system further comprises:
retrieving all feedback metrics associated with the client system from the database; and
analyzing the retrieved metrics. 7. The method of claim 1, further comprising systematically polling the helper agent for real-time feedback metrics about the client system,
wherein the helper agent is further configured to send a plurality of real-time feedback metrics about the client system to the server when the helper agent is polled. 8. A computer configured to access a storage device, the computer comprising:
a processor; and a non-transitory, computer-readable storage medium storing computer-readable instructions that when executed by the processor cause the computer to perform:
publishing, by a server, an application program interface (API);
deploying the published API and a helper agent to a client system, wherein the helper agent is configured to:
bind to the published API on the client system; and
send a plurality of feedback metrics about the client system to the server, the plurality of feedback metrics indicating at least one use of the published API by the client system;
receiving, from the helper agent, the plurality of feedback metrics about the client system; and
analyzing, using the processor, the plurality of feedback metrics about the client system. 9. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system does not use the at least one feature of the published API; and in response to determining that the client system does not use the at least one feature of the published API, modifying the at least one feature of the published API without alerting a system administrator for the client system and without impacting the client system. 10. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; and in response to determining that the client system uses the at least one feature of the published API:
determining not to modify the published API; and
not modifying the published API. 11. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform:
generating a proposed modification to at least one feature of the published API; determining, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; determining that the proposed modification is high priority; and in response to determining that the proposed modification is high priority:
modifying the at least one feature of the published API; and
alerting a system administrator for the client system that the at least one feature of the published API has been modified. 12. The computer of claim 8, wherein the helper agent is further configured to:
scan an application on the client system associated with the published API; and in response to scanning the application on the client system:
generate a certification report comprising at least one feature of the published API used in the application and a dependency tree list of the at least one feature of the published API used in the application; and
send the certification report and the dependency tree list to the server. 13. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform saving the plurality of feedback metrics in a database,
wherein analyzing the plurality of feedback metrics about the client system further comprises:
retrieving all feedback metrics associated with the client system from the database; and
analyzing the retrieved metrics. 14. The computer of claim 8, wherein the computer-readable instructions further cause the computer to perform systematically polling the helper agent for real-time feedback metrics about the client system,
wherein the helper agent is further configured to send a plurality of real-time feedback metrics about the client system to the server when the helper agent is polled. 15. A computer program product comprising:
a computer-readable storage medium having computer-readable program code embodied therewith, the computer-readable program code comprising:
computer-readable program code configured to publish, by a server, an application program interface (API);
computer-readable program code configured to deploy the published API and a helper agent to a client system, wherein the helper agent is configured to:
bind to the published API on the client system; and
send a plurality of feedback metrics about the client system to the server, the plurality of feedback metrics indicating at least one use of the published API by the client system;
computer-readable program code configured to receive, from the helper agent, the plurality of feedback metrics about the client system; and
computer-readable program code configured to analyze, using a processor, the plurality of feedback metrics about the client system. 16. The computer program product of claim 15, wherein the computer-readable program code further comprises:
computer-readable program code configured to generate a proposed modification to at least one feature of the published API; computer-readable program code configured to determine, based on the plurality of feedback metrics, that the client system does not use the at least one feature of the published API; and computer-readable program code configured to, in response to determining that the client system does not use the at least one feature of the published API, modify the at least one feature of the published API without alerting a system administrator for the client system and without impacting the client system. 17. The computer program product of claim 15, wherein the computer-readable program code further comprises:
computer-readable program code configured to generate a proposed modification to at least one feature of the published API; computer-readable program code configured to determine, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; and computer-readable program code configured to, in response to determining that the client system uses the at least one feature of the published API:
determine not to modify the published API; and
not modify the published API. 18. The computer program product of claim 15, wherein the computer-readable program code further comprises:
computer-readable program code configured to generate a proposed modification to at least one feature of the published API; computer-readable program code configured to determine, based on the plurality of feedback metrics, that the client system uses the at least one feature of the published API; computer-readable program code configured to determine that the proposed modification is high priority; and computer-readable program code configured to, in response to determining that the proposed modification is high priority:
modify the at least one feature of the published API; and
alert a system administrator for the client system that the at least one feature of the published API has been modified. 19. The computer program product of claim 15, wherein the helper agent is further configured to:
scan an application on the client system associated with the published API; and in response to scanning the application on the client system:
generate a certification report comprising at least one feature of the published API used in the application and a dependency tree list of the at least one feature of the published API used in the application; and
send the certification report and the dependency tree list to the server. 20. The computer program product of claim 15, wherein the computer-readable program code further comprises computer-readable program code configured to save the plurality of feedback metrics in a database,
wherein the computer-readable program code configured to analyze the plurality of feedback metrics about the client system further comprises:
computer-readable program code configured to retrieve all feedback metrics associated with the client system from the database; and
computer-readable program code configured to analyze the retrieved metrics. | 2,400 |
8,264 | 8,264 | 14,890,912 | 2,492 | A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key includes performing a measurement on each system and/or application specific file before said file is being loaded or launched by a kernel module or an application loader of the computing system, directing the measurement results to the tamper-resistant hardware, maintaining an extend-only global counter at the tamper-resistant hardware, increasing the extend-only global counter upon receiving a measurement result, executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key, and keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware. | 1. A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key, the method comprising:
performing a measurement on each of one or more system specific and/or application specific files before each file is loaded or launched by a kernel module or an application loader of the computing system to produce measurement results; directing the measurement results to the tamper-resistant hardware; maintaining an extend-only global counter at the tamper-resistant hardware; increasing the extend-only global counter upon receiving one of the measurement results; executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key; and keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware. 2. The method according to claim 1, wherein the tamper-resistant hardware maintains an extend-only local register of a summary of the signatures generated by the tamper-resistant hardware. 3. The method according to claim 2, wherein the extend-only local register is extended each time the tamper-resistant hardware executes the signing process. 4. The method according to claim 1, wherein the one or more system specific and/or application specific files include one or more of classes, libraries, executables, kernel models, application files or configuration files. 5. The method according to claim 1, wherein the performing a measurement on each of one or more system specific and/or application specific files comprises calculating a hash of the content of the file being measured. 6. The method according to claim 1, wherein a service is provided on the computing system that interfaces between a kernel of the computing system and the tamper-resistant hardware. 7. The method according to claim 6, wherein the service is configured to receive the measurement results and to direct the measurement results together with respective signing requests to the tamper-resistant hardware. 8. The method according to claim 6, wherein the service is configured to receive the signatures generated by said tamper-resistant hardware and to keep the measurement list. 9. The method according to claim 1, wherein the performing a measurement on each of one or more system specific and/or application specific files comprises performing a measurement on a system specific file by a software based integrity measurement component implemented on the computing system. 10. The method according to claim 1, wherein the performing a measurement on each of one or more system specific and/or application specific files comprises performing a measurement on an application specific file by an application loader implemented on the computing system. 11. The method according to claim 1, wherein a measurement list is generated and stored separately for measurements performed on system specific files and a measurement list is generated and stored separately for measurements performed on application specific files. 12. The method according to claim 1, wherein measurement results related to application specific files are encrypted before being directed to a service provided on the computing system by using a key derived from a master key of the tamper-resistant hardware. 13. The method according to claim 1, wherein basic system files of computing systems that are loaded before the tamper-resistant hardware becomes active are launched according to a preset white list. 14. A mobile device computing system with secure boot functionality, the mobile device computing system comprising:
tamper-resistant hardware that provides secure storage of at least a cryptographic private key; a memory for keeping a measurement list that includes signatures generated by the tamper-resistant hardware; and at least one of:
a software based integrity measurement component configured to perform a measurement on each of at least one system specific file, or
an application loader configured to perform a measurement on each of at least one application specific file before each is loaded or launched, and to direct the measurement results to the tamper-resistant hardware, wherein the tamper-resistant hardware is configured to maintain an extend-only global counter, to increase the extend-only global counter upon receiving a measurement result, and to execute a signing process in which the extend-only global counter together with the measurement result is signed using the private key to generate the signatures. 15. The computing system according to claim 14, wherein the tamper-resistant hardware is a SIM card. 16. The computing system according to claim 14, wherein the software based integrity measurement component is provided in the computing system and includes an IMA kernel module. 17. The computing system according to claim 14, wherein a service is provided that interfaces between a kernel of the computing system and the tamper-resistant hardware component. 18. The computing system according to claim 17, wherein the service is implemented as a native daemon. 19. The computing system according to claim 17, wherein the service is implemented to run in kernel space. 20. A method for performing remote attestation of a mobile device computing system that includes a tamper resistant hardware that provides secure storage of at least a cryptographic private key, the method comprising:
performing a secure hoot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key by:
performing a measurement on each of one or more system specific and/or application specific files before each file is loaded or launched by a kernel module or an application loader of the computing system to produce measurement results;
directing the measurement results to the tamper-resistant hardware;
maintaining an extend-only global counter at the tamper-resistant hardware;
increasing the extend-only global upon receiving one of the measurement results;
executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key, and
keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware;
sending, by a verifier, an attestation request including a challenge to the computing system, wherein the challenge is directed to the tamper-resistant hardware; upon receiving the challenge, preparing, by the tamper-resistant hardware, an extended summary of the measurement results from a register of the tamper-resistant hardware; and sending to the verifier the extended summary of the measurement results with the measurement list such that the integrity of each loaded file can be verified by checking signed ones of the measurement results. 21. The method according to claim 20, wherein the challenge includes a random number. 22. The method according to claim 20, wherein the verifier specifies a time window for receiving a response to an attestation request from the computing system. | A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key includes performing a measurement on each system and/or application specific file before said file is being loaded or launched by a kernel module or an application loader of the computing system, directing the measurement results to the tamper-resistant hardware, maintaining an extend-only global counter at the tamper-resistant hardware, increasing the extend-only global counter upon receiving a measurement result, executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key, and keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware.1. A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key, the method comprising:
performing a measurement on each of one or more system specific and/or application specific files before each file is loaded or launched by a kernel module or an application loader of the computing system to produce measurement results; directing the measurement results to the tamper-resistant hardware; maintaining an extend-only global counter at the tamper-resistant hardware; increasing the extend-only global counter upon receiving one of the measurement results; executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key; and keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware. 2. The method according to claim 1, wherein the tamper-resistant hardware maintains an extend-only local register of a summary of the signatures generated by the tamper-resistant hardware. 3. The method according to claim 2, wherein the extend-only local register is extended each time the tamper-resistant hardware executes the signing process. 4. The method according to claim 1, wherein the one or more system specific and/or application specific files include one or more of classes, libraries, executables, kernel models, application files or configuration files. 5. The method according to claim 1, wherein the performing a measurement on each of one or more system specific and/or application specific files comprises calculating a hash of the content of the file being measured. 6. The method according to claim 1, wherein a service is provided on the computing system that interfaces between a kernel of the computing system and the tamper-resistant hardware. 7. The method according to claim 6, wherein the service is configured to receive the measurement results and to direct the measurement results together with respective signing requests to the tamper-resistant hardware. 8. The method according to claim 6, wherein the service is configured to receive the signatures generated by said tamper-resistant hardware and to keep the measurement list. 9. The method according to claim 1, wherein the performing a measurement on each of one or more system specific and/or application specific files comprises performing a measurement on a system specific file by a software based integrity measurement component implemented on the computing system. 10. The method according to claim 1, wherein the performing a measurement on each of one or more system specific and/or application specific files comprises performing a measurement on an application specific file by an application loader implemented on the computing system. 11. The method according to claim 1, wherein a measurement list is generated and stored separately for measurements performed on system specific files and a measurement list is generated and stored separately for measurements performed on application specific files. 12. The method according to claim 1, wherein measurement results related to application specific files are encrypted before being directed to a service provided on the computing system by using a key derived from a master key of the tamper-resistant hardware. 13. The method according to claim 1, wherein basic system files of computing systems that are loaded before the tamper-resistant hardware becomes active are launched according to a preset white list. 14. A mobile device computing system with secure boot functionality, the mobile device computing system comprising:
tamper-resistant hardware that provides secure storage of at least a cryptographic private key; a memory for keeping a measurement list that includes signatures generated by the tamper-resistant hardware; and at least one of:
a software based integrity measurement component configured to perform a measurement on each of at least one system specific file, or
an application loader configured to perform a measurement on each of at least one application specific file before each is loaded or launched, and to direct the measurement results to the tamper-resistant hardware, wherein the tamper-resistant hardware is configured to maintain an extend-only global counter, to increase the extend-only global counter upon receiving a measurement result, and to execute a signing process in which the extend-only global counter together with the measurement result is signed using the private key to generate the signatures. 15. The computing system according to claim 14, wherein the tamper-resistant hardware is a SIM card. 16. The computing system according to claim 14, wherein the software based integrity measurement component is provided in the computing system and includes an IMA kernel module. 17. The computing system according to claim 14, wherein a service is provided that interfaces between a kernel of the computing system and the tamper-resistant hardware component. 18. The computing system according to claim 17, wherein the service is implemented as a native daemon. 19. The computing system according to claim 17, wherein the service is implemented to run in kernel space. 20. A method for performing remote attestation of a mobile device computing system that includes a tamper resistant hardware that provides secure storage of at least a cryptographic private key, the method comprising:
performing a secure hoot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key by:
performing a measurement on each of one or more system specific and/or application specific files before each file is loaded or launched by a kernel module or an application loader of the computing system to produce measurement results;
directing the measurement results to the tamper-resistant hardware;
maintaining an extend-only global counter at the tamper-resistant hardware;
increasing the extend-only global upon receiving one of the measurement results;
executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key, and
keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware;
sending, by a verifier, an attestation request including a challenge to the computing system, wherein the challenge is directed to the tamper-resistant hardware; upon receiving the challenge, preparing, by the tamper-resistant hardware, an extended summary of the measurement results from a register of the tamper-resistant hardware; and sending to the verifier the extended summary of the measurement results with the measurement list such that the integrity of each loaded file can be verified by checking signed ones of the measurement results. 21. The method according to claim 20, wherein the challenge includes a random number. 22. The method according to claim 20, wherein the verifier specifies a time window for receiving a response to an attestation request from the computing system. | 2,400 |
8,265 | 8,265 | 14,484,939 | 2,486 | Techniques are disclosed for collaborative and synchronized photography across multiple digital camera devices. A panoramic photograph of a scene can be generated from separate photographs taken by each of the cameras simultaneously. During composition, the viewfinder images from each camera are collected and stitched together on the fly to create a panoramic preview image. The panoramic preview is then displayed on the camera devices as live visual guidance, which each user can use to change the orientation of the camera and thus change the composition of the panoramic photograph. In some cases, the host sends visual instructions to other camera devices to guide users in camera adjustment. When the desired composition is achieved, the host sends a trigger command to all of the cameras to take photographs simultaneously. Each of these separate photographs can then be stitched together to form a panoramic photograph. | 1. A computer-implemented digital image processing method comprising:
receiving a plurality of viewfinder images from a plurality of different camera devices, at least two of the viewfinder images including an overlapping field of view; combining, by a processor, each of the viewfinder images together to form a panoramic image based on the overlapping field of view; and sending the panoramic image to each of the camera devices for display in a user interface. 2. The method of claim 1, wherein the sending occurs in near real-time with respect to the receiving. 3. The method of claim 1, further comprising:
receiving a trigger request from one of the camera devices; and in response to the trigger request, sending a trigger command to all of the camera devices, the trigger command configured to cause each camera device to simultaneously acquire an image. 4. The method of claim 1, further comprising:
receiving an adjustment request from one of the camera devices, the adjustment request including a direction of aim; and in response to the adjustment request, sending an adjustment command to at least one of the camera devices, the adjustment command configured to cause the respective camera devices to display instructions to a user including the direction of aim. 5. A computer-implemented digital image processing method comprising:
obtaining a first viewfinder image from a camera; sending the first viewfinder image to a server; receiving, from the server, a panoramic preview image, the panoramic preview image including at least a portion of the first viewfinder image in combination with at least a portion of a second viewfinder image from a different camera; and displaying, via a display screen, the panoramic preview image. 6. The method of claim 5, further comprising:
receiving, from the server, the second viewfinder image; and displaying, via a display screen, the first and second viewfinder images separately from the panoramic preview image. 7. The method of claim 6, wherein the panoramic preview image changes as each of the first and second viewfinder images change in real-time or near real-time. 8. The method of claim 5, further comprising:
receiving touch contact input via the display screen, the touch contact input including a direction of aim; and in response to receiving the touch contact input, sending an adjustment request to the server, the adjustment request including the direction of aim. 9. The method of claim 5, further comprising:
receiving an adjustment command from the different camera, the adjustment request including a direction of aim; and in response to receiving the adjustment command, displaying aiming instructions to a user via the display screen, the aiming instructions including the direction of aim. 10. The method of claim 5, further comprising:
receiving a trigger request from the server; and in response to the trigger request, acquiring an image using the camera. 11-14. (canceled) 15. A system comprising:
a camera; a display screen; a storage; and a processor operatively coupled to the storage, the camera and the display screen, the processor configured to execute instructions stored in the storage that when executed cause the processor to carry out a process comprising:
obtaining a first viewfinder image from the camera;
sending the first viewfinder image to a server;
receiving, from the server, a panoramic preview image, the panoramic preview image including at least a portion of the first viewfinder image in combination with at least a portion of a second viewfinder image from a different camera; and
displaying, via the display screen, the panoramic preview image. 16. The system of claim 15, wherein the process further comprises:
receiving, from the server, the second viewfinder image; and displaying, via a display screen, the first and second viewfinder images separately from the panoramic preview image. 17. The system of claim 16, wherein the panoramic preview image changes as each of the first and second viewfinder images change in real-time or near real-time. 18. The system of claim 15, wherein the process further comprises:
receiving touch contact input via the display screen, the touch contact input including a direction of aim; and in response to receiving the touch contact input, sending an adjustment request to the server, the adjustment request including the direction of aim. 19. The system of claim 15, wherein the process further comprises:
receiving an adjustment command from the different camera, the adjustment request including a direction of aim; and in response to receiving the adjustment command, displaying aiming instructions to a user via the display screen, the aiming instructions including the direction of aim. 20. The system of claim 15, wherein the process further comprises:
receiving a trigger request from the server; and in response to the trigger request, acquiring an image using the camera. 21. The system of claim 15, wherein the process further comprises:
receiving a first trigger request from the camera; and in response to receiving the first trigger request, sending a second trigger request to the server. 22. The system of claim 15, wherein the process further comprises:
receiving a trigger request from the server; and in response to the trigger request, displaying a countdown sequence that culminates in acquisition of an image. 23. The method of claim 1, further comprising:
receiving a trigger request from one of the camera devices; and in response to the trigger request, sending a trigger command to all of the camera devices, the trigger command configured to cause each camera device to simultaneously display a countdown sequence that culminates in acquisition of an image. 24. The method of claim 5, further comprising:
receiving a first trigger request from the camera; and in response to receiving the first trigger request, sending a second trigger request to the server. | Techniques are disclosed for collaborative and synchronized photography across multiple digital camera devices. A panoramic photograph of a scene can be generated from separate photographs taken by each of the cameras simultaneously. During composition, the viewfinder images from each camera are collected and stitched together on the fly to create a panoramic preview image. The panoramic preview is then displayed on the camera devices as live visual guidance, which each user can use to change the orientation of the camera and thus change the composition of the panoramic photograph. In some cases, the host sends visual instructions to other camera devices to guide users in camera adjustment. When the desired composition is achieved, the host sends a trigger command to all of the cameras to take photographs simultaneously. Each of these separate photographs can then be stitched together to form a panoramic photograph.1. A computer-implemented digital image processing method comprising:
receiving a plurality of viewfinder images from a plurality of different camera devices, at least two of the viewfinder images including an overlapping field of view; combining, by a processor, each of the viewfinder images together to form a panoramic image based on the overlapping field of view; and sending the panoramic image to each of the camera devices for display in a user interface. 2. The method of claim 1, wherein the sending occurs in near real-time with respect to the receiving. 3. The method of claim 1, further comprising:
receiving a trigger request from one of the camera devices; and in response to the trigger request, sending a trigger command to all of the camera devices, the trigger command configured to cause each camera device to simultaneously acquire an image. 4. The method of claim 1, further comprising:
receiving an adjustment request from one of the camera devices, the adjustment request including a direction of aim; and in response to the adjustment request, sending an adjustment command to at least one of the camera devices, the adjustment command configured to cause the respective camera devices to display instructions to a user including the direction of aim. 5. A computer-implemented digital image processing method comprising:
obtaining a first viewfinder image from a camera; sending the first viewfinder image to a server; receiving, from the server, a panoramic preview image, the panoramic preview image including at least a portion of the first viewfinder image in combination with at least a portion of a second viewfinder image from a different camera; and displaying, via a display screen, the panoramic preview image. 6. The method of claim 5, further comprising:
receiving, from the server, the second viewfinder image; and displaying, via a display screen, the first and second viewfinder images separately from the panoramic preview image. 7. The method of claim 6, wherein the panoramic preview image changes as each of the first and second viewfinder images change in real-time or near real-time. 8. The method of claim 5, further comprising:
receiving touch contact input via the display screen, the touch contact input including a direction of aim; and in response to receiving the touch contact input, sending an adjustment request to the server, the adjustment request including the direction of aim. 9. The method of claim 5, further comprising:
receiving an adjustment command from the different camera, the adjustment request including a direction of aim; and in response to receiving the adjustment command, displaying aiming instructions to a user via the display screen, the aiming instructions including the direction of aim. 10. The method of claim 5, further comprising:
receiving a trigger request from the server; and in response to the trigger request, acquiring an image using the camera. 11-14. (canceled) 15. A system comprising:
a camera; a display screen; a storage; and a processor operatively coupled to the storage, the camera and the display screen, the processor configured to execute instructions stored in the storage that when executed cause the processor to carry out a process comprising:
obtaining a first viewfinder image from the camera;
sending the first viewfinder image to a server;
receiving, from the server, a panoramic preview image, the panoramic preview image including at least a portion of the first viewfinder image in combination with at least a portion of a second viewfinder image from a different camera; and
displaying, via the display screen, the panoramic preview image. 16. The system of claim 15, wherein the process further comprises:
receiving, from the server, the second viewfinder image; and displaying, via a display screen, the first and second viewfinder images separately from the panoramic preview image. 17. The system of claim 16, wherein the panoramic preview image changes as each of the first and second viewfinder images change in real-time or near real-time. 18. The system of claim 15, wherein the process further comprises:
receiving touch contact input via the display screen, the touch contact input including a direction of aim; and in response to receiving the touch contact input, sending an adjustment request to the server, the adjustment request including the direction of aim. 19. The system of claim 15, wherein the process further comprises:
receiving an adjustment command from the different camera, the adjustment request including a direction of aim; and in response to receiving the adjustment command, displaying aiming instructions to a user via the display screen, the aiming instructions including the direction of aim. 20. The system of claim 15, wherein the process further comprises:
receiving a trigger request from the server; and in response to the trigger request, acquiring an image using the camera. 21. The system of claim 15, wherein the process further comprises:
receiving a first trigger request from the camera; and in response to receiving the first trigger request, sending a second trigger request to the server. 22. The system of claim 15, wherein the process further comprises:
receiving a trigger request from the server; and in response to the trigger request, displaying a countdown sequence that culminates in acquisition of an image. 23. The method of claim 1, further comprising:
receiving a trigger request from one of the camera devices; and in response to the trigger request, sending a trigger command to all of the camera devices, the trigger command configured to cause each camera device to simultaneously display a countdown sequence that culminates in acquisition of an image. 24. The method of claim 5, further comprising:
receiving a first trigger request from the camera; and in response to receiving the first trigger request, sending a second trigger request to the server. | 2,400 |
8,266 | 8,266 | 14,752,241 | 2,486 | A received optical image is processed to generate a wide field-of-view (FOV) optical image displayed on a display. An indication is received to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image. A magnified PIP optical image is generated for display from a central area of a defined size of the wide FOV optical image and displayed on the display simultaneously with the wide FOV optical image. | 1. A method comprising:
processing a received optical image to generate a wide field-of-view (FOV) optical image; initiating display of the wide FOV optical image on a display; receiving an indication to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image; generating a magnified PIP optical image for display on the display, wherein the magnified PIP optical image is copied from a central area of a defined size of the wide FOV optical image; and initiating display of the magnified PIP optical image on the display simultaneously with the wide FOV optical image. 2. The method of claim 1, comprising receiving audio or other data associated with the optical image. 3. The method of claim 2, wherein the other data includes data received from temperature, altitude, humidity, atmospheric pressure, elevation, gyroscopic, accelerometer, light intensity, or compass sensors. 4. The method of claim 1, wherein processing includes formatting, sizing, scaling, color determination, temperature determination, contrast determination, and brightness determination. 5. The method of claim 1, wherein the magnified PIP optical image displays a lower pixel detailed image than the wide FOV optical image. 6. The method of claim 1, wherein the magnified PIP optical image displays a reticle reduced in size from a reticle displayed on the wide FOV optical image. 7. The method of claim 1, comprising correlating the magnified PIP optical image with the wide FOV optical image to provide situational awareness in relation to the wide FOV optical image. 8. The method of claim 1, wherein the magnified PIP optical image is displayed centered and above the center point of the wide FOV optical image. 9. A non-transitory, computer-readable medium storing computer-readable instructions, the instructions executable by a computer and configured to:
process a received optical image to generate a wide field-of-view (FOV) optical image; initiate display of the wide FOV optical image on a display; receive an indication to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image; generate a magnified PIP optical image for display on the display, wherein the magnified PIP optical image is copied from a central area of a defined size of the wide FOV optical image; and initiate display of the magnified PIP optical image on the display simultaneously with the wide FOV optical image. 10. The non-transitory, computer-readable medium of claim 9, comprising instructions to receive audio or other data associated with the optical image. 11. The non-transitory, computer-readable medium of claim 10, wherein the other data includes data received from temperature, altitude, humidity, atmospheric pressure, elevation, gyroscopic, accelerometer, light intensity, or compass sensors. 12. The non-transitory, computer-readable medium of claim 9, wherein processing includes formatting, sizing, scaling, color determination, temperature determination, contrast determination, and brightness determination. 13. The non-transitory, computer-readable medium of claim 9, wherein the magnified PIP optical image displays a lower pixel detailed image than the wide FOV optical image. 14. The non-transitory, computer-readable medium of claim 9, wherein the magnified PIP optical image displays a reticle reduced in size from a reticle displayed on the wide FOV optical image. 15. The non-transitory, computer-readable medium of claim 9, comprising instructions to correlate the magnified PIP optical image with the wide FOV optical image to provide situational awareness in relation to the wide FOV optical image. 16. The non-transitory, computer-readable medium of claim 9, wherein the magnified PIP optical image is displayed centered and above the center point of the wide FOV optical image. 17. A system, comprising:
a computer memory; at least one hardware processor interoperably coupled with the computer memory and configured to:
process a received optical image to generate a wide field-of-view (FOV) optical image;
initiate display of the wide FOV optical image on a display;
receive an indication to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image;
generate a magnified PIP optical image for display on the display, wherein the magnified PIP optical image is copied from a central area of a defined size of the wide FOV optical image; and
initiate display of the magnified PIP optical image on the display simultaneously with the wide FOV optical image. 18. The system of claim 17, configured to receive audio or other data associated with the optical image. 19. The system of claim 18, wherein the other data includes data received from temperature, altitude, humidity, atmospheric pressure, elevation, gyroscopic, accelerometer, light intensity, or compass sensors. 20. The system of claim 17, wherein processing includes formatting, sizing, scaling, color determination, temperature determination, contrast determination, and brightness determination. 21. The system of claim 17, wherein the magnified PIP optical image displays a lower pixel detailed image than the wide FOV optical image. 22. The system of claim 17, wherein the magnified PIP optical image displays a reticle reduced in size from a reticle displayed on the wide FOV optical image. 23. The system of claim 17, configured to correlate the magnified PIP optical image with the wide FOV optical image to provide situational awareness in relation to the wide FOV optical image. 24. The system of claim 17, wherein the magnified PIP optical image is displayed centered and above the center point of the wide FOV optical image. | A received optical image is processed to generate a wide field-of-view (FOV) optical image displayed on a display. An indication is received to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image. A magnified PIP optical image is generated for display from a central area of a defined size of the wide FOV optical image and displayed on the display simultaneously with the wide FOV optical image.1. A method comprising:
processing a received optical image to generate a wide field-of-view (FOV) optical image; initiating display of the wide FOV optical image on a display; receiving an indication to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image; generating a magnified PIP optical image for display on the display, wherein the magnified PIP optical image is copied from a central area of a defined size of the wide FOV optical image; and initiating display of the magnified PIP optical image on the display simultaneously with the wide FOV optical image. 2. The method of claim 1, comprising receiving audio or other data associated with the optical image. 3. The method of claim 2, wherein the other data includes data received from temperature, altitude, humidity, atmospheric pressure, elevation, gyroscopic, accelerometer, light intensity, or compass sensors. 4. The method of claim 1, wherein processing includes formatting, sizing, scaling, color determination, temperature determination, contrast determination, and brightness determination. 5. The method of claim 1, wherein the magnified PIP optical image displays a lower pixel detailed image than the wide FOV optical image. 6. The method of claim 1, wherein the magnified PIP optical image displays a reticle reduced in size from a reticle displayed on the wide FOV optical image. 7. The method of claim 1, comprising correlating the magnified PIP optical image with the wide FOV optical image to provide situational awareness in relation to the wide FOV optical image. 8. The method of claim 1, wherein the magnified PIP optical image is displayed centered and above the center point of the wide FOV optical image. 9. A non-transitory, computer-readable medium storing computer-readable instructions, the instructions executable by a computer and configured to:
process a received optical image to generate a wide field-of-view (FOV) optical image; initiate display of the wide FOV optical image on a display; receive an indication to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image; generate a magnified PIP optical image for display on the display, wherein the magnified PIP optical image is copied from a central area of a defined size of the wide FOV optical image; and initiate display of the magnified PIP optical image on the display simultaneously with the wide FOV optical image. 10. The non-transitory, computer-readable medium of claim 9, comprising instructions to receive audio or other data associated with the optical image. 11. The non-transitory, computer-readable medium of claim 10, wherein the other data includes data received from temperature, altitude, humidity, atmospheric pressure, elevation, gyroscopic, accelerometer, light intensity, or compass sensors. 12. The non-transitory, computer-readable medium of claim 9, wherein processing includes formatting, sizing, scaling, color determination, temperature determination, contrast determination, and brightness determination. 13. The non-transitory, computer-readable medium of claim 9, wherein the magnified PIP optical image displays a lower pixel detailed image than the wide FOV optical image. 14. The non-transitory, computer-readable medium of claim 9, wherein the magnified PIP optical image displays a reticle reduced in size from a reticle displayed on the wide FOV optical image. 15. The non-transitory, computer-readable medium of claim 9, comprising instructions to correlate the magnified PIP optical image with the wide FOV optical image to provide situational awareness in relation to the wide FOV optical image. 16. The non-transitory, computer-readable medium of claim 9, wherein the magnified PIP optical image is displayed centered and above the center point of the wide FOV optical image. 17. A system, comprising:
a computer memory; at least one hardware processor interoperably coupled with the computer memory and configured to:
process a received optical image to generate a wide field-of-view (FOV) optical image;
initiate display of the wide FOV optical image on a display;
receive an indication to display a magnified picture-in-picture (PIP) optical image on the display simultaneously with the wide FOV optical image;
generate a magnified PIP optical image for display on the display, wherein the magnified PIP optical image is copied from a central area of a defined size of the wide FOV optical image; and
initiate display of the magnified PIP optical image on the display simultaneously with the wide FOV optical image. 18. The system of claim 17, configured to receive audio or other data associated with the optical image. 19. The system of claim 18, wherein the other data includes data received from temperature, altitude, humidity, atmospheric pressure, elevation, gyroscopic, accelerometer, light intensity, or compass sensors. 20. The system of claim 17, wherein processing includes formatting, sizing, scaling, color determination, temperature determination, contrast determination, and brightness determination. 21. The system of claim 17, wherein the magnified PIP optical image displays a lower pixel detailed image than the wide FOV optical image. 22. The system of claim 17, wherein the magnified PIP optical image displays a reticle reduced in size from a reticle displayed on the wide FOV optical image. 23. The system of claim 17, configured to correlate the magnified PIP optical image with the wide FOV optical image to provide situational awareness in relation to the wide FOV optical image. 24. The system of claim 17, wherein the magnified PIP optical image is displayed centered and above the center point of the wide FOV optical image. | 2,400 |
8,267 | 8,267 | 15,198,531 | 2,446 | Systems and methods include a cloud hub located in a premises, and the cloud hub comprises adapters configured for coupling to premises devices. The cloud hub is configured as a gateway for the premises devices. The system includes a virtual gateway located in a cloud server environment and coupled to the cloud hub. The virtual gateway is configured as a server-side abstraction of the cloud hub. The cloud hub and the virtual gateway are configured as an automation platform that maintains state data of the premises devices, controls interaction among the premises devices, and monitors and manages the premises devices. | 1. A system comprising:
a cloud hub located in a premises, wherein the cloud hub comprises a plurality of adapters coupled to a plurality of premises devices, wherein the cloud hub is configured as a gateway for the premises devices; a virtual gateway located in a cloud server environment and coupled to the cloud hub, wherein the virtual gateway is configured as a server-side abstraction of the cloud hub, wherein the cloud hub and the virtual gateway are configured as an automation platform that maintains state data of the plurality of premises devices, controls interaction among the plurality of premises devices, and monitors and manages the plurality of premises devices. 2. The system of claim 1, wherein the plurality of adapters includes an internet protocol (IP) adapter. 3. The system of claim 2, wherein the IP adapter is coupled to a premises device including at least one IP device. 4. The system of claim 1, wherein the plurality of adapters includes a radio adapter. 5. The system of claim 4, wherein the radio adapter is configured to use a communication protocol of a premises device coupled to the radio adapter. 6. The system of claim 4, wherein the radio adapter includes a wireless radio adapter. 7. The system of claim 4, wherein the radio adapter is coupled to a premises device including at least one Zigbee device. 8. The system of claim 1, wherein the plurality of adapters includes a camera adapter. 9. The system of claim 8, wherein the camera adapter is coupled to a premises device including at least one camera device. 10. The system of claim 9, wherein the at least one camera device includes a tunnel camera. 11. The system of claim 1, wherein the plurality of adapters include a Wi-Fi adapter. 12. The system of claim 1, wherein the cloud hub is coupled to a radio frequency (RF) bridge in the premises. 13. The system of claim 1, wherein the RF bridge is coupled to at least one additional premises device. 14. The system of claim 1, wherein the at least one additional premises device includes at least one Z-Wave device. 15. The system of claim 1, wherein the cloud server environment includes a session server, wherein the virtual gateway is an instance of a plurality of virtual gateways running on the session server. 16. The system of claim 15, wherein the cloud server environment includes at least one of a registry gateway and a session gateway, wherein the at least one the registry gateway and a session gateway are coupled to the session server. 17. The system of claim 16, wherein the registry gateway is configured to identify the virtual gateway from the plurality of virtual gateways and route incoming data from the cloud hub to the virtual gateway. 18. The system of claim 17, wherein the routing of incoming data includes a mapping of premises device identification (ID) and device type to site ID corresponding to the premises. 19. The system of claim 18, wherein the premises device ID corresponds to at least one of the plurality of premises devices. 20. The system of claim 18, wherein the site ID is assigned to the cloud hub. 21. The system of claim 18, wherein the cloud hub is configured to communicate with the registry gateway and receive the site ID. 22. The system of claim 21, wherein the cloud hub is configured to communicate with the registry gateway and receive a network address of the credential gateway. 23. The system of claim 21, wherein the cloud server environment includes a credential gateway, wherein the cloud hub is configured to communicate with the credential gateway and, using the site ID, receive a key. 24. The system of claim 23, wherein the cloud hub is configured to receive session server data from the credential gateway, wherein the session server data includes a session server address. 25. The system of claim 15, wherein the virtual gateway comprises a first gateway state machine running on the session server. 26. The system of claim 25, wherein the cloud hub comprises a processor running a second gateway state machine. 27. The system of claim 26, wherein at least one of the first gateway state machine and the second gateway state machine maintains track of a state of the plurality of premises devices. 28. The system of claim 27, wherein at least one of the first gateway state machine and the second gateway state machine monitors and manages the plurality of premises devices. 29. The system of claim 27, wherein the first gateway state machine and the second gateway state machine maintain track of a state of the plurality of premises devices. 30. The system of claim 29, wherein the first gateway state machine and the second gateway state machine monitor and manage the plurality of premises devices. 31. The system of claim 1, comprising at least one premises device of the plurality of premises devices configured to communicate with the virtual gateway over a cellular coupling. 32. The system of claim 1, wherein inbound communications to the virtual gateway comprise packet communications. 33. The system of claim 32, wherein outbound communications from the virtual gateway comprise short message service (SMS) messages. 34. The system of claim 1, wherein the cloud hub is configured to maintain a persistent connection with the cloud server environment. 35. The system of claim 1, wherein the cloud hub is coupled to the cloud server environment using a broadband coupling. 36. The system of claim 1, wherein the cloud hub is coupled to the cloud server environment using a cellular coupling. 37. The system of claim 1, comprising a remote device coupled to the cloud server environment, wherein the remote device receives state data of the plurality of premises devices and provides control data to the plurality of premises devices. 38. The system of claim 37, wherein the remote device is coupled to the cloud server via at least one of a mobile portal and a web portal. 39. The system of claim 1, wherein the plurality of premises devices includes at least one of a sensor, a detector, a camera, an input/output (I/O) device, a touchscreen controller, a video camera, an input/output (I/O) device, an actuator, and a device controller that controls an attached device. 40. A method comprising:
configuring a cloud hub to include a plurality of adapters, wherein the plurality of adapters is coupled to a plurality of premises devices, wherein the cloud hub is located in a premises and configured as a gateway for the premises devices; configuring a cloud server environment to include a virtual gateway, wherein the virtual gateway is coupled to the cloud hub and configured as a server-side abstraction of the cloud hub; configuring the cloud hub and the virtual gateway as an automation platform that maintains state data of the plurality of premises devices, controls interaction among the plurality of premises devices, and monitors and manages the plurality of premises devices. 41. The method of claim 40, wherein the plurality of adapters includes an internet protocol (IP) adapter. 42. The method of claim 41, wherein the IP adapter is coupled to a premises device including at least one IP device. 43. The method of claim 40, wherein the plurality of adapters includes a radio adapter. 44. The method of claim 43, comprising configuring the radio adapter to use a communication protocol of a premises device coupled to the radio adapter. 45. The method of claim 43, wherein the radio adapter includes a wireless radio adapter. 46. The method of claim 43, wherein the radio adapter is coupled to a premises device including at least one Zigbee device. 47. The method of claim 40, wherein the plurality of adapters includes a camera adapter. 48. The method of claim 47, wherein the camera adapter is coupled to a premises device including at least one camera device. 49. The method of claim 48, wherein the at least one camera device includes a tunnel camera. 50. The method of claim 40, wherein the plurality of adapters include a Wi-Fi adapter. 51. The method of claim 40, wherein the cloud hub is coupled to a radio frequency (RF) bridge in the premises. 52. The method of claim 40, wherein the RF bridge is coupled to at least one additional premises device. 53. The method of claim 40, wherein the at least one additional premises device includes at least one Z-Wave device. 54. The method of claim 40, comprising configuring the cloud server environment to include a session server, wherein the virtual gateway is an instance of a plurality of virtual gateways running on the session server. 55. The method of claim 54, comprising configuring the cloud server environment to include at least one of a registry gateway and a session gateway, wherein the at least one of the registry gateway and the session gateway are coupled to the session server. 56. The method of claim 55, comprising configuring the registry gateway to identify the virtual gateway from the plurality of virtual gateways and route incoming data from the cloud hub to the virtual gateway. 57. The method of claim 56, comprising configuring the routing of incoming data to include a mapping of premises device identification (ID) and device type to site ID corresponding to the premises. 58. The method of claim 57, wherein the premises device ID corresponds to at least one of the plurality of premises devices. 59. The method of claim 57, wherein the site ID is assigned to the cloud hub. 60. The method of claim 57, comprising configuring the cloud hub to communicate with the registry gateway and receive the site ID. 61. The method of claim 60, comprising configuring the cloud hub to communicate with the registry gateway and receive a network address of the credential gateway. 62. The method of claim 60, comprising configuring the cloud server environment to include a credential gateway, and configuring the cloud hub to communicate with the credential gateway and, using the site ID, receive a key. 63. The method of claim 62, comprising configuring the cloud hub to receive session server data from the credential gateway, wherein the session server data includes a session server address. 64. The method of claim 54, comprising configuring the virtual gateway to include a first gateway state machine running on the session server. 65. The method of claim 64, comprising configuring the cloud hub to include a processor running a second gateway state machine. 66. The method of claim 65, comprising configuring at least one of the first gateway state machine and the second gateway state machine to maintain track of a state of the plurality of premises devices. 67. The method of claim 66, comprising configuring at least one of the first gateway state machine and the second gateway state machine to monitor and manage the plurality of premises devices. 68. The method of claim 66, comprising configuring the first gateway state machine and the second gateway state machine to maintain track of a state of the plurality of premises devices. 69. The method of claim 68, comprising configuring the first gateway state machine and the second gateway state machine to monitor and manage the plurality of premises devices. 70. The method of claim 40, comprising configuring at least one premises device of the plurality of premises devices to communicate with the virtual gateway over a cellular coupling. 71. The method of claim 40, comprising configuring inbound communications to the virtual gateway to include packet communications. 72. The method of claim 71, comprising configuring outbound communications from the virtual gateway to include short message service (SMS) messages. 73. The method of claim 40, comprising configuring the cloud hub to maintain a persistent connection with the cloud server environment. 74. The method of claim 40, wherein the cloud hub is coupled to the cloud server environment using a broadband coupling. 75. The method of claim 40, wherein the cloud hub is coupled to the cloud server environment using a cellular coupling. 76. The method of claim 40, comprising a remote device coupled to the cloud server environment, wherein the remote device receives state data of the plurality of premises devices and provides control data to the plurality of premises devices. 77. The method of claim 76, wherein the remote device is coupled to the cloud server via at least one of a mobile portal and a web portal. 78. The method of claim 40, wherein the plurality of premises devices includes at least one of a sensor, a detector, a camera, an input/output (I/O) device, a touchscreen controller, a video camera, an input/output (I/O) device, an actuator, and a device controller that controls an attached device. | Systems and methods include a cloud hub located in a premises, and the cloud hub comprises adapters configured for coupling to premises devices. The cloud hub is configured as a gateway for the premises devices. The system includes a virtual gateway located in a cloud server environment and coupled to the cloud hub. The virtual gateway is configured as a server-side abstraction of the cloud hub. The cloud hub and the virtual gateway are configured as an automation platform that maintains state data of the premises devices, controls interaction among the premises devices, and monitors and manages the premises devices.1. A system comprising:
a cloud hub located in a premises, wherein the cloud hub comprises a plurality of adapters coupled to a plurality of premises devices, wherein the cloud hub is configured as a gateway for the premises devices; a virtual gateway located in a cloud server environment and coupled to the cloud hub, wherein the virtual gateway is configured as a server-side abstraction of the cloud hub, wherein the cloud hub and the virtual gateway are configured as an automation platform that maintains state data of the plurality of premises devices, controls interaction among the plurality of premises devices, and monitors and manages the plurality of premises devices. 2. The system of claim 1, wherein the plurality of adapters includes an internet protocol (IP) adapter. 3. The system of claim 2, wherein the IP adapter is coupled to a premises device including at least one IP device. 4. The system of claim 1, wherein the plurality of adapters includes a radio adapter. 5. The system of claim 4, wherein the radio adapter is configured to use a communication protocol of a premises device coupled to the radio adapter. 6. The system of claim 4, wherein the radio adapter includes a wireless radio adapter. 7. The system of claim 4, wherein the radio adapter is coupled to a premises device including at least one Zigbee device. 8. The system of claim 1, wherein the plurality of adapters includes a camera adapter. 9. The system of claim 8, wherein the camera adapter is coupled to a premises device including at least one camera device. 10. The system of claim 9, wherein the at least one camera device includes a tunnel camera. 11. The system of claim 1, wherein the plurality of adapters include a Wi-Fi adapter. 12. The system of claim 1, wherein the cloud hub is coupled to a radio frequency (RF) bridge in the premises. 13. The system of claim 1, wherein the RF bridge is coupled to at least one additional premises device. 14. The system of claim 1, wherein the at least one additional premises device includes at least one Z-Wave device. 15. The system of claim 1, wherein the cloud server environment includes a session server, wherein the virtual gateway is an instance of a plurality of virtual gateways running on the session server. 16. The system of claim 15, wherein the cloud server environment includes at least one of a registry gateway and a session gateway, wherein the at least one the registry gateway and a session gateway are coupled to the session server. 17. The system of claim 16, wherein the registry gateway is configured to identify the virtual gateway from the plurality of virtual gateways and route incoming data from the cloud hub to the virtual gateway. 18. The system of claim 17, wherein the routing of incoming data includes a mapping of premises device identification (ID) and device type to site ID corresponding to the premises. 19. The system of claim 18, wherein the premises device ID corresponds to at least one of the plurality of premises devices. 20. The system of claim 18, wherein the site ID is assigned to the cloud hub. 21. The system of claim 18, wherein the cloud hub is configured to communicate with the registry gateway and receive the site ID. 22. The system of claim 21, wherein the cloud hub is configured to communicate with the registry gateway and receive a network address of the credential gateway. 23. The system of claim 21, wherein the cloud server environment includes a credential gateway, wherein the cloud hub is configured to communicate with the credential gateway and, using the site ID, receive a key. 24. The system of claim 23, wherein the cloud hub is configured to receive session server data from the credential gateway, wherein the session server data includes a session server address. 25. The system of claim 15, wherein the virtual gateway comprises a first gateway state machine running on the session server. 26. The system of claim 25, wherein the cloud hub comprises a processor running a second gateway state machine. 27. The system of claim 26, wherein at least one of the first gateway state machine and the second gateway state machine maintains track of a state of the plurality of premises devices. 28. The system of claim 27, wherein at least one of the first gateway state machine and the second gateway state machine monitors and manages the plurality of premises devices. 29. The system of claim 27, wherein the first gateway state machine and the second gateway state machine maintain track of a state of the plurality of premises devices. 30. The system of claim 29, wherein the first gateway state machine and the second gateway state machine monitor and manage the plurality of premises devices. 31. The system of claim 1, comprising at least one premises device of the plurality of premises devices configured to communicate with the virtual gateway over a cellular coupling. 32. The system of claim 1, wherein inbound communications to the virtual gateway comprise packet communications. 33. The system of claim 32, wherein outbound communications from the virtual gateway comprise short message service (SMS) messages. 34. The system of claim 1, wherein the cloud hub is configured to maintain a persistent connection with the cloud server environment. 35. The system of claim 1, wherein the cloud hub is coupled to the cloud server environment using a broadband coupling. 36. The system of claim 1, wherein the cloud hub is coupled to the cloud server environment using a cellular coupling. 37. The system of claim 1, comprising a remote device coupled to the cloud server environment, wherein the remote device receives state data of the plurality of premises devices and provides control data to the plurality of premises devices. 38. The system of claim 37, wherein the remote device is coupled to the cloud server via at least one of a mobile portal and a web portal. 39. The system of claim 1, wherein the plurality of premises devices includes at least one of a sensor, a detector, a camera, an input/output (I/O) device, a touchscreen controller, a video camera, an input/output (I/O) device, an actuator, and a device controller that controls an attached device. 40. A method comprising:
configuring a cloud hub to include a plurality of adapters, wherein the plurality of adapters is coupled to a plurality of premises devices, wherein the cloud hub is located in a premises and configured as a gateway for the premises devices; configuring a cloud server environment to include a virtual gateway, wherein the virtual gateway is coupled to the cloud hub and configured as a server-side abstraction of the cloud hub; configuring the cloud hub and the virtual gateway as an automation platform that maintains state data of the plurality of premises devices, controls interaction among the plurality of premises devices, and monitors and manages the plurality of premises devices. 41. The method of claim 40, wherein the plurality of adapters includes an internet protocol (IP) adapter. 42. The method of claim 41, wherein the IP adapter is coupled to a premises device including at least one IP device. 43. The method of claim 40, wherein the plurality of adapters includes a radio adapter. 44. The method of claim 43, comprising configuring the radio adapter to use a communication protocol of a premises device coupled to the radio adapter. 45. The method of claim 43, wherein the radio adapter includes a wireless radio adapter. 46. The method of claim 43, wherein the radio adapter is coupled to a premises device including at least one Zigbee device. 47. The method of claim 40, wherein the plurality of adapters includes a camera adapter. 48. The method of claim 47, wherein the camera adapter is coupled to a premises device including at least one camera device. 49. The method of claim 48, wherein the at least one camera device includes a tunnel camera. 50. The method of claim 40, wherein the plurality of adapters include a Wi-Fi adapter. 51. The method of claim 40, wherein the cloud hub is coupled to a radio frequency (RF) bridge in the premises. 52. The method of claim 40, wherein the RF bridge is coupled to at least one additional premises device. 53. The method of claim 40, wherein the at least one additional premises device includes at least one Z-Wave device. 54. The method of claim 40, comprising configuring the cloud server environment to include a session server, wherein the virtual gateway is an instance of a plurality of virtual gateways running on the session server. 55. The method of claim 54, comprising configuring the cloud server environment to include at least one of a registry gateway and a session gateway, wherein the at least one of the registry gateway and the session gateway are coupled to the session server. 56. The method of claim 55, comprising configuring the registry gateway to identify the virtual gateway from the plurality of virtual gateways and route incoming data from the cloud hub to the virtual gateway. 57. The method of claim 56, comprising configuring the routing of incoming data to include a mapping of premises device identification (ID) and device type to site ID corresponding to the premises. 58. The method of claim 57, wherein the premises device ID corresponds to at least one of the plurality of premises devices. 59. The method of claim 57, wherein the site ID is assigned to the cloud hub. 60. The method of claim 57, comprising configuring the cloud hub to communicate with the registry gateway and receive the site ID. 61. The method of claim 60, comprising configuring the cloud hub to communicate with the registry gateway and receive a network address of the credential gateway. 62. The method of claim 60, comprising configuring the cloud server environment to include a credential gateway, and configuring the cloud hub to communicate with the credential gateway and, using the site ID, receive a key. 63. The method of claim 62, comprising configuring the cloud hub to receive session server data from the credential gateway, wherein the session server data includes a session server address. 64. The method of claim 54, comprising configuring the virtual gateway to include a first gateway state machine running on the session server. 65. The method of claim 64, comprising configuring the cloud hub to include a processor running a second gateway state machine. 66. The method of claim 65, comprising configuring at least one of the first gateway state machine and the second gateway state machine to maintain track of a state of the plurality of premises devices. 67. The method of claim 66, comprising configuring at least one of the first gateway state machine and the second gateway state machine to monitor and manage the plurality of premises devices. 68. The method of claim 66, comprising configuring the first gateway state machine and the second gateway state machine to maintain track of a state of the plurality of premises devices. 69. The method of claim 68, comprising configuring the first gateway state machine and the second gateway state machine to monitor and manage the plurality of premises devices. 70. The method of claim 40, comprising configuring at least one premises device of the plurality of premises devices to communicate with the virtual gateway over a cellular coupling. 71. The method of claim 40, comprising configuring inbound communications to the virtual gateway to include packet communications. 72. The method of claim 71, comprising configuring outbound communications from the virtual gateway to include short message service (SMS) messages. 73. The method of claim 40, comprising configuring the cloud hub to maintain a persistent connection with the cloud server environment. 74. The method of claim 40, wherein the cloud hub is coupled to the cloud server environment using a broadband coupling. 75. The method of claim 40, wherein the cloud hub is coupled to the cloud server environment using a cellular coupling. 76. The method of claim 40, comprising a remote device coupled to the cloud server environment, wherein the remote device receives state data of the plurality of premises devices and provides control data to the plurality of premises devices. 77. The method of claim 76, wherein the remote device is coupled to the cloud server via at least one of a mobile portal and a web portal. 78. The method of claim 40, wherein the plurality of premises devices includes at least one of a sensor, a detector, a camera, an input/output (I/O) device, a touchscreen controller, a video camera, an input/output (I/O) device, an actuator, and a device controller that controls an attached device. | 2,400 |
8,268 | 8,268 | 15,466,197 | 2,477 | The present disclosure relates to a 5 th Generation (5G) or pre-5G communication system supporting a higher data transfer rate after a 4 th Generation (4G) communication system such as Long Term Evolution (LTE). In particular, a method and an apparatus for controlling communication of a terminal in a wireless communication system are provided. The method includes receiving information regarding an operation of a second system by using a first communication module configured to support a first system and controlling an activation state of a second communication module configured to support the second system, based on the information regarding the operation of the second system. | 1. A method for operating a terminal in a wireless communication system, the method comprising:
receiving, from a base station of a first system, via a first communication module for the first system, a signal comprising information indicating whether downlink traffic is generated for another terminal; and transmitting, to the another terminal, a signal for requesting to control an activation state of a communication module corresponding to the downlink traffic. 2. The method of claim 1,
wherein the communication module corresponding to the downlink traffic is configured to support at least one of the first system and the second system, and wherein the signal for requesting to control the activation state is transmitted from the first communication module or a third communication module or a third module different from the first module. 3. The method of claim 1, further comprising:
forming a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. 4. The method of claim 3, further comprising:
determining the terminal as a representative terminal between the terminal which has formed the group and the another terminal, wherein the representative terminal is determined based on at least one of a plurality of communication schemes supported by terminals in the group, a capacity of a communication module of each terminal in the group, a remaining power level of each terminal in the group, reception signal quality of each terminal in the group, and a topology for terminals in the group. 5. The method of claim 4,
wherein the first communication module is determined as a downlink monitor module among a plurality of communication modules included in the representative terminal, and wherein the downlink monitor module is determined based on at least one of a communication scheme supported by each terminal in the group, capacity of each of the plurality of communication modules, reception signal quality of each of the plurality of communication modules, a channel occupation probability of each of the plurality of communication modules, a power consumption amount of each of the plurality of communication modules, a type of an accessed base station, and a topology for terminals in the group. 6. The method of claim 1, wherein the first communication module is in an activation state when the signal is generated. 7. A method for operating a terminal in a wireless communication system, the method comprising:
receiving, from another terminal, via a first communication module corresponding to a first system, a signal for requesting to control an activation state of a second communication module corresponding to a second system; and controlling the activation state of the second communication module corresponding to the second system based on the signal received from the another terminal. 8. The method of claim 7,
wherein the controlling of the activation state of the second communication module corresponding to the second system based on the received signal comprises activating the second communication module based on the received signal, and wherein downlink data is received from a base station of the second system by using the activated second communication module. 9. The method of claim 7, wherein the activation state of the second communication module is changed according to the signal received from the another terminal. 10. The method of claim 7, further comprising:
forming a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. 11. An apparatus of a terminal in a wireless communication system, the apparatus comprising:
at least one communication module including a first communication module; and at least one processor, operatively coupled to the at least one communication module, configured to:
receive, from a base station of a first system, via the first communication module for the first system, a signal comprising information indicating whether downlink traffic is generated for another terminal, and
transmit, to the another terminal, a signal for requesting to control an activation state of a communication module corresponding to the downlink traffic. 12. The apparatus of claim 11,
wherein the communication module corresponding to the downlink traffic is configured to support at least one of the first system and the second system, and wherein the signal for requesting to control the activation state is transmitted from the first communication module or a third communication module or a third module different from the first module. 13. The apparatus of claim 11, wherein the at least one processor is further configured to form a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. 14. The apparatus of claim 13,
wherein the at least one processor is further configured to determine the terminal as a representative terminal between the terminal which has formed the group and the another terminal, and wherein the representative terminal is determined based on at least one of a plurality of communication schemes supported by terminals in the group, a capacity of a communication module of each terminal in the group, a remaining power level of each terminal in the group, reception signal quality of each terminal in the group, and a topology for terminals in the group. 15. The apparatus of claim 14,
wherein the first communication module is determined as a downlink monitor module among a plurality of communication modules included in the representative terminal, and wherein the downlink monitor module is determined based on at least one of a communication scheme supported by each terminal in the group, capacity of each of the plurality of communication modules, reception signal quality of each of the plurality of communication modules, a channel occupation probability of each of the plurality of communication modules, a power consumption amount of each of the plurality of communication modules, a type of an accessed base station, and a topology for terminals in the group. 16. The apparatus of claim 11, wherein the first communication module is in an activation state when the signal is generated. 17. An apparatus of a terminal in a wireless communication system, the apparatus comprising:
at least one communication module including a first communication module; and at least one processor, operatively coupled to the at least one communication module, configured to:
receive, from another terminal, via the first communication module corresponding to a first system, a signal for requesting to control an activation state of a second communication module corresponding to a second system, and
control the activation state of the second communication module corresponding to the second system based on the signal received from the another terminal. 18. The apparatus of claim 17,
wherein the at least one processor is further configured to activate the second communication module based on the received signal, and wherein downlink data is received from a base station of the second system by using the activated second communication module. 19. The apparatus of claim 17, wherein the activation state of the second communication module is changed according to the signal received from the another terminal. 20. The apparatus of claim 17, wherein the at least one processor is further configured to form a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. | The present disclosure relates to a 5 th Generation (5G) or pre-5G communication system supporting a higher data transfer rate after a 4 th Generation (4G) communication system such as Long Term Evolution (LTE). In particular, a method and an apparatus for controlling communication of a terminal in a wireless communication system are provided. The method includes receiving information regarding an operation of a second system by using a first communication module configured to support a first system and controlling an activation state of a second communication module configured to support the second system, based on the information regarding the operation of the second system.1. A method for operating a terminal in a wireless communication system, the method comprising:
receiving, from a base station of a first system, via a first communication module for the first system, a signal comprising information indicating whether downlink traffic is generated for another terminal; and transmitting, to the another terminal, a signal for requesting to control an activation state of a communication module corresponding to the downlink traffic. 2. The method of claim 1,
wherein the communication module corresponding to the downlink traffic is configured to support at least one of the first system and the second system, and wherein the signal for requesting to control the activation state is transmitted from the first communication module or a third communication module or a third module different from the first module. 3. The method of claim 1, further comprising:
forming a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. 4. The method of claim 3, further comprising:
determining the terminal as a representative terminal between the terminal which has formed the group and the another terminal, wherein the representative terminal is determined based on at least one of a plurality of communication schemes supported by terminals in the group, a capacity of a communication module of each terminal in the group, a remaining power level of each terminal in the group, reception signal quality of each terminal in the group, and a topology for terminals in the group. 5. The method of claim 4,
wherein the first communication module is determined as a downlink monitor module among a plurality of communication modules included in the representative terminal, and wherein the downlink monitor module is determined based on at least one of a communication scheme supported by each terminal in the group, capacity of each of the plurality of communication modules, reception signal quality of each of the plurality of communication modules, a channel occupation probability of each of the plurality of communication modules, a power consumption amount of each of the plurality of communication modules, a type of an accessed base station, and a topology for terminals in the group. 6. The method of claim 1, wherein the first communication module is in an activation state when the signal is generated. 7. A method for operating a terminal in a wireless communication system, the method comprising:
receiving, from another terminal, via a first communication module corresponding to a first system, a signal for requesting to control an activation state of a second communication module corresponding to a second system; and controlling the activation state of the second communication module corresponding to the second system based on the signal received from the another terminal. 8. The method of claim 7,
wherein the controlling of the activation state of the second communication module corresponding to the second system based on the received signal comprises activating the second communication module based on the received signal, and wherein downlink data is received from a base station of the second system by using the activated second communication module. 9. The method of claim 7, wherein the activation state of the second communication module is changed according to the signal received from the another terminal. 10. The method of claim 7, further comprising:
forming a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. 11. An apparatus of a terminal in a wireless communication system, the apparatus comprising:
at least one communication module including a first communication module; and at least one processor, operatively coupled to the at least one communication module, configured to:
receive, from a base station of a first system, via the first communication module for the first system, a signal comprising information indicating whether downlink traffic is generated for another terminal, and
transmit, to the another terminal, a signal for requesting to control an activation state of a communication module corresponding to the downlink traffic. 12. The apparatus of claim 11,
wherein the communication module corresponding to the downlink traffic is configured to support at least one of the first system and the second system, and wherein the signal for requesting to control the activation state is transmitted from the first communication module or a third communication module or a third module different from the first module. 13. The apparatus of claim 11, wherein the at least one processor is further configured to form a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. 14. The apparatus of claim 13,
wherein the at least one processor is further configured to determine the terminal as a representative terminal between the terminal which has formed the group and the another terminal, and wherein the representative terminal is determined based on at least one of a plurality of communication schemes supported by terminals in the group, a capacity of a communication module of each terminal in the group, a remaining power level of each terminal in the group, reception signal quality of each terminal in the group, and a topology for terminals in the group. 15. The apparatus of claim 14,
wherein the first communication module is determined as a downlink monitor module among a plurality of communication modules included in the representative terminal, and wherein the downlink monitor module is determined based on at least one of a communication scheme supported by each terminal in the group, capacity of each of the plurality of communication modules, reception signal quality of each of the plurality of communication modules, a channel occupation probability of each of the plurality of communication modules, a power consumption amount of each of the plurality of communication modules, a type of an accessed base station, and a topology for terminals in the group. 16. The apparatus of claim 11, wherein the first communication module is in an activation state when the signal is generated. 17. An apparatus of a terminal in a wireless communication system, the apparatus comprising:
at least one communication module including a first communication module; and at least one processor, operatively coupled to the at least one communication module, configured to:
receive, from another terminal, via the first communication module corresponding to a first system, a signal for requesting to control an activation state of a second communication module corresponding to a second system, and
control the activation state of the second communication module corresponding to the second system based on the signal received from the another terminal. 18. The apparatus of claim 17,
wherein the at least one processor is further configured to activate the second communication module based on the received signal, and wherein downlink data is received from a base station of the second system by using the activated second communication module. 19. The apparatus of claim 17, wherein the activation state of the second communication module is changed according to the signal received from the another terminal. 20. The apparatus of claim 17, wherein the at least one processor is further configured to form a group with the another terminal based on at least one of user input information, association history information stored in the terminal, and information acquired through signal transmission/reception to/from a neighboring terminal. | 2,400 |
8,269 | 8,269 | 15,008,438 | 2,426 | Systems, methods, architectures, mechanisms or apparatus for streaming content toward client devices, comprising a content delivery system configured to automatically ingest content asset packages and publish identifying data associated with content assets encrypted and stored therein at a content delivery network (CDN), a virtualized Digital Rights Management (DRM) platform configured to provide content encryption keys to the content delivery system and to authorized client devices, and a virtualized services platform configured to interact with client devices to authenticate client devices, receive client device content requests, and cause the CDN to transmit requested content to an authorized client device. | 1. An architecture for streaming content toward client devices, comprising:
a content delivery system configured to automatically ingest content asset packages and publish identifying data associated with content assets encrypted and stored therein at a content delivery network (CDN); a virtualized Digital Rights Management (DRM) platform configured to provide content encryption keys to the content delivery system and to authorized client devices; and a virtualized services platform configured to interact with client devices to authenticate client devices, receive client device content requests, and cause the CDN to transmit requested content to an authorized client device. | Systems, methods, architectures, mechanisms or apparatus for streaming content toward client devices, comprising a content delivery system configured to automatically ingest content asset packages and publish identifying data associated with content assets encrypted and stored therein at a content delivery network (CDN), a virtualized Digital Rights Management (DRM) platform configured to provide content encryption keys to the content delivery system and to authorized client devices, and a virtualized services platform configured to interact with client devices to authenticate client devices, receive client device content requests, and cause the CDN to transmit requested content to an authorized client device.1. An architecture for streaming content toward client devices, comprising:
a content delivery system configured to automatically ingest content asset packages and publish identifying data associated with content assets encrypted and stored therein at a content delivery network (CDN); a virtualized Digital Rights Management (DRM) platform configured to provide content encryption keys to the content delivery system and to authorized client devices; and a virtualized services platform configured to interact with client devices to authenticate client devices, receive client device content requests, and cause the CDN to transmit requested content to an authorized client device. | 2,400 |
8,270 | 8,270 | 15,191,493 | 2,415 | Disclosed embodiments facilitate wireless channel calibration, including ranging and direction finding, between wirelessly networked devices. In some embodiments. a method on a first station (STA) may comprise: transmitting a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmitting, after a Short Interval Frame Space (SIFS) time interval, a second frame. The second frame may be one of: a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or a Null Data Packet (NDP) frame, or a Beam Refinement Protocol (BRP) frame. The first NDPA frame may be unicast, multicast, or broadcast. | 1. A method on a first station (STA) comprising:
transmitting, at a first time, a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmitting, after a Short Interval Frame Space (SIFS) time interval from the first time, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 2. The method of claim 1, wherein:
transmitting the first NDPA frame comprises unicasting the first NDPA frame to a corresponding STA of the one or more second STAs; and transmitting the second frame comprises unicasting the second frame to the corresponding STA of the one or more second STAs. 3. The method of claim 2, further comprising:
receiving, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 4. The method of claim 3, wherein the FTM frame comprises an acknowledgment response bit, the acknowledgment response bit to indicate whether a response to the FTM frame may be sent in the form of an FTM Acknowledgment (FTM Ack) frame, and the method further comprises:
transmitting, based, in part, on a value of the acknowledgment response bit, an FTM Ack frame to the corresponding STA, the FTM Ack frame comprising one or more of:
a second timing information, the second timing information comprising one or more of: a time of arrival of the FTM frame at the first STA, or a time of transmission of the FTM Ack frame by the first STA, or
AoA information of the FTM frame; or
AoD information of the FTM frame; or
azimuth information pertaining to the corresponding STA, or
range information pertaining to the corresponding STA. 5. The method of claim 2, further comprising:
receiving, at the first STA, in response to the second frame, a Compressed Beamforming (CBF) frame, the CBF frame comprising one or more of:
a Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the corresponding STA, or
timing information for Round Trip Time (RTT) calculations by the first STA, the timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the CBF frame by the corresponding STA. 6. The method of claim 1, wherein:
transmitting the first NDPA frame comprises broadcasting the first NDPA frame to the one or more second STAs; and transmitting the second frame comprises broadcasting the second frame to the one or more second STAs. 7. The method of claim 6, further comprising:
receiving, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising:
a first corresponding Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs,
a time of reception of the second frame at the first corresponding STA, and
a time of transmission of the first CBF frame to the first STA. 8. The method of claim 7, further comprising:
transmitting one or more Beamforming Report Poll (BRP) frames, wherein each BRP frame comprises a corresponding Basic Service Set Identifier (BSS ID) associated with a second corresponding STA of the one or more second STAs. 9. The method of claim 8, further comprising:
receiving, in response to each of the one or more BRP frames, one or more corresponding second CBF frames, wherein each corresponding second CBF frame is received from a second corresponding STA of the one or more second STAs, wherein each corresponding second CBF frame comprises:
a second corresponding CFI field with information pertaining to a communication channel between the first STA and the second corresponding STA,
a time of reception of a corresponding BRP frame at the second corresponding STA, and
a time of transmission of the corresponding second CBF frame to the first STA. 10. The method of claim 9, further comprising:
transmitting, upon reception of a final corresponding second CBF frame received in response to the one or more BRP frames from a final second corresponding STA of the one or more second STAs, one of:
an FTM Acknowledgment (FTM Ack) frame with the time of reception of the final corresponding second CBF frame; or
an additional BRP frame with a null BSS ID and with the time of reception of the final corresponding second CBF frame. 11. The method of claim 9, further comprising:
broadcasting, upon reception of a final corresponding second CBF frame received in response to the one or more BRP frames from a final second corresponding STA of the one or more second STAs, an FTM Acknowledgment (FTM Ack) frame with one or more of: a time of transmission of the second frame, the time of reception of the first CBF frame and times of reception of each of the corresponding second CBF frames, or an Angle of Arrival (AoA) corresponding to the first CBF frame and Angles of Arrival of each of the corresponding second CBF frames, or an Angle of Departure (AoD) corresponding to the first CBF frame and Angles of Departure of each of the corresponding second CBF frames, or a Range, or Location Context Identifier (LCI), or Azimuth for each of the one or more second STAs. 12. The method of claim 10, further comprising:
receiving, from a third STA in the one or more second STAs, a Fine Timing Measurement (FTM) request for information; and transmitting, in response to the FTM request, an FTM frame to the third STA comprising one or more of:
a time of transmission of a corresponding BRP frame to the third STA,
the time of reception of a corresponding second CBF frame from the third STA, or
an Angle of Arrival (AoA) of the corresponding second CBF frame from the third STA, or
an Angle of Departure (AoD) of the corresponding second CBF frame from the third STA, or
a Range, or Location Context Identifier (LCI), or Azimuth for the third STA. 13. A first station (STA) comprising:
a memory, and a processor coupled to the memory, wherein the processor is configured to: transmit, at a first time, a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmit, after a Short Interval Frame Space (SIFS) time interval from the first time, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 14. The first STA of claim 13, wherein the processor is configured to:
transmit the first NDPA frame by unicasting the first NDPA frame to a corresponding STA of the one or more second STAs; and transmit the second frame by unicasting the second frame to the corresponding STA of the one or more second STAs. 15. The first STA of claim 14, wherein the processor is further configured to:
receive, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 16. The first STA of claim 15, wherein the FTM frame comprises an acknowledgment response bit, the acknowledgment response bit indicating whether a response to the FTM frame may be sent in the form of an FTM Acknowledgment (FTM Ack) frame, and the processor is further configured to:
transmit, based, in part, on a value of the acknowledgment response bit, an FTM Ack frame to the corresponding STA, the FTM Ack frame comprising one or more of:
a second timing information, the second timing information comprising one or more of: a time of arrival of the FTM frame at the first STA, or a time of transmission of the FTM Ack frame by the first STA, or
AoA information of the FTM frame; or
AoD information of the FTM frame; or
azimuth information pertaining to the corresponding STA, or
range information pertaining to the corresponding STA. 17. The first STA of claim 14, wherein the processor is further configured to:
receive, at the first STA, in response to the second frame, a Compressed Beamforming (CBF) frame, the CBF frame comprising one or more of:
a Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the corresponding STA, or
timing information for Round Trip Time (RTT) calculations by the first STA, the timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the CBF frame by the corresponding STA. 18. The first STA of claim 13, wherein the processor is configured to:
transmit the first NDPA frame by broadcasting the first NDPA frame to the one or more second STAs; and transmit the second frame by broadcasting the first NDPA frame to a corresponding STA of the one or more second STAs. 19. The first STA of claim 18, wherein the processor is further configured to:
receive, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising: a first corresponding Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs, a time of reception of the second frame at the first corresponding STA, and a time of transmission of the first CBF frame to the first STA. 20. The first STA of claim 19, wherein the processor is further configured to:
transmit one or more Beamforming Report Poll (BRP) frames, wherein each BRP frame comprises a corresponding Basic Service Set Identifier (BSS ID) associated with a second corresponding STA of the one or more second STAs. 21. The first STA of claim 20, wherein the processor is further configured to:
receive, in response to each of the one or more BRP frames, a corresponding second CBF frame, wherein each corresponding second CBF frame is received from the second corresponding STA of the one or more second STAs, wherein each corresponding second CBF frame comprises: a second corresponding CFI field pertaining to communication channel between the first STA and the second corresponding STA, a time of reception of a corresponding BRP frame at the second corresponding STA, and a time of transmission of the corresponding second CBF frame to the first STA. 22. The first STA of claim 21, wherein the processor is further configured to:
transmit, upon reception of a final corresponding second CBF frame received in response to the one or more BRP frames from a final second corresponding STA of the one or more second STAs, one of:
an FTM Acknowledgment (FTM Ack) frame with the time of reception of the final corresponding second CBF frame; or
an additional BRP frame with a null BSS ID and with the time of reception of the final corresponding second CBF frame. 23. The first STA of claim 21, wherein the processor is further configured to:
broadcast, upon reception of a final corresponding second CBF frame received in response the one or more BRP frames from a final second corresponding STA of the one or more second STAs, an FTM Acknowledgment (FTM Ack) frame with one or more of: a time of transmission of the second frame, the time of reception of the first CBF frame and times of reception of each of the corresponding second CBF frames, or an Angle of Arrival (AoA) corresponding to the first CBF frame and Angles of Arrival of each of the corresponding second CBF frames, or an Angle of Departure (AoD) corresponding to the first CBF frame and Angles of Departure of each of the corresponding second CBF frames, or a Range, or Location Context Identifier (LCI), or Azimuth for each of the one or more second STAs. 24. The first STA of claim 22, wherein the processor is further configured to:
receive, from a third STA in the one or more second STAs, a Fine Timing Measurement (FTM) request for information; and transmit, in response to the FTM request, an FTM frame to the third STA comprising one or more of:
a time of transmission of a corresponding BRP frame to the third STA,
the time of reception of a corresponding second CBF frame from the third STA, or
an Angle of Arrival (AoA) of the corresponding second CBF frame from the third STA, or
an Angle of Departure (AoD) of the corresponding second CBF frame from the third STA, or
a Range, or Location Context Identifier (LCI), or Azimuth for the third STA. 25. A first station (STA) comprising:
means for transmitting a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and means for transmitting, after a Short Interval Frame Space (SIFS) time interval, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 26. The first STA of claim 25, wherein:
means for transmitting the first NDPA frame comprises means for unicasting the first NDPA frame to a corresponding STA of the one or more second STAs, and means for transmitting the second frame comprises means for unicasting the second frame to the corresponding STA of the one or more second STAs; and the first STA further comprises: means for receiving, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 27. The first STA of claim 25, wherein
means for transmitting the first NDPA frame comprises means for broadcasting the first NDPA frame to the one or more second STAs, and means for transmitting the second frame comprises means for broadcasting the second frame to the one or more second STAs, and the first STA further comprises: means for receiving, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising:
a first corresponding Channel Feedback Information (CFI) field pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs,
a time of reception of the second frame at the first corresponding STA, and
a time of transmission of the first CBF frame to the first STA. 28. A non-transitory computer-readable medium comprising code executable by a processor to:
transmit a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmit, after a Short Interval Frame Space (SIFS) time interval, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 29. The computer-readable medium of claim 28, wherein the code executable by the processor to:
transmit the first NDPA frame unicasts the first NDPA frame to a corresponding STA of the one or more second STAs, and transmit the second frame unicasts the second frame to the corresponding STA of the one or more second STAs; and the medium further comprises code executable by the processor to: receive, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 30. The computer-readable medium of claim 28, wherein the code executable by the processor to:
transmit the first NDPA frame broadcasts the first NDPA frame to the one or more second STAs, and transmit the second frame broadcasts the second frame to the one or more second STAs; and the medium further comprises code executable by the processor to:
receive, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising one or more of:
a first corresponding Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs,
a time of reception of the second frame at the first corresponding STA, and a time of transmission of the first CBF frame to the first STA. | Disclosed embodiments facilitate wireless channel calibration, including ranging and direction finding, between wirelessly networked devices. In some embodiments. a method on a first station (STA) may comprise: transmitting a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmitting, after a Short Interval Frame Space (SIFS) time interval, a second frame. The second frame may be one of: a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or a Null Data Packet (NDP) frame, or a Beam Refinement Protocol (BRP) frame. The first NDPA frame may be unicast, multicast, or broadcast.1. A method on a first station (STA) comprising:
transmitting, at a first time, a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmitting, after a Short Interval Frame Space (SIFS) time interval from the first time, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 2. The method of claim 1, wherein:
transmitting the first NDPA frame comprises unicasting the first NDPA frame to a corresponding STA of the one or more second STAs; and transmitting the second frame comprises unicasting the second frame to the corresponding STA of the one or more second STAs. 3. The method of claim 2, further comprising:
receiving, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 4. The method of claim 3, wherein the FTM frame comprises an acknowledgment response bit, the acknowledgment response bit to indicate whether a response to the FTM frame may be sent in the form of an FTM Acknowledgment (FTM Ack) frame, and the method further comprises:
transmitting, based, in part, on a value of the acknowledgment response bit, an FTM Ack frame to the corresponding STA, the FTM Ack frame comprising one or more of:
a second timing information, the second timing information comprising one or more of: a time of arrival of the FTM frame at the first STA, or a time of transmission of the FTM Ack frame by the first STA, or
AoA information of the FTM frame; or
AoD information of the FTM frame; or
azimuth information pertaining to the corresponding STA, or
range information pertaining to the corresponding STA. 5. The method of claim 2, further comprising:
receiving, at the first STA, in response to the second frame, a Compressed Beamforming (CBF) frame, the CBF frame comprising one or more of:
a Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the corresponding STA, or
timing information for Round Trip Time (RTT) calculations by the first STA, the timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the CBF frame by the corresponding STA. 6. The method of claim 1, wherein:
transmitting the first NDPA frame comprises broadcasting the first NDPA frame to the one or more second STAs; and transmitting the second frame comprises broadcasting the second frame to the one or more second STAs. 7. The method of claim 6, further comprising:
receiving, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising:
a first corresponding Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs,
a time of reception of the second frame at the first corresponding STA, and
a time of transmission of the first CBF frame to the first STA. 8. The method of claim 7, further comprising:
transmitting one or more Beamforming Report Poll (BRP) frames, wherein each BRP frame comprises a corresponding Basic Service Set Identifier (BSS ID) associated with a second corresponding STA of the one or more second STAs. 9. The method of claim 8, further comprising:
receiving, in response to each of the one or more BRP frames, one or more corresponding second CBF frames, wherein each corresponding second CBF frame is received from a second corresponding STA of the one or more second STAs, wherein each corresponding second CBF frame comprises:
a second corresponding CFI field with information pertaining to a communication channel between the first STA and the second corresponding STA,
a time of reception of a corresponding BRP frame at the second corresponding STA, and
a time of transmission of the corresponding second CBF frame to the first STA. 10. The method of claim 9, further comprising:
transmitting, upon reception of a final corresponding second CBF frame received in response to the one or more BRP frames from a final second corresponding STA of the one or more second STAs, one of:
an FTM Acknowledgment (FTM Ack) frame with the time of reception of the final corresponding second CBF frame; or
an additional BRP frame with a null BSS ID and with the time of reception of the final corresponding second CBF frame. 11. The method of claim 9, further comprising:
broadcasting, upon reception of a final corresponding second CBF frame received in response to the one or more BRP frames from a final second corresponding STA of the one or more second STAs, an FTM Acknowledgment (FTM Ack) frame with one or more of: a time of transmission of the second frame, the time of reception of the first CBF frame and times of reception of each of the corresponding second CBF frames, or an Angle of Arrival (AoA) corresponding to the first CBF frame and Angles of Arrival of each of the corresponding second CBF frames, or an Angle of Departure (AoD) corresponding to the first CBF frame and Angles of Departure of each of the corresponding second CBF frames, or a Range, or Location Context Identifier (LCI), or Azimuth for each of the one or more second STAs. 12. The method of claim 10, further comprising:
receiving, from a third STA in the one or more second STAs, a Fine Timing Measurement (FTM) request for information; and transmitting, in response to the FTM request, an FTM frame to the third STA comprising one or more of:
a time of transmission of a corresponding BRP frame to the third STA,
the time of reception of a corresponding second CBF frame from the third STA, or
an Angle of Arrival (AoA) of the corresponding second CBF frame from the third STA, or
an Angle of Departure (AoD) of the corresponding second CBF frame from the third STA, or
a Range, or Location Context Identifier (LCI), or Azimuth for the third STA. 13. A first station (STA) comprising:
a memory, and a processor coupled to the memory, wherein the processor is configured to: transmit, at a first time, a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmit, after a Short Interval Frame Space (SIFS) time interval from the first time, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 14. The first STA of claim 13, wherein the processor is configured to:
transmit the first NDPA frame by unicasting the first NDPA frame to a corresponding STA of the one or more second STAs; and transmit the second frame by unicasting the second frame to the corresponding STA of the one or more second STAs. 15. The first STA of claim 14, wherein the processor is further configured to:
receive, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 16. The first STA of claim 15, wherein the FTM frame comprises an acknowledgment response bit, the acknowledgment response bit indicating whether a response to the FTM frame may be sent in the form of an FTM Acknowledgment (FTM Ack) frame, and the processor is further configured to:
transmit, based, in part, on a value of the acknowledgment response bit, an FTM Ack frame to the corresponding STA, the FTM Ack frame comprising one or more of:
a second timing information, the second timing information comprising one or more of: a time of arrival of the FTM frame at the first STA, or a time of transmission of the FTM Ack frame by the first STA, or
AoA information of the FTM frame; or
AoD information of the FTM frame; or
azimuth information pertaining to the corresponding STA, or
range information pertaining to the corresponding STA. 17. The first STA of claim 14, wherein the processor is further configured to:
receive, at the first STA, in response to the second frame, a Compressed Beamforming (CBF) frame, the CBF frame comprising one or more of:
a Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the corresponding STA, or
timing information for Round Trip Time (RTT) calculations by the first STA, the timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the CBF frame by the corresponding STA. 18. The first STA of claim 13, wherein the processor is configured to:
transmit the first NDPA frame by broadcasting the first NDPA frame to the one or more second STAs; and transmit the second frame by broadcasting the first NDPA frame to a corresponding STA of the one or more second STAs. 19. The first STA of claim 18, wherein the processor is further configured to:
receive, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising: a first corresponding Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs, a time of reception of the second frame at the first corresponding STA, and a time of transmission of the first CBF frame to the first STA. 20. The first STA of claim 19, wherein the processor is further configured to:
transmit one or more Beamforming Report Poll (BRP) frames, wherein each BRP frame comprises a corresponding Basic Service Set Identifier (BSS ID) associated with a second corresponding STA of the one or more second STAs. 21. The first STA of claim 20, wherein the processor is further configured to:
receive, in response to each of the one or more BRP frames, a corresponding second CBF frame, wherein each corresponding second CBF frame is received from the second corresponding STA of the one or more second STAs, wherein each corresponding second CBF frame comprises: a second corresponding CFI field pertaining to communication channel between the first STA and the second corresponding STA, a time of reception of a corresponding BRP frame at the second corresponding STA, and a time of transmission of the corresponding second CBF frame to the first STA. 22. The first STA of claim 21, wherein the processor is further configured to:
transmit, upon reception of a final corresponding second CBF frame received in response to the one or more BRP frames from a final second corresponding STA of the one or more second STAs, one of:
an FTM Acknowledgment (FTM Ack) frame with the time of reception of the final corresponding second CBF frame; or
an additional BRP frame with a null BSS ID and with the time of reception of the final corresponding second CBF frame. 23. The first STA of claim 21, wherein the processor is further configured to:
broadcast, upon reception of a final corresponding second CBF frame received in response the one or more BRP frames from a final second corresponding STA of the one or more second STAs, an FTM Acknowledgment (FTM Ack) frame with one or more of: a time of transmission of the second frame, the time of reception of the first CBF frame and times of reception of each of the corresponding second CBF frames, or an Angle of Arrival (AoA) corresponding to the first CBF frame and Angles of Arrival of each of the corresponding second CBF frames, or an Angle of Departure (AoD) corresponding to the first CBF frame and Angles of Departure of each of the corresponding second CBF frames, or a Range, or Location Context Identifier (LCI), or Azimuth for each of the one or more second STAs. 24. The first STA of claim 22, wherein the processor is further configured to:
receive, from a third STA in the one or more second STAs, a Fine Timing Measurement (FTM) request for information; and transmit, in response to the FTM request, an FTM frame to the third STA comprising one or more of:
a time of transmission of a corresponding BRP frame to the third STA,
the time of reception of a corresponding second CBF frame from the third STA, or
an Angle of Arrival (AoA) of the corresponding second CBF frame from the third STA, or
an Angle of Departure (AoD) of the corresponding second CBF frame from the third STA, or
a Range, or Location Context Identifier (LCI), or Azimuth for the third STA. 25. A first station (STA) comprising:
means for transmitting a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and means for transmitting, after a Short Interval Frame Space (SIFS) time interval, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 26. The first STA of claim 25, wherein:
means for transmitting the first NDPA frame comprises means for unicasting the first NDPA frame to a corresponding STA of the one or more second STAs, and means for transmitting the second frame comprises means for unicasting the second frame to the corresponding STA of the one or more second STAs; and the first STA further comprises: means for receiving, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 27. The first STA of claim 25, wherein
means for transmitting the first NDPA frame comprises means for broadcasting the first NDPA frame to the one or more second STAs, and means for transmitting the second frame comprises means for broadcasting the second frame to the one or more second STAs, and the first STA further comprises: means for receiving, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising:
a first corresponding Channel Feedback Information (CFI) field pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs,
a time of reception of the second frame at the first corresponding STA, and
a time of transmission of the first CBF frame to the first STA. 28. A non-transitory computer-readable medium comprising code executable by a processor to:
transmit a first NDPA frame to one or more second stations (STAs), the first NDPA frame comprising a first bit indicating that one or more subsequent frames comprise ranging or angular information; and transmit, after a Short Interval Frame Space (SIFS) time interval, a second frame, wherein the second frame is one of:
a Null Data Packet az (NDP_az) frame with information about a time of transmission of the NDP_az frame, or
a Null Data Packet (NDP) frame, or
a Beam Refinement Protocol (BRP) frame. 29. The computer-readable medium of claim 28, wherein the code executable by the processor to:
transmit the first NDPA frame unicasts the first NDPA frame to a corresponding STA of the one or more second STAs, and transmit the second frame unicasts the second frame to the corresponding STA of the one or more second STAs; and the medium further comprises code executable by the processor to: receive, at the first STA, in response to the second frame, a Fine Timing Measurement (FTM) frame from the corresponding STA with at least one of: a first timing information for Round Trip Time (RTT) calculations by the first STA, the first timing information comprising one or more of: a time of arrival of the second frame at the corresponding STA, or a time of transmission of the FTM frame, or an Angle of Arrival (AoA) of the second frame; or an Angle of Departure (AoD) of the second frame; or a Location Context Identifier (LCI) for the corresponding STA; or a Channel Feedback Information (CFI) field with information pertaining to a communication channel between the first STA and the corresponding STA, wherein the CFI field comprises one of: Channel Frequency Response (CFR) information, or Channel Impulse Response (CIR) information, or a subset of the CIR information with arrival information of the second frame, or Power Delay Profile (PDP) information, or First Arrival Correction (FAC) information for the second frame. 30. The computer-readable medium of claim 28, wherein the code executable by the processor to:
transmit the first NDPA frame broadcasts the first NDPA frame to the one or more second STAs, and transmit the second frame broadcasts the second frame to the one or more second STAs; and the medium further comprises code executable by the processor to:
receive, at the first STA, in response to the second frame, a first Compressed Beamforming (CBF) frame from a first corresponding STA in the one or more second STAs, the first CBF frame comprising one or more of:
a first corresponding Channel Feedback Information (CFI) field with information pertaining to communication channel between the first STA and the first corresponding STA in the one or more second STAs,
a time of reception of the second frame at the first corresponding STA, and a time of transmission of the first CBF frame to the first STA. | 2,400 |
8,271 | 8,271 | 15,177,911 | 2,412 | This disclosure provides systems, methods, and apparatus for reducing or avoiding interference between communications of one base station-user equipment pair and communications of another base station-user equipment pair. A first user equipment can monitor a timing offset between the communications and send the timing offset to a first base station that services the first user equipment. The first base station time advances a window of time during which it receives uplink signals from the first user equipment. The base station also sends a time advance value and instructions to the first user equipment to advance a window of time during which the first user equipment transmits uplink signals to the first base station. The timing advance value is based on the timing offset value determined by the first user equipment. Thus, a gap period between uplink and downlink windows is increased, thereby reducing interference. | 1. A method for reducing communication interference, comprising:
determining, at a first base station servicing a first user equipment, a synchronization error between a timing of a communication between the first base station and the first user equipment and a timing of a communication between a second base station and a second user equipment, wherein the synchronization error is represented by a timing offset value; and in response to determining the synchronization error, sending, from the first base station to the first user equipment, a timing advance value and instructions to advance by the timing advance value a window of time during which the first user equipment transmits uplink signals to the first base station, wherein the timing advance value is based on the timing offset value. 2. The method of claim 1, further comprising, in response to determining the synchronization error, advancing by the timing offset value a window of time at the first base station during which the first base station receives uplink signals from the first user equipment. 3. The method of claim 1, wherein determining a synchronization error, at the first base station servicing the first user equipment, includes receiving at the first base station a message indicating the synchronization error from the first user equipment. 4. The method of claim 3, further comprising receiving, at the first base station, the timing offset value from the first user equipment. 5. The method of claim 1, wherein sending, from the first base station to the first user equipment, the timing advance value includes sending the timing advance value based on a sum of the timing offset value and a propagation delay of signal transmission between the first base station and the first user equipment. 6. The method of claim 2, wherein advancing by the timing offset value the window of time at the first base station during which the first base station receives uplink signals from the first user equipment includes increasing a gap period between the window of time during which the first base station receives uplink signals and a window of time during which the first base station transmits downlink signals to the first user equipment by the timing offset value. 7. The method of claim 6, wherein determining, at the first base station, the synchronization error includes receiving a message from the second base station and determining the synchronization error based on the received message. 8. The method of claim 7, wherein receiving the message from the second base station includes receiving the message from the second base station via a backhaul network. 9. The method of claim 1, further comprising, in response to determining the synchronization error, sending, from the first base station, a message to each of a plurality of base stations instructing the plurality of base stations to advance, by the timing offset value, a window of time during which each of the plurality of base stations receives uplink signals from its respective user equipment. 10. An first base station for communicating with the first user equipment, comprising:
a communication interface configured to send and receive communications; and a processor coupled to the communication interface, configured to:
determine a synchronization error between a timing of a communication between the first base station and a first user equipment and a timing of a communication between a second base station and a second user equipment, wherein the synchronization error is represented by a timing offset value; and
in response to determining the synchronization error, send to the first user equipment a timing advance value and instructions to advance, by the timing advance value, a window of time during which the first user equipment transmits uplink signals to the first base station, wherein the timing advance value is based on the timing offset value. 11. The first base station of claim 10, wherein the processor is further configured to, in response to determining the synchronization error advance by the timing offset value a window of time during which uplink signals are received from the first user equipment. 12. The first base station of claim 10, wherein the communication interface includes a receiver configured to receive uplink signals from the first user equipment, and wherein the processor is configured to receive a message from the first user equipment via the receiver indicating the synchronization error. 13. The first base station of claim 11, wherein the processor is further configured to receive the timing offset value from the first user equipment via the receiver. 14. The first base station of claim 11, wherein the processor is further configured to determine the timing advance value sent to the first user equipment by adding the timing offset value to a propagation delay of signal transmission between the first base station and the first user equipment. 15. The first base station of claim 11, wherein the processor is further configured to advance, by a timing offset value, a window of time during which uplink signals are received from the first user equipment by increasing a gap period between the window of time during which the first base station receives uplink signals and a window of time during which the first base station transmits downlink signals to the first user equipment by the timing offset value. 16. The first base station of claim 10, wherein the communication interface includes a backhaul network interface for connecting to a backhaul network, and wherein the message is received from the second base station via the backhaul network interface. 17. The first base station of claim 10, wherein the processor is further configured to, in response to determining the synchronization error, send a message to each of a plurality of base stations instructing the plurality of base stations to advance, by the timing offset value, a window of time during which each of the plurality of base stations receives uplink signals from its respective user equipment. 18. A method for reducing interference in a communication network, comprising:
determining, at a first user equipment being served by a first base station, a timing offset representing a synchronization error between a timing of a communication between the first base station and the first user equipment and a timing of a communication between a second base station and a second user equipment; sending, from the first user equipment to the first base station, the determined timing offset; receiving, in response to the sending of the determined timing offset, a timing advance value from the first base station; and advancing, at the first user equipment, by the timing advance value, a window of time during which the first user equipment transmits uplink signals to the first base station, wherein the timing advance value is greater than a propagation delay of signal transmission between the first base station and the first user equipment. 19. The method of claim 18, wherein advancing, at the first user equipment, by the timing advance value, the window of time during which the first user equipment transmits uplink signals to the first base station includes increasing a gap period between the window of time during which the first user equipment transmits uplink signals to the first base station and a window of time during which the first user equipment receives downlink signals from the first base station. 20. A first user equipment for communicating with a first base station, comprising:
a transmitter configured to transmit uplink signals to the first base station, the first base station currently servicing the first user equipment; a receiver configured to receive communication signals from the first base station and communication signals from a second base station; and a processor coupled to the transmitter and receiver, configured to:
determine a timing offset representing a synchronization error between a timing of the communication signals received from the first base station and a timing of the communication received from the second base station;
send, via the transmitter, the determined timing offset to the first base station;
receive, in response to sending of the determined timing offset, a timing advance value from the first base station; and
advance, by the received timing advance value, a window of time during which uplink signals are transmitted to the first base station, wherein the timing advance value is greater than a propagation delay of signal transmission between the first base station and the first user equipment. 21. The first user equipment of claim 20, wherein the processor is configured to advance, by the received timing advance value, the window of time during which uplink signals are transmitted to the first base station by increasing a gap period between the window of time during which the first user equipment transmits uplink signals to the first base station and a window of time during which the first user equipment receives downlink signals from the first base station. | This disclosure provides systems, methods, and apparatus for reducing or avoiding interference between communications of one base station-user equipment pair and communications of another base station-user equipment pair. A first user equipment can monitor a timing offset between the communications and send the timing offset to a first base station that services the first user equipment. The first base station time advances a window of time during which it receives uplink signals from the first user equipment. The base station also sends a time advance value and instructions to the first user equipment to advance a window of time during which the first user equipment transmits uplink signals to the first base station. The timing advance value is based on the timing offset value determined by the first user equipment. Thus, a gap period between uplink and downlink windows is increased, thereby reducing interference.1. A method for reducing communication interference, comprising:
determining, at a first base station servicing a first user equipment, a synchronization error between a timing of a communication between the first base station and the first user equipment and a timing of a communication between a second base station and a second user equipment, wherein the synchronization error is represented by a timing offset value; and in response to determining the synchronization error, sending, from the first base station to the first user equipment, a timing advance value and instructions to advance by the timing advance value a window of time during which the first user equipment transmits uplink signals to the first base station, wherein the timing advance value is based on the timing offset value. 2. The method of claim 1, further comprising, in response to determining the synchronization error, advancing by the timing offset value a window of time at the first base station during which the first base station receives uplink signals from the first user equipment. 3. The method of claim 1, wherein determining a synchronization error, at the first base station servicing the first user equipment, includes receiving at the first base station a message indicating the synchronization error from the first user equipment. 4. The method of claim 3, further comprising receiving, at the first base station, the timing offset value from the first user equipment. 5. The method of claim 1, wherein sending, from the first base station to the first user equipment, the timing advance value includes sending the timing advance value based on a sum of the timing offset value and a propagation delay of signal transmission between the first base station and the first user equipment. 6. The method of claim 2, wherein advancing by the timing offset value the window of time at the first base station during which the first base station receives uplink signals from the first user equipment includes increasing a gap period between the window of time during which the first base station receives uplink signals and a window of time during which the first base station transmits downlink signals to the first user equipment by the timing offset value. 7. The method of claim 6, wherein determining, at the first base station, the synchronization error includes receiving a message from the second base station and determining the synchronization error based on the received message. 8. The method of claim 7, wherein receiving the message from the second base station includes receiving the message from the second base station via a backhaul network. 9. The method of claim 1, further comprising, in response to determining the synchronization error, sending, from the first base station, a message to each of a plurality of base stations instructing the plurality of base stations to advance, by the timing offset value, a window of time during which each of the plurality of base stations receives uplink signals from its respective user equipment. 10. An first base station for communicating with the first user equipment, comprising:
a communication interface configured to send and receive communications; and a processor coupled to the communication interface, configured to:
determine a synchronization error between a timing of a communication between the first base station and a first user equipment and a timing of a communication between a second base station and a second user equipment, wherein the synchronization error is represented by a timing offset value; and
in response to determining the synchronization error, send to the first user equipment a timing advance value and instructions to advance, by the timing advance value, a window of time during which the first user equipment transmits uplink signals to the first base station, wherein the timing advance value is based on the timing offset value. 11. The first base station of claim 10, wherein the processor is further configured to, in response to determining the synchronization error advance by the timing offset value a window of time during which uplink signals are received from the first user equipment. 12. The first base station of claim 10, wherein the communication interface includes a receiver configured to receive uplink signals from the first user equipment, and wherein the processor is configured to receive a message from the first user equipment via the receiver indicating the synchronization error. 13. The first base station of claim 11, wherein the processor is further configured to receive the timing offset value from the first user equipment via the receiver. 14. The first base station of claim 11, wherein the processor is further configured to determine the timing advance value sent to the first user equipment by adding the timing offset value to a propagation delay of signal transmission between the first base station and the first user equipment. 15. The first base station of claim 11, wherein the processor is further configured to advance, by a timing offset value, a window of time during which uplink signals are received from the first user equipment by increasing a gap period between the window of time during which the first base station receives uplink signals and a window of time during which the first base station transmits downlink signals to the first user equipment by the timing offset value. 16. The first base station of claim 10, wherein the communication interface includes a backhaul network interface for connecting to a backhaul network, and wherein the message is received from the second base station via the backhaul network interface. 17. The first base station of claim 10, wherein the processor is further configured to, in response to determining the synchronization error, send a message to each of a plurality of base stations instructing the plurality of base stations to advance, by the timing offset value, a window of time during which each of the plurality of base stations receives uplink signals from its respective user equipment. 18. A method for reducing interference in a communication network, comprising:
determining, at a first user equipment being served by a first base station, a timing offset representing a synchronization error between a timing of a communication between the first base station and the first user equipment and a timing of a communication between a second base station and a second user equipment; sending, from the first user equipment to the first base station, the determined timing offset; receiving, in response to the sending of the determined timing offset, a timing advance value from the first base station; and advancing, at the first user equipment, by the timing advance value, a window of time during which the first user equipment transmits uplink signals to the first base station, wherein the timing advance value is greater than a propagation delay of signal transmission between the first base station and the first user equipment. 19. The method of claim 18, wherein advancing, at the first user equipment, by the timing advance value, the window of time during which the first user equipment transmits uplink signals to the first base station includes increasing a gap period between the window of time during which the first user equipment transmits uplink signals to the first base station and a window of time during which the first user equipment receives downlink signals from the first base station. 20. A first user equipment for communicating with a first base station, comprising:
a transmitter configured to transmit uplink signals to the first base station, the first base station currently servicing the first user equipment; a receiver configured to receive communication signals from the first base station and communication signals from a second base station; and a processor coupled to the transmitter and receiver, configured to:
determine a timing offset representing a synchronization error between a timing of the communication signals received from the first base station and a timing of the communication received from the second base station;
send, via the transmitter, the determined timing offset to the first base station;
receive, in response to sending of the determined timing offset, a timing advance value from the first base station; and
advance, by the received timing advance value, a window of time during which uplink signals are transmitted to the first base station, wherein the timing advance value is greater than a propagation delay of signal transmission between the first base station and the first user equipment. 21. The first user equipment of claim 20, wherein the processor is configured to advance, by the received timing advance value, the window of time during which uplink signals are transmitted to the first base station by increasing a gap period between the window of time during which the first user equipment transmits uplink signals to the first base station and a window of time during which the first user equipment receives downlink signals from the first base station. | 2,400 |
8,272 | 8,272 | 15,404,484 | 2,424 | A method and a system for managing an application of a set-top box, method including making connection with a terminal using a local network, downloading the application from the terminal using an application store of the terminal and installing the application, receiving installation data or deletion data of the application from the terminal, and managing the application using the received installation data or the received deletion data. | 1. A method of managing an application of a set-top box, the method comprising:
making a connection with a terminal using a local network; downloading the application from the terminal using an application store of the terminal and installing the application; receiving installation data or deletion data of the application from the terminal; and managing the application using the received installation data or the received deletion data. 2. The method of claim 1, wherein the making of the connection with the terminal using the local network comprises:
providing uniform resource locator (URL) information or installation information of an embedded client application to the terminal for inter-device connection using the local network; and making the connection with the terminal by providing the client application based on the URL information or the installation information. 3. The method of claim 1, further comprising:
storing, by the terminal, location determination information of the terminal when making connection with the set-top box; determining, by the terminal, similarity between previously-stored location determination information of the terminal and current location determination information of the terminal in re-connection with the set-top box when making the re-connection with the set-top box after terminating the connection with the set-top box; and searching for, by the terminal, the set-top box for inter-device connection for a period shorter than a period before the determining of the similarity when the previously-stored location determination information of the terminal is similar to the current location determination information of the terminal in the re-connection. 4. The method of claim 1, wherein the making of the connection with the terminal using the local network comprises making the connection with the terminal through near field communication (NFC) when the set-top box is within NFC range of the terminal. 5. The method of claim 2, wherein the making of the connection with the terminal using the local network comprises making the connection with the terminal using at least one of a bar code, a personal identification number (PIN) code, and a voice outputting device after Wi-Fi connection to provide the client application. 6. The method of claim 2, wherein the making of the connection with the terminal using the local network comprises:
reproducing a setting guide sound source or a connection sound source to enable downloading of the client application through voice search of the terminal after Bluetooth connection; and guiding reception of the client application as the setting guide sound source or the connection sound source, which is reproduced, is recognized in the voice search of the terminal. 7. The method of claim 1, further comprising:
receiving and storing at least one of a photograph, a moving picture, and a file stored in the terminal, or outputting the at least one of the photograph, the moving picture, and the file through a display device. 8. A system for managing an application of a set-top box, the system comprising:
a local network connecting unit configured to make connection with a terminal using a local network; an application storing unit configured to download the application from the terminal using an application store of the terminal and to install the application, and configured to receive installation data or deletion data of the application from the terminal; and an application managing unit to manage the application using the received installation data or the received deletion data. 9. The system of claim 8, wherein the local network connecting unit comprises:
an installation information providing unit configured to provide uniform resource locator (URL) information or installation information of an embedded client application to the terminal for inter-device connection using the local network; and a device connecting unit configured to make the connection with the terminal by providing the client application to the terminal based on the uniform resource locator (URL) information or the installation information. 10. The system of claim 8, wherein the terminal comprises:
a location information storing unit configured to store location determination information of the terminal when making connection with the set-top box; a location information determining unit configured to determine similarity between previously-stored location determination information of the terminal and current location determination information of the terminal in re-connection with the set-top box when making the re-connection with the set-top box after terminating the connection with the set-top box; and a device searching unit configured to search for the set-top box for inter-device connection for a period shorter than a period before the determining of the similarity when the previously-stored location determination information of the terminal is similar to the current location determination information of the terminal in the re-connection. 11. The system of claim 8, wherein the local network connecting unit is configured to make the connection with the terminal through near field communication (NFC) when within NFC range of the terminal. 12. The system of claim 9, wherein the local network connecting unit is configured to make the connection with the terminal using at least one of a bar code, a personal identification number (PIN) code, and a voice outputting device after Wi-Fi connection to provide the client application. 13. The system of claim 9, wherein the local network connecting unit further comprises a sound source providing unit configured to reproduce a setting guide sound source or a connection sound source to enable downloading of the client application through voice search of the terminal after Bluetooth connection, and
wherein the local network connecting unit guides reception of the client application as the setting guide sound source or the connection sound source, which is reproduced by the sound source providing unit, is recognized in the voice search of the terminal. 14. The system of claim 8, further comprising a data managing unit configured to receive and store at least one of a photograph, a moving picture, and a file, which are stored in the terminal, or configured to output the at least one of the photograph, the moving picture, and the file through a display device. 15. An inter-device connection method using a local network, the inter-device connection method comprising:
providing uniform resource locator (URL) information or installation information of a client application, which is embedded in a set-top box, to a terminal for inter-device connection using the local network; and making connection between the terminal and the set-top box as the terminal receives the client application based on the uniform resource locator (URL) information or the installation information. 16. The inter-device connection method of claim 15, further comprising:
storing location determination information of the terminal when making the connection with the set-top box; determining similarity between previously-stored location determination information of the terminal and current location determination information of the terminal in re-connection with the set-top box when making the re-connection with the set-top box after terminating the connection with the set-top box; and searching for the set-top box for the inter-device connection for a period shorter than a period before the determining of the similarity when the previously-stored location determination information of the terminal is similar to the current location determination information of the terminal in the re-connection. | A method and a system for managing an application of a set-top box, method including making connection with a terminal using a local network, downloading the application from the terminal using an application store of the terminal and installing the application, receiving installation data or deletion data of the application from the terminal, and managing the application using the received installation data or the received deletion data.1. A method of managing an application of a set-top box, the method comprising:
making a connection with a terminal using a local network; downloading the application from the terminal using an application store of the terminal and installing the application; receiving installation data or deletion data of the application from the terminal; and managing the application using the received installation data or the received deletion data. 2. The method of claim 1, wherein the making of the connection with the terminal using the local network comprises:
providing uniform resource locator (URL) information or installation information of an embedded client application to the terminal for inter-device connection using the local network; and making the connection with the terminal by providing the client application based on the URL information or the installation information. 3. The method of claim 1, further comprising:
storing, by the terminal, location determination information of the terminal when making connection with the set-top box; determining, by the terminal, similarity between previously-stored location determination information of the terminal and current location determination information of the terminal in re-connection with the set-top box when making the re-connection with the set-top box after terminating the connection with the set-top box; and searching for, by the terminal, the set-top box for inter-device connection for a period shorter than a period before the determining of the similarity when the previously-stored location determination information of the terminal is similar to the current location determination information of the terminal in the re-connection. 4. The method of claim 1, wherein the making of the connection with the terminal using the local network comprises making the connection with the terminal through near field communication (NFC) when the set-top box is within NFC range of the terminal. 5. The method of claim 2, wherein the making of the connection with the terminal using the local network comprises making the connection with the terminal using at least one of a bar code, a personal identification number (PIN) code, and a voice outputting device after Wi-Fi connection to provide the client application. 6. The method of claim 2, wherein the making of the connection with the terminal using the local network comprises:
reproducing a setting guide sound source or a connection sound source to enable downloading of the client application through voice search of the terminal after Bluetooth connection; and guiding reception of the client application as the setting guide sound source or the connection sound source, which is reproduced, is recognized in the voice search of the terminal. 7. The method of claim 1, further comprising:
receiving and storing at least one of a photograph, a moving picture, and a file stored in the terminal, or outputting the at least one of the photograph, the moving picture, and the file through a display device. 8. A system for managing an application of a set-top box, the system comprising:
a local network connecting unit configured to make connection with a terminal using a local network; an application storing unit configured to download the application from the terminal using an application store of the terminal and to install the application, and configured to receive installation data or deletion data of the application from the terminal; and an application managing unit to manage the application using the received installation data or the received deletion data. 9. The system of claim 8, wherein the local network connecting unit comprises:
an installation information providing unit configured to provide uniform resource locator (URL) information or installation information of an embedded client application to the terminal for inter-device connection using the local network; and a device connecting unit configured to make the connection with the terminal by providing the client application to the terminal based on the uniform resource locator (URL) information or the installation information. 10. The system of claim 8, wherein the terminal comprises:
a location information storing unit configured to store location determination information of the terminal when making connection with the set-top box; a location information determining unit configured to determine similarity between previously-stored location determination information of the terminal and current location determination information of the terminal in re-connection with the set-top box when making the re-connection with the set-top box after terminating the connection with the set-top box; and a device searching unit configured to search for the set-top box for inter-device connection for a period shorter than a period before the determining of the similarity when the previously-stored location determination information of the terminal is similar to the current location determination information of the terminal in the re-connection. 11. The system of claim 8, wherein the local network connecting unit is configured to make the connection with the terminal through near field communication (NFC) when within NFC range of the terminal. 12. The system of claim 9, wherein the local network connecting unit is configured to make the connection with the terminal using at least one of a bar code, a personal identification number (PIN) code, and a voice outputting device after Wi-Fi connection to provide the client application. 13. The system of claim 9, wherein the local network connecting unit further comprises a sound source providing unit configured to reproduce a setting guide sound source or a connection sound source to enable downloading of the client application through voice search of the terminal after Bluetooth connection, and
wherein the local network connecting unit guides reception of the client application as the setting guide sound source or the connection sound source, which is reproduced by the sound source providing unit, is recognized in the voice search of the terminal. 14. The system of claim 8, further comprising a data managing unit configured to receive and store at least one of a photograph, a moving picture, and a file, which are stored in the terminal, or configured to output the at least one of the photograph, the moving picture, and the file through a display device. 15. An inter-device connection method using a local network, the inter-device connection method comprising:
providing uniform resource locator (URL) information or installation information of a client application, which is embedded in a set-top box, to a terminal for inter-device connection using the local network; and making connection between the terminal and the set-top box as the terminal receives the client application based on the uniform resource locator (URL) information or the installation information. 16. The inter-device connection method of claim 15, further comprising:
storing location determination information of the terminal when making the connection with the set-top box; determining similarity between previously-stored location determination information of the terminal and current location determination information of the terminal in re-connection with the set-top box when making the re-connection with the set-top box after terminating the connection with the set-top box; and searching for the set-top box for the inter-device connection for a period shorter than a period before the determining of the similarity when the previously-stored location determination information of the terminal is similar to the current location determination information of the terminal in the re-connection. | 2,400 |
8,273 | 8,273 | 14,045,511 | 2,425 | Disclosed is a data transmission system that transmits data by using a relay.
The relay selects a transmission terminal from among a plurality of terminals accessing a base station. A base station transmits base station data to the relay during a first time slot, and the transmission terminal transmits terminal data to the relay. The relay transmits terminal data to the base station during a second time slot, and transmits base station data to the transmission terminal. | 1. An apparatus of coding an image, comprising:
a first transforming unit to transform a target image into a first transform coefficient based on a discrete cosine transform (DCT) scheme; a second transforming unit to transform the target image into a second transform coefficient based on a discrete sine transform (DST) scheme; and a transform scheme determining unit to select one of the first transform coefficient and the second coefficient as a transform coefficient of the target image. 2. The apparatus of claim 1, wherein:
the first transforming unit generates a first decoded image of the target image based on the first transform coefficient; the second transforming unit generates a first decoded image of the target image based on the second transform coefficient; and the transform scheme determining unit compares the target image, the first decoded image, and the second decoded image, to select the transform coefficient. 3. The apparatus of claim 2, further comprising:
a Lagrange multiplier calculator to calculate a Lagrange multiplier based on a size of the target image, wherein the transform scheme determining unit selects the transform coefficient based on the Lagrange multiplier. 4. The apparatus of claim 3, further comprising:
a rate-distortion cost calculator to measure a rate-distortion cost of the first decoded image with respect to the target image based on the calculated Lagrange multiplier, and to calculate a rate-distortion cost of the second decoded image with respect to the target image based on the calculated Lagrange multiplier, wherein the transform scheme determining selects the transform coefficient based on the each calculated rate-distortion cost. 5. The apparatus of claim 2, wherein the first transforming unit comprises:
a discrete cosine transforming unit to generate a first image coefficient by performing a DCT on the target image; a quantizing unit to generate the first transform coefficient by quantizing the first image coefficient; a DCT coefficient threshold unit to perform a coefficient threshold operation on the quantized first transform coefficient; an inverse-quantizing unit to perform inverse quantization on the coefficient threshold-operated first transform coefficient; and a discrete cosine inverse transforming unit to generate the first decoded image of the target image by performing discrete cosine inverse transform on the inverse-quantized first transform coefficient, wherein the transform scheme determining unit selects the transform coefficient based on the first decoded image. 6. The apparatus of claim 2, wherein the second transforming unit comprises:
a discrete sine transforming unit to generate a second image coefficient by performing a DST on the target image; a quantizing unit to generate the second transform coefficient by quantizing the second image coefficient; a DST coefficient threshold unit to perform a coefficient threshold operation on the quantized second transform coefficient; an inverse-quantizing unit to perform inverse quantization on the coefficient threshold-operated second transform coefficient; and a discrete sine inverse transforming unit to generate the second decoded image of the target image by performing discrete sine inverse transform on the inverse-quantized second transform coefficient, wherein the transform scheme determining unit selects the transform coefficient based on the second decoded image. 7. The apparatus of claim 1, further comprising:
a transform scheme storage unit to store information about a transform scheme corresponding to the transform coefficient of the target image. 8. The apparatus of claim 7, wherein the transform scheme storage unit stores the information about the transform scheme based on a coded block pattern (CBP) value with respect to the transform coefficient. 9. The apparatus of claim 1, further comprising:
an image predicting unit to generate a prediction image with respect to an input image based on a reference image with respect to the input image, and to calculate a difference between the input image and the prediction image as the target image. 10. An apparatus of decoding an image, comprising:
a transform scheme decision unit to decide a transform scheme with respect to a transform coefficient; a first inverse transforming unit to generate a decoded image with respect to the transform coefficient by using a discrete cosine inverse transform scheme, when the transform scheme is a DCT; and a second inverse transforming unit to generate the decoded image with respect to the transform coefficient by using a discrete sine inverse transform scheme, when the transform scheme is a DST. 11. The apparatus of claim 10, wherein the transform scheme decision unit decides the transform scheme by using transform scheme information included in a macroblock header with respect to the transform coefficient. 12. The apparatus of claim 11, wherein the transform scheme information is stored based on a CBP value with respect to the transform coefficient. 13. The apparatus of claim 10, wherein the first inverse transforming unit comprises:
an inverse quantizing unit to quantize the transform coefficient; and a discrete since inverse transforming unit to generate the decoded image by performing a discrete cosine inverse transform on the inverse-quantized transform coefficient. 14. The apparatus of claim 10, wherein the second inverse transforming unit comprises:
an inverse quantizing unit to quantize the transform coefficient; and discrete sine inverse transforming unit to generate the decoded image by performing a discrete sine inverse transform on the inverse-quantized transform coefficient. 15. The apparatus of claim 10, further comprising:
an image restoring unit to generate a prediction image with respect to the transform coefficient based on a reference image with respect to the transform coefficient, and to generate a restoration image with respect to the transform coefficient based on the prediction image and the decoded image. 16. An apparatus of coding an image, comprising:
a first transforming unit to generate a first transform coefficient by performing a DCT with respect to a target image; a second transforming unit to generate a second transform coefficient by performing a DST with respect to the target image; and a transform scheme determining unit to select one of the first transform coefficient and the second transform coefficient as a transform coefficient with respect to the target image. 17. The apparatus of claim 16, further comprising:
a transform scheme storage unit to store, in a macroblock header with respect to the target image, the transform scheme information with respect to the selected transform coefficient. 18. The apparatus of claim 17, wherein the transform scheme storage unit does not store the transform scheme information when a CBP value with respect to the transform coefficient is “0”. 19. The apparatus of claim 16, further comprising:
an image predicting unit to generate a prediction image with respect to an input image based on a reference image with respect to the input image, and to calculate a difference between the input image and the prediction image as the target image. 20. The apparatus of claim 16, further comprising:
a rate-distortion cost calculator to calculate a rate-distortion cost of a decoded image with respect to the first transform coefficient, and to calculate a rate-distortion cost of a decoded image with respect to the second transform coefficient, wherein the transform scheme determining unit selects the transform coefficient based on each calculated rate-distortion cost. | Disclosed is a data transmission system that transmits data by using a relay.
The relay selects a transmission terminal from among a plurality of terminals accessing a base station. A base station transmits base station data to the relay during a first time slot, and the transmission terminal transmits terminal data to the relay. The relay transmits terminal data to the base station during a second time slot, and transmits base station data to the transmission terminal.1. An apparatus of coding an image, comprising:
a first transforming unit to transform a target image into a first transform coefficient based on a discrete cosine transform (DCT) scheme; a second transforming unit to transform the target image into a second transform coefficient based on a discrete sine transform (DST) scheme; and a transform scheme determining unit to select one of the first transform coefficient and the second coefficient as a transform coefficient of the target image. 2. The apparatus of claim 1, wherein:
the first transforming unit generates a first decoded image of the target image based on the first transform coefficient; the second transforming unit generates a first decoded image of the target image based on the second transform coefficient; and the transform scheme determining unit compares the target image, the first decoded image, and the second decoded image, to select the transform coefficient. 3. The apparatus of claim 2, further comprising:
a Lagrange multiplier calculator to calculate a Lagrange multiplier based on a size of the target image, wherein the transform scheme determining unit selects the transform coefficient based on the Lagrange multiplier. 4. The apparatus of claim 3, further comprising:
a rate-distortion cost calculator to measure a rate-distortion cost of the first decoded image with respect to the target image based on the calculated Lagrange multiplier, and to calculate a rate-distortion cost of the second decoded image with respect to the target image based on the calculated Lagrange multiplier, wherein the transform scheme determining selects the transform coefficient based on the each calculated rate-distortion cost. 5. The apparatus of claim 2, wherein the first transforming unit comprises:
a discrete cosine transforming unit to generate a first image coefficient by performing a DCT on the target image; a quantizing unit to generate the first transform coefficient by quantizing the first image coefficient; a DCT coefficient threshold unit to perform a coefficient threshold operation on the quantized first transform coefficient; an inverse-quantizing unit to perform inverse quantization on the coefficient threshold-operated first transform coefficient; and a discrete cosine inverse transforming unit to generate the first decoded image of the target image by performing discrete cosine inverse transform on the inverse-quantized first transform coefficient, wherein the transform scheme determining unit selects the transform coefficient based on the first decoded image. 6. The apparatus of claim 2, wherein the second transforming unit comprises:
a discrete sine transforming unit to generate a second image coefficient by performing a DST on the target image; a quantizing unit to generate the second transform coefficient by quantizing the second image coefficient; a DST coefficient threshold unit to perform a coefficient threshold operation on the quantized second transform coefficient; an inverse-quantizing unit to perform inverse quantization on the coefficient threshold-operated second transform coefficient; and a discrete sine inverse transforming unit to generate the second decoded image of the target image by performing discrete sine inverse transform on the inverse-quantized second transform coefficient, wherein the transform scheme determining unit selects the transform coefficient based on the second decoded image. 7. The apparatus of claim 1, further comprising:
a transform scheme storage unit to store information about a transform scheme corresponding to the transform coefficient of the target image. 8. The apparatus of claim 7, wherein the transform scheme storage unit stores the information about the transform scheme based on a coded block pattern (CBP) value with respect to the transform coefficient. 9. The apparatus of claim 1, further comprising:
an image predicting unit to generate a prediction image with respect to an input image based on a reference image with respect to the input image, and to calculate a difference between the input image and the prediction image as the target image. 10. An apparatus of decoding an image, comprising:
a transform scheme decision unit to decide a transform scheme with respect to a transform coefficient; a first inverse transforming unit to generate a decoded image with respect to the transform coefficient by using a discrete cosine inverse transform scheme, when the transform scheme is a DCT; and a second inverse transforming unit to generate the decoded image with respect to the transform coefficient by using a discrete sine inverse transform scheme, when the transform scheme is a DST. 11. The apparatus of claim 10, wherein the transform scheme decision unit decides the transform scheme by using transform scheme information included in a macroblock header with respect to the transform coefficient. 12. The apparatus of claim 11, wherein the transform scheme information is stored based on a CBP value with respect to the transform coefficient. 13. The apparatus of claim 10, wherein the first inverse transforming unit comprises:
an inverse quantizing unit to quantize the transform coefficient; and a discrete since inverse transforming unit to generate the decoded image by performing a discrete cosine inverse transform on the inverse-quantized transform coefficient. 14. The apparatus of claim 10, wherein the second inverse transforming unit comprises:
an inverse quantizing unit to quantize the transform coefficient; and discrete sine inverse transforming unit to generate the decoded image by performing a discrete sine inverse transform on the inverse-quantized transform coefficient. 15. The apparatus of claim 10, further comprising:
an image restoring unit to generate a prediction image with respect to the transform coefficient based on a reference image with respect to the transform coefficient, and to generate a restoration image with respect to the transform coefficient based on the prediction image and the decoded image. 16. An apparatus of coding an image, comprising:
a first transforming unit to generate a first transform coefficient by performing a DCT with respect to a target image; a second transforming unit to generate a second transform coefficient by performing a DST with respect to the target image; and a transform scheme determining unit to select one of the first transform coefficient and the second transform coefficient as a transform coefficient with respect to the target image. 17. The apparatus of claim 16, further comprising:
a transform scheme storage unit to store, in a macroblock header with respect to the target image, the transform scheme information with respect to the selected transform coefficient. 18. The apparatus of claim 17, wherein the transform scheme storage unit does not store the transform scheme information when a CBP value with respect to the transform coefficient is “0”. 19. The apparatus of claim 16, further comprising:
an image predicting unit to generate a prediction image with respect to an input image based on a reference image with respect to the input image, and to calculate a difference between the input image and the prediction image as the target image. 20. The apparatus of claim 16, further comprising:
a rate-distortion cost calculator to calculate a rate-distortion cost of a decoded image with respect to the first transform coefficient, and to calculate a rate-distortion cost of a decoded image with respect to the second transform coefficient, wherein the transform scheme determining unit selects the transform coefficient based on each calculated rate-distortion cost. | 2,400 |
8,274 | 8,274 | 15,433,258 | 2,487 | Methods for capturing an image for identity verification and recordation are provided. The methods may include receiving, at a specialized processing device, transfer data from a remote terminal. The methods may include determining, based on the transfer data, that an identity verification process is required to execute the transfer data. The methods may include sending, based on a determination that the identity verification process is required, a first image file to the terminal for display. The methods may include receiving from a mobile device, information derived from the first image file which identifies the transfer data and a second image file. The methods may include determining, whether the second image file meets a predefined criteria associated with the transfer data identified by the information derived from the first image file. The methods may include sending an authorization signal upon determining that the second image file meets the criteria. | 1. A method for capturing an image for identity verification and recordation, wherein the method comprises:
receiving, at a specialized processing device, transfer data from a remote terminal; determining, with the specialized processing device, based on the transfer data, that an identity verification process is required to execute the transfer data; sending, from the specialized processing device, based on a determination that the identity verification process is required, a first image file to the remote terminal for display at the remote terminal; receiving, at the specialized processing device from a mobile device, information derived from the first image file which identifies the transfer data and a second image file; determining, with the specialized processing device, whether the second image file meets at least one predefined criteria associated with the transfer data identified by the information derived from the first image file; and sending, from the specialized processing device, an authorization signal upon a determination by the specialized processing device that the second image file meets at least one predefined criteria associated with the transfer data. 2. The method for capturing an image for identity verification and recordation of claim 1, wherein the method further comprises:
storing, by the specialized processing device, the second image file in association with the transfer data. 3. The method for capturing an image for identity verification and recordation of claim 1, wherein:
the mobile device derives information from the first image file by converting graphical elements of the first image into characters. 4. The method for capturing an image for identity verification and recordation of claim 3, wherein:
the first image file comprises a one-dimensional bar code or two-dimensional bar code. 5. The method for capturing an image for identity verification and recordation of claim 1, wherein the method further comprises:
determining, with the specialized processing device, the predefined criteria based at least in part on the transfer data. 6. The method for capturing an image for identity verification and recordation of claim 1, wherein determining whether the second image file meets at least one predefined criteria comprises:
determining whether the second image file includes a sub-image of a government issued identification document. 7. The method for capturing an image for identity verification and recordation of claim 6, wherein determining whether the second image file meets at least one predefined criteria further comprises:
determining whether the government issued identification document corresponds to the transfer data. 8. A system for capturing an image for identity verification and recordation, wherein the system comprises:
a specialized processing device configured to at least:
receive transfer data from a remote terminal;
determine, based on the transfer data, that an identity verification process is required to execute the transfer data;
send, based on a determination that the identity verification process is required, a first image file to the remote terminal for display at the remote terminal;
receiving from a mobile device information derived from the first image file which identifies the transfer data and a second image file;
determine whether the second image file meets at least one predefined criteria associated with the transfer data identified by the information derived from the first image file; and
send an authorization signal upon a determination by the specialized processing device that the second image file meets at least one predefined criteria associated with the transfer data. 9. The system for capturing an image for identity verification and recordation of claim 8, wherein the specialized processing device is further configured to at least:
store the second image file in association with the transfer data. 10. The system for capturing an image for identity verification and recordation of claim 8, wherein:
the mobile device derives information from the first image by converting graphical elements of the first image file into characters. 11. The system for capturing an image for identity verification and recordation of claim 10, wherein:
the first image file comprises a one-dimensional bar code or two-dimensional bar code. 12. The system for capturing an image for identity verification and recordation of claim 8, wherein the specialized processing device is further configured to at least:
determine the predefined criteria based at least in part on the transfer data. 13. The system for capturing an image for identity verification and recordation of claim 8, wherein determining whether the second image file meets at least one predefined criteria comprises:
determining whether the second image file includes a sub-image of a government issued identification document. 14. The system for capturing an image for identity verification and recordation of claim 8, wherein determining whether the second image file meets at least one predefined criteria further comprises:
determining whether the government issued identification document corresponds to the transfer data. 15. A non-transitory machine readable medium having instructions stored thereon for capturing an image for identity verification and recordation, wherein the instructions are executable by at least one processor to at least:
receive transfer data from a remote terminal; determine, based on the transfer data, that an identity verification process is required to execute the transfer data; send, based on a determination that the identity verification process is required, a first image file to the remote terminal for display at the remote terminal; receiving, from a mobile device, information derived from the first image file which identifies the transfer data and a second image file; determine whether the second image file meets at least one predefined criteria associated with the transfer data identified by the information derived from the first image file; and send an authorization signal upon a determination by the specialized processing device that the second image file meets at least one predefined criteria associated with the transfer data. 16. The non-transitory machine readable medium having instructions stored thereon of claim 15, wherein:
the mobile device derives information from the first image file by converting graphical elements of the first image into characters. 17. The non-transitory machine readable medium having instructions stored thereon of claim 16, wherein:
the first image file comprises a one-dimensional bar code or two-dimensional bar code. 18. The system for capturing an image for identity verification and recordation of claim 15, wherein the instructions are further executable by at least one processor to at least:
determine the predefined criteria based at least in part on the transfer data. 19. The non-transitory machine readable medium having instructions stored thereon of claim 15, wherein determining whether the second image file meets at least one predefined criteria comprises:
determining whether the second image file includes a sub-image of a government issued identification document. 20. The non-transitory machine readable medium having instructions stored thereon of claim 15, wherein determining whether the second image file meets at least one predefined criteria further comprises:
determining whether the government issued identification document corresponds to the transfer data. | Methods for capturing an image for identity verification and recordation are provided. The methods may include receiving, at a specialized processing device, transfer data from a remote terminal. The methods may include determining, based on the transfer data, that an identity verification process is required to execute the transfer data. The methods may include sending, based on a determination that the identity verification process is required, a first image file to the terminal for display. The methods may include receiving from a mobile device, information derived from the first image file which identifies the transfer data and a second image file. The methods may include determining, whether the second image file meets a predefined criteria associated with the transfer data identified by the information derived from the first image file. The methods may include sending an authorization signal upon determining that the second image file meets the criteria.1. A method for capturing an image for identity verification and recordation, wherein the method comprises:
receiving, at a specialized processing device, transfer data from a remote terminal; determining, with the specialized processing device, based on the transfer data, that an identity verification process is required to execute the transfer data; sending, from the specialized processing device, based on a determination that the identity verification process is required, a first image file to the remote terminal for display at the remote terminal; receiving, at the specialized processing device from a mobile device, information derived from the first image file which identifies the transfer data and a second image file; determining, with the specialized processing device, whether the second image file meets at least one predefined criteria associated with the transfer data identified by the information derived from the first image file; and sending, from the specialized processing device, an authorization signal upon a determination by the specialized processing device that the second image file meets at least one predefined criteria associated with the transfer data. 2. The method for capturing an image for identity verification and recordation of claim 1, wherein the method further comprises:
storing, by the specialized processing device, the second image file in association with the transfer data. 3. The method for capturing an image for identity verification and recordation of claim 1, wherein:
the mobile device derives information from the first image file by converting graphical elements of the first image into characters. 4. The method for capturing an image for identity verification and recordation of claim 3, wherein:
the first image file comprises a one-dimensional bar code or two-dimensional bar code. 5. The method for capturing an image for identity verification and recordation of claim 1, wherein the method further comprises:
determining, with the specialized processing device, the predefined criteria based at least in part on the transfer data. 6. The method for capturing an image for identity verification and recordation of claim 1, wherein determining whether the second image file meets at least one predefined criteria comprises:
determining whether the second image file includes a sub-image of a government issued identification document. 7. The method for capturing an image for identity verification and recordation of claim 6, wherein determining whether the second image file meets at least one predefined criteria further comprises:
determining whether the government issued identification document corresponds to the transfer data. 8. A system for capturing an image for identity verification and recordation, wherein the system comprises:
a specialized processing device configured to at least:
receive transfer data from a remote terminal;
determine, based on the transfer data, that an identity verification process is required to execute the transfer data;
send, based on a determination that the identity verification process is required, a first image file to the remote terminal for display at the remote terminal;
receiving from a mobile device information derived from the first image file which identifies the transfer data and a second image file;
determine whether the second image file meets at least one predefined criteria associated with the transfer data identified by the information derived from the first image file; and
send an authorization signal upon a determination by the specialized processing device that the second image file meets at least one predefined criteria associated with the transfer data. 9. The system for capturing an image for identity verification and recordation of claim 8, wherein the specialized processing device is further configured to at least:
store the second image file in association with the transfer data. 10. The system for capturing an image for identity verification and recordation of claim 8, wherein:
the mobile device derives information from the first image by converting graphical elements of the first image file into characters. 11. The system for capturing an image for identity verification and recordation of claim 10, wherein:
the first image file comprises a one-dimensional bar code or two-dimensional bar code. 12. The system for capturing an image for identity verification and recordation of claim 8, wherein the specialized processing device is further configured to at least:
determine the predefined criteria based at least in part on the transfer data. 13. The system for capturing an image for identity verification and recordation of claim 8, wherein determining whether the second image file meets at least one predefined criteria comprises:
determining whether the second image file includes a sub-image of a government issued identification document. 14. The system for capturing an image for identity verification and recordation of claim 8, wherein determining whether the second image file meets at least one predefined criteria further comprises:
determining whether the government issued identification document corresponds to the transfer data. 15. A non-transitory machine readable medium having instructions stored thereon for capturing an image for identity verification and recordation, wherein the instructions are executable by at least one processor to at least:
receive transfer data from a remote terminal; determine, based on the transfer data, that an identity verification process is required to execute the transfer data; send, based on a determination that the identity verification process is required, a first image file to the remote terminal for display at the remote terminal; receiving, from a mobile device, information derived from the first image file which identifies the transfer data and a second image file; determine whether the second image file meets at least one predefined criteria associated with the transfer data identified by the information derived from the first image file; and send an authorization signal upon a determination by the specialized processing device that the second image file meets at least one predefined criteria associated with the transfer data. 16. The non-transitory machine readable medium having instructions stored thereon of claim 15, wherein:
the mobile device derives information from the first image file by converting graphical elements of the first image into characters. 17. The non-transitory machine readable medium having instructions stored thereon of claim 16, wherein:
the first image file comprises a one-dimensional bar code or two-dimensional bar code. 18. The system for capturing an image for identity verification and recordation of claim 15, wherein the instructions are further executable by at least one processor to at least:
determine the predefined criteria based at least in part on the transfer data. 19. The non-transitory machine readable medium having instructions stored thereon of claim 15, wherein determining whether the second image file meets at least one predefined criteria comprises:
determining whether the second image file includes a sub-image of a government issued identification document. 20. The non-transitory machine readable medium having instructions stored thereon of claim 15, wherein determining whether the second image file meets at least one predefined criteria further comprises:
determining whether the government issued identification document corresponds to the transfer data. | 2,400 |
8,275 | 8,275 | 14,581,803 | 2,463 | Various embodiments may be generally directed to techniques for UE initiated and network initiated IP flow mobility. Various embodiments provide techniques for sharing IP flow routing rules and/or filters between a UE and various network infrastructure components using existing network based protocols or extensions thereto. Various embodiments provide techniques for provisioning network based IP flow mobility triggers and for ensuring UE connections to a 3GPP network are maintained in the absence of any 3GPP network IP flows. | 1. User equipment (UE), comprising:
logic, at least a portion of which is in hardware, to generate a wireless local area network (WLAN) control protocol (WLCP) packet data network (PDN) connectivity request message indicating that an existing PDN connection is to be provisioned as a multiple access PDN connection by adding one of a WLAN and a 3GPP network as an additional access connection; and a transceiver to transmit the WLCP PDN connectivity request message. 2. The UE of claim 1, the logic to indicate in a request type field of the WLCP PDN connectivity request message that the existing PDN connection is to be provisioned as the multiple access PDN connection and to specify one of the WLAN and the 3GPP network as the additional access connection. 3. The UE of claim 1, the logic to update a routing rule in the WLCP PDN connectivity request message. 4. The UE of claim 3, the logic to include a new routing rule in the WLCP PDN connectivity request message. 5. The UE of claim 4, the logic to include a new routing filter description for the new routing rule. 6. The UE of claim 4, the logic to modify a routing access type of an existing routing rule in the WLCP PDN connectivity request message. 7. The UE of claim 3, the logic to include the updated routing rule in a protocol configuration options (PCO) field of the WLCP PDN connectivity request message. 8. The UE of claim 1, wherein the WLAN is a trusted WLAN (TWAN). 9. User equipment (UE), comprising:
logic, at least a portion of which is in hardware, to generate a wireless local area network (WLAN) control protocol (WLCP) flow mobility request message indicating that an internet protocol (IP) flow is to be moved from a first wireless access system to a second wireless access system; and a transceiver to transmit the WLCP flow mobility request message. 10. The UE of claim 9, wherein the first wireless access system is a 3GPP wireless access system and the second wireless access system is a non-3GPP wireless access system. 11. The UE of claim 9, wherein the first wireless access system is a non-3GPP wireless access system and the second wireless access system is a 3GPP wireless access system. 12. The UE of claim 9, the logic to identify at least one of a message type, a transaction identifier, an access point name, and a packet data network (PDN) connection identifier (ID) in the WLCP flow mobility request message. 13. The UE of claim 9, the logic to include an updated routing rule in the WLCP flow mobility request message. 14. The UE of claim 13, the logic include the updated routing rule in a protocol configuration options (PCO) field of the WLCP flow mobility request message. 15. The UE of claim 9, the logic to process an indication provided in a WLCP flow mobility indication message that a second IP flow is to be moved from the first wireless access system to the second wireless access system and to process a second updated routing rule included in a PCO field of the WLCP flow mobility indication; and
a receiver to receive the WLCP flow mobility indication message. 16. A wireless local area network (WLAN) gateway, comprising:
logic, at least a portion of which is in hardware, to generate one of a bearer resource command and a modify bearer request message indicating that an IP flow is to be moved from a first wireless access system to a second wireless access system and to include an updated routing rule for the IP flow in a protocol configuration options (PCO) field in the one of the bearer resource command and the modify bearer request message; and a transmitter to transmit the one of the bearer resource command and the modify bearer request message. 17. The WLAN gateway of claim 16, the logic to process an indication provided in an update bearer request message that a second IP flow is to be moved from the first wireless access system to the second wireless access system and to process a second updated routing rule included in the PCO field of the update bearer request message; and
a receiver to receive the update bearer request message. 18. The WLAN gateway of claim 17, the logic to generate an update bearer response message indicating acknowledgement that the second IP flow is to be moved from the first wireless access system to the second wireless access system and to include the second updated routing rule in the PCO field of the update bearer response message. 19. The WLAN gateway of claim 16, wherein the WLAN gateway is a trusted WLAN gateway (TWAG). 20. A packet data network gateway (PDN-GW) comprising:
logic, at least a portion of which is in hardware, to process a rule for managing internet protocol (IP) flows associated with the PDN-GW, to generate an update bearer request message indicating that an IP flow is to be moved from a first wireless access system to a second wireless access system based on the processed rule, and to include an updated routing rule in the update bearer request message. 21. The PDN-GW of claim 20, the logic to process the rule for managing IP flows based on an indication from an access network discovery and select function (ANDSF). 22. The PDN-GW of claim 20, the logic to include the updated routing rule in a protocol configuration options (PCO) field of the update bearer request message. 23. The PDN-GW of claim 20, the logic to process an update bearer response message indicating acknowledgement that the IP flow is to be moved from the first wireless access system to the second wireless access system and to process the updated routing rule included in the PCO field of the update bearer response message. 24. The PDN-GW of claim 20, the logic to process one of a bearer resource command and a modify bearer request message indicating that a second IP flow is to be moved from the first wireless access system to the second wireless access system and to process a second updated routing rule for the second IP flow included in the PCO field in the one of the bearer resource command and the modify bearer request message. 25. The PDN-GW of claim 24, the logic to generate one of a bearer resource command and a modify bearer response message indicating acknowledgement that the second IP flow is to be moved from the first wireless access system to the second wireless access system and to include the second updated routing rule for the second IP flow in the PCO field in the one of the bearer resource command and the modify bearer response message. | Various embodiments may be generally directed to techniques for UE initiated and network initiated IP flow mobility. Various embodiments provide techniques for sharing IP flow routing rules and/or filters between a UE and various network infrastructure components using existing network based protocols or extensions thereto. Various embodiments provide techniques for provisioning network based IP flow mobility triggers and for ensuring UE connections to a 3GPP network are maintained in the absence of any 3GPP network IP flows.1. User equipment (UE), comprising:
logic, at least a portion of which is in hardware, to generate a wireless local area network (WLAN) control protocol (WLCP) packet data network (PDN) connectivity request message indicating that an existing PDN connection is to be provisioned as a multiple access PDN connection by adding one of a WLAN and a 3GPP network as an additional access connection; and a transceiver to transmit the WLCP PDN connectivity request message. 2. The UE of claim 1, the logic to indicate in a request type field of the WLCP PDN connectivity request message that the existing PDN connection is to be provisioned as the multiple access PDN connection and to specify one of the WLAN and the 3GPP network as the additional access connection. 3. The UE of claim 1, the logic to update a routing rule in the WLCP PDN connectivity request message. 4. The UE of claim 3, the logic to include a new routing rule in the WLCP PDN connectivity request message. 5. The UE of claim 4, the logic to include a new routing filter description for the new routing rule. 6. The UE of claim 4, the logic to modify a routing access type of an existing routing rule in the WLCP PDN connectivity request message. 7. The UE of claim 3, the logic to include the updated routing rule in a protocol configuration options (PCO) field of the WLCP PDN connectivity request message. 8. The UE of claim 1, wherein the WLAN is a trusted WLAN (TWAN). 9. User equipment (UE), comprising:
logic, at least a portion of which is in hardware, to generate a wireless local area network (WLAN) control protocol (WLCP) flow mobility request message indicating that an internet protocol (IP) flow is to be moved from a first wireless access system to a second wireless access system; and a transceiver to transmit the WLCP flow mobility request message. 10. The UE of claim 9, wherein the first wireless access system is a 3GPP wireless access system and the second wireless access system is a non-3GPP wireless access system. 11. The UE of claim 9, wherein the first wireless access system is a non-3GPP wireless access system and the second wireless access system is a 3GPP wireless access system. 12. The UE of claim 9, the logic to identify at least one of a message type, a transaction identifier, an access point name, and a packet data network (PDN) connection identifier (ID) in the WLCP flow mobility request message. 13. The UE of claim 9, the logic to include an updated routing rule in the WLCP flow mobility request message. 14. The UE of claim 13, the logic include the updated routing rule in a protocol configuration options (PCO) field of the WLCP flow mobility request message. 15. The UE of claim 9, the logic to process an indication provided in a WLCP flow mobility indication message that a second IP flow is to be moved from the first wireless access system to the second wireless access system and to process a second updated routing rule included in a PCO field of the WLCP flow mobility indication; and
a receiver to receive the WLCP flow mobility indication message. 16. A wireless local area network (WLAN) gateway, comprising:
logic, at least a portion of which is in hardware, to generate one of a bearer resource command and a modify bearer request message indicating that an IP flow is to be moved from a first wireless access system to a second wireless access system and to include an updated routing rule for the IP flow in a protocol configuration options (PCO) field in the one of the bearer resource command and the modify bearer request message; and a transmitter to transmit the one of the bearer resource command and the modify bearer request message. 17. The WLAN gateway of claim 16, the logic to process an indication provided in an update bearer request message that a second IP flow is to be moved from the first wireless access system to the second wireless access system and to process a second updated routing rule included in the PCO field of the update bearer request message; and
a receiver to receive the update bearer request message. 18. The WLAN gateway of claim 17, the logic to generate an update bearer response message indicating acknowledgement that the second IP flow is to be moved from the first wireless access system to the second wireless access system and to include the second updated routing rule in the PCO field of the update bearer response message. 19. The WLAN gateway of claim 16, wherein the WLAN gateway is a trusted WLAN gateway (TWAG). 20. A packet data network gateway (PDN-GW) comprising:
logic, at least a portion of which is in hardware, to process a rule for managing internet protocol (IP) flows associated with the PDN-GW, to generate an update bearer request message indicating that an IP flow is to be moved from a first wireless access system to a second wireless access system based on the processed rule, and to include an updated routing rule in the update bearer request message. 21. The PDN-GW of claim 20, the logic to process the rule for managing IP flows based on an indication from an access network discovery and select function (ANDSF). 22. The PDN-GW of claim 20, the logic to include the updated routing rule in a protocol configuration options (PCO) field of the update bearer request message. 23. The PDN-GW of claim 20, the logic to process an update bearer response message indicating acknowledgement that the IP flow is to be moved from the first wireless access system to the second wireless access system and to process the updated routing rule included in the PCO field of the update bearer response message. 24. The PDN-GW of claim 20, the logic to process one of a bearer resource command and a modify bearer request message indicating that a second IP flow is to be moved from the first wireless access system to the second wireless access system and to process a second updated routing rule for the second IP flow included in the PCO field in the one of the bearer resource command and the modify bearer request message. 25. The PDN-GW of claim 24, the logic to generate one of a bearer resource command and a modify bearer response message indicating acknowledgement that the second IP flow is to be moved from the first wireless access system to the second wireless access system and to include the second updated routing rule for the second IP flow in the PCO field in the one of the bearer resource command and the modify bearer response message. | 2,400 |
8,276 | 8,276 | 14,849,573 | 2,465 | The present description provides methods, computer program products, and systems for alternative network communication for access point troubleshooting and monitoring. When a station has difficulty initiating or maintaining a connection with an access point, or even when performance is suboptimal, alternative network communication is initiated. The issue can be handled by reporting to a troubled access point for self-correction, or by uploading interrogation commands or code for active correction externally by a station. Further actions can be taken, for example, when a station determines through alternative communication that a troubled access point itself has connection issues to a back end network, the station uses a different access point for reporting up to a network admin. Although Wi-Fi and Bluetooth are described herein, other combinations of wireless protocols are implementable. | 1. A computer-implemented method, in an access point in a Wi-Fi communications network, of using alternative networks for troubleshooting or monitoring, the method comprising the steps of:
providing access for at least one station over a Wi-Fi channel to connect with a wired backbone network; detect triggering event indicative of a communication issue associated with the access point; responsive to the triggering event detection, establishing a Bluetooth channel for communication with the at least one station for collecting data associated with the triggering event; detecting an end to the triggering event; responsive to the triggering event end, resuming access for the at least one station over the Wi-Fi channel. 2. The method of claim 1, further comprising:
reporting the collected data concerning the triggering event to a controller. 3. The method of claim 1, further comprising:
receiving RSSI values responsive to the interrogation. 4. The method of claim 1, wherein:
the triggering event detection is initially determined by the at least one station which notifies the access point through the Bluetooth channel. 5. The method of claim 1, wherein the triggering event comprises at least one of: a link failure, failure of the at least one station, failure of the access point, powering down, sleep mode, network congestion, long flight times for packets, processor load, memory shortage, and processing load. 6. The method of claim 1, further comprising:
utilizing the Bluetooth channel for communications between an external network and the at least one station, during the triggering event. 7. The method of claim 1, wherein the access point comprises at least one Wi-Fi radio and at least one Bluetooth radio. 8. The method of claim 1, wherein the triggering event comprises suspicious activity and the Bluetooth channel is activated to discretely communicate the suspicious activity without alerting the source of the suspicious activity. 9. A non-transitory computer-readable medium storing source code that, when executed by a processor, performs a method in an access point in a Wi-Fi communications network, of using alternative networks for troubleshooting or monitoring, the method comprising the steps of:
providing access for at least one station over a Wi-Fi channel to connect with a wired backbone network; detect triggering event indicative of a communication issue associated with the access point; responsive to the triggering event detection, establishing a Bluetooth channel for communication with the at least one station for collecting data associated with the triggering event; detecting an end to the triggering event; responsive to the triggering event end, resuming access for the at least one station over the Wi-Fi channel. 10. An access point in a Wi-Fi communications network, of using alternative networks for troubleshooting or monitoring, the access point comprising:
a processor; and a memory, storing:
a first module to provide access for at least one station over a Wi-Fi channel to connect with a wired backbone network;
a second module to detect triggering event indicative of a communication issue associated with the access point;
a fourth module to, responsive to the triggering event detection, establish a Bluetooth channel for communication with the at least one station for collecting data associated with the triggering event;
a fifth module to detect an end to the triggering event;
a sixth module to, responsive to the triggering event end, resume access for the at least one station over the Wi-Fi channel. | The present description provides methods, computer program products, and systems for alternative network communication for access point troubleshooting and monitoring. When a station has difficulty initiating or maintaining a connection with an access point, or even when performance is suboptimal, alternative network communication is initiated. The issue can be handled by reporting to a troubled access point for self-correction, or by uploading interrogation commands or code for active correction externally by a station. Further actions can be taken, for example, when a station determines through alternative communication that a troubled access point itself has connection issues to a back end network, the station uses a different access point for reporting up to a network admin. Although Wi-Fi and Bluetooth are described herein, other combinations of wireless protocols are implementable.1. A computer-implemented method, in an access point in a Wi-Fi communications network, of using alternative networks for troubleshooting or monitoring, the method comprising the steps of:
providing access for at least one station over a Wi-Fi channel to connect with a wired backbone network; detect triggering event indicative of a communication issue associated with the access point; responsive to the triggering event detection, establishing a Bluetooth channel for communication with the at least one station for collecting data associated with the triggering event; detecting an end to the triggering event; responsive to the triggering event end, resuming access for the at least one station over the Wi-Fi channel. 2. The method of claim 1, further comprising:
reporting the collected data concerning the triggering event to a controller. 3. The method of claim 1, further comprising:
receiving RSSI values responsive to the interrogation. 4. The method of claim 1, wherein:
the triggering event detection is initially determined by the at least one station which notifies the access point through the Bluetooth channel. 5. The method of claim 1, wherein the triggering event comprises at least one of: a link failure, failure of the at least one station, failure of the access point, powering down, sleep mode, network congestion, long flight times for packets, processor load, memory shortage, and processing load. 6. The method of claim 1, further comprising:
utilizing the Bluetooth channel for communications between an external network and the at least one station, during the triggering event. 7. The method of claim 1, wherein the access point comprises at least one Wi-Fi radio and at least one Bluetooth radio. 8. The method of claim 1, wherein the triggering event comprises suspicious activity and the Bluetooth channel is activated to discretely communicate the suspicious activity without alerting the source of the suspicious activity. 9. A non-transitory computer-readable medium storing source code that, when executed by a processor, performs a method in an access point in a Wi-Fi communications network, of using alternative networks for troubleshooting or monitoring, the method comprising the steps of:
providing access for at least one station over a Wi-Fi channel to connect with a wired backbone network; detect triggering event indicative of a communication issue associated with the access point; responsive to the triggering event detection, establishing a Bluetooth channel for communication with the at least one station for collecting data associated with the triggering event; detecting an end to the triggering event; responsive to the triggering event end, resuming access for the at least one station over the Wi-Fi channel. 10. An access point in a Wi-Fi communications network, of using alternative networks for troubleshooting or monitoring, the access point comprising:
a processor; and a memory, storing:
a first module to provide access for at least one station over a Wi-Fi channel to connect with a wired backbone network;
a second module to detect triggering event indicative of a communication issue associated with the access point;
a fourth module to, responsive to the triggering event detection, establish a Bluetooth channel for communication with the at least one station for collecting data associated with the triggering event;
a fifth module to detect an end to the triggering event;
a sixth module to, responsive to the triggering event end, resume access for the at least one station over the Wi-Fi channel. | 2,400 |
8,277 | 8,277 | 11,923,540 | 2,467 | To resolve a Uniform Resource Identifier (URI) for use in routing messages in or between IP Multimedia Subsystem (IMS) networks, a query ( 101;201 ) is sent to resolve this URI from a device ( 120;220 ) to a private name server ( 121;221 ). The private name server ( 121;221 ) attempts to resolve the URI. In case of failure the method further involves the sending of a new query ( 104;203 ) for resolving the URI to a public name server ( 122;222 ). The public name server ( 122;222 ) resolves the URI in the new query ( 104;203 ). | 1. A method for resolving a Uniform Resource Identifier (URI) for use in routing messages in or between IP Multimedia Subsystem (IMS) networks comprising the following steps:
a. sending a query (101;201) for resolving said Uniform Resource Identifier from a device capable of sending messages to said IP Multimedia Subsystem networks (1 20;220), to a private name server (121 ;221); and b. resolving (102; 202) said Uniform Resource Identifier by said private name server (121 ;221);
characterized in that said method further comprises:
c. sending a new query (104;203) for resolving said Uniform Resource Identifier to a public name server (122;222) in case resolving said Uniform Resource Identifier by said private name server (121 ;221) fails;
d. resolving (105;204) said Uniform Resource Identifier by said public name server (1 22;222); and
e. receiving a response (106;205) to said query (104;203) by said device (120;220). 2. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step c of sending said new query (104;203) is performed by said device (120;220). 3. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step c of sending said new query (104;203) is performed by said private name server (121;221). 4. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step d involves translating a domain in said Uniform Resource Identifier into a different domain using Naming Authority Pointer (NAPTR) records. 5. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step d involves translating a domain in said Uniform Resource Identifier into a different domain using Service (SRV) records. 6. A device (120) for routing messages in an IP Multimedia Subsystem network, said device (120) comprising:
means able to formulate a query (101) for resolving (102) a Uniform Resource Identifier (URI); means for sending said query (101) to a private name server (121); and means for interpreting a response (103) to said query (101);
characterized in that said device (120) is further adapted to formulate a new query (104) for resolving (105) said Uniform Resource Identifier (URI) and to send said new query (104) to a public name server (122) in case a response (103) from said private name server indicates a failure to resolve (102) said Uniform Resource Identifier (URI) by said private name server (121). 7. A private name server (221) for resolving (202) a Uniform Resource Identifier (URI) for use in routing messages in a IP Multimedia Subsystem network, said private name server (221) comprising:
means for receiving a query (201) for resolving (202) a Uniform Resource Identifier (URI); means for resolving (202) said Uniform Resource Identifier (URI); means for formulating a response (207) to said query (201); and means for sending said response (207);
characterized in that said private name server (221) is further adapted to formulate a new query (203) for resolving (204) said Uniform Resource Identifier (URI) and to send said new query (203) to a public name server (222) in case of failure to resolve (202) said Uniform Resource Identifier (URI) by said private name server (222). | To resolve a Uniform Resource Identifier (URI) for use in routing messages in or between IP Multimedia Subsystem (IMS) networks, a query ( 101;201 ) is sent to resolve this URI from a device ( 120;220 ) to a private name server ( 121;221 ). The private name server ( 121;221 ) attempts to resolve the URI. In case of failure the method further involves the sending of a new query ( 104;203 ) for resolving the URI to a public name server ( 122;222 ). The public name server ( 122;222 ) resolves the URI in the new query ( 104;203 ).1. A method for resolving a Uniform Resource Identifier (URI) for use in routing messages in or between IP Multimedia Subsystem (IMS) networks comprising the following steps:
a. sending a query (101;201) for resolving said Uniform Resource Identifier from a device capable of sending messages to said IP Multimedia Subsystem networks (1 20;220), to a private name server (121 ;221); and b. resolving (102; 202) said Uniform Resource Identifier by said private name server (121 ;221);
characterized in that said method further comprises:
c. sending a new query (104;203) for resolving said Uniform Resource Identifier to a public name server (122;222) in case resolving said Uniform Resource Identifier by said private name server (121 ;221) fails;
d. resolving (105;204) said Uniform Resource Identifier by said public name server (1 22;222); and
e. receiving a response (106;205) to said query (104;203) by said device (120;220). 2. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step c of sending said new query (104;203) is performed by said device (120;220). 3. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step c of sending said new query (104;203) is performed by said private name server (121;221). 4. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step d involves translating a domain in said Uniform Resource Identifier into a different domain using Naming Authority Pointer (NAPTR) records. 5. A method for resolving a Uniform Resource Identifier (URI) as described in claim 1, characterized in that said step d involves translating a domain in said Uniform Resource Identifier into a different domain using Service (SRV) records. 6. A device (120) for routing messages in an IP Multimedia Subsystem network, said device (120) comprising:
means able to formulate a query (101) for resolving (102) a Uniform Resource Identifier (URI); means for sending said query (101) to a private name server (121); and means for interpreting a response (103) to said query (101);
characterized in that said device (120) is further adapted to formulate a new query (104) for resolving (105) said Uniform Resource Identifier (URI) and to send said new query (104) to a public name server (122) in case a response (103) from said private name server indicates a failure to resolve (102) said Uniform Resource Identifier (URI) by said private name server (121). 7. A private name server (221) for resolving (202) a Uniform Resource Identifier (URI) for use in routing messages in a IP Multimedia Subsystem network, said private name server (221) comprising:
means for receiving a query (201) for resolving (202) a Uniform Resource Identifier (URI); means for resolving (202) said Uniform Resource Identifier (URI); means for formulating a response (207) to said query (201); and means for sending said response (207);
characterized in that said private name server (221) is further adapted to formulate a new query (203) for resolving (204) said Uniform Resource Identifier (URI) and to send said new query (203) to a public name server (222) in case of failure to resolve (202) said Uniform Resource Identifier (URI) by said private name server (222). | 2,400 |
8,278 | 8,278 | 15,224,149 | 2,413 | Example embodiments presented herein are directed towards a base station and corresponding method for scheduling a downlink broadcast transmission using PDSCH. The base station is also configured to provide an OFDM PDSCH to a wireless terminal, which monitors ePDCCH for receiving downlink control data. Thus, by applying such a symbol, a wireless terminal that monitors ePDCCH and a wireless terminal that monitors PDCCH may receive the same downlink broadcast transmission on PDSCH. Example embodiments are also directed towards a wireless terminal for receiving such downlink broadcast transmissions. | 1. A method in a base station for scheduling a downlink broadcast transmission using a Physical Downlink Shared Channel (PDSCH) wherein an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol identifier is used for identifying a start of said broadcast transmission, said base station being comprised in a wireless communications network, the method comprising:
selecting an OFDM PDSCH start symbol for the start of the broadcast transmission, wherein the OFDM PDSCH start symbol is based on a system bandwidth. 2. The method of claim 1, wherein the OFDM PDSCH start symbol is one of a number of predefined values and the value is selected based on the system bandwidth. 3. The method of claim 1, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 4. The method of claim 1, further comprising configuring a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the selected OFDM PDSCH start symbol. 5. The method of claim 4, further comprising configuring a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the OFDM PDSCH start symbol, wherein the OFDM PDSCH start symbol is a radio resource control (RRC) configured value. 6. The method of claim 1, further comprising transmitting the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 7. The method of claim 6, further comprising transmitting, to the at least a first user equipment, an ePDCCH, based on the second OFDM start symbol. 8. A base station for scheduling a downlink broadcast transmission using a Physical Downlink Shared Channel (PDSCH) wherein an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol is used for identifying a start of said broadcast transmission, said base station being comprised in a wireless communications network, the base station comprising:
radio circuitry configured to transmit the broadcast transmission; and processing circuitry configured to control the radio circuitry and to select an OFDM PDSCH start symbol for the start of the broadcast transmission, wherein the OFDM PDSCH start symbol is based on a system bandwidth. 9. The base station of claim 8, wherein the OFDM PDSCH start symbol is one of a number of predefined values and the value is selected based on the system bandwidth. 10. The base station of claim 8, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 11. The base station of claim 8, further comprising configuring a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the selected OFDM PDSCH start symbol. 12. The base station of claim 11, wherein the processing circuit is configured to configure a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the OFDM PDSCH start symbol, wherein the OFDM PDSCH start symbol is a radio resource control (RRC) configured value. 13. The base station of claim 8, wherein the processing circuit is configured to control the radio circuitry to transmit the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 14. The base station of claim 13, wherein the processing circuit is configured to control the radio circuitry to transmit, to the at least a first user equipment, an ePDCCH, based on the second OFDM start symbol. 15. A method in a wireless terminal for receiving downlink broadcast transmissions in a Physical Downlink Shared Channel (PDSCH) said wireless terminal being comprised in a wireless communications network, the method comprising:
monitoring an enhanced Physical Downlink Control Channel (ePDCCH) for downlink control information; determining an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol for a start of the downlink broadcast transmissions, wherein said OFDM PDSCH start symbol is based on a system bandwidth. 16. The method of claim 15, wherein the start symbol for the start of the downlink broadcast transmission is one of a number of values, and the value is determined based on the system bandwidth. 17. The method of claim 15, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 18. The method of claim 15, wherein the method further comprises receiving the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 19. The method of claim 18, wherein the method further comprises receiving an ePDCCH, based on the second OFDM PDSCH start symbol. 20. A wireless terminal for receiving downlink broadcast transmissions in a Physical Downlink Shared Channel (PDSCH), the wireless terminal comprising:
radio circuitry configured to receive downlink broadcast transmissions on the PDSCH; processing circuitry configured to control the radio circuitry to monitor an enhanced Physical Downlink Control Channel (ePDCCH) for downlink control information, to determine an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol for identifying a start of said downlink broadcast transmissions, wherein said OFDM PDSCH start symbol is based on a system bandwidth, and to control the radio circuitry to receive downlink broadcast transmissions based on the OFDM PDSCH start symbol. 21. The wireless terminal of claim 20, wherein the start symbol for the start of the downlink broadcast transmission is one of a number of values, and the value is determined based on the system bandwidth. 22. The wireless terminal of claim 20, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 23. The wireless terminal of claim 23, wherein the processing circuitry is configured to receive the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 24. The wireless terminal of claim 23, wherein the processing circuitry is configured to receive an ePDCCH, based on the second OFDM start symbol. | Example embodiments presented herein are directed towards a base station and corresponding method for scheduling a downlink broadcast transmission using PDSCH. The base station is also configured to provide an OFDM PDSCH to a wireless terminal, which monitors ePDCCH for receiving downlink control data. Thus, by applying such a symbol, a wireless terminal that monitors ePDCCH and a wireless terminal that monitors PDCCH may receive the same downlink broadcast transmission on PDSCH. Example embodiments are also directed towards a wireless terminal for receiving such downlink broadcast transmissions.1. A method in a base station for scheduling a downlink broadcast transmission using a Physical Downlink Shared Channel (PDSCH) wherein an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol identifier is used for identifying a start of said broadcast transmission, said base station being comprised in a wireless communications network, the method comprising:
selecting an OFDM PDSCH start symbol for the start of the broadcast transmission, wherein the OFDM PDSCH start symbol is based on a system bandwidth. 2. The method of claim 1, wherein the OFDM PDSCH start symbol is one of a number of predefined values and the value is selected based on the system bandwidth. 3. The method of claim 1, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 4. The method of claim 1, further comprising configuring a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the selected OFDM PDSCH start symbol. 5. The method of claim 4, further comprising configuring a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the OFDM PDSCH start symbol, wherein the OFDM PDSCH start symbol is a radio resource control (RRC) configured value. 6. The method of claim 1, further comprising transmitting the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 7. The method of claim 6, further comprising transmitting, to the at least a first user equipment, an ePDCCH, based on the second OFDM start symbol. 8. A base station for scheduling a downlink broadcast transmission using a Physical Downlink Shared Channel (PDSCH) wherein an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol is used for identifying a start of said broadcast transmission, said base station being comprised in a wireless communications network, the base station comprising:
radio circuitry configured to transmit the broadcast transmission; and processing circuitry configured to control the radio circuitry and to select an OFDM PDSCH start symbol for the start of the broadcast transmission, wherein the OFDM PDSCH start symbol is based on a system bandwidth. 9. The base station of claim 8, wherein the OFDM PDSCH start symbol is one of a number of predefined values and the value is selected based on the system bandwidth. 10. The base station of claim 8, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 11. The base station of claim 8, further comprising configuring a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the selected OFDM PDSCH start symbol. 12. The base station of claim 11, wherein the processing circuit is configured to configure a Physical Control Format Indicator Channel (PCFICH) control format indicator (CFI) value, in a subframe in which downlink broadcast transmissions are sent, to be equal to the OFDM PDSCH start symbol, wherein the OFDM PDSCH start symbol is a radio resource control (RRC) configured value. 13. The base station of claim 8, wherein the processing circuit is configured to control the radio circuitry to transmit the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 14. The base station of claim 13, wherein the processing circuit is configured to control the radio circuitry to transmit, to the at least a first user equipment, an ePDCCH, based on the second OFDM start symbol. 15. A method in a wireless terminal for receiving downlink broadcast transmissions in a Physical Downlink Shared Channel (PDSCH) said wireless terminal being comprised in a wireless communications network, the method comprising:
monitoring an enhanced Physical Downlink Control Channel (ePDCCH) for downlink control information; determining an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol for a start of the downlink broadcast transmissions, wherein said OFDM PDSCH start symbol is based on a system bandwidth. 16. The method of claim 15, wherein the start symbol for the start of the downlink broadcast transmission is one of a number of values, and the value is determined based on the system bandwidth. 17. The method of claim 15, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 18. The method of claim 15, wherein the method further comprises receiving the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 19. The method of claim 18, wherein the method further comprises receiving an ePDCCH, based on the second OFDM PDSCH start symbol. 20. A wireless terminal for receiving downlink broadcast transmissions in a Physical Downlink Shared Channel (PDSCH), the wireless terminal comprising:
radio circuitry configured to receive downlink broadcast transmissions on the PDSCH; processing circuitry configured to control the radio circuitry to monitor an enhanced Physical Downlink Control Channel (ePDCCH) for downlink control information, to determine an Orthogonal Frequency Division Multiplexing (OFDM) PDSCH start symbol for identifying a start of said downlink broadcast transmissions, wherein said OFDM PDSCH start symbol is based on a system bandwidth, and to control the radio circuitry to receive downlink broadcast transmissions based on the OFDM PDSCH start symbol. 21. The wireless terminal of claim 20, wherein the start symbol for the start of the downlink broadcast transmission is one of a number of values, and the value is determined based on the system bandwidth. 22. The wireless terminal of claim 20, where a size of said control region is zero symbols and the OFDM PDSCH start symbol is zero. 23. The wireless terminal of claim 23, wherein the processing circuitry is configured to receive the downlink broadcast transmission, the downlink broadcast transmission including a second OFDM start symbol identifying the start of a PDSCH region for connected mode signaling and/or an enhanced Physical Downlink Control Channel (ePDCCH) region. 24. The wireless terminal of claim 23, wherein the processing circuitry is configured to receive an ePDCCH, based on the second OFDM start symbol. | 2,400 |
8,279 | 8,279 | 14,954,272 | 2,487 | An imaging system includes a housing having a lens defining a first optical axis. A first sensor is within the housing aligned with the first optical axis. A second sensor is within the housing offset from the first optical axis. A third sensor is within the housing opposite from the second sensor across the first optical axis. A second optical axis is defined between the second and third sensors. A polarized beam splitter is within the housing at an intersection of the first and second optical axes to redirect a portion of incoming photons to the second sensor. A bandpass filter is between the polarized beam splitter and the second sensor to pass a portion of photons traveling from the polarized beam splitter to the second sensor and to reflect a remaining portion of the photons back to the polarized beam splitter. | 1. An imaging system comprising:
a housing having a lens defining a first optical axis; a first sensor within the housing aligned with the first optical axis; a second sensor within the housing offset from the first optical axis; a third sensor within the housing offset from the first optical axis opposite from the second sensor across the first optical axis, wherein a second optical axis is defined between the second and third sensors; a polarized beam splitter within the housing at an intersection of the first and second optical axes to redirect a portion of incoming photons traveling from the lens along the first optical axis to the second sensor along the second optical axis; and a bandpass filter between the polarized beam splitter and the second sensor along the second optical axis to pass a portion of photons traveling from the polarized beam splitter to the second sensor along the second optical axis and to reflect a remaining portion of the photons back to the polarized beam splitter toward the third sensor. 2. The imaging system as recited in claim 1, wherein the polarized beam splitter is angled relative to the first and second optical axes. 3. The imaging system as recited in claim 1, wherein the polarized beam splitter includes a polarized surface oriented to face the second sensor in order to pass photons reflected back from the second sensor to the third sensor along the second optical axis. 4. The imaging system as recited in claim 1, further comprising a quarter-wave plate between the polarized beam splitter and the bandpass filter along the second optical axis to alter the polarity of photons traveling from the polarized beam splitter to the second sensor along the second optical axis. 5. The imaging system as recited in claim 1, wherein each of the first, second and third sensors include respective lenses and focal plane arrays (FPA). 6. The imaging system as recited in claim 1, wherein each of the first, second and third sensors generate respective images using different spectral bands of an overlapping field of view. 7. The imaging system as recited in claim 1, wherein the first and second optical axes are perpendicular to one another. 8. The imaging system as recited in claim 1, wherein each of the first, second and third sensors are at least one of a SWIR band sensor, a NIR band sensor, a LWIR band sensor, a MWIR band sensor, or a visible band sensor. 9. A method for directing photons in an imaging system comprising:
receiving photons through a lens in a housing, wherein the lens defines a first optical axis; passing a first portion of the photons through a beam splitter to a first sensor; reflecting a second portion of the photons along a second optical axis using the beam splitter; passing a portion of the second portion of the photons through a bandpass filter to a second sensor offset from the first optical axis; reflecting a remaining portion of the second portion of the photons with the bandpass filter back to the beam splitter; and passing the remaining portion of the second portion of the photons through the beam splitter to a third sensor. 10. The method as recited in claim 9, further comprising passing the second portion of the photons through a quarter-wave plate to adjust the polarity of the second portion of the photons. 11. The method as recited in claim 9, wherein the beam splitter is a polarized beam splitter. 12. The method as recited in claim 9, further comprising generating respective images with each of the first, second and third sensors. 13. The method as recited in claim 12, further comprising blending each image together to form a single image. 14. The method as recited in claim 12, wherein each of the first, second and third sensors generate the respective images using different spectral bands of an overlapping field of view. 15. The method as recited in claim 9, wherein each of the first, second and third sensors are at least one of a SWIR band sensor, a NIR band sensor, a LWIR band sensor, a MWIR band sensor, or a visible band sensor. | An imaging system includes a housing having a lens defining a first optical axis. A first sensor is within the housing aligned with the first optical axis. A second sensor is within the housing offset from the first optical axis. A third sensor is within the housing opposite from the second sensor across the first optical axis. A second optical axis is defined between the second and third sensors. A polarized beam splitter is within the housing at an intersection of the first and second optical axes to redirect a portion of incoming photons to the second sensor. A bandpass filter is between the polarized beam splitter and the second sensor to pass a portion of photons traveling from the polarized beam splitter to the second sensor and to reflect a remaining portion of the photons back to the polarized beam splitter.1. An imaging system comprising:
a housing having a lens defining a first optical axis; a first sensor within the housing aligned with the first optical axis; a second sensor within the housing offset from the first optical axis; a third sensor within the housing offset from the first optical axis opposite from the second sensor across the first optical axis, wherein a second optical axis is defined between the second and third sensors; a polarized beam splitter within the housing at an intersection of the first and second optical axes to redirect a portion of incoming photons traveling from the lens along the first optical axis to the second sensor along the second optical axis; and a bandpass filter between the polarized beam splitter and the second sensor along the second optical axis to pass a portion of photons traveling from the polarized beam splitter to the second sensor along the second optical axis and to reflect a remaining portion of the photons back to the polarized beam splitter toward the third sensor. 2. The imaging system as recited in claim 1, wherein the polarized beam splitter is angled relative to the first and second optical axes. 3. The imaging system as recited in claim 1, wherein the polarized beam splitter includes a polarized surface oriented to face the second sensor in order to pass photons reflected back from the second sensor to the third sensor along the second optical axis. 4. The imaging system as recited in claim 1, further comprising a quarter-wave plate between the polarized beam splitter and the bandpass filter along the second optical axis to alter the polarity of photons traveling from the polarized beam splitter to the second sensor along the second optical axis. 5. The imaging system as recited in claim 1, wherein each of the first, second and third sensors include respective lenses and focal plane arrays (FPA). 6. The imaging system as recited in claim 1, wherein each of the first, second and third sensors generate respective images using different spectral bands of an overlapping field of view. 7. The imaging system as recited in claim 1, wherein the first and second optical axes are perpendicular to one another. 8. The imaging system as recited in claim 1, wherein each of the first, second and third sensors are at least one of a SWIR band sensor, a NIR band sensor, a LWIR band sensor, a MWIR band sensor, or a visible band sensor. 9. A method for directing photons in an imaging system comprising:
receiving photons through a lens in a housing, wherein the lens defines a first optical axis; passing a first portion of the photons through a beam splitter to a first sensor; reflecting a second portion of the photons along a second optical axis using the beam splitter; passing a portion of the second portion of the photons through a bandpass filter to a second sensor offset from the first optical axis; reflecting a remaining portion of the second portion of the photons with the bandpass filter back to the beam splitter; and passing the remaining portion of the second portion of the photons through the beam splitter to a third sensor. 10. The method as recited in claim 9, further comprising passing the second portion of the photons through a quarter-wave plate to adjust the polarity of the second portion of the photons. 11. The method as recited in claim 9, wherein the beam splitter is a polarized beam splitter. 12. The method as recited in claim 9, further comprising generating respective images with each of the first, second and third sensors. 13. The method as recited in claim 12, further comprising blending each image together to form a single image. 14. The method as recited in claim 12, wherein each of the first, second and third sensors generate the respective images using different spectral bands of an overlapping field of view. 15. The method as recited in claim 9, wherein each of the first, second and third sensors are at least one of a SWIR band sensor, a NIR band sensor, a LWIR band sensor, a MWIR band sensor, or a visible band sensor. | 2,400 |
8,280 | 8,280 | 15,346,574 | 2,439 | A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy protection method comprises executing a software loop of a first software application in a first operating system. A first call is executed in the software loop to a code portion. A decrypted code portion of the first software application is executed in a second operating system in response to the first call. The code portion is decrypted in response to a successful validation of the first software application. | 1. A copy protection method comprising:
executing a software loop of a first software application in a first operating system; executing a first call in the software loop to a code portion; executing a decrypted code portion of the first software application in a second operating system in response to the first call, wherein the code portion is decrypted in response to a successful validation of the first software application. 2. The copy protection method of claim 1, wherein the second operating system is a secure operating system. 3. The copy protection method of claim 1, wherein the code portion is executed by and the validation is performed by a second software application in the second operating system. 4. The copy protection method of claim 3 further comprising:
using a key, decrypting an encrypted code portion of the first software application to produce the decrypted code portion. 5. The copy protection method of claim 4, wherein the decrypting comprises:
copying an encrypted code portion of the first software application from the first operating system to the second operating system; downloading a decryption key for decrypting the code portion after the completion of the validation of the first software application, wherein the decryption key is specific to a particular device and first software application combination; decrypting the code portion of the first software application with the decryption key in the second operating system with the second software application; and storing the decrypted first function in a secured storage area. 6. The copy protection method of claim 1 wherein the code portion comprises one of a function, a routine, a subroutine, and a procedure. 7. A computer system comprising:
a processor, a memory for storing instructions, that when executed by the processor performs a copy protection method comprising:
executing a software loop of a first software application in a first operating system;
executing a first call in the software loop to a code portion;
executing a decrypted code portion of the first software application in a second operating system in response to the first call, wherein the code portion is decrypted in response to a successful validation of the first software application. 8. The computer system of claim 7, wherein the second operating system is a secure operating system. 9. The computer system of claim 7, wherein the code portion is executed by and the validation is performed by a second software application in the second operating system. 10. The computer system of claim 7 further comprising:
opening the first software application and verifying that a decrypted copy of the data portion is present in a secured storage area, and decrypting an encrypted data portion of the first software application if the decrypted copy of the data portion is not present in the secured storage area. 11. The computer system of claim 10, wherein the decrypting comprises:
copying an encrypted code portion of the first software application from the first operating system to the second operating system; downloading a decryption key for decrypting the code portion after the completion of the validation of the first software application, wherein the decryption key is specific to a particular device and first software application combination; decrypting the code portion of the first software application with the decryption key in the second operating system with the second software application; and storing the decrypted first function in a secured storage area. 12. The computer system of claim 7, wherein the data portion comprises one of a function, a routine, a subroutine, and a procedure. 13. A computer system comprising:
a processor; a memory comprising an unsecured portion and a secured portion, wherein the unsecured portion comprises a first operating system running a first software application, wherein the first software application comprises a software loop, and wherein the secured portion comprises a second operating system running a second software application; a secured storage area storing a code portion; and a memory for storing instructions, that when executed by the processor perform a copy protection method comprising:
executing the software loop of the first software application;
executing a first call in the software loop to the code portion;
executing the code portion of the first software application in the second operating system in response to the first call, wherein a result returned in response to the first call produces one of an unusable state in the first software application when the first software application has not been successfully validated and a usable state in the first software application when the first software application has been successfully validated. 14. The computer system of claim 13, wherein the second operating system is a secure operating system. 15. The computer system of claim 13, wherein the first function and the validation are performed by a second software application in the second operating system. 16. The computer system of claim 13 further comprising:
using a key, decrypting an encrypted first function of the first software application if the decrypted copy of the first function is not present in the secured storage area. 17. The computer system of claim 16, wherein the decrypting comprises:
copying an encrypted code portion of the first software application from the first operating system to the second operating system; downloading a decryption key for decrypting the code portion after the completion of the validation of the first software application, wherein the decryption key is specific to a particular device and first software application combination; decrypting the code portion of the first software application with the decryption key in the second operating system with the second software application; and storing the decrypted first function in a secured storage area. 18. The computer system of claim 13, wherein the data portion comprises one of a function, a routine, a subroutine, and a procedure. 19. The computer system of claim 13, wherein the result returned from the first call that causes the unusable state in the first software application comprises one of a predetermined response, a garbage data, and returning no result. 20. The computer system of claim 19, wherein the code portion comprises one of garbage code and garbage data when the first software application has not been successfully validated. | A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy protection method comprises executing a software loop of a first software application in a first operating system. A first call is executed in the software loop to a code portion. A decrypted code portion of the first software application is executed in a second operating system in response to the first call. The code portion is decrypted in response to a successful validation of the first software application.1. A copy protection method comprising:
executing a software loop of a first software application in a first operating system; executing a first call in the software loop to a code portion; executing a decrypted code portion of the first software application in a second operating system in response to the first call, wherein the code portion is decrypted in response to a successful validation of the first software application. 2. The copy protection method of claim 1, wherein the second operating system is a secure operating system. 3. The copy protection method of claim 1, wherein the code portion is executed by and the validation is performed by a second software application in the second operating system. 4. The copy protection method of claim 3 further comprising:
using a key, decrypting an encrypted code portion of the first software application to produce the decrypted code portion. 5. The copy protection method of claim 4, wherein the decrypting comprises:
copying an encrypted code portion of the first software application from the first operating system to the second operating system; downloading a decryption key for decrypting the code portion after the completion of the validation of the first software application, wherein the decryption key is specific to a particular device and first software application combination; decrypting the code portion of the first software application with the decryption key in the second operating system with the second software application; and storing the decrypted first function in a secured storage area. 6. The copy protection method of claim 1 wherein the code portion comprises one of a function, a routine, a subroutine, and a procedure. 7. A computer system comprising:
a processor, a memory for storing instructions, that when executed by the processor performs a copy protection method comprising:
executing a software loop of a first software application in a first operating system;
executing a first call in the software loop to a code portion;
executing a decrypted code portion of the first software application in a second operating system in response to the first call, wherein the code portion is decrypted in response to a successful validation of the first software application. 8. The computer system of claim 7, wherein the second operating system is a secure operating system. 9. The computer system of claim 7, wherein the code portion is executed by and the validation is performed by a second software application in the second operating system. 10. The computer system of claim 7 further comprising:
opening the first software application and verifying that a decrypted copy of the data portion is present in a secured storage area, and decrypting an encrypted data portion of the first software application if the decrypted copy of the data portion is not present in the secured storage area. 11. The computer system of claim 10, wherein the decrypting comprises:
copying an encrypted code portion of the first software application from the first operating system to the second operating system; downloading a decryption key for decrypting the code portion after the completion of the validation of the first software application, wherein the decryption key is specific to a particular device and first software application combination; decrypting the code portion of the first software application with the decryption key in the second operating system with the second software application; and storing the decrypted first function in a secured storage area. 12. The computer system of claim 7, wherein the data portion comprises one of a function, a routine, a subroutine, and a procedure. 13. A computer system comprising:
a processor; a memory comprising an unsecured portion and a secured portion, wherein the unsecured portion comprises a first operating system running a first software application, wherein the first software application comprises a software loop, and wherein the secured portion comprises a second operating system running a second software application; a secured storage area storing a code portion; and a memory for storing instructions, that when executed by the processor perform a copy protection method comprising:
executing the software loop of the first software application;
executing a first call in the software loop to the code portion;
executing the code portion of the first software application in the second operating system in response to the first call, wherein a result returned in response to the first call produces one of an unusable state in the first software application when the first software application has not been successfully validated and a usable state in the first software application when the first software application has been successfully validated. 14. The computer system of claim 13, wherein the second operating system is a secure operating system. 15. The computer system of claim 13, wherein the first function and the validation are performed by a second software application in the second operating system. 16. The computer system of claim 13 further comprising:
using a key, decrypting an encrypted first function of the first software application if the decrypted copy of the first function is not present in the secured storage area. 17. The computer system of claim 16, wherein the decrypting comprises:
copying an encrypted code portion of the first software application from the first operating system to the second operating system; downloading a decryption key for decrypting the code portion after the completion of the validation of the first software application, wherein the decryption key is specific to a particular device and first software application combination; decrypting the code portion of the first software application with the decryption key in the second operating system with the second software application; and storing the decrypted first function in a secured storage area. 18. The computer system of claim 13, wherein the data portion comprises one of a function, a routine, a subroutine, and a procedure. 19. The computer system of claim 13, wherein the result returned from the first call that causes the unusable state in the first software application comprises one of a predetermined response, a garbage data, and returning no result. 20. The computer system of claim 19, wherein the code portion comprises one of garbage code and garbage data when the first software application has not been successfully validated. | 2,400 |
8,281 | 8,281 | 15,641,543 | 2,457 | A method for providing data produced in a conference, in which voice signals from participants in the conference are mixed in a conference bridge, can include provision of a time base that runs concurrently over the duration of the conference and setup of automatic identification of each participant when this participant speaks in the conference. The method also comprises capture of conversation contribution by each speaking participant to a conversation by the participants which is conducted during the conference as speaking time associated with each speaking participant at the conference, association of a time stamp with the speaking time, and production of statistical data by virtue of statistical evaluation of the speaking times of the participants. | 1-21. (canceled) 22. A method of collecting conference call data based on voice signals received via at least one network from terminal devices of conference call participants, the method comprising:
a conference server receiving the voice signals from the terminal devices via the network during the conference call, the conference server comprising hardware; the conference server recognizing a first participant of the conference call based on the received voice signals and assigning a first time stamp to a first time segment of the conference call; in response to detecting that the first participant and all other participants to the conference call do not speak for a fixed talk delay period after the assignment of the first time stamp during the first time segment, the conference server assigning a second time stamp to define a first time stop of the first time segment of the conference call, the first and second time stamps defining a start and end of the first time segment in which the recognized first participant spoke during the conference call; the conference server recognizing the second participant of the conference call based on the received voice signals and assigning a third time stamp to a second time segment of the conference call; in response to detecting that the second participant and all the other participants to the conference call do not speak for the fixed talk delay period after the assignment of the third time stamp during the second time segment based on the received voice signals, the conference server assigning a fourth time stamp to define a second time stop of the second time segment of the conference call, the third and fourth time stamps defining a start and end of the second time segment in which the recognized second participant spoke during the conference call; and during the second time segment, the conference server recognizing a first speech pause that is shorter than the fixed talk delay period, the first speech pause being a duration of time in which the second participant is not speaking, a duration of the first speech pause being included within the second time segment and assigned as a portion of time during the conference that the second participant spoke during the conference; the conference server performing statistical analysis based on the assigned first, second, third, and fourth time stamps and the first speech pause to generate statistical data that identifies a duration of time the first participant has spoken during the conference call and that identifies a duration of time the second participant has spoken during the conference call. 23. The method of claim 22, wherein each of the terminal devices is a cellular phone, a telephone, a personal computer, or a personal digital assistant; and
wherein the conference server is a conference bridge. 24. The method of claim 22, further comprising:
during the first speech pause of the second time segment, the conference server detecting a third participant of the conference call based on the received voice signals and assigning a fifth time stamp for a third time segment of the conference call; in response to detecting that the third participant does not speak for the fixed talk delay period after the assignment of the fifth time stamp based on the received voice signals, the conference server assigning a sixth time stamp to define a third time stop for a third time segment of the conference call that is associated with a third time segment of the conference call in which the third participant spoke during the conference call. 25. The method of claim 24, wherein the third time stop is assigned when the conference server detects that the third participant and all the other participants of the conference call did not speak for the fixed talk delay period after the fifth time stamp was assigned. 26. The method of claim 24, wherein the conference server performs the statistical analysis during the conference call, and the method also comprising:
the conference server communicating data to a terminal device of the first participant based on the performed statistical analysis; the terminal device of the first participant generating at least one graphic to identify the duration of time the first participant has spoken during the conference call, the duration of time the second participant has spoken during the conference call and the duration of time the third participant has spoken during the conference call via a display device of the terminal device or a display connected to the terminal device based on the data communicated to the terminal device of the first participant by the conference server. 27. The method of claim 22, comprising:
the conference server recognizing a third participant of the conference call based on the received voice signals and assigning a fifth time stamp to a third time segment of the conference call; in response to detecting that the third participant does not speak for a third pre-selected time period after the assignment of the fifth time stamp during the third time segment while a fourth participant is detected as speaking during the third pre-selected time period, the conference server assigning a sixth time stamp to define a third time stop of the third time segment of the conference call, the fifth and sixth time stamps defining a start and end of the third time segment in which the recognized third participant spoke during the conference call; the conference server recognizing the fourth participant of the conference call based on the received voice signals and assigning a seventh time stamp to a fourth time segment of the conference call; and in response to detecting that the fourth participant does not speak for a fourth pre-selected time period after the assignment of the seventh time stamp during the fourth time segment based on the received voice signals, the conference server assigning an eighth time stamp to define a fourth time stop of the fourth time segment of the conference call, the seventh and eighth time stamps defining a start and end of the fourth time segment in which the recognized fourth participant spoke during the conference call. 28. The method of claim 27, comprising:
the conference server performing the statistical analysis based on the assigned fifth, sixth, seventh, and eighth time stamps to generate statistical data that identifies a duration of time the third participant has spoken during the conference call and that identifies a duration of time the fourth participant has spoken during the conference call. 29. The method of claim 28, comprising:
the conference server communicating data to a terminal device of the first participant based on the performed statistical analysis; the terminal device of the first participant generating at least one graphic to identify the duration of time the first participant has spoken during the conference call, the duration of time the second participant has spoken during the conference call, the duration of time the third participant has spoken during the conference call, and the duration of time the fourth participant has spoken during the conference call via a display device of the terminal device or a display connected to the terminal device; the conference server communicating data to a terminal device of the second participant based on the performed statistical analysis; and the terminal device of the second participant generating at least one graphic to identify the duration of time the first participant has spoken during the conference call, the duration of time the second participant has spoken during the conference call, the duration of time the third participant has spoken during the conference call, and the duration of time the fourth participant has spoken during the conference call via a display device of the terminal device or a display connected to the terminal device based on the data communicated by the conference server. 30. The method of claim 29, wherein the conference server performs the statistical analysis during the conference call. 31. The method of claim 22, comprising:
the conference server communicating with a non real-time collaboration service during the conference call. 32. The method of claim 31, wherein the non real-time collaboration service is an instant messaging service or a chat service. 33. The method of claim 32, comprising:
the conference server incorporating data generated by the non real-time collaboration service into the statistical analysis performed by the conference server. 34. The method of claim 22, wherein the assignments of the first time stamp and the third time stamp are each in response to receipt of input received via an input device. 35. The method of claim 34, wherein the input device is a button or a soft key of a user interface of a terminal device communicatively connected to the conference server via the network, and a gesture recognized by a gesture control communicatively connected to the conference server via the network. 36. The method of claim 22, comprising:
the conference server performing statistical analysis based on the assigned first, second, third, and fourth time stamps and the first speech pause to determine which participant of the conference call had a largest conversation contribution to the conference call. 37. The method of claim 36, comprising:
the conference server assigning a rule-based call forwarding for the first participant in response to determining that the first participant had the largest conversation contribution. 38. The method of claim 22, comprising:
the conference server performing chronological conversation analysis based on the received voice signals and the first, second, third, and fourth time stamps. 39. The method of claim 38, comprising:
the conference server generating data to communicate to at least one terminal device based on the performed chronological conversation analysis that is configured for generation of a display identifying a chronological sequence of speaking times for the conference call. 40. The method of claim 22, comprising:
assigning the first and second time segments to different accounts. 41. A conference server comprising hardware, the conference server configured to perform the method of claim 22. | A method for providing data produced in a conference, in which voice signals from participants in the conference are mixed in a conference bridge, can include provision of a time base that runs concurrently over the duration of the conference and setup of automatic identification of each participant when this participant speaks in the conference. The method also comprises capture of conversation contribution by each speaking participant to a conversation by the participants which is conducted during the conference as speaking time associated with each speaking participant at the conference, association of a time stamp with the speaking time, and production of statistical data by virtue of statistical evaluation of the speaking times of the participants.1-21. (canceled) 22. A method of collecting conference call data based on voice signals received via at least one network from terminal devices of conference call participants, the method comprising:
a conference server receiving the voice signals from the terminal devices via the network during the conference call, the conference server comprising hardware; the conference server recognizing a first participant of the conference call based on the received voice signals and assigning a first time stamp to a first time segment of the conference call; in response to detecting that the first participant and all other participants to the conference call do not speak for a fixed talk delay period after the assignment of the first time stamp during the first time segment, the conference server assigning a second time stamp to define a first time stop of the first time segment of the conference call, the first and second time stamps defining a start and end of the first time segment in which the recognized first participant spoke during the conference call; the conference server recognizing the second participant of the conference call based on the received voice signals and assigning a third time stamp to a second time segment of the conference call; in response to detecting that the second participant and all the other participants to the conference call do not speak for the fixed talk delay period after the assignment of the third time stamp during the second time segment based on the received voice signals, the conference server assigning a fourth time stamp to define a second time stop of the second time segment of the conference call, the third and fourth time stamps defining a start and end of the second time segment in which the recognized second participant spoke during the conference call; and during the second time segment, the conference server recognizing a first speech pause that is shorter than the fixed talk delay period, the first speech pause being a duration of time in which the second participant is not speaking, a duration of the first speech pause being included within the second time segment and assigned as a portion of time during the conference that the second participant spoke during the conference; the conference server performing statistical analysis based on the assigned first, second, third, and fourth time stamps and the first speech pause to generate statistical data that identifies a duration of time the first participant has spoken during the conference call and that identifies a duration of time the second participant has spoken during the conference call. 23. The method of claim 22, wherein each of the terminal devices is a cellular phone, a telephone, a personal computer, or a personal digital assistant; and
wherein the conference server is a conference bridge. 24. The method of claim 22, further comprising:
during the first speech pause of the second time segment, the conference server detecting a third participant of the conference call based on the received voice signals and assigning a fifth time stamp for a third time segment of the conference call; in response to detecting that the third participant does not speak for the fixed talk delay period after the assignment of the fifth time stamp based on the received voice signals, the conference server assigning a sixth time stamp to define a third time stop for a third time segment of the conference call that is associated with a third time segment of the conference call in which the third participant spoke during the conference call. 25. The method of claim 24, wherein the third time stop is assigned when the conference server detects that the third participant and all the other participants of the conference call did not speak for the fixed talk delay period after the fifth time stamp was assigned. 26. The method of claim 24, wherein the conference server performs the statistical analysis during the conference call, and the method also comprising:
the conference server communicating data to a terminal device of the first participant based on the performed statistical analysis; the terminal device of the first participant generating at least one graphic to identify the duration of time the first participant has spoken during the conference call, the duration of time the second participant has spoken during the conference call and the duration of time the third participant has spoken during the conference call via a display device of the terminal device or a display connected to the terminal device based on the data communicated to the terminal device of the first participant by the conference server. 27. The method of claim 22, comprising:
the conference server recognizing a third participant of the conference call based on the received voice signals and assigning a fifth time stamp to a third time segment of the conference call; in response to detecting that the third participant does not speak for a third pre-selected time period after the assignment of the fifth time stamp during the third time segment while a fourth participant is detected as speaking during the third pre-selected time period, the conference server assigning a sixth time stamp to define a third time stop of the third time segment of the conference call, the fifth and sixth time stamps defining a start and end of the third time segment in which the recognized third participant spoke during the conference call; the conference server recognizing the fourth participant of the conference call based on the received voice signals and assigning a seventh time stamp to a fourth time segment of the conference call; and in response to detecting that the fourth participant does not speak for a fourth pre-selected time period after the assignment of the seventh time stamp during the fourth time segment based on the received voice signals, the conference server assigning an eighth time stamp to define a fourth time stop of the fourth time segment of the conference call, the seventh and eighth time stamps defining a start and end of the fourth time segment in which the recognized fourth participant spoke during the conference call. 28. The method of claim 27, comprising:
the conference server performing the statistical analysis based on the assigned fifth, sixth, seventh, and eighth time stamps to generate statistical data that identifies a duration of time the third participant has spoken during the conference call and that identifies a duration of time the fourth participant has spoken during the conference call. 29. The method of claim 28, comprising:
the conference server communicating data to a terminal device of the first participant based on the performed statistical analysis; the terminal device of the first participant generating at least one graphic to identify the duration of time the first participant has spoken during the conference call, the duration of time the second participant has spoken during the conference call, the duration of time the third participant has spoken during the conference call, and the duration of time the fourth participant has spoken during the conference call via a display device of the terminal device or a display connected to the terminal device; the conference server communicating data to a terminal device of the second participant based on the performed statistical analysis; and the terminal device of the second participant generating at least one graphic to identify the duration of time the first participant has spoken during the conference call, the duration of time the second participant has spoken during the conference call, the duration of time the third participant has spoken during the conference call, and the duration of time the fourth participant has spoken during the conference call via a display device of the terminal device or a display connected to the terminal device based on the data communicated by the conference server. 30. The method of claim 29, wherein the conference server performs the statistical analysis during the conference call. 31. The method of claim 22, comprising:
the conference server communicating with a non real-time collaboration service during the conference call. 32. The method of claim 31, wherein the non real-time collaboration service is an instant messaging service or a chat service. 33. The method of claim 32, comprising:
the conference server incorporating data generated by the non real-time collaboration service into the statistical analysis performed by the conference server. 34. The method of claim 22, wherein the assignments of the first time stamp and the third time stamp are each in response to receipt of input received via an input device. 35. The method of claim 34, wherein the input device is a button or a soft key of a user interface of a terminal device communicatively connected to the conference server via the network, and a gesture recognized by a gesture control communicatively connected to the conference server via the network. 36. The method of claim 22, comprising:
the conference server performing statistical analysis based on the assigned first, second, third, and fourth time stamps and the first speech pause to determine which participant of the conference call had a largest conversation contribution to the conference call. 37. The method of claim 36, comprising:
the conference server assigning a rule-based call forwarding for the first participant in response to determining that the first participant had the largest conversation contribution. 38. The method of claim 22, comprising:
the conference server performing chronological conversation analysis based on the received voice signals and the first, second, third, and fourth time stamps. 39. The method of claim 38, comprising:
the conference server generating data to communicate to at least one terminal device based on the performed chronological conversation analysis that is configured for generation of a display identifying a chronological sequence of speaking times for the conference call. 40. The method of claim 22, comprising:
assigning the first and second time segments to different accounts. 41. A conference server comprising hardware, the conference server configured to perform the method of claim 22. | 2,400 |
8,282 | 8,282 | 14,324,580 | 2,447 | Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein. | 1. A method comprising:
receiving, by a peer device, a discovery request from a client seeking available remote peers, wherein the peer device executes a first instance of a first application in a local mode such that the first instance receives user input from a local user of the peer device and provides output to the local user; sending, by the peer device, a response indicating that remote access is available; receiving, by the peer device, a request from the client for a list of available applications; sending to the client, by the peer device, the list of available applications; and providing the client with remote access to a selected application of the available applications, wherein the selected application is hosted in a remote mode by the peer device. 2. The method of claim 1, wherein the discovery request comprises a broadcast message on a local area network shared by the peer device and the client, said method further comprising:
authenticating an access credential included in the broadcast message. 3. The method of claim 1, further comprising:
receiving, by the peer device, a request for remote access including a selection of one of the available applications as the selected application. 4. The method of claim 1, further comprising:
generating the list of available applications, wherein the list of available applications is generated based on a listing of application instances that are running on the peer device. 5. The method of claim 1, further comprising:
generating the list of available applications, wherein the list of available applications is generated based on a listing of applications installed on the peer device. 6. The method of claim 1, wherein hosting the selected application in the remote mode comprises:
executing the selected application in a background desktop environment of the peer device, wherein applications executing in the background desktop environment are segregated from applications executing in a primary desktop environment of the peer device; and hooking into input and output interfaces associated with the selected application such that output of the selected application is redirected to the client and input from the client is transmitted to the selected application. 7. The method of claim 1, further comprising:
generating the list of available applications, wherein the list of available applications includes the first instance of the first application; and receiving, by the peer device, a request for remote access including a selection of the first instance as the selected application. 8. The method of claim 7, further comprising changing the first instance of the first application from the local mode to the remote mode by:
transferring execution of the first instance to a background desktop environment of the peer device, wherein applications executing in the background desktop environment are segregated from applications executing in a primary desktop environment of the peer device; and hooking into input and output interfaces associated with the first instance such that output of the first instance is redirected to the client and input from the client is transmitted to the first instance. 9. The method of claim 7, further comprising:
changing the first instance of the first application from the local mode to the remote mode; determining that remote access to the first instance is terminated; and reverting the first instance back to the local mode. 10. A method comprising:
broadcasting, by a client device, a discovery request seeking available remote peers; receiving, by the client device, a response from a plurality of peer devices indicating that remote access is available; sending to a selected peer device, by the client device, a request for a list of available applications; receiving, by the client device, the list of available applications hosted by the selected peer device; and initiating remote access of a selected application of the available applications. 11. The method of claim 10, wherein the discovery request comprises an access credential and is broadcast on a network shared by the peer device and the client. 12. The method of claim 10, further comprising:
receiving, by the client device, user input selecting a first application from the list of available applications as the selected application; and sending, by the client device, a request to initiate remote access of the first application. 13. The method of claim 12, further comprising:
presenting, on a user interface of the client device, the list of available applications, wherein the list of available applications includes an instance of an application that is already running on the peer device and one or more applications that are installed on the peer device. 14. The method of claim 10, wherein the list of available applications includes a first instance of a first application executing in a local mode on the peer device, said method further comprising:
receiving, by the client device, user input selecting the first instance from the list of available applications as the selected application; and sending, by the client device, a request to initiate remote access of the first instance. 15. A method comprising:
receiving, by a peer device, a discovery request from a client seeking available remote peers; sending to the client, by the peer device, a list of available applications hosted by the peer device; receiving from the client, by the peer device, a selection of one of the available applications; executing, by the peer device, the selected application in a remote access mode; and providing the client with remote access to the selected application. 16. The method of claim 15, wherein executing the selected application in a remote access mode comprises:
executing the selected application in a background desktop environment of the peer device, wherein applications executing in the background desktop environment are segregated from applications executing in a primary desktop environment of the peer device; and hooking into input and output interfaces associated with the selected application such that output of the selected application is redirected to the client and input from the client is transmitted to the selected application. 17. The method of claim 16, wherein the selected application is a first instance of a first application executing on the peer device, said method further comprising:
determining that the first instance is executing in the primary desktop environment of the peer device; and transferring execution of the first instance from the primary desktop environment to the background desktop environment. 18. The method of claim 15, wherein the discovery request comprises a broadcast message on a network shared by the peer device and the client. 19. The method of claim 15, further comprising:
generating the list of available applications, wherein the list of available applications is generated based on a first listing of one or more application instances that are already running on the peer device and a second listing of applications installed on the peer device. 20. The method of claim 15, further comprising:
executing a first instance of a first application on the peer device in a local mode such that the first instance receives user input from a local user of the peer device and provides display output to the local user; and generating the list of available applications, wherein the list of available applications includes the first instance of the first application, wherein the received selection indicates the first instance as the selected application. | Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein.1. A method comprising:
receiving, by a peer device, a discovery request from a client seeking available remote peers, wherein the peer device executes a first instance of a first application in a local mode such that the first instance receives user input from a local user of the peer device and provides output to the local user; sending, by the peer device, a response indicating that remote access is available; receiving, by the peer device, a request from the client for a list of available applications; sending to the client, by the peer device, the list of available applications; and providing the client with remote access to a selected application of the available applications, wherein the selected application is hosted in a remote mode by the peer device. 2. The method of claim 1, wherein the discovery request comprises a broadcast message on a local area network shared by the peer device and the client, said method further comprising:
authenticating an access credential included in the broadcast message. 3. The method of claim 1, further comprising:
receiving, by the peer device, a request for remote access including a selection of one of the available applications as the selected application. 4. The method of claim 1, further comprising:
generating the list of available applications, wherein the list of available applications is generated based on a listing of application instances that are running on the peer device. 5. The method of claim 1, further comprising:
generating the list of available applications, wherein the list of available applications is generated based on a listing of applications installed on the peer device. 6. The method of claim 1, wherein hosting the selected application in the remote mode comprises:
executing the selected application in a background desktop environment of the peer device, wherein applications executing in the background desktop environment are segregated from applications executing in a primary desktop environment of the peer device; and hooking into input and output interfaces associated with the selected application such that output of the selected application is redirected to the client and input from the client is transmitted to the selected application. 7. The method of claim 1, further comprising:
generating the list of available applications, wherein the list of available applications includes the first instance of the first application; and receiving, by the peer device, a request for remote access including a selection of the first instance as the selected application. 8. The method of claim 7, further comprising changing the first instance of the first application from the local mode to the remote mode by:
transferring execution of the first instance to a background desktop environment of the peer device, wherein applications executing in the background desktop environment are segregated from applications executing in a primary desktop environment of the peer device; and hooking into input and output interfaces associated with the first instance such that output of the first instance is redirected to the client and input from the client is transmitted to the first instance. 9. The method of claim 7, further comprising:
changing the first instance of the first application from the local mode to the remote mode; determining that remote access to the first instance is terminated; and reverting the first instance back to the local mode. 10. A method comprising:
broadcasting, by a client device, a discovery request seeking available remote peers; receiving, by the client device, a response from a plurality of peer devices indicating that remote access is available; sending to a selected peer device, by the client device, a request for a list of available applications; receiving, by the client device, the list of available applications hosted by the selected peer device; and initiating remote access of a selected application of the available applications. 11. The method of claim 10, wherein the discovery request comprises an access credential and is broadcast on a network shared by the peer device and the client. 12. The method of claim 10, further comprising:
receiving, by the client device, user input selecting a first application from the list of available applications as the selected application; and sending, by the client device, a request to initiate remote access of the first application. 13. The method of claim 12, further comprising:
presenting, on a user interface of the client device, the list of available applications, wherein the list of available applications includes an instance of an application that is already running on the peer device and one or more applications that are installed on the peer device. 14. The method of claim 10, wherein the list of available applications includes a first instance of a first application executing in a local mode on the peer device, said method further comprising:
receiving, by the client device, user input selecting the first instance from the list of available applications as the selected application; and sending, by the client device, a request to initiate remote access of the first instance. 15. A method comprising:
receiving, by a peer device, a discovery request from a client seeking available remote peers; sending to the client, by the peer device, a list of available applications hosted by the peer device; receiving from the client, by the peer device, a selection of one of the available applications; executing, by the peer device, the selected application in a remote access mode; and providing the client with remote access to the selected application. 16. The method of claim 15, wherein executing the selected application in a remote access mode comprises:
executing the selected application in a background desktop environment of the peer device, wherein applications executing in the background desktop environment are segregated from applications executing in a primary desktop environment of the peer device; and hooking into input and output interfaces associated with the selected application such that output of the selected application is redirected to the client and input from the client is transmitted to the selected application. 17. The method of claim 16, wherein the selected application is a first instance of a first application executing on the peer device, said method further comprising:
determining that the first instance is executing in the primary desktop environment of the peer device; and transferring execution of the first instance from the primary desktop environment to the background desktop environment. 18. The method of claim 15, wherein the discovery request comprises a broadcast message on a network shared by the peer device and the client. 19. The method of claim 15, further comprising:
generating the list of available applications, wherein the list of available applications is generated based on a first listing of one or more application instances that are already running on the peer device and a second listing of applications installed on the peer device. 20. The method of claim 15, further comprising:
executing a first instance of a first application on the peer device in a local mode such that the first instance receives user input from a local user of the peer device and provides display output to the local user; and generating the list of available applications, wherein the list of available applications includes the first instance of the first application, wherein the received selection indicates the first instance as the selected application. | 2,400 |
8,283 | 8,283 | 16,368,031 | 2,474 | A method for registering a wireless device by a terminal in a wireless communication system is provided. The method includes obtaining connection information for the wireless device by scanning a recognition code of the wireless device in a first mode, transitioning to a second mode based on the connection information and receiving a connection request from the wireless device, performing a connection operation to the wireless device to transmit network access information to the wireless device, and transitioning to the first mode, and registering the wireless device upon detecting connection of the wireless device to a network in the first mode. | 1. A method by a first electronic device for facilitating a connection for a second electronic device, the method comprising:
obtaining a quick response (QR) code provided on the second electronic device, the QR code being obtained by using a camera of the first electronic device; identifying connection information based on the obtained QR code provided on the second electronic device, the connection information including identification information to be used by the first electronic device to identify the second electronic device for a connection operation; performing the connection operation to establish a connection with the second electronic device based on the obtained connection information; transmitting access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and registering the second electronic device based at least on the second electronic device being connected to the access point. 2. The method of claim 1, wherein registering the second electronic device comprises:
receiving a user input for indicating the second electronic device to be registered. 3. The method of claim 1, wherein the second electronic device is registered, via the access point, at a home server corresponding to the first electronic device. 4. The method of claim 1, further comprising:
establishing a connection with the access point to identify the second electronic device connected to the access point. 5. The method of claim 1, wherein the connection information includes identification information to be used by the second electronic device to identify the first electronic device for the connection operation. 6. The method of claim 1, wherein the identification information includes a service set identifier (SSID) and a password. 7. The method of claim 1, wherein the connection information further includes at least one of information about a connectivity type between the second electronic device and the first electronic device, a medium access control (MAC) address information of the second electronic device, or uniform resource identifier (URI) information related to an application to be used for establishing the connection. 8. The method of claim 7, wherein the MAC address information of the second electronic device is used for identifying the second electronic device among a plurality of electronic devices if the plurality of electronic devices are connected to the first electronic device. 9. The method of claim 1, wherein the connection operation includes a tethering operation, and the identification information is used by the first electronic device for performing the tethering operation to establish the connection with the second electronic device. 10. The method of claim 1, wherein the second electronic device is a home appliance and the first electronic device is a smart phone. 11. A non-transitory computer-readable storage medium storing instructions which, when executed by at least one processor, cause the at least one processor to:
control to obtain a quick response (QR) code provided on a second electronic device, the QR code being obtained by using a camera of a first electronic device; control to identify connection information based on the obtained QR code provided on the second electronic device; control to perform a connection operation to establish a connection with the second electronic device based on the obtained connection information; control to transmit access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and control to register the second electronic device based at least on the second electronic device being connected to the access point. 12. The non-transitory computer-readable storage medium of claim 11, wherein the second electronic device is registered, via the access point, at a home server corresponding to the first electronic device. 13. The non-transitory computer-readable storage medium of claim 11, wherein the instructions, when executed, cause the at least one processor to:
control to establish a connection with the access point to identify the second electronic device connected the access point. 14. The non-transitory computer-readable storage medium of claim 11, wherein the connection information includes identification information to be used by the second electronic device to identify the first electronic device for the connection operation. 15. The non-transitory computer-readable storage medium of claim 11, wherein the identification information includes a service set identifier (SSID) and a password. 16. The non-transitory computer-readable storage medium of claim 11, wherein the connection operation includes a tethering operation, and the identification information is used by the first electronic device for performing the tethering operation to establish the connection with the second electronic device. 17. The non-transitory computer-readable storage medium of claim 11, wherein the second electronic device is a home appliance and the first electronic device is a smart phone. 18. A system comprising:
a first electronic device; and a second electronic device, wherein the first electronic device is configured to:
obtain a quick response (QR) code provided on the second electronic device, the QR code being obtained by using a camera of the first electronic device;
identify connection information based on the obtained QR code provided on the second electronic device;
perform a connection operation to establish a connection with the second electronic device based on the obtained connection information;
transmit access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and
register the second electronic device based at least on the second electronic device being connected to the access point, and wherein the second electronic device is configured to:
receive the access information of the access point from the first electronic device, and
establish a connection with the access point based on the received access information of the access point. 19. A method by a first electronic device for facilitating a connection for a second electronic device, the method comprising:
obtaining, using an application executed in the first electronic device, a quick response (QR) code provided on the second electronic device, the QR code being obtained by using a camera of the first electronic device; identifying, using the executed application, connection information based on the obtained QR code provided on the second electronic device, the connection information including identification information to be used by the first electronic device to identify the second electronic device for a connection operation; performing, using the executed application, the connection operation to establish a connection with the second electronic device based on the obtained connection information; transmitting, using the executed application, access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and registering, using the executed application, the second electronic device based at least on the second electronic device being connected to the access point. 20. The method of claim 19, wherein the connection operation includes a tethering operation, and the identification information is used by the first electronic device for performing the tethering operation to establish the connection with the second electronic device. | A method for registering a wireless device by a terminal in a wireless communication system is provided. The method includes obtaining connection information for the wireless device by scanning a recognition code of the wireless device in a first mode, transitioning to a second mode based on the connection information and receiving a connection request from the wireless device, performing a connection operation to the wireless device to transmit network access information to the wireless device, and transitioning to the first mode, and registering the wireless device upon detecting connection of the wireless device to a network in the first mode.1. A method by a first electronic device for facilitating a connection for a second electronic device, the method comprising:
obtaining a quick response (QR) code provided on the second electronic device, the QR code being obtained by using a camera of the first electronic device; identifying connection information based on the obtained QR code provided on the second electronic device, the connection information including identification information to be used by the first electronic device to identify the second electronic device for a connection operation; performing the connection operation to establish a connection with the second electronic device based on the obtained connection information; transmitting access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and registering the second electronic device based at least on the second electronic device being connected to the access point. 2. The method of claim 1, wherein registering the second electronic device comprises:
receiving a user input for indicating the second electronic device to be registered. 3. The method of claim 1, wherein the second electronic device is registered, via the access point, at a home server corresponding to the first electronic device. 4. The method of claim 1, further comprising:
establishing a connection with the access point to identify the second electronic device connected to the access point. 5. The method of claim 1, wherein the connection information includes identification information to be used by the second electronic device to identify the first electronic device for the connection operation. 6. The method of claim 1, wherein the identification information includes a service set identifier (SSID) and a password. 7. The method of claim 1, wherein the connection information further includes at least one of information about a connectivity type between the second electronic device and the first electronic device, a medium access control (MAC) address information of the second electronic device, or uniform resource identifier (URI) information related to an application to be used for establishing the connection. 8. The method of claim 7, wherein the MAC address information of the second electronic device is used for identifying the second electronic device among a plurality of electronic devices if the plurality of electronic devices are connected to the first electronic device. 9. The method of claim 1, wherein the connection operation includes a tethering operation, and the identification information is used by the first electronic device for performing the tethering operation to establish the connection with the second electronic device. 10. The method of claim 1, wherein the second electronic device is a home appliance and the first electronic device is a smart phone. 11. A non-transitory computer-readable storage medium storing instructions which, when executed by at least one processor, cause the at least one processor to:
control to obtain a quick response (QR) code provided on a second electronic device, the QR code being obtained by using a camera of a first electronic device; control to identify connection information based on the obtained QR code provided on the second electronic device; control to perform a connection operation to establish a connection with the second electronic device based on the obtained connection information; control to transmit access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and control to register the second electronic device based at least on the second electronic device being connected to the access point. 12. The non-transitory computer-readable storage medium of claim 11, wherein the second electronic device is registered, via the access point, at a home server corresponding to the first electronic device. 13. The non-transitory computer-readable storage medium of claim 11, wherein the instructions, when executed, cause the at least one processor to:
control to establish a connection with the access point to identify the second electronic device connected the access point. 14. The non-transitory computer-readable storage medium of claim 11, wherein the connection information includes identification information to be used by the second electronic device to identify the first electronic device for the connection operation. 15. The non-transitory computer-readable storage medium of claim 11, wherein the identification information includes a service set identifier (SSID) and a password. 16. The non-transitory computer-readable storage medium of claim 11, wherein the connection operation includes a tethering operation, and the identification information is used by the first electronic device for performing the tethering operation to establish the connection with the second electronic device. 17. The non-transitory computer-readable storage medium of claim 11, wherein the second electronic device is a home appliance and the first electronic device is a smart phone. 18. A system comprising:
a first electronic device; and a second electronic device, wherein the first electronic device is configured to:
obtain a quick response (QR) code provided on the second electronic device, the QR code being obtained by using a camera of the first electronic device;
identify connection information based on the obtained QR code provided on the second electronic device;
perform a connection operation to establish a connection with the second electronic device based on the obtained connection information;
transmit access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and
register the second electronic device based at least on the second electronic device being connected to the access point, and wherein the second electronic device is configured to:
receive the access information of the access point from the first electronic device, and
establish a connection with the access point based on the received access information of the access point. 19. A method by a first electronic device for facilitating a connection for a second electronic device, the method comprising:
obtaining, using an application executed in the first electronic device, a quick response (QR) code provided on the second electronic device, the QR code being obtained by using a camera of the first electronic device; identifying, using the executed application, connection information based on the obtained QR code provided on the second electronic device, the connection information including identification information to be used by the first electronic device to identify the second electronic device for a connection operation; performing, using the executed application, the connection operation to establish a connection with the second electronic device based on the obtained connection information; transmitting, using the executed application, access information of an access point to the second electronic device over the established connection, wherein the access information of the access point is used for the second electronic device to connect to the access point; and registering, using the executed application, the second electronic device based at least on the second electronic device being connected to the access point. 20. The method of claim 19, wherein the connection operation includes a tethering operation, and the identification information is used by the first electronic device for performing the tethering operation to establish the connection with the second electronic device. | 2,400 |
8,284 | 8,284 | 15,090,004 | 2,447 | Computer-implemented method and apparatus for placing a request for an Internet chat session between a visitor and a chat persona. A client device displays to the visitor (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor. In response to visitor selections, a chat system server selects (i) at least one chat persona and (ii) at least one chat action. The client device sends to the chat system server (i) a chat request to begin a chat session, and (ii) the visitor-identifier. The chat system server receives the chat request and the visitor identifier. The chat system server retrieves from memory additional information corresponding to the received visitor-identifier. The chat system server generates a personalized chat session between the identified visitor on the client device and the selected persona on the chat system server, using the retrieved additional information. | 1. A computer-implemented method of placing a request for an Internet chat session between a visitor and a chat persona, comprising:
under control of a client device, displaying to the visitor on a client device display information corresponding to (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor; in response to a visitor selection-action performed on the client device, a chat system server selecting at least one chat persona from among the displayed plurality of chat personas; in response to another visitor selection-action performed on the client device, the chat system server selecting at least one chat action from among the displayed plurality of chat actions; sending from the client device to the chat system server (i) a chat request to begin a chat session, and (ii) the visitor-identifier; the chat system server receiving the chat request and the visitor identifier; the chat system server retrieving from at least one server memory additional information corresponding to the received visitor-identifier; and the chat system server generating a personalized chat session for the identified visitor between the client device and the server system, using the retrieved additional information. 2. The method according to claim 1, wherein the chat system server includes a personalization engine comprising at least two of: (i) layout of the persona description, (ii) text of the persona description, (iii) sales and/or communications strategies employed by the persona, (iv) language used during the chat, (v) recommendations made during the chat, (vi) changes to the website, wherein the (iv) language includes at least two of: (iva) choice of vocabulary, (ivb) sentence structure, (ivc) use of particular phrases, (ivd) type of framing used in sentences, (ive) order of presentation of information, (ivf) information conveyed, (ivg) questions used during the chat; and wherein the chat system server uses (i) the personalization engine and (ii) the retrieved additional information to provide the plurality of chat personas to the client device. 3. The method according to claim 2, wherein the chat system server provides an augmented dashboard display on a chat server device viewable by the selected persona, the augmented dashboard being coupled to the personalization engine. 4. The method of claim 3, wherein the augmented dashboard displays information corresponding to the visitor. 5. The method of claim 3, wherein the client device stores at least one cookie for the visitor to alter a layout of the client device display of the plurality of personas in a menu for initiating the chat session, the at least one cookie being also stored in a chat server database memory. 6. The method of claim 1, wherein the client device displays a menu of indicated actions for the visitor, the menu having text corresponding to the visitor's prior server system traffic and behavior. 7. The method of claim 1, wherein each of the selections is initiated by the visitor clicking a button displayed on a client device display. 8. The method of claim 1, wherein the visitor-identifier corresponds to an anonymous visitor. 9. The method according to claim 2, wherein at least one of the plurality of chat personas comprises a computerized chatbot having a personality, skills, and point of view corresponding to a human persona. 10. The method according to claim 9, wherein the computerized chatbot is coupled to the personalization engine, and provides personalized responses to the visitor. 11. A computer-implemented method of placing a request for an Internet chat session between a visitor and a chat persona, comprising:
a client processing device receiving from a chat server system information corresponding to (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor; the client processing device receiving from the visitor a selection-action selecting at least one of the plurality of chat personas; the client processing device receiving from the visitor a selection-action selecting at least one of the plurality of chat actions; the client processing device sending to the chat server system (i) a chat request, and (ii) the visitor-identifier associated with the visitor; and the client processing device receiving from the chat server system a personalized chat session for the visitor, the personalized chat session corresponding to (i) the selected persona, and (ii) additional information stored in the chat server system, said additional information corresponding to the sent visitor-identifier. 12. The method of claim 11, wherein the client processing device stores at least one cookie for the visitor to alter a layout of the client device display of the plurality of personas in a menu for initiating the chat session. 13. The method of claim 11, wherein the client processing device displays a menu of indicated actions for the visitor, the menu having text corresponding to the visitor's prior server system traffic and behavior. 14. The method of claim 11, wherein each of the selections is initiated by the visitor clicking a button displayed on a client device display. 15. The method of claim 11, wherein the visitor-identifier corresponds to an anonymous visitor. 16. A computer-implemented method of placing a request for an Internet chat session between a visitor and a chat persona, comprising:
a chat server providing to a client device information for the client device to display on a client device display (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor; the chat server receiving from the client device a selection of at least one of the plurality of chat personas, and in response, selecting said at least one persona; the chat server receiving from the client device a selection of at least one of the plurality of chat action, and in response, selecting said at least one chat action; the chat server receiving from the client device (i) a chat request to begin a chat session, and (ii) the visitor-identifier; the chat server retrieving from at least one chat server memory additional information corresponding to the received visitor-identifier; and the chat server generating a personalized chat session for the identified visitor between the client device and the server system, using the retrieved additional information. 17. The method of claim 16, wherein the chat server provides an augmented dashboard display on a server device viewable by the selected persona, the augmented dashboard being coupled to the personalization engine. 18. The method of claim 17, wherein the augmented dashboard displays information corresponding to the visitor. 19. The method of claim 17, wherein at least one of the plurality of chat personas comprises a computerized chatbot having a personality, skills, and point of view corresponding to a human persona. 20. Apparatus for placing a request for an Internet chat session between a visitor and a chat persona, comprising:
a client processing device, displaying to the visitor on a client device display information corresponding to (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor, said information being provided by at least one chat server; in response to a visitor selection-action performed on the client device, the at least one chat server selecting at least one chat persona from among the displayed plurality of chat personas; in response to another visitor selection-action performed on the client device, the at least one chat server selecting at least one chat action from among the displayed plurality of chat actions; the client device sending to the at least one chat server (i) a chat request to begin a chat session, and (ii) the visitor-identifier; the at least one chat server receiving the chat request and the visitor identifier; the at least one chat server retrieving from at least one chat server memory additional information corresponding to the received visitor-identifier; and the at least one chat server generating a personalized chat session for the identified visitor between the client device and the at least one chat server, using the retrieved additional information. | Computer-implemented method and apparatus for placing a request for an Internet chat session between a visitor and a chat persona. A client device displays to the visitor (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor. In response to visitor selections, a chat system server selects (i) at least one chat persona and (ii) at least one chat action. The client device sends to the chat system server (i) a chat request to begin a chat session, and (ii) the visitor-identifier. The chat system server receives the chat request and the visitor identifier. The chat system server retrieves from memory additional information corresponding to the received visitor-identifier. The chat system server generates a personalized chat session between the identified visitor on the client device and the selected persona on the chat system server, using the retrieved additional information.1. A computer-implemented method of placing a request for an Internet chat session between a visitor and a chat persona, comprising:
under control of a client device, displaying to the visitor on a client device display information corresponding to (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor; in response to a visitor selection-action performed on the client device, a chat system server selecting at least one chat persona from among the displayed plurality of chat personas; in response to another visitor selection-action performed on the client device, the chat system server selecting at least one chat action from among the displayed plurality of chat actions; sending from the client device to the chat system server (i) a chat request to begin a chat session, and (ii) the visitor-identifier; the chat system server receiving the chat request and the visitor identifier; the chat system server retrieving from at least one server memory additional information corresponding to the received visitor-identifier; and the chat system server generating a personalized chat session for the identified visitor between the client device and the server system, using the retrieved additional information. 2. The method according to claim 1, wherein the chat system server includes a personalization engine comprising at least two of: (i) layout of the persona description, (ii) text of the persona description, (iii) sales and/or communications strategies employed by the persona, (iv) language used during the chat, (v) recommendations made during the chat, (vi) changes to the website, wherein the (iv) language includes at least two of: (iva) choice of vocabulary, (ivb) sentence structure, (ivc) use of particular phrases, (ivd) type of framing used in sentences, (ive) order of presentation of information, (ivf) information conveyed, (ivg) questions used during the chat; and wherein the chat system server uses (i) the personalization engine and (ii) the retrieved additional information to provide the plurality of chat personas to the client device. 3. The method according to claim 2, wherein the chat system server provides an augmented dashboard display on a chat server device viewable by the selected persona, the augmented dashboard being coupled to the personalization engine. 4. The method of claim 3, wherein the augmented dashboard displays information corresponding to the visitor. 5. The method of claim 3, wherein the client device stores at least one cookie for the visitor to alter a layout of the client device display of the plurality of personas in a menu for initiating the chat session, the at least one cookie being also stored in a chat server database memory. 6. The method of claim 1, wherein the client device displays a menu of indicated actions for the visitor, the menu having text corresponding to the visitor's prior server system traffic and behavior. 7. The method of claim 1, wherein each of the selections is initiated by the visitor clicking a button displayed on a client device display. 8. The method of claim 1, wherein the visitor-identifier corresponds to an anonymous visitor. 9. The method according to claim 2, wherein at least one of the plurality of chat personas comprises a computerized chatbot having a personality, skills, and point of view corresponding to a human persona. 10. The method according to claim 9, wherein the computerized chatbot is coupled to the personalization engine, and provides personalized responses to the visitor. 11. A computer-implemented method of placing a request for an Internet chat session between a visitor and a chat persona, comprising:
a client processing device receiving from a chat server system information corresponding to (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor; the client processing device receiving from the visitor a selection-action selecting at least one of the plurality of chat personas; the client processing device receiving from the visitor a selection-action selecting at least one of the plurality of chat actions; the client processing device sending to the chat server system (i) a chat request, and (ii) the visitor-identifier associated with the visitor; and the client processing device receiving from the chat server system a personalized chat session for the visitor, the personalized chat session corresponding to (i) the selected persona, and (ii) additional information stored in the chat server system, said additional information corresponding to the sent visitor-identifier. 12. The method of claim 11, wherein the client processing device stores at least one cookie for the visitor to alter a layout of the client device display of the plurality of personas in a menu for initiating the chat session. 13. The method of claim 11, wherein the client processing device displays a menu of indicated actions for the visitor, the menu having text corresponding to the visitor's prior server system traffic and behavior. 14. The method of claim 11, wherein each of the selections is initiated by the visitor clicking a button displayed on a client device display. 15. The method of claim 11, wherein the visitor-identifier corresponds to an anonymous visitor. 16. A computer-implemented method of placing a request for an Internet chat session between a visitor and a chat persona, comprising:
a chat server providing to a client device information for the client device to display on a client device display (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor; the chat server receiving from the client device a selection of at least one of the plurality of chat personas, and in response, selecting said at least one persona; the chat server receiving from the client device a selection of at least one of the plurality of chat action, and in response, selecting said at least one chat action; the chat server receiving from the client device (i) a chat request to begin a chat session, and (ii) the visitor-identifier; the chat server retrieving from at least one chat server memory additional information corresponding to the received visitor-identifier; and the chat server generating a personalized chat session for the identified visitor between the client device and the server system, using the retrieved additional information. 17. The method of claim 16, wherein the chat server provides an augmented dashboard display on a server device viewable by the selected persona, the augmented dashboard being coupled to the personalization engine. 18. The method of claim 17, wherein the augmented dashboard displays information corresponding to the visitor. 19. The method of claim 17, wherein at least one of the plurality of chat personas comprises a computerized chatbot having a personality, skills, and point of view corresponding to a human persona. 20. Apparatus for placing a request for an Internet chat session between a visitor and a chat persona, comprising:
a client processing device, displaying to the visitor on a client device display information corresponding to (i) a plurality of chat personas, and (ii) a plurality of chat actions determined by a visitor-identifier associated with the visitor, said information being provided by at least one chat server; in response to a visitor selection-action performed on the client device, the at least one chat server selecting at least one chat persona from among the displayed plurality of chat personas; in response to another visitor selection-action performed on the client device, the at least one chat server selecting at least one chat action from among the displayed plurality of chat actions; the client device sending to the at least one chat server (i) a chat request to begin a chat session, and (ii) the visitor-identifier; the at least one chat server receiving the chat request and the visitor identifier; the at least one chat server retrieving from at least one chat server memory additional information corresponding to the received visitor-identifier; and the at least one chat server generating a personalized chat session for the identified visitor between the client device and the at least one chat server, using the retrieved additional information. | 2,400 |
8,285 | 8,285 | 15,304,686 | 2,466 | The present invention provide a method for processing flexible duplex, including: receiving, by a UE, configuration information of flexible duplex; and according to the received configuration information of flexible duplex, transmitting and receiving data by the UE based on configured uplink and downlink subframe distribution on one or two carriers of a flexible duplex cell. The present disclosure further provides an apparatus for processing flexible duplex. The method and apparatus of the present disclosure support to configure uplink and downlink subframes at the same time on a pair of carriers or one of a pair of carriers of the flexible duplex cell, so as to meet requirements of uplink and downlink traffics. | 1. A method for processing flexible duplex, comprising:
receiving, by a UE, configuration information of flexible duplex; and according to the received configuration information of flexible duplex, transmitting and receiving data by the UE based on configured uplink and downlink subframe distribution on one or two carriers of a flexible duplex cell. 2. The method of claim 1, wherein
if more uplink subframe resources are required than downlink subframe resources, or if equal uplink subframe resources and downlink subframe resources are required, in one period, some subframes on a flexible duplex-uplink (FD-UL) are downlink subframes, and all subframes on a flexible duplex-downlink (FD-DL) are downlink subframes; if more uplink subframe resources are required than downlink subframe resources, in one period, all subframes on the FD-UL are uplink subframes, and some subframes on the FD-DL are uplink subframes; and for a pair of carriers of the flexible duplex cell, the FD-DL is a carrier used for downlink transmission for a backward frequency division duplex (FDD) UE, and the FD-UL is a carrier used for uplink transmission for the backward FDD UE. 3. The method of claim 1, wherein
the uplink and downlink subframe distribution of the flexible duplex cell is obtained through semi-static configuration; or the uplink and downlink subframe distribution of the flexible duplex cell is obtained through re-configuration downlink control information (DCI). 4. The method of claim 3, wherein
the re-configuration DCI is transmitted on the FD-DL. 5. The method of claim 3, wherein
if the flexible duplex cell is a secondary cell of the UE, the uplink and downlink subframe distribution of the flexible duplex cell is obtained in the re-configuration DCI of a primary cell. 6. The method of claim 3, wherein
the uplink and downlink subframe distribution on the FD-UL is obtained according to the re-configuration DCI; or the uplink and downlink subframe distribution on the FD-UL and the uplink and downlink subframe distribution on the FD-DL are obtained respectively from the reconfiguration DCI; or a joint indication indicating the uplink and downlink subframe distribution of a pair of carriers of the flexible duplex cell is obtained from an indication field of the re-configuration DCI. 7. The method of claim 1, wherein
a periodicity of an uplink and downlink subframe pattern on the FD-UL is Tms. 8. The method of claim 7, wherein
the periodicity of an uplink and downlink subframe pattern on the FD-UL is 10 ms; on one carrier of the flexible duplex carrier, the number of uplink subframes allocated in one 10 ms period is some or all values from 0 to 10. 9. The method of claim 7, wherein
the periodicity of an uplink and downlink subframe pattern on the FD-UL is 8 ms, on one carrier of the flexible duplex carrier, the number of uplink subframes allocated in one 8 ms period is some or all values from 0 to 8. 10. The method of claim 7, wherein
the periodicity T of the uplink and downlink subframe pattern is 40 ms, and 40 bits are utilized to respectively indicate a duplex direction of each subframe in the period. 11. The method of claim 10, wherein
if an index of an ABSF subframe is n, subframe n+4 on the FD-UL is configured as a downlink subframe. 12. The method of claim 7, further comprising:
for a downlink subframe on the FD-UL, an HARQ-ACK timing position of a downlink subframe on a same position of the FD-DL as the downlink subframe on the FD-UL is re-used for feeding back HARQ-ACK information. 13. The method of claim 7, further comprising:
obtaining CRS structures of all possible downlink subframes on the FD-UL according to bit mapping. 14. The method of claim 2, wherein
a transmission power of a CRS resource element on the FD-UL is the same as the FD-DL. 15. The method of claim 1, wherein
a timing advance of the UE is controlled by a base station, there is an interval between the base station receives an uplink subframe and transmits a downlink subframe, the interval is used for switching time from uplink to downlink. 16. The method of claim 1, wherein
the downlink subframe is a shortened downlink subframe, the downlink subframe includes an interval between downlink transmission time and uplink transmission time. 17. The method of claim 16, wherein
the downlink subframe is shortened by one OFDM symbol, and conflict between receiving and transmission of the UE is avoided through scheduling of the base station; or a plurality of shortened lengths of different number of OFDM symbols are defined in advance, and the UE determines to adopt which shortened length according to a semi-static configuration of higher layer signaling. 18. The method of claim 2, wherein
the uplink transmission on the FD-DL and the uplink transmission on the FD-UL are processed according to a same timing advance group (TAG); or the uplink transmission on the FD-DL and the uplink transmission on the FD-UL are processed according to different TAGs. 19. The method of claim 2, further comprising:
measuring path loss (PL) based on downlink signals on the FD-UL, and applying the PL to uplink power control of the UE. 20. An apparatus for processing flexible duplex, comprising: a configuration module and a transmitting module; wherein
the configuration module is to receive configuration information of flexible duplex; and the transmitting module is to transmit and received data according to an uplink and downlink subframe distribution on one or two carriers of a flexible duplex cell based on the received configuration information of the flexible duplex. | The present invention provide a method for processing flexible duplex, including: receiving, by a UE, configuration information of flexible duplex; and according to the received configuration information of flexible duplex, transmitting and receiving data by the UE based on configured uplink and downlink subframe distribution on one or two carriers of a flexible duplex cell. The present disclosure further provides an apparatus for processing flexible duplex. The method and apparatus of the present disclosure support to configure uplink and downlink subframes at the same time on a pair of carriers or one of a pair of carriers of the flexible duplex cell, so as to meet requirements of uplink and downlink traffics.1. A method for processing flexible duplex, comprising:
receiving, by a UE, configuration information of flexible duplex; and according to the received configuration information of flexible duplex, transmitting and receiving data by the UE based on configured uplink and downlink subframe distribution on one or two carriers of a flexible duplex cell. 2. The method of claim 1, wherein
if more uplink subframe resources are required than downlink subframe resources, or if equal uplink subframe resources and downlink subframe resources are required, in one period, some subframes on a flexible duplex-uplink (FD-UL) are downlink subframes, and all subframes on a flexible duplex-downlink (FD-DL) are downlink subframes; if more uplink subframe resources are required than downlink subframe resources, in one period, all subframes on the FD-UL are uplink subframes, and some subframes on the FD-DL are uplink subframes; and for a pair of carriers of the flexible duplex cell, the FD-DL is a carrier used for downlink transmission for a backward frequency division duplex (FDD) UE, and the FD-UL is a carrier used for uplink transmission for the backward FDD UE. 3. The method of claim 1, wherein
the uplink and downlink subframe distribution of the flexible duplex cell is obtained through semi-static configuration; or the uplink and downlink subframe distribution of the flexible duplex cell is obtained through re-configuration downlink control information (DCI). 4. The method of claim 3, wherein
the re-configuration DCI is transmitted on the FD-DL. 5. The method of claim 3, wherein
if the flexible duplex cell is a secondary cell of the UE, the uplink and downlink subframe distribution of the flexible duplex cell is obtained in the re-configuration DCI of a primary cell. 6. The method of claim 3, wherein
the uplink and downlink subframe distribution on the FD-UL is obtained according to the re-configuration DCI; or the uplink and downlink subframe distribution on the FD-UL and the uplink and downlink subframe distribution on the FD-DL are obtained respectively from the reconfiguration DCI; or a joint indication indicating the uplink and downlink subframe distribution of a pair of carriers of the flexible duplex cell is obtained from an indication field of the re-configuration DCI. 7. The method of claim 1, wherein
a periodicity of an uplink and downlink subframe pattern on the FD-UL is Tms. 8. The method of claim 7, wherein
the periodicity of an uplink and downlink subframe pattern on the FD-UL is 10 ms; on one carrier of the flexible duplex carrier, the number of uplink subframes allocated in one 10 ms period is some or all values from 0 to 10. 9. The method of claim 7, wherein
the periodicity of an uplink and downlink subframe pattern on the FD-UL is 8 ms, on one carrier of the flexible duplex carrier, the number of uplink subframes allocated in one 8 ms period is some or all values from 0 to 8. 10. The method of claim 7, wherein
the periodicity T of the uplink and downlink subframe pattern is 40 ms, and 40 bits are utilized to respectively indicate a duplex direction of each subframe in the period. 11. The method of claim 10, wherein
if an index of an ABSF subframe is n, subframe n+4 on the FD-UL is configured as a downlink subframe. 12. The method of claim 7, further comprising:
for a downlink subframe on the FD-UL, an HARQ-ACK timing position of a downlink subframe on a same position of the FD-DL as the downlink subframe on the FD-UL is re-used for feeding back HARQ-ACK information. 13. The method of claim 7, further comprising:
obtaining CRS structures of all possible downlink subframes on the FD-UL according to bit mapping. 14. The method of claim 2, wherein
a transmission power of a CRS resource element on the FD-UL is the same as the FD-DL. 15. The method of claim 1, wherein
a timing advance of the UE is controlled by a base station, there is an interval between the base station receives an uplink subframe and transmits a downlink subframe, the interval is used for switching time from uplink to downlink. 16. The method of claim 1, wherein
the downlink subframe is a shortened downlink subframe, the downlink subframe includes an interval between downlink transmission time and uplink transmission time. 17. The method of claim 16, wherein
the downlink subframe is shortened by one OFDM symbol, and conflict between receiving and transmission of the UE is avoided through scheduling of the base station; or a plurality of shortened lengths of different number of OFDM symbols are defined in advance, and the UE determines to adopt which shortened length according to a semi-static configuration of higher layer signaling. 18. The method of claim 2, wherein
the uplink transmission on the FD-DL and the uplink transmission on the FD-UL are processed according to a same timing advance group (TAG); or the uplink transmission on the FD-DL and the uplink transmission on the FD-UL are processed according to different TAGs. 19. The method of claim 2, further comprising:
measuring path loss (PL) based on downlink signals on the FD-UL, and applying the PL to uplink power control of the UE. 20. An apparatus for processing flexible duplex, comprising: a configuration module and a transmitting module; wherein
the configuration module is to receive configuration information of flexible duplex; and the transmitting module is to transmit and received data according to an uplink and downlink subframe distribution on one or two carriers of a flexible duplex cell based on the received configuration information of the flexible duplex. | 2,400 |
8,286 | 8,286 | 13,828,562 | 2,425 | A method of determining “true” standstill in a vehicle. The method includes detecting an object outside of the vehicle via a camera, saving first data on the detected object in a memory, detecting the same object after a delay, saving, after the delay, second data on the detected object in a memory, analyzing, by a controller, the first and second data, and determining “true” standstill has occurred based on the analysis. | 1. A method of determining “true” standstill in a vehicle, the method comprising:
detecting an object outside of the vehicle via a camera;
saving first data on the detected object in a memory;
detecting the same object after a delay;
saving, after the delay, second data on the detected object in a memory;
analyzing, by a controller, the first and second data;
determining “true” standstill has occurred based on the analysis. 2. The method of claim 1, wherein the detecting steps are performed by a camera and the first and second data are images of the detected object. 3. The method of claim 1, wherein the detected object is a stationary object. 4. The method of claim 1, wherein the detected object is a moving object. 5. The method of claim 1, further comprising setting a standstill flag when “true” standstill is determined. 6. The method of claim 1, further comprising resetting a standstill flag when the determining “true” standstill determines the vehicle is moving. 7. The method of claim 1, further comprising providing an indication of a standstill condition when requested. 8. The method of claim 1, further comprising continuously providing an indication of a standstill condition on a bus in the vehicle. 9. A system for determining a “true” standstill condition of a vehicle, the system comprising:
a camera configured to capture an image of objects outside the vehicle; and
a controller configured to
receive images of objects from the camera,
save images received to memory,
compare images saved in memory,
determine from the comparison of the images in the memory if the vehicle is moving, and
provide an indication whether the vehicle is at a “true” standstill. 10. The system of claim 1, wherein the captured objects are a stationary object. 11. The system of claim 1, wherein the captured object is a moving object. 12. The system of claim 1, wherein the controller sets a standstill flag when “true” standstill is determined. 13. The system of claim 1, wherein the controller resets a standstill flag when the determining “true” standstill determines the vehicle is moving. 14. The system of claim 1, wherein the controller provides an indication of a standstill condition when requested. 15. The system of claim 1, further comprising a bus the controller continuously providing an indication of a standstill condition on the bus. | A method of determining “true” standstill in a vehicle. The method includes detecting an object outside of the vehicle via a camera, saving first data on the detected object in a memory, detecting the same object after a delay, saving, after the delay, second data on the detected object in a memory, analyzing, by a controller, the first and second data, and determining “true” standstill has occurred based on the analysis.1. A method of determining “true” standstill in a vehicle, the method comprising:
detecting an object outside of the vehicle via a camera;
saving first data on the detected object in a memory;
detecting the same object after a delay;
saving, after the delay, second data on the detected object in a memory;
analyzing, by a controller, the first and second data;
determining “true” standstill has occurred based on the analysis. 2. The method of claim 1, wherein the detecting steps are performed by a camera and the first and second data are images of the detected object. 3. The method of claim 1, wherein the detected object is a stationary object. 4. The method of claim 1, wherein the detected object is a moving object. 5. The method of claim 1, further comprising setting a standstill flag when “true” standstill is determined. 6. The method of claim 1, further comprising resetting a standstill flag when the determining “true” standstill determines the vehicle is moving. 7. The method of claim 1, further comprising providing an indication of a standstill condition when requested. 8. The method of claim 1, further comprising continuously providing an indication of a standstill condition on a bus in the vehicle. 9. A system for determining a “true” standstill condition of a vehicle, the system comprising:
a camera configured to capture an image of objects outside the vehicle; and
a controller configured to
receive images of objects from the camera,
save images received to memory,
compare images saved in memory,
determine from the comparison of the images in the memory if the vehicle is moving, and
provide an indication whether the vehicle is at a “true” standstill. 10. The system of claim 1, wherein the captured objects are a stationary object. 11. The system of claim 1, wherein the captured object is a moving object. 12. The system of claim 1, wherein the controller sets a standstill flag when “true” standstill is determined. 13. The system of claim 1, wherein the controller resets a standstill flag when the determining “true” standstill determines the vehicle is moving. 14. The system of claim 1, wherein the controller provides an indication of a standstill condition when requested. 15. The system of claim 1, further comprising a bus the controller continuously providing an indication of a standstill condition on the bus. | 2,400 |
8,287 | 8,287 | 16,113,659 | 2,473 | An interface circuit in an electronic device (such as an access point) may receive a setup request associated with the recipient electronic device. The setup request may specify a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval. Based at least in part on the proposed transmission interval, the electronic device may determine a transmission schedule and/or may assign, based at least in part on the group address, the recipient electronic device to an aggregated group having a flexible multicast service identifier (FMSID). Then, the electronic device may provide a wake-up frame for the recipient electronic device, where the wake-up frame includes an identifier of the aggregated group for which a group-addressed frame will subsequently be transmitted by the electronic device. Moreover, the wake-up frame may be provided at a transmission time based at least in part on the transmission schedule. | 1. An electronic device, comprising:
a node configured to communicatively couple to an antenna; and an interface circuit, communicatively coupled to the node, configured to communicate with a recipient electronic device, and configured to:
receive, from the node, a wake-up radio (WUR)-setup request associated with the recipient electronic device, wherein the WUR-setup request specifies a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval;
determine a transmission schedule based at least in part on the proposed transmission interval; and
provide, to the node, a wake-up frame intended for the recipient electronic device, wherein the wake-up frame comprises an identifier of an aggregated group, the identifier comprising the group address for which a group-addressed frame will subsequently be transmitted by the electronic device, and
wherein the wake-up frame is provided at a transmission time based at least in part on the transmission schedule. 2. The electronic device of claim 1, wherein the transmission time is an integer multiple of a Delivery Traffic Indication Message (DTIM)-beacon transmission interval. 3. The electronic device of claim 2, wherein the integer is greater than one. 4. The electronic device of claim 1, wherein the identifier comprises a flexible multicast service identifier (FMSID). 5. The electronic device of claim 1, wherein the wake-up frame specifies an FMS stream for which there is pending traffic in the electronic device. 6. The electronic device of claim 1, wherein the interface circuit is configured to select an FMS stream for which there is pending traffic in the electronic device; and
wherein the wake-up frame specifies the FMS stream. 7. The electronic device of claim 1, wherein the interface circuit is configured to assign, based at least in part on the group address, the recipient electronic device to the aggregated group associated with a FMSID. 8. The electronic device of claim 1, wherein the electronic device comprises an access point. 9. The electronic device of claim 1, wherein the WUR-setup request and the wake-up frame are compatible with an IEEE 802.11 communication protocol. 10. The electronic device of claim 1, wherein the interface circuit is configured to:
receive, from the node, a second WUR-setup request associated with the recipient electronic device, wherein the second WUR-setup request specifies one or more attributes associated with group-addressed frames that the recipient electronic device wants to receive using a directed multicast service (DMS); and provide, to the node, a second wake-up frame intended for the recipient electronic device, wherein the second wake-up frame indicates that the electronic device will subsequently provide a unicast copy of a second group-addressed frame having the one or more attributes. 11. A non-transitory computer-readable storage medium for use in conjunction with an electronic device, the computer-readable storage medium storing program instructions that, when executed by the electronic device, cause the electronic device to provide a wake-up frame by carrying out one or more operations comprising:
receive, at an interface circuit in the electronic device, a wake-up radio (WUR)-setup request associated with a recipient electronic device, wherein the WUR-setup request specifies a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval; determine a transmission schedule based at least in part on the proposed transmission interval; and provide, from the interface circuit, the wake-up frame intended for the recipient electronic device, wherein the wake-up frame comprises an identifier of an aggregated group, the identifier comprising the group address for which a group-addressed frame will subsequently be transmitted by the electronic device, and wherein the wake-up frame is provided at a transmission time based at least in part on the transmission schedule. 12. The computer-readable storage medium of claim 11, wherein the transmission time is an integer multiple of a Delivery Traffic Indication Message (DTIM)-beacon transmission interval. 13. The computer-readable storage medium of claim 12, wherein the integer is greater than one. 14. The computer-readable storage medium of claim 11, wherein the identifier comprises a flexible multicast service identifier (FMSID). 15. The computer-readable storage medium of claim 11, wherein the wake-up frame specifies an FMS stream for which there is pending traffic in the electronic device. 16. The computer-readable storage medium of claim 11, wherein the interface circuit is configured to select an FMS stream for which there is pending traffic in the electronic device; and
wherein the wake-up frame specifies the FMS stream. 17. The computer-readable storage medium of claim 11, wherein the interface circuit is configured to assign, based at least in part on the group address, the recipient electronic device to the aggregated group associated with a FMSID. 18. A method for providing a wake-up frame, comprising:
by an electronic device:
receiving, at an interface circuit in the electronic device, a wake-up radio (WUR) -setup request associated with a recipient electronic device, wherein the WUR-setup request specifies a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval;
determining a transmission schedule based at least in part on the proposed transmission interval; and
providing, from the interface circuit, the wake-up frame intended for the recipient electronic device, wherein the wake-up frame comprises an identifier of an aggregated group, the identifier comprising the group address for which a group-addressed frame will subsequently be transmitted by the electronic device, and
wherein the wake-up frame is provided at a transmission time based at least in part on the transmission schedule. 19. The method of claim 18, wherein the transmission time is an integer multiple of a Delivery Traffic Indication Message (DTIM)-beacon transmission interval and the integer is greater than one. 20. The method of claim 18, wherein the identifier comprises a flexible multicast service identifier (FMSID). | An interface circuit in an electronic device (such as an access point) may receive a setup request associated with the recipient electronic device. The setup request may specify a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval. Based at least in part on the proposed transmission interval, the electronic device may determine a transmission schedule and/or may assign, based at least in part on the group address, the recipient electronic device to an aggregated group having a flexible multicast service identifier (FMSID). Then, the electronic device may provide a wake-up frame for the recipient electronic device, where the wake-up frame includes an identifier of the aggregated group for which a group-addressed frame will subsequently be transmitted by the electronic device. Moreover, the wake-up frame may be provided at a transmission time based at least in part on the transmission schedule.1. An electronic device, comprising:
a node configured to communicatively couple to an antenna; and an interface circuit, communicatively coupled to the node, configured to communicate with a recipient electronic device, and configured to:
receive, from the node, a wake-up radio (WUR)-setup request associated with the recipient electronic device, wherein the WUR-setup request specifies a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval;
determine a transmission schedule based at least in part on the proposed transmission interval; and
provide, to the node, a wake-up frame intended for the recipient electronic device, wherein the wake-up frame comprises an identifier of an aggregated group, the identifier comprising the group address for which a group-addressed frame will subsequently be transmitted by the electronic device, and
wherein the wake-up frame is provided at a transmission time based at least in part on the transmission schedule. 2. The electronic device of claim 1, wherein the transmission time is an integer multiple of a Delivery Traffic Indication Message (DTIM)-beacon transmission interval. 3. The electronic device of claim 2, wherein the integer is greater than one. 4. The electronic device of claim 1, wherein the identifier comprises a flexible multicast service identifier (FMSID). 5. The electronic device of claim 1, wherein the wake-up frame specifies an FMS stream for which there is pending traffic in the electronic device. 6. The electronic device of claim 1, wherein the interface circuit is configured to select an FMS stream for which there is pending traffic in the electronic device; and
wherein the wake-up frame specifies the FMS stream. 7. The electronic device of claim 1, wherein the interface circuit is configured to assign, based at least in part on the group address, the recipient electronic device to the aggregated group associated with a FMSID. 8. The electronic device of claim 1, wherein the electronic device comprises an access point. 9. The electronic device of claim 1, wherein the WUR-setup request and the wake-up frame are compatible with an IEEE 802.11 communication protocol. 10. The electronic device of claim 1, wherein the interface circuit is configured to:
receive, from the node, a second WUR-setup request associated with the recipient electronic device, wherein the second WUR-setup request specifies one or more attributes associated with group-addressed frames that the recipient electronic device wants to receive using a directed multicast service (DMS); and provide, to the node, a second wake-up frame intended for the recipient electronic device, wherein the second wake-up frame indicates that the electronic device will subsequently provide a unicast copy of a second group-addressed frame having the one or more attributes. 11. A non-transitory computer-readable storage medium for use in conjunction with an electronic device, the computer-readable storage medium storing program instructions that, when executed by the electronic device, cause the electronic device to provide a wake-up frame by carrying out one or more operations comprising:
receive, at an interface circuit in the electronic device, a wake-up radio (WUR)-setup request associated with a recipient electronic device, wherein the WUR-setup request specifies a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval; determine a transmission schedule based at least in part on the proposed transmission interval; and provide, from the interface circuit, the wake-up frame intended for the recipient electronic device, wherein the wake-up frame comprises an identifier of an aggregated group, the identifier comprising the group address for which a group-addressed frame will subsequently be transmitted by the electronic device, and wherein the wake-up frame is provided at a transmission time based at least in part on the transmission schedule. 12. The computer-readable storage medium of claim 11, wherein the transmission time is an integer multiple of a Delivery Traffic Indication Message (DTIM)-beacon transmission interval. 13. The computer-readable storage medium of claim 12, wherein the integer is greater than one. 14. The computer-readable storage medium of claim 11, wherein the identifier comprises a flexible multicast service identifier (FMSID). 15. The computer-readable storage medium of claim 11, wherein the wake-up frame specifies an FMS stream for which there is pending traffic in the electronic device. 16. The computer-readable storage medium of claim 11, wherein the interface circuit is configured to select an FMS stream for which there is pending traffic in the electronic device; and
wherein the wake-up frame specifies the FMS stream. 17. The computer-readable storage medium of claim 11, wherein the interface circuit is configured to assign, based at least in part on the group address, the recipient electronic device to the aggregated group associated with a FMSID. 18. A method for providing a wake-up frame, comprising:
by an electronic device:
receiving, at an interface circuit in the electronic device, a wake-up radio (WUR) -setup request associated with a recipient electronic device, wherein the WUR-setup request specifies a group address for which the recipient electronic device wants to receive associated frames and a proposed transmission interval;
determining a transmission schedule based at least in part on the proposed transmission interval; and
providing, from the interface circuit, the wake-up frame intended for the recipient electronic device, wherein the wake-up frame comprises an identifier of an aggregated group, the identifier comprising the group address for which a group-addressed frame will subsequently be transmitted by the electronic device, and
wherein the wake-up frame is provided at a transmission time based at least in part on the transmission schedule. 19. The method of claim 18, wherein the transmission time is an integer multiple of a Delivery Traffic Indication Message (DTIM)-beacon transmission interval and the integer is greater than one. 20. The method of claim 18, wherein the identifier comprises a flexible multicast service identifier (FMSID). | 2,400 |
8,288 | 8,288 | 15,580,454 | 2,467 | An access node ( 100 ) of a cellular network sends an uplink grant to a communication device ( 10 -A, 10 -B, 10 -C). The uplink grant indicates uplink radio resources allocated to the communication device ( 10 -A, 10 -B, 10 -C) in reoccurring time intervals. The access node ( 100 ) monitors a uplink radio resource, configured before each of the reoccurring time intervals, for an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval. In response to not detecting the indication and determining a need for an uplink transmission in the corresponding reoccurring time interval by a further communication device ( 10 -A, 10 -B, 10 -C), the access node ( 100 ) reallocates the indicated uplink radio resources in the corresponding time interval to the further communication device. | 1-36. (canceled) 37. A method of controlling radio transmission in a cellular network, the method comprising:
an access node of the cellular network sending an uplink grant to a communication device, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals; the access node monitoring an uplink radio resource, configured before each of the reoccurring time intervals, for an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and in response to not detecting the indication and determining a need for an uplink transmission in the corresponding reoccurring time interval by a further communication device, the access node reallocating the indicated uplink radio resources in the corresponding time interval to the further communication device. 38. The method of claim 37, further comprising the access node selecting, depending on detection of the indication, between a first mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is active and a second mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is inactive. 39. The method of claim 38, further comprising the access node selecting the second mode in response to not detecting the indication. 40. The method of claim 38, further comprising the access node selecting the first mode in response to detecting the indication. 41. The method of claim 37, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices; and the configured uplink radio resource is shared by the communication devices of the group. 42. The method of claim 41, further comprising the access node estimating, based on a received signal strength in the configured uplink radio resource, a number of communication devices with intention to perform an uplink transmission on the indicated radio resources in the corresponding reoccurring time interval. 43. The method of claim 42, further comprising the access node, in response to estimated number of communication devices being larger than one, allocating new uplink radio resources in the corresponding reoccurring time interval to at least one of the communication devices of the group. 44. A method of controlling radio transmission in a cellular network, the method comprising:
a communication device receiving an uplink grant from the cellular network, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals; in an uplink radio resource configured before each of the reoccurring time intervals, the communication device sending an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and after sending the indication, the communication device performing the uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval. 45. The method of claim 44, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices; and the configured uplink radio resource is shared by the communication devices of the group. 46. The method of claim 44 further comprising the communication device selecting, for each of the reoccurring time intervals, between:
an active mode in which the communication device performs an uplink transmission on the indicated uplink radio resources; and
an inactive mode in which the communication device performs no uplink transmission on the indicated uplink radio resources. 47. The method of claim 46, further comprising the communication device:
for each of the reoccurring time intervals, checking whether one or more conditions for sending a buffer status report are met; and in response to one or more of the conditions being met, selecting the active mode to send an uplink transmission comprising the buffer status report, the buffer status report indicating an amount of uplink data available for transmission by the communication device. 48. An access node for a cellular network, the node comprising:
an interface for connecting to a communication device; and processing circuitry configured to:
send an uplink grant to the communication device via the interface, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals;
monitor an uplink radio resource, configured before each of the reoccurring time intervals, for an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and
in response to not detecting the indication and determining a need for an uplink transmission in the corresponding reoccurring time interval by a further communication device, reallocate the indicated uplink radio resources in the corresponding reoccurring time interval to the further communication device. 49. The access node of claim 48, wherein the processing circuitry is configured to select, depending on detection of the indication, between a first mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is active and a second mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is inactive. 50. The access node of claim 49, wherein the processing circuitry is configured to select the second mode in response to not detecting the indication. 51. The access node of claim 49, wherein the processing circuitry is configured to select the first mode in response to detecting the indication. 52. The access node of claim 21, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices; the configured uplink radio resource is shared by the communication devices of the group; and the processing circuitry is configured to estimate, based on a received signal strength in the configured uplink radio resource, a number of communication devices with intention to perform an uplink transmission on the indicated radio resources in the corresponding reoccurring time interval. 53. The access node of claim 52, wherein the processing circuitry is configured to allocate, in response to estimated number of communication devices being larger than one, new uplink radio resources in the corresponding reoccurring time interval to at least one of the communication devices of the group. 54. A communication device, comprising:
an interface for connecting to a cellular network; and processing circuitry configured to:
receive, via the interface, an uplink grant from the cellular network, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals;
in an uplink radio resource configured before each of the reoccurring time intervals, send an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and
after sending the indication, perform the uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval. 55. The communication device of claim 54, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices, and the configured uplink radio resource is shared by the communication devices of the group. 56. The communication device of claim 54, wherein the processing circuitry is configured to select, for each of the reoccurring time intervals, between:
an active mode in which the communication device performs an uplink transmission on the indicated uplink radio resources; and an inactive mode in which the communication device performs no uplink transmission on the indicated uplink radio resources. | An access node ( 100 ) of a cellular network sends an uplink grant to a communication device ( 10 -A, 10 -B, 10 -C). The uplink grant indicates uplink radio resources allocated to the communication device ( 10 -A, 10 -B, 10 -C) in reoccurring time intervals. The access node ( 100 ) monitors a uplink radio resource, configured before each of the reoccurring time intervals, for an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval. In response to not detecting the indication and determining a need for an uplink transmission in the corresponding reoccurring time interval by a further communication device ( 10 -A, 10 -B, 10 -C), the access node ( 100 ) reallocates the indicated uplink radio resources in the corresponding time interval to the further communication device.1-36. (canceled) 37. A method of controlling radio transmission in a cellular network, the method comprising:
an access node of the cellular network sending an uplink grant to a communication device, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals; the access node monitoring an uplink radio resource, configured before each of the reoccurring time intervals, for an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and in response to not detecting the indication and determining a need for an uplink transmission in the corresponding reoccurring time interval by a further communication device, the access node reallocating the indicated uplink radio resources in the corresponding time interval to the further communication device. 38. The method of claim 37, further comprising the access node selecting, depending on detection of the indication, between a first mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is active and a second mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is inactive. 39. The method of claim 38, further comprising the access node selecting the second mode in response to not detecting the indication. 40. The method of claim 38, further comprising the access node selecting the first mode in response to detecting the indication. 41. The method of claim 37, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices; and the configured uplink radio resource is shared by the communication devices of the group. 42. The method of claim 41, further comprising the access node estimating, based on a received signal strength in the configured uplink radio resource, a number of communication devices with intention to perform an uplink transmission on the indicated radio resources in the corresponding reoccurring time interval. 43. The method of claim 42, further comprising the access node, in response to estimated number of communication devices being larger than one, allocating new uplink radio resources in the corresponding reoccurring time interval to at least one of the communication devices of the group. 44. A method of controlling radio transmission in a cellular network, the method comprising:
a communication device receiving an uplink grant from the cellular network, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals; in an uplink radio resource configured before each of the reoccurring time intervals, the communication device sending an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and after sending the indication, the communication device performing the uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval. 45. The method of claim 44, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices; and the configured uplink radio resource is shared by the communication devices of the group. 46. The method of claim 44 further comprising the communication device selecting, for each of the reoccurring time intervals, between:
an active mode in which the communication device performs an uplink transmission on the indicated uplink radio resources; and
an inactive mode in which the communication device performs no uplink transmission on the indicated uplink radio resources. 47. The method of claim 46, further comprising the communication device:
for each of the reoccurring time intervals, checking whether one or more conditions for sending a buffer status report are met; and in response to one or more of the conditions being met, selecting the active mode to send an uplink transmission comprising the buffer status report, the buffer status report indicating an amount of uplink data available for transmission by the communication device. 48. An access node for a cellular network, the node comprising:
an interface for connecting to a communication device; and processing circuitry configured to:
send an uplink grant to the communication device via the interface, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals;
monitor an uplink radio resource, configured before each of the reoccurring time intervals, for an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and
in response to not detecting the indication and determining a need for an uplink transmission in the corresponding reoccurring time interval by a further communication device, reallocate the indicated uplink radio resources in the corresponding reoccurring time interval to the further communication device. 49. The access node of claim 48, wherein the processing circuitry is configured to select, depending on detection of the indication, between a first mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is active and a second mode in which monitoring of the indicated uplink radio resources in the corresponding reoccurring time interval by the access node is inactive. 50. The access node of claim 49, wherein the processing circuitry is configured to select the second mode in response to not detecting the indication. 51. The access node of claim 49, wherein the processing circuitry is configured to select the first mode in response to detecting the indication. 52. The access node of claim 21, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices; the configured uplink radio resource is shared by the communication devices of the group; and the processing circuitry is configured to estimate, based on a received signal strength in the configured uplink radio resource, a number of communication devices with intention to perform an uplink transmission on the indicated radio resources in the corresponding reoccurring time interval. 53. The access node of claim 52, wherein the processing circuitry is configured to allocate, in response to estimated number of communication devices being larger than one, new uplink radio resources in the corresponding reoccurring time interval to at least one of the communication devices of the group. 54. A communication device, comprising:
an interface for connecting to a cellular network; and processing circuitry configured to:
receive, via the interface, an uplink grant from the cellular network, the uplink grant indicating uplink radio resources allocated to the communication device in reoccurring time intervals;
in an uplink radio resource configured before each of the reoccurring time intervals, send an indication of intention to transmit uplink data by an uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval; and
after sending the indication, perform the uplink transmission on the indicated uplink radio resources in the corresponding reoccurring time interval. 55. The communication device of claim 54, wherein:
the indicated uplink radio resources are allocated to a group of multiple communication devices, and the configured uplink radio resource is shared by the communication devices of the group. 56. The communication device of claim 54, wherein the processing circuitry is configured to select, for each of the reoccurring time intervals, between:
an active mode in which the communication device performs an uplink transmission on the indicated uplink radio resources; and an inactive mode in which the communication device performs no uplink transmission on the indicated uplink radio resources. | 2,400 |
8,289 | 8,289 | 15,498,950 | 2,477 | Systems, methods, apparatuses, and computer program products for optimized cell update for a multi-connectivity user equipment are provided. One method includes, when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, sending a message, by the user equipment, to inform the network of cell update via a connection on a first radio interface. The user equipment is radio resource control (RRC) connected, the user equipment is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface. | 1. A method comprising:
when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, sending a message, by a user equipment, to inform the network of cell update via a connection on a first radio interface; wherein the user equipment is radio resource control (RRC) connected, and wherein the user equipment is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface. 2. The method according to claim 1, further comprising performing cell reselection for mobility on the second radio interface. 3. The method according to claim 1, further comprising transmitting uplink and receiving downlink traffic on the first radio interface. 4. The method according to claim 1, further comprising receiving cell update confirmation from the network using the second radio interface. 5. The method according to claim 1, further comprising, when informing the network of the cell update, receiving random access channel (RACH) prefix to perform contention-less RACH in the newly selected cell and receiving uplink grant to use to send further radio resource control (RRC) messages to the newly selected cell in the second radio interface for completing mobility procedure. 6. The method according to claim 2, wherein, when the user equipment is performing cell reselection in the second radio interface, the user equipment stays in the second radio interface and does not select a cell in another radio interface. 7. The method according to claim 1, wherein the first radio interface comprises at least one of millimeter wave (mmW), centimeter wave (cmW), and below 6 gigahertz (B6G), and wherein the second radio interface comprises at least one of millimeter wave (mmW), centimeter wave (cmW), and below 6 gigahertz (B6G). 8. The method according to claim 1, wherein the first radio interface and the second radio interface are independently configured. 9. The method according to claim 1, wherein the configuration of the first radio interface and the second radio interface are managed by different entities in the network. 10. The method according to claim 1, wherein the configuration of the first radio interface and the second radio interface are coordinated between different entities in the network. 11. An apparatus, comprising:
at least one processor; and at least one memory including computer program code, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, send a message to inform a network of cell update via a connection on a first radio interface; wherein the apparatus is radio resource control (RRC) connected, and wherein the apparatus is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface. 12. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to perform cell reselection for mobility on the second radio interface. 13. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to transmit uplink traffic and receive downlink traffic on the first radio interface. 14. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to receive cell update confirmation from the network using the second radio interface. 15. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to, when informing the network of the cell update, receive random access channel (RACH) prefix to perform contention-less RACH in the newly selected cell and receive uplink grant to use to send further radio resource control (RRC) messages to the newly selected cell in the second radio interface for completing mobility procedure. 16. The apparatus according to claim 11, wherein the first radio interface and the second radio interface are independently configured. 17. The apparatus according to claim 11, wherein the configuration of the first radio interface and the second radio interface are managed by different entities in the network. 18. The apparatus according to claim 11, wherein the configuration of the first radio interface and the second radio interface are coordinated between different entities in the network. 19. The apparatus according to claim 12, wherein, when the apparatus is performing cell reselection in the second radio interface, the apparatus is configured to stay in the second radio interface and does not select a cell in another radio interface. 20. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a process, comprising:
when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, sending a message, by a user equipment, to inform the network of cell update via a connection on a first radio interface; wherein the user equipment is radio resource control (RRC) connected, and wherein the user equipment is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface. | Systems, methods, apparatuses, and computer program products for optimized cell update for a multi-connectivity user equipment are provided. One method includes, when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, sending a message, by the user equipment, to inform the network of cell update via a connection on a first radio interface. The user equipment is radio resource control (RRC) connected, the user equipment is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface.1. A method comprising:
when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, sending a message, by a user equipment, to inform the network of cell update via a connection on a first radio interface; wherein the user equipment is radio resource control (RRC) connected, and wherein the user equipment is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface. 2. The method according to claim 1, further comprising performing cell reselection for mobility on the second radio interface. 3. The method according to claim 1, further comprising transmitting uplink and receiving downlink traffic on the first radio interface. 4. The method according to claim 1, further comprising receiving cell update confirmation from the network using the second radio interface. 5. The method according to claim 1, further comprising, when informing the network of the cell update, receiving random access channel (RACH) prefix to perform contention-less RACH in the newly selected cell and receiving uplink grant to use to send further radio resource control (RRC) messages to the newly selected cell in the second radio interface for completing mobility procedure. 6. The method according to claim 2, wherein, when the user equipment is performing cell reselection in the second radio interface, the user equipment stays in the second radio interface and does not select a cell in another radio interface. 7. The method according to claim 1, wherein the first radio interface comprises at least one of millimeter wave (mmW), centimeter wave (cmW), and below 6 gigahertz (B6G), and wherein the second radio interface comprises at least one of millimeter wave (mmW), centimeter wave (cmW), and below 6 gigahertz (B6G). 8. The method according to claim 1, wherein the first radio interface and the second radio interface are independently configured. 9. The method according to claim 1, wherein the configuration of the first radio interface and the second radio interface are managed by different entities in the network. 10. The method according to claim 1, wherein the configuration of the first radio interface and the second radio interface are coordinated between different entities in the network. 11. An apparatus, comprising:
at least one processor; and at least one memory including computer program code, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, send a message to inform a network of cell update via a connection on a first radio interface; wherein the apparatus is radio resource control (RRC) connected, and wherein the apparatus is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface. 12. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to perform cell reselection for mobility on the second radio interface. 13. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to transmit uplink traffic and receive downlink traffic on the first radio interface. 14. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to receive cell update confirmation from the network using the second radio interface. 15. The apparatus according to claim 11, wherein the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to, when informing the network of the cell update, receive random access channel (RACH) prefix to perform contention-less RACH in the newly selected cell and receive uplink grant to use to send further radio resource control (RRC) messages to the newly selected cell in the second radio interface for completing mobility procedure. 16. The apparatus according to claim 11, wherein the first radio interface and the second radio interface are independently configured. 17. The apparatus according to claim 11, wherein the configuration of the first radio interface and the second radio interface are managed by different entities in the network. 18. The apparatus according to claim 11, wherein the configuration of the first radio interface and the second radio interface are coordinated between different entities in the network. 19. The apparatus according to claim 12, wherein, when the apparatus is performing cell reselection in the second radio interface, the apparatus is configured to stay in the second radio interface and does not select a cell in another radio interface. 20. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a process, comprising:
when a new cell of a second radio interface is selected according to cell reselection parameters provided in a system information block, sending a message, by a user equipment, to inform the network of cell update via a connection on a first radio interface; wherein the user equipment is radio resource control (RRC) connected, and wherein the user equipment is connected to a first cell in the first radio interface and is connected to a second cell in the second radio interface. | 2,400 |
8,290 | 8,290 | 14,842,196 | 2,424 | iTV content is created and deployed using a server component adapted to allow content developers to create applications according to an authoring specification that describes a framework for same; a transport component configured to optimize and deliver the applications to one or more clients; and a client component adapted to render the applications through a television so as to permit user interaction therewith. The authoring specification provides for the presentation of content through one or more templates defined therein, allowing application definition and behavior to remain common across multiple client device types, middleware platforms, and/or iTV operating environments. The framework for applications accommodates advertising, promotions, content placement packages and/or programming campaign definitions, so as to permit a selection of a specific advertisement, promotion or content at a time of preparation of the iTV content by the server, and/or a time of execution of the applications by the client. | 1-20. (canceled) 21. A method comprising:
transmitting, by a computing device to one or more user devices, advertising content associated with interactive content; receiving information indicating user interaction with the advertising content; modifying the advertising content based on the received information; and transmitting, to the one or more user devices, the modified advertising content. 22. The method of claim 21, wherein receiving the information comprises receiving data indicating one or more user impressions or one or more user click-throughs associated with accessing the advertising content. 23. The method of claim 22, further comprising:
determining an amount of user impressions or user click-throughs associated with accessing the advertising content; and modifying the advertising content based on the determined amount. 24. The method of claim 21, wherein transmitting the modified advertising content comprises transmitting the modified advertising content with the interactive content. 25. The method of claim 21, wherein the transmitted advertising content is integrated with the interactive content. 26. The method of claim 21, wherein transmitting the modified advertising content further comprises transmitting the modified advertising content in one or more predetermined intervals. 27. The method of claim 21, wherein the interactive content comprises one or more interactive television (iTV) applications. 28. A method comprising:
determining, by a computing device, that interactive content associated with advertising content has been accessed; determining, from the interactive content, a reference to a storage location associated with the advertising content; retrieving the advertising content based on the determined reference; and transmitting, to one or more user devices, the retrieved advertising content. 29. The method of claim 28, wherein the reference to the storage location associated with the advertising content is integrated within the interactive content. 30. The method of claim 28, wherein transmitting the retrieved advertising content comprises transmitting the advertising content to one or more user devices that have accessed the interactive content. 31. The method of claim 30, further comprising:
receiving information indicating whether the advertising content was accessed; modifying the advertising content based on the received information; and transmitting, to the one or more user devices that have accessed the interactive content, the modified advertising content. 32. The method of claim 31, wherein receiving the information comprises receiving data indicating one or more user impressions or one or more user click-throughs associated with accessing the advertising content. 33. The method of claim 28, wherein retrieving the advertising content based on the determined reference further comprises retrieving the advertising content from a global campaign resource file that comprises information for displaying the advertising content. 34. The method of claim 33, further comprising transmitting, to the one or more user devices, the information for displaying the advertising content. 35. The method of claim 28, wherein the interactive content comprises one or more interactive television (iTV) applications. 36. A method comprising:
determining, by a computing device, that interactive content associated with advertising content has been accessed by one or more user devices; retrieving one or more display rules associated with displaying the advertising content; and transmitting, to the one or more user devices, the advertising content and the one or more display rules. 37. The method of claim 36, wherein the interactive content comprises a reference to the one or more display rules. 38. The method of claim 36, wherein the retrieved one or more display rules comprises instructions for integrating the advertising content with the interactive content. 39. The method of claim 36, further comprising:
storing a plurality of advertising campaigns, each being associated with one or more respective display rules; and determining the advertising content from among the stored plurality of advertising campaigns based on the retrieved one or more display rules. 40. The method of claim 36, wherein the interactive content comprises one or more interactive television (iTV) applications. | iTV content is created and deployed using a server component adapted to allow content developers to create applications according to an authoring specification that describes a framework for same; a transport component configured to optimize and deliver the applications to one or more clients; and a client component adapted to render the applications through a television so as to permit user interaction therewith. The authoring specification provides for the presentation of content through one or more templates defined therein, allowing application definition and behavior to remain common across multiple client device types, middleware platforms, and/or iTV operating environments. The framework for applications accommodates advertising, promotions, content placement packages and/or programming campaign definitions, so as to permit a selection of a specific advertisement, promotion or content at a time of preparation of the iTV content by the server, and/or a time of execution of the applications by the client.1-20. (canceled) 21. A method comprising:
transmitting, by a computing device to one or more user devices, advertising content associated with interactive content; receiving information indicating user interaction with the advertising content; modifying the advertising content based on the received information; and transmitting, to the one or more user devices, the modified advertising content. 22. The method of claim 21, wherein receiving the information comprises receiving data indicating one or more user impressions or one or more user click-throughs associated with accessing the advertising content. 23. The method of claim 22, further comprising:
determining an amount of user impressions or user click-throughs associated with accessing the advertising content; and modifying the advertising content based on the determined amount. 24. The method of claim 21, wherein transmitting the modified advertising content comprises transmitting the modified advertising content with the interactive content. 25. The method of claim 21, wherein the transmitted advertising content is integrated with the interactive content. 26. The method of claim 21, wherein transmitting the modified advertising content further comprises transmitting the modified advertising content in one or more predetermined intervals. 27. The method of claim 21, wherein the interactive content comprises one or more interactive television (iTV) applications. 28. A method comprising:
determining, by a computing device, that interactive content associated with advertising content has been accessed; determining, from the interactive content, a reference to a storage location associated with the advertising content; retrieving the advertising content based on the determined reference; and transmitting, to one or more user devices, the retrieved advertising content. 29. The method of claim 28, wherein the reference to the storage location associated with the advertising content is integrated within the interactive content. 30. The method of claim 28, wherein transmitting the retrieved advertising content comprises transmitting the advertising content to one or more user devices that have accessed the interactive content. 31. The method of claim 30, further comprising:
receiving information indicating whether the advertising content was accessed; modifying the advertising content based on the received information; and transmitting, to the one or more user devices that have accessed the interactive content, the modified advertising content. 32. The method of claim 31, wherein receiving the information comprises receiving data indicating one or more user impressions or one or more user click-throughs associated with accessing the advertising content. 33. The method of claim 28, wherein retrieving the advertising content based on the determined reference further comprises retrieving the advertising content from a global campaign resource file that comprises information for displaying the advertising content. 34. The method of claim 33, further comprising transmitting, to the one or more user devices, the information for displaying the advertising content. 35. The method of claim 28, wherein the interactive content comprises one or more interactive television (iTV) applications. 36. A method comprising:
determining, by a computing device, that interactive content associated with advertising content has been accessed by one or more user devices; retrieving one or more display rules associated with displaying the advertising content; and transmitting, to the one or more user devices, the advertising content and the one or more display rules. 37. The method of claim 36, wherein the interactive content comprises a reference to the one or more display rules. 38. The method of claim 36, wherein the retrieved one or more display rules comprises instructions for integrating the advertising content with the interactive content. 39. The method of claim 36, further comprising:
storing a plurality of advertising campaigns, each being associated with one or more respective display rules; and determining the advertising content from among the stored plurality of advertising campaigns based on the retrieved one or more display rules. 40. The method of claim 36, wherein the interactive content comprises one or more interactive television (iTV) applications. | 2,400 |
8,291 | 8,291 | 14,761,139 | 2,439 | According to various aspects and embodiments, a system including a programmable device is provided. The programmable device includes a memory storing an identifier of an authentication session and at least one processor coupled to the memory. The at least one processor is configured to receive an authentication credential, decode the authentication credential to access a session identifier and information associated with a requestor of the authentication credential, determine whether the session identifier matches the identifier of the authentication session, and grant the requestor access to protected functionality of the programmable device if the session identifier matches the identifier of the authentication session. | 1. A system comprising:
a programmable device comprising:
a memory storing an identifier of an authentication session; and
at least one processor coupled to the memory and configured to:
receive an authentication credential;
decode the authentication credential to access a session identifier and information associated with a requestor of the authentication credential;
determine whether the session identifier matches the identifier of the authentication session; and
grant the requestor access to protected functionality of the programmable device if the session identifier matches the identifier of the authentication session. 2. The system according to claim 1, wherein the at least one processor is configured to determine that the session identifier matches the identifier of the authentication session if the session identifier equals the identifier of the authentication session. 3. The system according to claim 1, wherein the at least one processor is configured to decode the authentication credential by decrypting the authentication credential using a public key. 4. The system according to claim 3, wherein the at least one processor is further configured to:
receive a session request; generate the identifier of the authentication session in response to receiving the session request; provide the identifier of the authentication session to the requestor; and initiate a timer in response to providing the identifier of the authentication session to the requestor. 5. The system according to any of claim 1, wherein the at least one processor is further configured to:
determine whether a predetermined period of time has expired since the timer was initiated; and terminate the authentication session if the predetermined period of time has expired. 6. The system according to claim 5, wherein the at least one processor is further configured to limit subsequent generation of identifiers of authentication sessions if the predetermined period of time has expired. 7. The system according to claim 1, wherein the at least one processor is further configured to deny the requestor access to the protected functionality of the programmable device if the session identifier does not match the identifier of the authentication session. 8. The system according to claim 7, wherein the at least one processor is further configured to:
record an access failure event if the session identifier does not match the identifier of the authentication session; calculate whether a total number of access failure events exceeds a predetermined threshold; and terminate the authentication session if the total number of access failure events exceeds the predetermined threshold. 9. The system according to claim 7, wherein the at least one processor is further configured to limit subsequent generation of identifiers of authentication sessions if the total number of access failure events exceeds the predetermined threshold. 10. The system according to claim 1, further comprising a computer system configured to:
receive a credential request including the identifier of the authentication session and information identifying a destination; generate an authentication credential in response to receiving the credential request; and provide the authentication credential to the destination. 11. The system according to claim 10, wherein the computer system is configured to generate the authentication credential based on a combination of the identifier of the authentication session, a unique identifier of the requestor, and additional characters. 12. The system according to claim 11, wherein the computer system is configured to generate the authentication credential by encrypting the combination. 13. The system according to claim 12, wherein the computer system is configured to generate the authentication credential by configuring the length of the combination to generate an authentication credential having a length not to exceed 48 characters. 14. The system according to claim 13, wherein the programmable device further comprises a utility meter including a sensor configured to measure utility usage and the protected functionality includes functionality to configure operational parameters of the utility meter. 15. A computer system comprising:
a memory; and at least one processor coupled to the memory and configured to:
receive a credential request including an identifier of the authentication session and information identifying a destination;
generate an authentication credential in response to receiving the credential request; and
provide the authentication credential to the destination. 16. The computer system according to claim 15, wherein the at least one processor is configured to generate the authentication credential based on a combination of the identifier of the authentication session, a unique identifier of a requestor, and additional characters. 17. The system according to claim 16, wherein the at least one processor is configured to generate the authentication credential by encrypting the combination. 18. The system according to claim 17, wherein the at least one processor is configured to generate the authentication credential by configuring the length of the combination to generate an authentication credential having a length not to exceed 48 characters. 19. A method of generating authentication credentials using a programmable device and a computer system, the method comprising:
receiving an authentication credential at a programmable device; decoding, by the programmable device, the authentication credential to access a session identifier and information associated with a requestor of the authentication credential; determining whether the session identifier matches the identifier of the authentication session; and granting the requestor access to protected functionality of the programmable device if the session identifier matches the identifier of the authentication session. 20. The method according to claim 19, further comprising:
receiving a credential request including the identifier of the authentication session and information identifying a destination; generating an authentication credential in response to receiving the credential request; and provide the authentication credential to the destination. | According to various aspects and embodiments, a system including a programmable device is provided. The programmable device includes a memory storing an identifier of an authentication session and at least one processor coupled to the memory. The at least one processor is configured to receive an authentication credential, decode the authentication credential to access a session identifier and information associated with a requestor of the authentication credential, determine whether the session identifier matches the identifier of the authentication session, and grant the requestor access to protected functionality of the programmable device if the session identifier matches the identifier of the authentication session.1. A system comprising:
a programmable device comprising:
a memory storing an identifier of an authentication session; and
at least one processor coupled to the memory and configured to:
receive an authentication credential;
decode the authentication credential to access a session identifier and information associated with a requestor of the authentication credential;
determine whether the session identifier matches the identifier of the authentication session; and
grant the requestor access to protected functionality of the programmable device if the session identifier matches the identifier of the authentication session. 2. The system according to claim 1, wherein the at least one processor is configured to determine that the session identifier matches the identifier of the authentication session if the session identifier equals the identifier of the authentication session. 3. The system according to claim 1, wherein the at least one processor is configured to decode the authentication credential by decrypting the authentication credential using a public key. 4. The system according to claim 3, wherein the at least one processor is further configured to:
receive a session request; generate the identifier of the authentication session in response to receiving the session request; provide the identifier of the authentication session to the requestor; and initiate a timer in response to providing the identifier of the authentication session to the requestor. 5. The system according to any of claim 1, wherein the at least one processor is further configured to:
determine whether a predetermined period of time has expired since the timer was initiated; and terminate the authentication session if the predetermined period of time has expired. 6. The system according to claim 5, wherein the at least one processor is further configured to limit subsequent generation of identifiers of authentication sessions if the predetermined period of time has expired. 7. The system according to claim 1, wherein the at least one processor is further configured to deny the requestor access to the protected functionality of the programmable device if the session identifier does not match the identifier of the authentication session. 8. The system according to claim 7, wherein the at least one processor is further configured to:
record an access failure event if the session identifier does not match the identifier of the authentication session; calculate whether a total number of access failure events exceeds a predetermined threshold; and terminate the authentication session if the total number of access failure events exceeds the predetermined threshold. 9. The system according to claim 7, wherein the at least one processor is further configured to limit subsequent generation of identifiers of authentication sessions if the total number of access failure events exceeds the predetermined threshold. 10. The system according to claim 1, further comprising a computer system configured to:
receive a credential request including the identifier of the authentication session and information identifying a destination; generate an authentication credential in response to receiving the credential request; and provide the authentication credential to the destination. 11. The system according to claim 10, wherein the computer system is configured to generate the authentication credential based on a combination of the identifier of the authentication session, a unique identifier of the requestor, and additional characters. 12. The system according to claim 11, wherein the computer system is configured to generate the authentication credential by encrypting the combination. 13. The system according to claim 12, wherein the computer system is configured to generate the authentication credential by configuring the length of the combination to generate an authentication credential having a length not to exceed 48 characters. 14. The system according to claim 13, wherein the programmable device further comprises a utility meter including a sensor configured to measure utility usage and the protected functionality includes functionality to configure operational parameters of the utility meter. 15. A computer system comprising:
a memory; and at least one processor coupled to the memory and configured to:
receive a credential request including an identifier of the authentication session and information identifying a destination;
generate an authentication credential in response to receiving the credential request; and
provide the authentication credential to the destination. 16. The computer system according to claim 15, wherein the at least one processor is configured to generate the authentication credential based on a combination of the identifier of the authentication session, a unique identifier of a requestor, and additional characters. 17. The system according to claim 16, wherein the at least one processor is configured to generate the authentication credential by encrypting the combination. 18. The system according to claim 17, wherein the at least one processor is configured to generate the authentication credential by configuring the length of the combination to generate an authentication credential having a length not to exceed 48 characters. 19. A method of generating authentication credentials using a programmable device and a computer system, the method comprising:
receiving an authentication credential at a programmable device; decoding, by the programmable device, the authentication credential to access a session identifier and information associated with a requestor of the authentication credential; determining whether the session identifier matches the identifier of the authentication session; and granting the requestor access to protected functionality of the programmable device if the session identifier matches the identifier of the authentication session. 20. The method according to claim 19, further comprising:
receiving a credential request including the identifier of the authentication session and information identifying a destination; generating an authentication credential in response to receiving the credential request; and provide the authentication credential to the destination. | 2,400 |
8,292 | 8,292 | 16,142,008 | 2,473 | An interface circuit in an electronic device may provide rate feedback. During operation the interface circuit may transmit one or more packets or frames associated with a data stream that are intended for the recipient electronic device, where the data stream is associated with a video encoder. Then, the interface circuit may estimate a communication performance metric associated with at least the transmissions. For example, the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. Moreover, the effective capacity may be estimated based at least in part on an efficiency of the wireless link. Next, the interface circuit may provide the rate feedback intended for the video encoder based at least in part on the estimated communication performance metric. In some embodiments, when beamforming occurs, the rate feedback may be reset. | 1. An electronic device, comprising:
a node configured to communicatively couple to an antenna; and an interface circuit, communicatively coupled to the node, configured to communicate with a recipient electronic device, and configured to:
transmit, via the node, one or more packets or frames associated with a data stream that are intended for the recipient electronic device, wherein the data stream is associated with a video encoder;
estimate a communication performance metric associated with at least the transmission of the one or more packets or frames; and
provide rate feedback intended for the video encoder based at least in part on the estimated communication performance metric. 2. The electronic device of claim 1, wherein the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. 3. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on an efficiency of the wireless link. 4. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on a packet-error rate (PER) and/or a modulation coding scheme (MCS) of the wireless link. 5. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on an overhead associated with the packets or the frames. 6. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on a relative access time of the electronic device during the transmissions. 7. The electronic device of claim 1, wherein the electronic device comprises an access point. 8. The electronic device of claim 1, wherein the rate feedback corresponding to the communication performance metric may be predetermined. 9. The electronic device of claim 1, wherein the rate feedback corresponding to the communication performance metric is dynamically determined. 10. The electronic device of claim 1, wherein the rate feedback is reset when a beamforming condition occurs. 11. The electronic device of claim 1, wherein the rate feedback is filtered. 12. The electronic device of claim 1, wherein the interface circuit is configured to:
transmit multiple data streams; and estimate multiple communication performance metrics, with each communication performance metric corresponding to a respective data stream of the multiple data streams; and wherein the rate feedback corresponds to the multiple communication performance metrics. 13. The electronic device of claim 1, wherein the rate feedback is based at least in part on at least one of: an application associated with the data stream, content associated with the data stream, or a quality-of-service (QoS) tolerance associated with the data stream. 14. A non-transitory computer-readable storage medium for use in conjunction with an electronic device, the computer-readable storage medium storing program instructions that, when executed by the electronic device, cause the electronic device to provide rate feedback by carrying out one or more operations comprising:
transmitting, to a recipient electronic device, one or more packets or frames associated with a data stream, wherein the data stream is associated with a video encoder; estimating a communication performance metric associated with the transmission of the one or more packets or frames; and providing rate feedback intended for the video encoder based at least in part on the estimated communication performance metric. 15. The computer-readable storage medium of claim 14, wherein the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. 16. The computer-readable storage medium of claim 14, wherein the rate feedback is reset when a beamforming condition occurs. 17. The computer-readable storage medium of claim 14, wherein the one or more operations comprises:
transmitting one or more packets of frames associated with multiple data streams; and estimating multiple communication performance metrics, wherein each of the multiple communication performance metrics is associated with a data stream of the multiple data streams; and wherein the rate feedback corresponds to the multiple communication performance metrics. 18. The computer-readable storage medium of claim 14, wherein the rate feedback is based at least in part on at least one of: an application associated with the data stream, content associated with the data stream, or a quality-of-service (QoS) tolerance associated with the data stream. 19. A method for providing rate feedback, comprising:
by an electronic device: transmitting, to a recipient electronic device, one or more packets or frames associated with a data stream, wherein the data stream is associated with a video encoder; estimating a communication performance metric associated with the transmission of the one or more packets or frames; and generating rate feedback for the video encoder based at least in part on the estimated communication performance metric. 20. The method of claim 19, wherein the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. | An interface circuit in an electronic device may provide rate feedback. During operation the interface circuit may transmit one or more packets or frames associated with a data stream that are intended for the recipient electronic device, where the data stream is associated with a video encoder. Then, the interface circuit may estimate a communication performance metric associated with at least the transmissions. For example, the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. Moreover, the effective capacity may be estimated based at least in part on an efficiency of the wireless link. Next, the interface circuit may provide the rate feedback intended for the video encoder based at least in part on the estimated communication performance metric. In some embodiments, when beamforming occurs, the rate feedback may be reset.1. An electronic device, comprising:
a node configured to communicatively couple to an antenna; and an interface circuit, communicatively coupled to the node, configured to communicate with a recipient electronic device, and configured to:
transmit, via the node, one or more packets or frames associated with a data stream that are intended for the recipient electronic device, wherein the data stream is associated with a video encoder;
estimate a communication performance metric associated with at least the transmission of the one or more packets or frames; and
provide rate feedback intended for the video encoder based at least in part on the estimated communication performance metric. 2. The electronic device of claim 1, wherein the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. 3. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on an efficiency of the wireless link. 4. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on a packet-error rate (PER) and/or a modulation coding scheme (MCS) of the wireless link. 5. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on an overhead associated with the packets or the frames. 6. The electronic device of claim 2, wherein the effective capacity is estimated based at least in part on a relative access time of the electronic device during the transmissions. 7. The electronic device of claim 1, wherein the electronic device comprises an access point. 8. The electronic device of claim 1, wherein the rate feedback corresponding to the communication performance metric may be predetermined. 9. The electronic device of claim 1, wherein the rate feedback corresponding to the communication performance metric is dynamically determined. 10. The electronic device of claim 1, wherein the rate feedback is reset when a beamforming condition occurs. 11. The electronic device of claim 1, wherein the rate feedback is filtered. 12. The electronic device of claim 1, wherein the interface circuit is configured to:
transmit multiple data streams; and estimate multiple communication performance metrics, with each communication performance metric corresponding to a respective data stream of the multiple data streams; and wherein the rate feedback corresponds to the multiple communication performance metrics. 13. The electronic device of claim 1, wherein the rate feedback is based at least in part on at least one of: an application associated with the data stream, content associated with the data stream, or a quality-of-service (QoS) tolerance associated with the data stream. 14. A non-transitory computer-readable storage medium for use in conjunction with an electronic device, the computer-readable storage medium storing program instructions that, when executed by the electronic device, cause the electronic device to provide rate feedback by carrying out one or more operations comprising:
transmitting, to a recipient electronic device, one or more packets or frames associated with a data stream, wherein the data stream is associated with a video encoder; estimating a communication performance metric associated with the transmission of the one or more packets or frames; and providing rate feedback intended for the video encoder based at least in part on the estimated communication performance metric. 15. The computer-readable storage medium of claim 14, wherein the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. 16. The computer-readable storage medium of claim 14, wherein the rate feedback is reset when a beamforming condition occurs. 17. The computer-readable storage medium of claim 14, wherein the one or more operations comprises:
transmitting one or more packets of frames associated with multiple data streams; and estimating multiple communication performance metrics, wherein each of the multiple communication performance metrics is associated with a data stream of the multiple data streams; and wherein the rate feedback corresponds to the multiple communication performance metrics. 18. The computer-readable storage medium of claim 14, wherein the rate feedback is based at least in part on at least one of: an application associated with the data stream, content associated with the data stream, or a quality-of-service (QoS) tolerance associated with the data stream. 19. A method for providing rate feedback, comprising:
by an electronic device: transmitting, to a recipient electronic device, one or more packets or frames associated with a data stream, wherein the data stream is associated with a video encoder; estimating a communication performance metric associated with the transmission of the one or more packets or frames; and generating rate feedback for the video encoder based at least in part on the estimated communication performance metric. 20. The method of claim 19, wherein the estimated communication performance metric comprises an effective capacity associated with a wireless link between the electronic device and the recipient electronic device. | 2,400 |
8,293 | 8,293 | 15,142,593 | 2,437 | The present disclosure is related to devices, systems, and methods for preemptive alerts in a connected environment. An example device can include instructions to receive a log from a first log source, determine whether a pattern of events in the log exceeds an alert threshold of the first log source, wherein the pattern of events is associated with an event source, in response to the pattern of events exceeding the alert threshold, trigger an alert particular to the event source, and in response to the pattern of events exceeding the alert threshold, initiate a sensitivity threshold of a second log source that provides a same functionality as the first log source, wherein the sensitivity threshold is more sensitive than the alert threshold, and wherein the sensitivity threshold is particular to the event source | 1. A non-transitory machine-readable medium storing instructions executable by a processing resource to cause a computing system to:
receive a log from a first log source; determine whether a pattern of events in the log exceeds an alert threshold of the first log source, wherein the pattern of events is associated with an event source; in response to the pattern of events exceeding the alert threshold, trigger an alert particular to the event source; and in response to the pattern of events exceeding the alert threshold, initiate a sensitivity threshold of a second log source that provides a same functionality as the first log source; wherein the sensitivity threshold is more sensitive than the alert threshold; and wherein the sensitivity threshold is particular to the event source. 2. The medium of claim 1, wherein the instructions to determine whether the pattern of events in the log exceeds the alert threshold include instructions to determine whether a particular number of events associated with the event source occurred over a particular time period. 3. The medium of claim 2, wherein the instructions include instructions to trigger another alert in response to a determination that a pattern of events exceeds the sensitivity threshold but does not exceed the alert threshold. 4. The medium of claim 1, wherein the first and second log sources are email servers. 5. The medium of claim 1, wherein the events are failed login attempts, and wherein the instructions to determine whether the pattern of events exceeds the alert threshold include instructions to determine that a number of failed login attempts to the first log source by a particular client exceeds a particular quantity. 6. The medium of claim 1, wherein the first and second log sources are virtual computing instances. 7. The medium of claim 1, wherein the sensitivity threshold is a user-defined quantity. 8. The medium of claim 1, wherein the sensitivity threshold is a particular percentage of the alert threshold. 9. The medium of claim 1, wherein the pattern of events in the log exceeding the alert threshold is indicative of an attack on the first log source. 10. The medium of claim 9, wherein the pattern of events in the log exceeding the alert threshold indicates at least one of: a denial of service (DOS) attack, a distributed denial-of-service (DDoS) attack, and a brute-force attack. 11. The medium of claim 1, wherein the pattern of events in the log exceeding the alert threshold indicates a log source storage failure. 12. The medium of claim 1, wherein the pattern of events in the log exceeding the alert threshold indicates an application error. 13. A system, comprising:
a first log source configured to selectively permit client login; a second log source configured to selectively permit client login, wherein the first and second log sources provide a same functionality; and a log management server configured to:
receive a first log from the first log source and a second log from the second log source, wherein the first log includes an identifier of a particular client and a number of failed login attempts to the first log source made by the client, and wherein the second log includes the identifier of the particular client and a number of failed login attempts to the second log source made by the client;
trigger an alert responsive to a determination, from the first log, that the number of failed login attempts to the first log source made by the client exceeds an alert threshold; and
initiate a sensitivity threshold of the second log source, the sensitivity threshold particular to the client. 14. The system of claim 13, wherein the first and second log sources are virtual application servers. 15. The system of claim 13, wherein the identifier is an IP address associated with the client. 16. The system of claim 13, wherein the log management server is configured to trigger another alert responsive to a determination, from the second log, that a number of failed login attempts to the second log source made by the client exceeds the sensitivity threshold. 17. The system of claim 13, wherein the alert threshold cannot be exceeded without exceeding the sensitivity threshold. 18. A method, comprising:
receiving a first event log associated with a first log source configured to selectively permit client login, wherein the first event log includes event information associated with each of a number of failed login attempts on the first log source, the event information including:
a timestamp of the failed login attempt;
a source of the failed login attempt;
text associated with the failed login attempt; and
a name-value pair extracted from the failed login attempt;
determining, from the first event log, that the number of failed login attempts to the first log source made by the client exceeds a first threshold; receiving a second event log associated with a second log source configured to selectively permit client login and provide a same functionality as the first log source, wherein the second event log includes event information associated with each of a number of failed login attempts to the second log source; triggering an alert and initiating a second threshold of the second log source responsive to the number of failed login attempts to the first log source made by the client exceeding the first threshold; and triggering another alert responsive to a determination, from the second event log, that a number of failed login attempts to the second log source made by the client exceeds the second threshold. 19. The medium of claim 18, wherein the method includes receiving the first and second event logs from the first and second log sources, respectively. 20. The medium of claim 18, wherein the method includes receiving the first and second event logs from a log aggregator. | The present disclosure is related to devices, systems, and methods for preemptive alerts in a connected environment. An example device can include instructions to receive a log from a first log source, determine whether a pattern of events in the log exceeds an alert threshold of the first log source, wherein the pattern of events is associated with an event source, in response to the pattern of events exceeding the alert threshold, trigger an alert particular to the event source, and in response to the pattern of events exceeding the alert threshold, initiate a sensitivity threshold of a second log source that provides a same functionality as the first log source, wherein the sensitivity threshold is more sensitive than the alert threshold, and wherein the sensitivity threshold is particular to the event source1. A non-transitory machine-readable medium storing instructions executable by a processing resource to cause a computing system to:
receive a log from a first log source; determine whether a pattern of events in the log exceeds an alert threshold of the first log source, wherein the pattern of events is associated with an event source; in response to the pattern of events exceeding the alert threshold, trigger an alert particular to the event source; and in response to the pattern of events exceeding the alert threshold, initiate a sensitivity threshold of a second log source that provides a same functionality as the first log source; wherein the sensitivity threshold is more sensitive than the alert threshold; and wherein the sensitivity threshold is particular to the event source. 2. The medium of claim 1, wherein the instructions to determine whether the pattern of events in the log exceeds the alert threshold include instructions to determine whether a particular number of events associated with the event source occurred over a particular time period. 3. The medium of claim 2, wherein the instructions include instructions to trigger another alert in response to a determination that a pattern of events exceeds the sensitivity threshold but does not exceed the alert threshold. 4. The medium of claim 1, wherein the first and second log sources are email servers. 5. The medium of claim 1, wherein the events are failed login attempts, and wherein the instructions to determine whether the pattern of events exceeds the alert threshold include instructions to determine that a number of failed login attempts to the first log source by a particular client exceeds a particular quantity. 6. The medium of claim 1, wherein the first and second log sources are virtual computing instances. 7. The medium of claim 1, wherein the sensitivity threshold is a user-defined quantity. 8. The medium of claim 1, wherein the sensitivity threshold is a particular percentage of the alert threshold. 9. The medium of claim 1, wherein the pattern of events in the log exceeding the alert threshold is indicative of an attack on the first log source. 10. The medium of claim 9, wherein the pattern of events in the log exceeding the alert threshold indicates at least one of: a denial of service (DOS) attack, a distributed denial-of-service (DDoS) attack, and a brute-force attack. 11. The medium of claim 1, wherein the pattern of events in the log exceeding the alert threshold indicates a log source storage failure. 12. The medium of claim 1, wherein the pattern of events in the log exceeding the alert threshold indicates an application error. 13. A system, comprising:
a first log source configured to selectively permit client login; a second log source configured to selectively permit client login, wherein the first and second log sources provide a same functionality; and a log management server configured to:
receive a first log from the first log source and a second log from the second log source, wherein the first log includes an identifier of a particular client and a number of failed login attempts to the first log source made by the client, and wherein the second log includes the identifier of the particular client and a number of failed login attempts to the second log source made by the client;
trigger an alert responsive to a determination, from the first log, that the number of failed login attempts to the first log source made by the client exceeds an alert threshold; and
initiate a sensitivity threshold of the second log source, the sensitivity threshold particular to the client. 14. The system of claim 13, wherein the first and second log sources are virtual application servers. 15. The system of claim 13, wherein the identifier is an IP address associated with the client. 16. The system of claim 13, wherein the log management server is configured to trigger another alert responsive to a determination, from the second log, that a number of failed login attempts to the second log source made by the client exceeds the sensitivity threshold. 17. The system of claim 13, wherein the alert threshold cannot be exceeded without exceeding the sensitivity threshold. 18. A method, comprising:
receiving a first event log associated with a first log source configured to selectively permit client login, wherein the first event log includes event information associated with each of a number of failed login attempts on the first log source, the event information including:
a timestamp of the failed login attempt;
a source of the failed login attempt;
text associated with the failed login attempt; and
a name-value pair extracted from the failed login attempt;
determining, from the first event log, that the number of failed login attempts to the first log source made by the client exceeds a first threshold; receiving a second event log associated with a second log source configured to selectively permit client login and provide a same functionality as the first log source, wherein the second event log includes event information associated with each of a number of failed login attempts to the second log source; triggering an alert and initiating a second threshold of the second log source responsive to the number of failed login attempts to the first log source made by the client exceeding the first threshold; and triggering another alert responsive to a determination, from the second event log, that a number of failed login attempts to the second log source made by the client exceeds the second threshold. 19. The medium of claim 18, wherein the method includes receiving the first and second event logs from the first and second log sources, respectively. 20. The medium of claim 18, wherein the method includes receiving the first and second event logs from a log aggregator. | 2,400 |
8,294 | 8,294 | 14,862,765 | 2,447 | Various users may benefit from methods and devices that utilize help extend a browser's application program interface through native code in web-based applications. Certain embodiments can include launching a web-based application using a first web browser, and opening a second web browser inside the web-based application. The method can also include loading a webpages on the second web browser, where the webpage provides a link to the web-based application. The second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser. | 1. An apparatus comprising:
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: launch a web-based application using a first web browser; open a second web browser inside the web-based application; and load a webpage on the second web browser, wherein the webpage provides a link to the web-based application, and wherein the second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser. 2. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
integrate a media streaming protocol through the webpage. 3. The apparatus according to claim 1, wherein the first web browser has not yet implemented a feature provided for by the user equipment. 4. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
run an operating system, wherein the operating system does not support the media streaming protocol being utilized. 5. The apparatus according to claim 4, wherein the operating system is a mobile operating system. 6. The apparatus according to claim 5, wherein the mobile operating system comprises Android version 4 or higher. 7. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
export a javascript object through which the functionality of the second web-based application is controlled. 8. The apparatus according to claim 1, wherein the media streaming protocol is a Real-Time Messaging Protocol. 9. The apparatus according to claim 1, wherein a program developed outside the web-based application can be integrated into the web-based application through the second web browser. 10. The apparatus according to claim 1, wherein an interface of the second web browser is customized through HyperText Markup Language (HTML). 11. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
ask a user to install the web-based application. 12. A method comprising:
launching a web-based application using a first web browser; opening a second web browser inside the web-based application; loading a webpage on the second web browser, wherein the webpage provides a link to the web-based application, and wherein the second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser. 13. The method according to claim 12, further comprising:
integrating a media streaming protocol through the webpage. 14. The method according to claim 12, further comprising:
running an operating system, wherein the operating system does not support the media streaming protocol being utilized. 15. The method according to claim 12, further comprising:
exporting a javascript object through which the functionality of the second web-based application is controlled. 16. The method according to claim 12, wherein the media streaming protocol is a Real-Time Messaging Protocol. 17. A non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process, the process comprising:
launching a web-based application using a first web browser; opening a second web browser inside the web-based application; loading a webpage on the second web browser, wherein the webpage provides a link to the web-based application, and wherein the second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser. 18. The non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process according to claim 17, the process further comprising:
integrating a media streaming protocol through the webpage. 19. The non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process according to claim 17, the process further comprising:
running an operating system, wherein the operating system does not support the media streaming protocol being utilized. 20. The non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process according to claim 17, the process further comprising:
exporting a javascript object through which the functionality of the second web-based application is controlled. | Various users may benefit from methods and devices that utilize help extend a browser's application program interface through native code in web-based applications. Certain embodiments can include launching a web-based application using a first web browser, and opening a second web browser inside the web-based application. The method can also include loading a webpages on the second web browser, where the webpage provides a link to the web-based application. The second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser.1. An apparatus comprising:
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: launch a web-based application using a first web browser; open a second web browser inside the web-based application; and load a webpage on the second web browser, wherein the webpage provides a link to the web-based application, and wherein the second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser. 2. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
integrate a media streaming protocol through the webpage. 3. The apparatus according to claim 1, wherein the first web browser has not yet implemented a feature provided for by the user equipment. 4. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
run an operating system, wherein the operating system does not support the media streaming protocol being utilized. 5. The apparatus according to claim 4, wherein the operating system is a mobile operating system. 6. The apparatus according to claim 5, wherein the mobile operating system comprises Android version 4 or higher. 7. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
export a javascript object through which the functionality of the second web-based application is controlled. 8. The apparatus according to claim 1, wherein the media streaming protocol is a Real-Time Messaging Protocol. 9. The apparatus according to claim 1, wherein a program developed outside the web-based application can be integrated into the web-based application through the second web browser. 10. The apparatus according to claim 1, wherein an interface of the second web browser is customized through HyperText Markup Language (HTML). 11. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to:
ask a user to install the web-based application. 12. A method comprising:
launching a web-based application using a first web browser; opening a second web browser inside the web-based application; loading a webpage on the second web browser, wherein the webpage provides a link to the web-based application, and wherein the second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser. 13. The method according to claim 12, further comprising:
integrating a media streaming protocol through the webpage. 14. The method according to claim 12, further comprising:
running an operating system, wherein the operating system does not support the media streaming protocol being utilized. 15. The method according to claim 12, further comprising:
exporting a javascript object through which the functionality of the second web-based application is controlled. 16. The method according to claim 12, wherein the media streaming protocol is a Real-Time Messaging Protocol. 17. A non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process, the process comprising:
launching a web-based application using a first web browser; opening a second web browser inside the web-based application; loading a webpage on the second web browser, wherein the webpage provides a link to the web-based application, and wherein the second web browser allows for greater access to an application programming interface beyond the limitations of the first web browser. 18. The non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process according to claim 17, the process further comprising:
integrating a media streaming protocol through the webpage. 19. The non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process according to claim 17, the process further comprising:
running an operating system, wherein the operating system does not support the media streaming protocol being utilized. 20. The non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process according to claim 17, the process further comprising:
exporting a javascript object through which the functionality of the second web-based application is controlled. | 2,400 |
8,295 | 8,295 | 15,091,903 | 2,465 | According to certain embodiments, a method by a wireless device is provided for mapping control information on carriers. The method includes receiving, by the wireless device, a mapping between at least one serving cell and at least one PUCCH channel. Based on the mapping, a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell is determined. The PUCCH-related signalling is transmitted on the particular PUCCH channel. | 1. A method by a wireless device for mapping control information on carriers, the method comprising:
receiving, by the wireless device, a mapping between at least one serving cell and at least one PUCCH channel; based on the mapping, determining a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell; and transmitting the PUCCH-related signalling on the particular PUCCH channel. 2. The method of claim 1, wherein the mapping comprises an indication, for the particular serving cell, of the particular PUCCH channel on which the PUCCH-related signalling is to be transmitted. 3. The method of claim 1, wherein the mapping comprises an indication, for the particular PUCCH channel, of any serving cells for which PUCCH-related signalling is to be transmitted on the particular PUCCH channel. 4. The method of claim 1, wherein the mapping between the at least one serving cell and the at least one PUCCH channel is applicable to a sub-set of the PUCCH-related signalling. 5. The method of claim 1, further comprising:
determining that the particular PUCCH channel on which the PUCCH-related signalling is transmitted for the serving cell has become unavailable; in response to determining that the particular PUCCH channel has become unavailable, sending, by the wireless device, the PUCCH-related signalling on a backup PUCCH channel. 6. The method of claim 5, wherein the determining that the particular PUCCH channel is unavailable comprises determining that the particular PUCCH channel is deactivated or that an associated alignment timer has expired or stopped. 7. The method of claim 1, further comprising:
receiving, by the wireless device, a MAC Control Element (MAC CE) from a network node, the MAC CE indicating that the particular PUCCH channel is not to be used by the wireless device; and in response to receiving the MAC CE indicating that the particular PUCCH channel is not to be used, sending the PUCCH-related signalling on an alternative cell, the alternative cell being configured by a Radio Resource Configuration (RRC). 8. A wireless device for mapping control information on carriers, the wireless device comprising:
a memory; and a processor in communication with the memory, the processor operable to:
receive a mapping between at least one serving cell and at least one PUCCH channel;
store the mapping in the memory;
based on the mapping, determine a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell; and
transmit the PUCCH-related signalling on the particular PUCCH channel. 9. The wireless device of claim 8, wherein the mapping comprises an indication, for the particular serving cell, of the particular PUCCH channel on which the PUCCH-related signalling is to be transmitted. 10. The wireless device of claim 8, wherein the mapping comprises an indication, for the particular PUCCH channel, of any serving cells for which PUCCH-related signalling is to be transmitted on the particular PUCCH channel. 11. The wireless device of claim 8, wherein the mapping between the at least one serving cell and the at least one PUCCH channel is applicable to a sub-set of the PUCCH-related signalling. 12. The wireless device of claim 8, wherein the processor is further operable to:
determine that the particular PUCCH channel on which the PUCCH-related signalling is transmitted for the serving cell has become unavailable; and in response to determining that the particular PUCCH channel has become unavailable, transmit the PUCCH-related signalling on a backup PUCCH channel. 13. The wireless device of claim 12, wherein determining that the particular PUCCH channel is unavailable, by the processor, comprises determining that the particular PUCCH channel is deactivated or that an associated alignment timer has expired or stopped. 14. The wireless device of claim 8, wherein the processor is further operable to:
receive a MAC Control Element (MAC CE) from a network node, the MAC CE indicating that the particular PUCCH channel is not to be used by the wireless device; and in response to receiving the MAC CE indicating that the particular PUCCH channel is not to be used, transmit the PUCCH-related signalling on an alternative cell, the alternative cell being configured by a Radio Resource Configuration (RRC). 15. Logic for mapping control information on carriers, the logic stored on a non-transitory computer-readable medium, the logic executed by a processor to cause the processor to:
receive a mapping between at least one serving cell and at least one PUCCH channel; based on the mapping, determine a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell; and transmit the PUCCH-related signalling on the particular PUCCH channel. 16. The logic of claim 15, wherein the mapping comprises an indication, for the particular serving cell, of the particular PUCCH channel on which the PUCCH-related signalling is to be transmitted. 17. The logic of claim 15, wherein the mapping comprises an indication, for the particular PUCCH channel, of any serving cells for which PUCCH-related signalling is to be transmitted on the particular PUCCH channel. 18. The logic of claim 15, wherein the mapping between the at least one serving cell and the at least one PUCCH channel is applicable to a sub-set of the PUCCH-related signalling. 19. The logic of claim 15, wherein the logic is further executed by the processor to cause the processor to:
determine that the particular PUCCH channel on which the PUCCH-related signalling is transmitted for the serving cell has become unavailable; and in response to determining that the particular PUCCH channel has become unavailable, transmit the PUCCH-related signalling on a backup PUCCH channel. 20. The logic of claim 19, wherein determining that the particular PUCCH channel is unavailable comprises determining that the particular PUCCH channel is deactivated or that an associated alignment timer has expired or stopped. 21. The logic of claim 15, wherein the logic is further executed by the processor to cause the processor to:
receive a MAC Control Element (MAC CE) from a network node, the MAC CE indicating that the particular PUCCH channel is not to be used by the wireless device; and in response to receiving the MAC CE indicating that the particular PUCCH channel is not to be used, transmit the PUCCH-related signalling on an alternative cell, the alternative cell being configured by a Radio Resource Configuration (RRC). | According to certain embodiments, a method by a wireless device is provided for mapping control information on carriers. The method includes receiving, by the wireless device, a mapping between at least one serving cell and at least one PUCCH channel. Based on the mapping, a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell is determined. The PUCCH-related signalling is transmitted on the particular PUCCH channel.1. A method by a wireless device for mapping control information on carriers, the method comprising:
receiving, by the wireless device, a mapping between at least one serving cell and at least one PUCCH channel; based on the mapping, determining a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell; and transmitting the PUCCH-related signalling on the particular PUCCH channel. 2. The method of claim 1, wherein the mapping comprises an indication, for the particular serving cell, of the particular PUCCH channel on which the PUCCH-related signalling is to be transmitted. 3. The method of claim 1, wherein the mapping comprises an indication, for the particular PUCCH channel, of any serving cells for which PUCCH-related signalling is to be transmitted on the particular PUCCH channel. 4. The method of claim 1, wherein the mapping between the at least one serving cell and the at least one PUCCH channel is applicable to a sub-set of the PUCCH-related signalling. 5. The method of claim 1, further comprising:
determining that the particular PUCCH channel on which the PUCCH-related signalling is transmitted for the serving cell has become unavailable; in response to determining that the particular PUCCH channel has become unavailable, sending, by the wireless device, the PUCCH-related signalling on a backup PUCCH channel. 6. The method of claim 5, wherein the determining that the particular PUCCH channel is unavailable comprises determining that the particular PUCCH channel is deactivated or that an associated alignment timer has expired or stopped. 7. The method of claim 1, further comprising:
receiving, by the wireless device, a MAC Control Element (MAC CE) from a network node, the MAC CE indicating that the particular PUCCH channel is not to be used by the wireless device; and in response to receiving the MAC CE indicating that the particular PUCCH channel is not to be used, sending the PUCCH-related signalling on an alternative cell, the alternative cell being configured by a Radio Resource Configuration (RRC). 8. A wireless device for mapping control information on carriers, the wireless device comprising:
a memory; and a processor in communication with the memory, the processor operable to:
receive a mapping between at least one serving cell and at least one PUCCH channel;
store the mapping in the memory;
based on the mapping, determine a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell; and
transmit the PUCCH-related signalling on the particular PUCCH channel. 9. The wireless device of claim 8, wherein the mapping comprises an indication, for the particular serving cell, of the particular PUCCH channel on which the PUCCH-related signalling is to be transmitted. 10. The wireless device of claim 8, wherein the mapping comprises an indication, for the particular PUCCH channel, of any serving cells for which PUCCH-related signalling is to be transmitted on the particular PUCCH channel. 11. The wireless device of claim 8, wherein the mapping between the at least one serving cell and the at least one PUCCH channel is applicable to a sub-set of the PUCCH-related signalling. 12. The wireless device of claim 8, wherein the processor is further operable to:
determine that the particular PUCCH channel on which the PUCCH-related signalling is transmitted for the serving cell has become unavailable; and in response to determining that the particular PUCCH channel has become unavailable, transmit the PUCCH-related signalling on a backup PUCCH channel. 13. The wireless device of claim 12, wherein determining that the particular PUCCH channel is unavailable, by the processor, comprises determining that the particular PUCCH channel is deactivated or that an associated alignment timer has expired or stopped. 14. The wireless device of claim 8, wherein the processor is further operable to:
receive a MAC Control Element (MAC CE) from a network node, the MAC CE indicating that the particular PUCCH channel is not to be used by the wireless device; and in response to receiving the MAC CE indicating that the particular PUCCH channel is not to be used, transmit the PUCCH-related signalling on an alternative cell, the alternative cell being configured by a Radio Resource Configuration (RRC). 15. Logic for mapping control information on carriers, the logic stored on a non-transitory computer-readable medium, the logic executed by a processor to cause the processor to:
receive a mapping between at least one serving cell and at least one PUCCH channel; based on the mapping, determine a particular PUCCH channel on which PUCCH-related signalling is to be transmitted for a particular serving cell; and transmit the PUCCH-related signalling on the particular PUCCH channel. 16. The logic of claim 15, wherein the mapping comprises an indication, for the particular serving cell, of the particular PUCCH channel on which the PUCCH-related signalling is to be transmitted. 17. The logic of claim 15, wherein the mapping comprises an indication, for the particular PUCCH channel, of any serving cells for which PUCCH-related signalling is to be transmitted on the particular PUCCH channel. 18. The logic of claim 15, wherein the mapping between the at least one serving cell and the at least one PUCCH channel is applicable to a sub-set of the PUCCH-related signalling. 19. The logic of claim 15, wherein the logic is further executed by the processor to cause the processor to:
determine that the particular PUCCH channel on which the PUCCH-related signalling is transmitted for the serving cell has become unavailable; and in response to determining that the particular PUCCH channel has become unavailable, transmit the PUCCH-related signalling on a backup PUCCH channel. 20. The logic of claim 19, wherein determining that the particular PUCCH channel is unavailable comprises determining that the particular PUCCH channel is deactivated or that an associated alignment timer has expired or stopped. 21. The logic of claim 15, wherein the logic is further executed by the processor to cause the processor to:
receive a MAC Control Element (MAC CE) from a network node, the MAC CE indicating that the particular PUCCH channel is not to be used by the wireless device; and in response to receiving the MAC CE indicating that the particular PUCCH channel is not to be used, transmit the PUCCH-related signalling on an alternative cell, the alternative cell being configured by a Radio Resource Configuration (RRC). | 2,400 |
8,296 | 8,296 | 15,512,904 | 2,476 | Embodiments provide apparatuses, methods and computer programs for mobile communication systems comprising base station transceivers and mobile transceivers. An apparatus ( 10, 20 ) for a base station transceiver ( 100 ) (and/or a mobile transceiver ( 200 )) of a mobile communication system ( 300 ), comprises a transceiver module ( 12, 22 ) to communicate with the mobile transceiver ( 200 ) (and/or base station transceiver ( 100 )) using at least a first communication channel and a second communication channel, wherein the first communication channel is more reliable than the second communication channel. The apparatus ( 10, 20 ) further comprises a controller module ( 14, 24 ) to control the transceiver module ( 12, 22 ), and to provide a data service to the mobile transceiver ( 200 ) (and/or base station transceiver ( 100 )). The data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service. The first data packets use the first communication channel, and the second data packets use the second communication channel. | 1. An apparatus for a base station transceiver of a mobile communication system, the mobile communication system further comprising a mobile transceiver, the apparatus comprising
a transceiver module to communicate with the mobile transceiver using at least a first communication channel and a second communication channel, wherein the first communication channel is more reliable than the second communication channel; a controller module to
control the transceiver module,
provide a data service to the mobile transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service, wherein the first data packets use the first communication channel, and wherein the second data packets use the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 2. The apparatus of claim 1, wherein the controller module is configured to transmit the first and second data packets to the mobile transceiver wherein the controller module is configured to communicate the second data packets when a channel quality indicator for the second communication channel indicates a communication quality above a threshold, and/or wherein the controller module is configured to receive the first and second data packets from the mobile transceiver and wherein the controller module is configured to combine the first and second data packets received from the mobile transceiver when a reception quality on the second communication channel lies above a threshold. 3. The apparatus of claim 1, wherein the data service corresponds to a scalable video data service, wherein the first data packets comprise information related to basic video data, and wherein the second data packets comprise information related to enhancement video data. 4. The apparatus of claim 1, wherein the first data packets comprise information related to payload data, and wherein the second data packets comprise information related to channel state information of the first communication channel. 5. The apparatus of claim 1, wherein the controller module is configured to communicate the second data packets when a traffic volume on the second data channel is below a threshold, and/or wherein the second data packets comprise a priority indicator, and wherein the controller module is configured to communicate the second data packets when a channel priority level indicator for the second communication channel allows transmission of data packet with the priority indicator. 6. The apparatus of claim 1, wherein the second communication channel is a contention based communication channel, and/or wherein the first communication channel is a scheduled communication channel. 7. An apparatus for a mobile transceiver of a mobile communication system, the mobile communication system further comprising a base station transceiver, the apparatus comprising
a transceiver module to communicate with the base station transceiver using at least a first communication channel and a second communication channel, wherein the first communication channel is more reliable than the second communication channel; a controller module to
control the transceiver module,
provide a data service to the base station transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service, wherein the first data packets use the first communication channel, and wherein the second data packets use the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 8. The apparatus of claim 7, wherein the controller module is configured to transmit the first and second data packets to the base station transceiver wherein the controller module is configured to communicate the second data packets when a channel quality indicator for the second communication channel indicates a communication quality above a threshold, and/or wherein the controller module is configured to receive the first and second data packets from the base station transceiver and wherein the controller module is configured to combine the first and second data packets received from the base station transceiver when a reception quality on the second communication channel lies above a threshold. 9. The apparatus of claim 7, wherein the data service corresponds to a scalable video data service, wherein the first data packets comprise information related to basic video data, and wherein the second data packets comprise information related to enhancement video data. 10. The apparatus of claim 7, wherein the first data packets comprise information related to payload data, and wherein the second data packets comprise information related to channel state information of the first communication channel. 11. The apparatus of claim 7, wherein the controller module is configured to communicate the second data packets when a traffic volume on the second data channel is below a threshold, and/or wherein the controller module is configured to communicate the second data packets when a channel priority level indicator for the second communication channel indicates a priority level, above which messages characterized on a priority scale may be transmitted on the second communication channel. 12. The apparatus of claim 7, wherein the second communication channel is a contention based communication channel, and/or wherein the first communication channel is a scheduled communication channel. 13. A method for a base station transceiver of a mobile communication system, the mobile communication system further comprising a mobile transceiver, the method comprising providing a data service to the mobile transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service,
communicating with the mobile transceiver the first data packets using a first communication channel; and communicating with the mobile transceiver the second data packets using a second communication channel, wherein the first communication channel is more reliable than the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 14. A method for a mobile transceiver of a mobile communication system, the mobile communication system further comprising a base station transceiver, the method comprising providing a data service to the base station transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service,
communicating with the base station transceiver the first data packets using a first communication channel; and communicating with the base station transceiver the second data packets using a second communication channel, wherein the first communication channel is more reliable than the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 15. A computer program having a program code for performing the methods of claims 13, when the computer program is executed on a computer, a processor, or a programmable hardware component. 16. A computer program having a program code for performing the method of claim 14, when the computer program is executed on a computer, a processor, or a programmable hardware component. | Embodiments provide apparatuses, methods and computer programs for mobile communication systems comprising base station transceivers and mobile transceivers. An apparatus ( 10, 20 ) for a base station transceiver ( 100 ) (and/or a mobile transceiver ( 200 )) of a mobile communication system ( 300 ), comprises a transceiver module ( 12, 22 ) to communicate with the mobile transceiver ( 200 ) (and/or base station transceiver ( 100 )) using at least a first communication channel and a second communication channel, wherein the first communication channel is more reliable than the second communication channel. The apparatus ( 10, 20 ) further comprises a controller module ( 14, 24 ) to control the transceiver module ( 12, 22 ), and to provide a data service to the mobile transceiver ( 200 ) (and/or base station transceiver ( 100 )). The data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service. The first data packets use the first communication channel, and the second data packets use the second communication channel.1. An apparatus for a base station transceiver of a mobile communication system, the mobile communication system further comprising a mobile transceiver, the apparatus comprising
a transceiver module to communicate with the mobile transceiver using at least a first communication channel and a second communication channel, wherein the first communication channel is more reliable than the second communication channel; a controller module to
control the transceiver module,
provide a data service to the mobile transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service, wherein the first data packets use the first communication channel, and wherein the second data packets use the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 2. The apparatus of claim 1, wherein the controller module is configured to transmit the first and second data packets to the mobile transceiver wherein the controller module is configured to communicate the second data packets when a channel quality indicator for the second communication channel indicates a communication quality above a threshold, and/or wherein the controller module is configured to receive the first and second data packets from the mobile transceiver and wherein the controller module is configured to combine the first and second data packets received from the mobile transceiver when a reception quality on the second communication channel lies above a threshold. 3. The apparatus of claim 1, wherein the data service corresponds to a scalable video data service, wherein the first data packets comprise information related to basic video data, and wherein the second data packets comprise information related to enhancement video data. 4. The apparatus of claim 1, wherein the first data packets comprise information related to payload data, and wherein the second data packets comprise information related to channel state information of the first communication channel. 5. The apparatus of claim 1, wherein the controller module is configured to communicate the second data packets when a traffic volume on the second data channel is below a threshold, and/or wherein the second data packets comprise a priority indicator, and wherein the controller module is configured to communicate the second data packets when a channel priority level indicator for the second communication channel allows transmission of data packet with the priority indicator. 6. The apparatus of claim 1, wherein the second communication channel is a contention based communication channel, and/or wherein the first communication channel is a scheduled communication channel. 7. An apparatus for a mobile transceiver of a mobile communication system, the mobile communication system further comprising a base station transceiver, the apparatus comprising
a transceiver module to communicate with the base station transceiver using at least a first communication channel and a second communication channel, wherein the first communication channel is more reliable than the second communication channel; a controller module to
control the transceiver module,
provide a data service to the base station transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service, wherein the first data packets use the first communication channel, and wherein the second data packets use the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 8. The apparatus of claim 7, wherein the controller module is configured to transmit the first and second data packets to the base station transceiver wherein the controller module is configured to communicate the second data packets when a channel quality indicator for the second communication channel indicates a communication quality above a threshold, and/or wherein the controller module is configured to receive the first and second data packets from the base station transceiver and wherein the controller module is configured to combine the first and second data packets received from the base station transceiver when a reception quality on the second communication channel lies above a threshold. 9. The apparatus of claim 7, wherein the data service corresponds to a scalable video data service, wherein the first data packets comprise information related to basic video data, and wherein the second data packets comprise information related to enhancement video data. 10. The apparatus of claim 7, wherein the first data packets comprise information related to payload data, and wherein the second data packets comprise information related to channel state information of the first communication channel. 11. The apparatus of claim 7, wherein the controller module is configured to communicate the second data packets when a traffic volume on the second data channel is below a threshold, and/or wherein the controller module is configured to communicate the second data packets when a channel priority level indicator for the second communication channel indicates a priority level, above which messages characterized on a priority scale may be transmitted on the second communication channel. 12. The apparatus of claim 7, wherein the second communication channel is a contention based communication channel, and/or wherein the first communication channel is a scheduled communication channel. 13. A method for a base station transceiver of a mobile communication system, the mobile communication system further comprising a mobile transceiver, the method comprising providing a data service to the mobile transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service,
communicating with the mobile transceiver the first data packets using a first communication channel; and communicating with the mobile transceiver the second data packets using a second communication channel, wherein the first communication channel is more reliable than the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 14. A method for a mobile transceiver of a mobile communication system, the mobile communication system further comprising a base station transceiver, the method comprising providing a data service to the base station transceiver, wherein the data service comprises first and second data packets, wherein the first data packets comprise information related to core data of the data service, and wherein the second data packets comprise information related to optional refinement data for the data service,
communicating with the base station transceiver the first data packets using a first communication channel; and communicating with the base station transceiver the second data packets using a second communication channel, wherein the first communication channel is more reliable than the second communication channel, and wherein an access nature of the first communication channel is different from an access nature of the second communication channel. 15. A computer program having a program code for performing the methods of claims 13, when the computer program is executed on a computer, a processor, or a programmable hardware component. 16. A computer program having a program code for performing the method of claim 14, when the computer program is executed on a computer, a processor, or a programmable hardware component. | 2,400 |
8,297 | 8,297 | 15,418,369 | 2,447 | Various messaging systems and methods are disclosed for meeting invitation management. In one aspect, a method of messaging is provided that includes generating a message to invite one or more invitees to a meeting. The message includes an assertion to suppress an auto-responder of the one or more invitees. The message is sent to the one or more invitees. The assertion suppresses the auto-responder of the one or more invitees. | 1. A method of messaging, comprising:
generating a message to invite one or more invitees to a meeting, the message including an assertion to suppress an auto-responder of the one or more invitees; and sending the message to the one or more invitees, the assertion suppressing the auto-responder of the one or more invitees. 2. The method of claim 1, wherein the message comprises an email message. 3. The method of claim 1, wherein the message does not comprise an email message. 4. The method of claim 1, wherein the message is generated by an originator computer and sent to one or more recipient computers of the one or more invitees. 5. The method of claim 4, wherein the message is sent from the originator computer to a server and the server relays the message to the one or more recipient computers. 6. The method of claim 4, wherein the message is sent from the originator computer to the one or more recipient computers in a peer-to-peer network. 7. The method of claim 1, wherein the message is generated by a first email client and received by one or more other email clients. 8. The method of claim 7, wherein the first email client and the one or more other email clients comprise stand alone email clients or web-based email clients. 9. A non-transient computer readable medium having computer readable instructions for performing a method, comprising:
generating a message to invite one or more invitees to a meeting, the message including an assertion to suppress an auto-responder of the one or more invitees; and sending the message to the one or more invitees, the assertion suppressing the auto-responder of the one or more invitees. 10. The method of claim 9, wherein the message comprises an email message. 11. The method of claim 9, wherein the message does not comprise an email message. 12. A computer, comprising:
a non-transient computer readable medium having computer readable instructions for generating a message to invite one or more invitees to a meeting, the message including an assertion to suppress an auto-responder of the one or more invitees; and sending the message to the one or more invitees, the assertion suppressing the auto-responder of the one or more invitees. 13. The computer of claim 12, wherein the message comprises an email message. 14. The computer of claim 12, wherein the message does not comprise an email message. 15. The computer of claim 12, wherein the instructions send the message from the computer to a server and the server relays the message to the one or more invitees. 16. The computer of claim 12, wherein the instructions send the message from the computer to the one or more recipient computers in a peer-to-peer network. 17. The computer of claim 12, wherein the instructions are executed by a first email client. 18. The method of claim 17, wherein the first email client comprises a stand alone email client or web-based email client. 19. A messaging system, comprising:
an originator computer including a non-transient computer readable medium having computer readable instructions for generating and sending a message; one or more recipient computers networked to the originator computer, the one or more recipient computers including an auto-responder operable to automatically respond to messages; and whereby, the message is an invitation to a meeting, the message including an assertion to suppress the auto-responders of the one or more recipient computers. 20. The messaging system of claim 19, comprising a server connected to the originator computer and the one or more recipient computers to deliver the message to the one or more recipient computers. | Various messaging systems and methods are disclosed for meeting invitation management. In one aspect, a method of messaging is provided that includes generating a message to invite one or more invitees to a meeting. The message includes an assertion to suppress an auto-responder of the one or more invitees. The message is sent to the one or more invitees. The assertion suppresses the auto-responder of the one or more invitees.1. A method of messaging, comprising:
generating a message to invite one or more invitees to a meeting, the message including an assertion to suppress an auto-responder of the one or more invitees; and sending the message to the one or more invitees, the assertion suppressing the auto-responder of the one or more invitees. 2. The method of claim 1, wherein the message comprises an email message. 3. The method of claim 1, wherein the message does not comprise an email message. 4. The method of claim 1, wherein the message is generated by an originator computer and sent to one or more recipient computers of the one or more invitees. 5. The method of claim 4, wherein the message is sent from the originator computer to a server and the server relays the message to the one or more recipient computers. 6. The method of claim 4, wherein the message is sent from the originator computer to the one or more recipient computers in a peer-to-peer network. 7. The method of claim 1, wherein the message is generated by a first email client and received by one or more other email clients. 8. The method of claim 7, wherein the first email client and the one or more other email clients comprise stand alone email clients or web-based email clients. 9. A non-transient computer readable medium having computer readable instructions for performing a method, comprising:
generating a message to invite one or more invitees to a meeting, the message including an assertion to suppress an auto-responder of the one or more invitees; and sending the message to the one or more invitees, the assertion suppressing the auto-responder of the one or more invitees. 10. The method of claim 9, wherein the message comprises an email message. 11. The method of claim 9, wherein the message does not comprise an email message. 12. A computer, comprising:
a non-transient computer readable medium having computer readable instructions for generating a message to invite one or more invitees to a meeting, the message including an assertion to suppress an auto-responder of the one or more invitees; and sending the message to the one or more invitees, the assertion suppressing the auto-responder of the one or more invitees. 13. The computer of claim 12, wherein the message comprises an email message. 14. The computer of claim 12, wherein the message does not comprise an email message. 15. The computer of claim 12, wherein the instructions send the message from the computer to a server and the server relays the message to the one or more invitees. 16. The computer of claim 12, wherein the instructions send the message from the computer to the one or more recipient computers in a peer-to-peer network. 17. The computer of claim 12, wherein the instructions are executed by a first email client. 18. The method of claim 17, wherein the first email client comprises a stand alone email client or web-based email client. 19. A messaging system, comprising:
an originator computer including a non-transient computer readable medium having computer readable instructions for generating and sending a message; one or more recipient computers networked to the originator computer, the one or more recipient computers including an auto-responder operable to automatically respond to messages; and whereby, the message is an invitation to a meeting, the message including an assertion to suppress the auto-responders of the one or more recipient computers. 20. The messaging system of claim 19, comprising a server connected to the originator computer and the one or more recipient computers to deliver the message to the one or more recipient computers. | 2,400 |
8,298 | 8,298 | 15,062,122 | 2,472 | The present disclosure describes a system, method, and computer program product embodiments for processing an A-MPSDU frame structure. An example system can include an interface circuit to combine a plurality of media access control (MAC) headers corresponding to a plurality of media access control service data units (MSDUs) into an aggregated MAC header. The aggregated MAC header can include length information for each of the MSDUs. The interface circuit can also insert the aggregated MAC header into a frame and transmit the frame using an antenna. | 1. An electronic device, comprising:
an antenna; and an interface circuit, coupled to the antenna, configured to communicate with another electronic device and configured to:
combine a plurality of media access control (MAC) headers corresponding to a plurality of media access control service data units (MSDUs) into an aggregated MAC header, wherein the aggregated MAC header comprises length information for each of the MSDUs;
insert the aggregated MAC header into a frame; and
transmit the frame using the antenna. 2. The electronic device of claim 1, wherein the interface circuit is configured to combine the plurality of MAC headers into the aggregated MAC header during data link layer processing of the frame. 3. The electronic device of claim 1, wherein a modulation coding scheme (MCS) of the aggregated MAC header specified in the frame is different than a MCS of the MSDUs specified in the frame. 4. The electronic device of claim 1, wherein the interface circuit is further configured to:
append one or more tail bits after each instance of the MSDUs in the frame. 5. The electronic device of claim 4, wherein the interface circuit is configured to append the one or more the tail bits during physical layer processing. 6. The electronic device of claim 4, wherein the interface circuit is configured to append the one or more tail bits during data link layer processing. 7. A method, comprising:
combining, with an interface circuit coupled to an antenna, a plurality of media access control (MAC) headers corresponding to a plurality of media access control service data units (MSDUs) into an aggregated MAC header, wherein the aggregated MAC header comprises length information for each of the MSDUs; inserting, by the interface circuit, the aggregated MAC header into a frame; appending, by the interface circuit, one or more tail bits to the frame after each instance of the MSDUs in the frame, wherein the one or more tail bits reset a decoder to a zero state in response to the frame being decoded; and transmitting the frame using the antenna. 8. The method of claim 7, wherein the combining comprises combining the plurality of MAC headers into the aggregated MAC header during data link layer processing of the MSDUs. 9. The electronic device of claim 7, wherein a modulation coding scheme (MCS) of the aggregated MAC header specified in the frame is different than a MCS of at least one of the MSDUs specified in the frame. 10. The method of claim 7, wherein the appending comprises appending the one or more tail bits during physical layer processing. 11. The method of claim 7, wherein the appending comprises appending the one or more tail bits during data link layer processing. 12. The method of claim 7, the further comprising:
appending physical layer zero-padding to an end of the frame prior to transmitting the frame. 13. An electronic device, comprising:
an antenna; and an interface circuit, coupled to the antenna, configured to:
receive a frame, via the antenna, that includes a plurality of media access control (MAC) service data units (MSDUs) and an aggregated MAC header comprising length information for each of the MSDUs;
decode the aggregated MAC header to access the length information for each of the MSDUs in the frame;
decode each of the MSDUs separately from one another based at least in part on respective length information; and
forward the decoded MSDUs to a data link layer. 14. The electronic device of claim 13, wherein the interface circuit is configured to decode the aggregated MAC header during physical layer processing. 15. The electronic device of claim 13, wherein the interface circuit is configured to decode the MSDUs during physical layer processing. 16. The electronic device of claim 13, wherein the frame comprises one or more tail bits after each instance of the MSDUs in the frame, wherein the interface circuit comprises a state machine associated with a detector of the frame, and wherein the state machine is configured to return to a zero state based at least in part on the one or more tail bits prior to processing subsequent MSDUs in the frame. 17. The electronic device of claim 13, wherein the interface circuit is further configured to:
determine that the electronic device is not a destination for at least one MSDU of the plurality of MSDUs based at least in part on destination information stored in the aggregated MAC header; and drop the frame in response to determining the electronic device is not the destination for the at least one MSDU of the plurality of MSDUs. 18. The electronic device of claim 13, wherein the interface circuit is further configured to:
detect an error in the frame based at least in part on the aggregated MAC header; and drop the frame in response to detecting the error. 19. A method, comprising:
receiving, by an antenna, a frame that includes a plurality of media access control (MAC) service data units (MSDUs), an aggregated MAC header comprising length information for each of the MSDUs, and one or more tail bits after each instance of the MSDUs in the frame; decoding, by an interface circuit, the aggregated MAC header to access the length information for each of the MSDUs in the frame; decoding, by the interface circuit, each of the MSDUs separately from one another using respective length information and the one or more tail bits, and forwarding, by the interface circuit, the decoded MSDUs to a data link layer. 20. The method of claim 19, wherein the decoding the aggregated MAC header comprises decoding the aggregated MAC header during physical layer processing. 21. The method of claim 19, wherein the decoding each of the MSDUs comprises decoding the MSDUs during data link layer processing. 22. The method of claim 19, wherein the decoding each of the MSDUs comprises resetting a state machine associated with a detector of the frame to a zero state based at least in part on the one or more tail hits prior to processing subsequent MSDUs in the frame. 23. The method of claim 19, further comprising:
determining that the interface circuit is not a destination for at least one MSDU of the plurality of MSDUs based at least in pail on the aggregated MAC header; and dropping the frame in response to determining the interface circuit is not the destination for the at least one MSDU of the plurality of MSDUs. 24. The method of claim 19, further comprising:
detecting an error in the frame based at least in part on the aggregated MAC header; and dropping the frame in response to detecting the error. | The present disclosure describes a system, method, and computer program product embodiments for processing an A-MPSDU frame structure. An example system can include an interface circuit to combine a plurality of media access control (MAC) headers corresponding to a plurality of media access control service data units (MSDUs) into an aggregated MAC header. The aggregated MAC header can include length information for each of the MSDUs. The interface circuit can also insert the aggregated MAC header into a frame and transmit the frame using an antenna.1. An electronic device, comprising:
an antenna; and an interface circuit, coupled to the antenna, configured to communicate with another electronic device and configured to:
combine a plurality of media access control (MAC) headers corresponding to a plurality of media access control service data units (MSDUs) into an aggregated MAC header, wherein the aggregated MAC header comprises length information for each of the MSDUs;
insert the aggregated MAC header into a frame; and
transmit the frame using the antenna. 2. The electronic device of claim 1, wherein the interface circuit is configured to combine the plurality of MAC headers into the aggregated MAC header during data link layer processing of the frame. 3. The electronic device of claim 1, wherein a modulation coding scheme (MCS) of the aggregated MAC header specified in the frame is different than a MCS of the MSDUs specified in the frame. 4. The electronic device of claim 1, wherein the interface circuit is further configured to:
append one or more tail bits after each instance of the MSDUs in the frame. 5. The electronic device of claim 4, wherein the interface circuit is configured to append the one or more the tail bits during physical layer processing. 6. The electronic device of claim 4, wherein the interface circuit is configured to append the one or more tail bits during data link layer processing. 7. A method, comprising:
combining, with an interface circuit coupled to an antenna, a plurality of media access control (MAC) headers corresponding to a plurality of media access control service data units (MSDUs) into an aggregated MAC header, wherein the aggregated MAC header comprises length information for each of the MSDUs; inserting, by the interface circuit, the aggregated MAC header into a frame; appending, by the interface circuit, one or more tail bits to the frame after each instance of the MSDUs in the frame, wherein the one or more tail bits reset a decoder to a zero state in response to the frame being decoded; and transmitting the frame using the antenna. 8. The method of claim 7, wherein the combining comprises combining the plurality of MAC headers into the aggregated MAC header during data link layer processing of the MSDUs. 9. The electronic device of claim 7, wherein a modulation coding scheme (MCS) of the aggregated MAC header specified in the frame is different than a MCS of at least one of the MSDUs specified in the frame. 10. The method of claim 7, wherein the appending comprises appending the one or more tail bits during physical layer processing. 11. The method of claim 7, wherein the appending comprises appending the one or more tail bits during data link layer processing. 12. The method of claim 7, the further comprising:
appending physical layer zero-padding to an end of the frame prior to transmitting the frame. 13. An electronic device, comprising:
an antenna; and an interface circuit, coupled to the antenna, configured to:
receive a frame, via the antenna, that includes a plurality of media access control (MAC) service data units (MSDUs) and an aggregated MAC header comprising length information for each of the MSDUs;
decode the aggregated MAC header to access the length information for each of the MSDUs in the frame;
decode each of the MSDUs separately from one another based at least in part on respective length information; and
forward the decoded MSDUs to a data link layer. 14. The electronic device of claim 13, wherein the interface circuit is configured to decode the aggregated MAC header during physical layer processing. 15. The electronic device of claim 13, wherein the interface circuit is configured to decode the MSDUs during physical layer processing. 16. The electronic device of claim 13, wherein the frame comprises one or more tail bits after each instance of the MSDUs in the frame, wherein the interface circuit comprises a state machine associated with a detector of the frame, and wherein the state machine is configured to return to a zero state based at least in part on the one or more tail bits prior to processing subsequent MSDUs in the frame. 17. The electronic device of claim 13, wherein the interface circuit is further configured to:
determine that the electronic device is not a destination for at least one MSDU of the plurality of MSDUs based at least in part on destination information stored in the aggregated MAC header; and drop the frame in response to determining the electronic device is not the destination for the at least one MSDU of the plurality of MSDUs. 18. The electronic device of claim 13, wherein the interface circuit is further configured to:
detect an error in the frame based at least in part on the aggregated MAC header; and drop the frame in response to detecting the error. 19. A method, comprising:
receiving, by an antenna, a frame that includes a plurality of media access control (MAC) service data units (MSDUs), an aggregated MAC header comprising length information for each of the MSDUs, and one or more tail bits after each instance of the MSDUs in the frame; decoding, by an interface circuit, the aggregated MAC header to access the length information for each of the MSDUs in the frame; decoding, by the interface circuit, each of the MSDUs separately from one another using respective length information and the one or more tail bits, and forwarding, by the interface circuit, the decoded MSDUs to a data link layer. 20. The method of claim 19, wherein the decoding the aggregated MAC header comprises decoding the aggregated MAC header during physical layer processing. 21. The method of claim 19, wherein the decoding each of the MSDUs comprises decoding the MSDUs during data link layer processing. 22. The method of claim 19, wherein the decoding each of the MSDUs comprises resetting a state machine associated with a detector of the frame to a zero state based at least in part on the one or more tail hits prior to processing subsequent MSDUs in the frame. 23. The method of claim 19, further comprising:
determining that the interface circuit is not a destination for at least one MSDU of the plurality of MSDUs based at least in pail on the aggregated MAC header; and dropping the frame in response to determining the interface circuit is not the destination for the at least one MSDU of the plurality of MSDUs. 24. The method of claim 19, further comprising:
detecting an error in the frame based at least in part on the aggregated MAC header; and dropping the frame in response to detecting the error. | 2,400 |
8,299 | 8,299 | 15,143,206 | 2,449 | Systems and methods for controlling document access in a content management system. A user setup record may be saved for each user, and user groups may be generated based on attributes of user setup records. When a user group is stamped to a document in the content management system, all users in that user group get access to the document. | 1. A method for controlling document access in a content management system, wherein the content management system stores a first document and a second document and wherein each of the documents is associated with a set of attributes, the method comprising:
displaying a first user interface for receiving user setup records, wherein each user setup record comprises a user role field and a product field; receiving and storing a first user setup record and a second user setup record, wherein the first user setup record comprises a first user role and a first product, and the second user setup record comprises a second user role and a second product; generating a first user group and a second user group; assigning the first user to the first user group when attributes of the first user setup record satisfy requirements of the first user group, and assigning the second user to the second user group when attributes of the second user setup record satisfy requirements of the second user group; displaying a second user interface for receiving definition of a matching rule for matching the user groups to the documents, wherein the second user interface comprises a first field of the first user setup record, and a window for receiving a first attribute of the first document which matches the first field of the first user setup record; receiving definition of the matching rule; and determining that the first user group matches the first document based on the matching rule, the first user setup record, and attributes of the first document. 2. The method of claim 1, further comprising: associating the first user group to the first document to enable users in the first user group to access the first document. 3. The method of claim 1, wherein requirements of the first user group comprise a product. 4. The method of claim 1, wherein requirements of the first user group comprise a user role. 5. The method of claim 1, wherein requirements of the first user group comprise a geographic area. 6. The method of claim 1, further comprising: determining if there is any change to the matching rule. 7. The method of claim 6, wherein the change to the matching rule comprises: updating the matching rule, activating the matching rule, deactivating the matching rule, and adding a new matching rule. 8. The method of claim 7, further comprising: updating association between the user groups and the documents according to the change to the matching rule. 9. The method of claim 1, further comprising: determining if there is any change to attributes of the documents. 10. The method of claim 9, further comprising: updating association between the user groups and the documents according to a change to the attributes of the documents. 11. The method of claim 1, further comprising: receiving a third user setup record. 12. The method of claim 11, further comprising: determining that the third user setup record satisfies requirements of the first user group and assigning the third user to the first user group. 13. The method of claim 11, further comprising: determining that the third user setup record does not satisfy requirements of the first and second user groups, and generating a third user group based on the third user setup record. 14. The method of claim 13, further comprising: determining that the third user group matches the first document based on the matching rule, requirements of the third user group, and attributes of the first document. 15. The method of claim 14, further comprising: associating the third user group to the first document to enable users in the third user group to access the first document. 16. The method of claim 2, further comprising: removing the first user from the first user group when the first user setup record is deleted. 17. The method of claim 2, further comprising: when the first user setup record is updated, determining that the updated first user setup record meets requirements of the second user group, and reassigning the first user to the second user group. 18. A document access control system for a content management system, comprising a user role setup unit in a computing device for:
displaying a first user interface for receiving attributes of user setup records, wherein the attributes comprise a user role and a product; and receiving and storing a first user setup record and a second user setup record, wherein attributes of the first user setup record comprise a first user role and a first product, and attributes of the second user setup record comprise a second user role and a second product; a user group generator for:
generating a first user group and a second user group; and
assigning the first user to the first user group when attributes of the first user setup record satisfy requirements of the first user group, and assigning the second user to the second user group when attributes of the second user setup record satisfy requirements of the second user group; and
a matching unit for:
displaying a second user interface for receiving definition of a matching rule for matching the user groups to the documents, wherein the second user interface comprises a first field of the first user setup record, and wherein the definition of the matching rule comprises a first attribute of the first document matching the first field of the first user setup record;
receiving definition of the matching rule; and
determining that the first user group matches the first document based on the matching rule, requirements of the first user group, and attributes of the first document. | Systems and methods for controlling document access in a content management system. A user setup record may be saved for each user, and user groups may be generated based on attributes of user setup records. When a user group is stamped to a document in the content management system, all users in that user group get access to the document.1. A method for controlling document access in a content management system, wherein the content management system stores a first document and a second document and wherein each of the documents is associated with a set of attributes, the method comprising:
displaying a first user interface for receiving user setup records, wherein each user setup record comprises a user role field and a product field; receiving and storing a first user setup record and a second user setup record, wherein the first user setup record comprises a first user role and a first product, and the second user setup record comprises a second user role and a second product; generating a first user group and a second user group; assigning the first user to the first user group when attributes of the first user setup record satisfy requirements of the first user group, and assigning the second user to the second user group when attributes of the second user setup record satisfy requirements of the second user group; displaying a second user interface for receiving definition of a matching rule for matching the user groups to the documents, wherein the second user interface comprises a first field of the first user setup record, and a window for receiving a first attribute of the first document which matches the first field of the first user setup record; receiving definition of the matching rule; and determining that the first user group matches the first document based on the matching rule, the first user setup record, and attributes of the first document. 2. The method of claim 1, further comprising: associating the first user group to the first document to enable users in the first user group to access the first document. 3. The method of claim 1, wherein requirements of the first user group comprise a product. 4. The method of claim 1, wherein requirements of the first user group comprise a user role. 5. The method of claim 1, wherein requirements of the first user group comprise a geographic area. 6. The method of claim 1, further comprising: determining if there is any change to the matching rule. 7. The method of claim 6, wherein the change to the matching rule comprises: updating the matching rule, activating the matching rule, deactivating the matching rule, and adding a new matching rule. 8. The method of claim 7, further comprising: updating association between the user groups and the documents according to the change to the matching rule. 9. The method of claim 1, further comprising: determining if there is any change to attributes of the documents. 10. The method of claim 9, further comprising: updating association between the user groups and the documents according to a change to the attributes of the documents. 11. The method of claim 1, further comprising: receiving a third user setup record. 12. The method of claim 11, further comprising: determining that the third user setup record satisfies requirements of the first user group and assigning the third user to the first user group. 13. The method of claim 11, further comprising: determining that the third user setup record does not satisfy requirements of the first and second user groups, and generating a third user group based on the third user setup record. 14. The method of claim 13, further comprising: determining that the third user group matches the first document based on the matching rule, requirements of the third user group, and attributes of the first document. 15. The method of claim 14, further comprising: associating the third user group to the first document to enable users in the third user group to access the first document. 16. The method of claim 2, further comprising: removing the first user from the first user group when the first user setup record is deleted. 17. The method of claim 2, further comprising: when the first user setup record is updated, determining that the updated first user setup record meets requirements of the second user group, and reassigning the first user to the second user group. 18. A document access control system for a content management system, comprising a user role setup unit in a computing device for:
displaying a first user interface for receiving attributes of user setup records, wherein the attributes comprise a user role and a product; and receiving and storing a first user setup record and a second user setup record, wherein attributes of the first user setup record comprise a first user role and a first product, and attributes of the second user setup record comprise a second user role and a second product; a user group generator for:
generating a first user group and a second user group; and
assigning the first user to the first user group when attributes of the first user setup record satisfy requirements of the first user group, and assigning the second user to the second user group when attributes of the second user setup record satisfy requirements of the second user group; and
a matching unit for:
displaying a second user interface for receiving definition of a matching rule for matching the user groups to the documents, wherein the second user interface comprises a first field of the first user setup record, and wherein the definition of the matching rule comprises a first attribute of the first document matching the first field of the first user setup record;
receiving definition of the matching rule; and
determining that the first user group matches the first document based on the matching rule, requirements of the first user group, and attributes of the first document. | 2,400 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.