Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
8,300 | 8,300 | 14,971,382 | 2,439 | A first wireless access point notifies a handoff management resource that a second wireless access point is a potential handoff candidate. Subsequent to authentication of the second wireless access point as being a valid handoff candidate, the handoff management resource notifies a mobile communication device that the second wireless access point is a valid handoff option to receive a communication session from the first wireless access point. To perform a handoff, the mobile communication device initiates termination of a wireless communication link with the first wireless access point and communicates with the second wireless access point to establish a new wireless communication link. In furtherance of providing uninterrupted network access, the handoff management resource conveys communication settings information associated with the handed off communication session to the second wireless access point for use over the new wireless communication link. | 1. A method comprising:
via computer processor hardware operated in a wireless network environment including a first wireless access point and a second wireless access point, performing operations of:
receiving a notification indicating presence of the second wireless access point in the wireless network environment;
validating the second wireless access point for receiving handoffs from the first wireless access point; and
producing neighbor information associated with the first wireless access point to include an identity of the second wireless access point, the neighbor information indicating that the second wireless access point is a valid wireless access point in which to perform a handoff from the first wireless access point. 2. The method as in claim 1, wherein the first wireless access point is manufactured by a first vendor; and
wherein the second wireless access point is manufactured by a second vendor. 3. The method as in claim 1 further comprising: receiving the notification indicating the presence of the second wireless access point over a wireless medium from the second wireless access point, the notification broadcasted by the second wireless access point to indicate its presence in the wireless network environment. 4. The method as in claim 1 further comprising:
receiving the notification from a mobile communication device that receives a beacon from the second wireless access point, the received beacon indicating presence of the second wireless access point in the wireless network. 5. The method as in claim 1, wherein validating the second wireless access point includes: performing authentication of the second wireless access point with a remote authentication server resource. 6. The method as in claim 5, wherein performing authentication of the second wireless access point includes:
obtaining a unique identifier value assigned to the first wireless access point; forwarding the unique identifier value to the authentication server resource; and receiving an authentication response from the authentication server resource, the authentication response indicating that the second wireless access point is part of a service provider's wireless network in which the first wireless access point resides. 7. The method as in claim 6, wherein producing the neighbor information further comprises:
in accordance with the authentication response, adding an identity of the second wireless access point to the neighbor information, addition of the identity of the second wireless access point to the neighbor information indicating that the second wireless access point is valid in which to perform a handoff from the first wireless access point. 8. The method as in claim 1 further comprising:
providing notification of the neighbor information to a mobile communication device in communication with the first wireless access point via a corresponding communication session. 9. The method as in claim 8 further comprising:
receiving a handoff request from the mobile communication device to perform a handoff of the communication session from the first wireless access point to the second wireless access point, the handoff request received from the mobile communication device through the second wireless access point. 10. The method as in claim 9 further comprising:
to facilitate the handoff of the communication session from the first wireless access point to the second wireless access point, forwarding communication settings information associated with the communication session to the second wireless access point. 11. The method as in claim 1, wherein the first wireless access point resides in a first service provider's wireless network and the second wireless access point resides in a second service provider's wireless network, the first service provider and the second service provider partnering to provide shared used of content delivery services to a mobile communication device in communication with the first wireless access point via a corresponding communication session;
wherein authentication of the second wireless access point includes: in response to detecting that the second wireless access point resides outside of the first service provider's wireless network, communicating with an authentication resource operated by the second service provider to verify that the second wireless access point is a valid wireless access point from to handoff the corresponding communication session from the first wireless access point to the second wireless access point. 12. The method as in claim 11 further comprising:
conveying communication settings information associated with the corresponding communication session to the second wireless access point to facilitate the handoff of the corresponding communication session from the first wireless access point to the second wireless access point. 13. A method comprising:
via computer processor hardware operated in a mobile communication device roaming in a wireless network environment, performing operations of:
establishing a communication session to communicate from the mobile communication device to a first wireless access point in the wireless network;
receiving a notification indicating presence of a second wireless access point in the wireless network environment;
receiving neighbor information associated with the first wireless access point; and
utilizing the neighbor information to identify that the second wireless access point is valid in which to perform a handoff from the first wireless access point. 14. The method as in claim 13 further comprising:
in response to detecting that the second wireless access point is a valid handoff option for the communication session, communicating with the second wireless access point to establish a wireless communication link to perform the handoff of the communication session to the second wireless access point. 15. The method as in claim 13 further comprising:
transmitting session identifier information associated with the communication session from the mobile communication device to the second wireless access point, the session identifier information notifying the second wireless access point of an intent to handoff the communication session from the first wireless access point to the second wireless access point, the notification prompting the second wireless access point to retrieve communication settings information associated with the communication session. 16. The method as in claim 13, wherein retrieving neighbor information includes:
receiving the neighbor information in response to transmitting a query to the first wireless access point, the query requesting a list of valid wireless access points in which to perform the handoff. 17. The method as in claim 13, wherein the neighbor information indicates to the mobile communication device that the second wireless access point has been authenticated as being part of a service provider's wireless network in which the first wireless access point resides. 18. A system comprising:
computer processor hardware; and a hardware storage resource coupled to communicate with the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of:
receiving a notification indicating presence of the second wireless access point in the wireless network environment;
validating the second wireless access point for receiving handoffs from the first wireless access point; and
producing neighbor information associated with the first wireless access point to include an identity of the second wireless access point, the neighbor information indicating that the second wireless access point is a valid wireless access point in which to perform a handoff from the first wireless access point. 19. The computer system as in claim 18, wherein the first wireless access point is manufactured by a first vendor; and
wherein the second wireless access point is manufactured by a second vendor. 20. The computer system as in claim 18, wherein the computer processor hardware further performs operations of:
receiving the notification indicating the presence of the second wireless access point over a wireless medium from the second wireless access point, the notification broadcasted by the second wireless access point to indicate its presence in the wireless network environment. 21. The computer system as in claim 18, wherein the computer processor hardware further performs operations of:
receiving the notification from a mobile communication device that receives a beacon from the second wireless access point, the received beacon indicating presence of the second wireless access point in the wireless network. 22. The computer system as in claim 18, wherein validating the second wireless access point includes: performing authentication of the second wireless access point with a remote authentication server resource. 23. The computer system as in claim 22, wherein performing authentication of the second wireless access point includes:
obtaining a unique identifier value assigned to the first wireless access point; forwarding the unique identifier value to the authentication server resource; and receiving an authentication response from the authentication server resource, the authentication response indicating that the second wireless access point is part of a service provider's wireless network in which the first wireless access point resides. 24. The computer system as in claim 23, wherein producing the neighbor information further comprises:
in accordance with the authentication response, adding an identity of the second wireless access point to the neighbor information, addition of the identity of the second wireless access point to the neighbor information indicating that the second wireless access point is valid in which to perform a handoff from the first wireless access point. 25. The computer system as in claim 18, wherein the computer processor hardware further performs operations of:
providing notification of the neighbor information to a mobile communication device in communication with the first wireless access point via a corresponding communication session. 26. The computer system as in claim 25, wherein the computer processor hardware further performs operations of:
receiving a handoff request from the mobile communication device to perform a handoff of the communication session from the first wireless access point to the second wireless access point, the handoff request received from the mobile communication device through the second wireless access point. 27. The computer system as in claim 26, wherein the computer processor hardware further performs operations of:
to facilitate the handoff of the communication session from the first wireless access point to the second wireless access point, forwarding communication settings information associated with the communication session to the second wireless access point. 28. The computer system as in claim 18, wherein the first wireless access point resides in a first service provider's wireless network and the second wireless access point resides in a second service provider's wireless network, the first service provider and the second service provider partnering to provide shared used of content delivery services to a mobile communication device in communication with the first wireless access point via a corresponding communication session;
wherein authentication of the second wireless access point includes: in response to detecting that the second wireless access point resides outside of the first service provider's wireless network, communicating with an authentication resource operated by the second service provider to verify that the second wireless access point is a valid wireless access point from to handoff the corresponding communication session from the first wireless access point to the second wireless access point. 29. The computer system as in claim 28, wherein the computer processor hardware further performs operations of:
conveying communication settings information associated with the corresponding communication session to the second wireless access point to facilitate the handoff of the corresponding communication session from the first wireless access point to the second wireless access point. 30. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causing the computer processor hardware to perform operations of:
receiving a notification indicating presence of the second wireless access point in the wireless network environment; validating the second wireless access point for receiving handoffs from the first wireless access point; and producing neighbor information associated with the first wireless access point to include an identity of the second wireless access point, the neighbor information indicating that the second wireless access point is a valid wireless access point in which to perform a handoff from the first wireless access point. | A first wireless access point notifies a handoff management resource that a second wireless access point is a potential handoff candidate. Subsequent to authentication of the second wireless access point as being a valid handoff candidate, the handoff management resource notifies a mobile communication device that the second wireless access point is a valid handoff option to receive a communication session from the first wireless access point. To perform a handoff, the mobile communication device initiates termination of a wireless communication link with the first wireless access point and communicates with the second wireless access point to establish a new wireless communication link. In furtherance of providing uninterrupted network access, the handoff management resource conveys communication settings information associated with the handed off communication session to the second wireless access point for use over the new wireless communication link.1. A method comprising:
via computer processor hardware operated in a wireless network environment including a first wireless access point and a second wireless access point, performing operations of:
receiving a notification indicating presence of the second wireless access point in the wireless network environment;
validating the second wireless access point for receiving handoffs from the first wireless access point; and
producing neighbor information associated with the first wireless access point to include an identity of the second wireless access point, the neighbor information indicating that the second wireless access point is a valid wireless access point in which to perform a handoff from the first wireless access point. 2. The method as in claim 1, wherein the first wireless access point is manufactured by a first vendor; and
wherein the second wireless access point is manufactured by a second vendor. 3. The method as in claim 1 further comprising: receiving the notification indicating the presence of the second wireless access point over a wireless medium from the second wireless access point, the notification broadcasted by the second wireless access point to indicate its presence in the wireless network environment. 4. The method as in claim 1 further comprising:
receiving the notification from a mobile communication device that receives a beacon from the second wireless access point, the received beacon indicating presence of the second wireless access point in the wireless network. 5. The method as in claim 1, wherein validating the second wireless access point includes: performing authentication of the second wireless access point with a remote authentication server resource. 6. The method as in claim 5, wherein performing authentication of the second wireless access point includes:
obtaining a unique identifier value assigned to the first wireless access point; forwarding the unique identifier value to the authentication server resource; and receiving an authentication response from the authentication server resource, the authentication response indicating that the second wireless access point is part of a service provider's wireless network in which the first wireless access point resides. 7. The method as in claim 6, wherein producing the neighbor information further comprises:
in accordance with the authentication response, adding an identity of the second wireless access point to the neighbor information, addition of the identity of the second wireless access point to the neighbor information indicating that the second wireless access point is valid in which to perform a handoff from the first wireless access point. 8. The method as in claim 1 further comprising:
providing notification of the neighbor information to a mobile communication device in communication with the first wireless access point via a corresponding communication session. 9. The method as in claim 8 further comprising:
receiving a handoff request from the mobile communication device to perform a handoff of the communication session from the first wireless access point to the second wireless access point, the handoff request received from the mobile communication device through the second wireless access point. 10. The method as in claim 9 further comprising:
to facilitate the handoff of the communication session from the first wireless access point to the second wireless access point, forwarding communication settings information associated with the communication session to the second wireless access point. 11. The method as in claim 1, wherein the first wireless access point resides in a first service provider's wireless network and the second wireless access point resides in a second service provider's wireless network, the first service provider and the second service provider partnering to provide shared used of content delivery services to a mobile communication device in communication with the first wireless access point via a corresponding communication session;
wherein authentication of the second wireless access point includes: in response to detecting that the second wireless access point resides outside of the first service provider's wireless network, communicating with an authentication resource operated by the second service provider to verify that the second wireless access point is a valid wireless access point from to handoff the corresponding communication session from the first wireless access point to the second wireless access point. 12. The method as in claim 11 further comprising:
conveying communication settings information associated with the corresponding communication session to the second wireless access point to facilitate the handoff of the corresponding communication session from the first wireless access point to the second wireless access point. 13. A method comprising:
via computer processor hardware operated in a mobile communication device roaming in a wireless network environment, performing operations of:
establishing a communication session to communicate from the mobile communication device to a first wireless access point in the wireless network;
receiving a notification indicating presence of a second wireless access point in the wireless network environment;
receiving neighbor information associated with the first wireless access point; and
utilizing the neighbor information to identify that the second wireless access point is valid in which to perform a handoff from the first wireless access point. 14. The method as in claim 13 further comprising:
in response to detecting that the second wireless access point is a valid handoff option for the communication session, communicating with the second wireless access point to establish a wireless communication link to perform the handoff of the communication session to the second wireless access point. 15. The method as in claim 13 further comprising:
transmitting session identifier information associated with the communication session from the mobile communication device to the second wireless access point, the session identifier information notifying the second wireless access point of an intent to handoff the communication session from the first wireless access point to the second wireless access point, the notification prompting the second wireless access point to retrieve communication settings information associated with the communication session. 16. The method as in claim 13, wherein retrieving neighbor information includes:
receiving the neighbor information in response to transmitting a query to the first wireless access point, the query requesting a list of valid wireless access points in which to perform the handoff. 17. The method as in claim 13, wherein the neighbor information indicates to the mobile communication device that the second wireless access point has been authenticated as being part of a service provider's wireless network in which the first wireless access point resides. 18. A system comprising:
computer processor hardware; and a hardware storage resource coupled to communicate with the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of:
receiving a notification indicating presence of the second wireless access point in the wireless network environment;
validating the second wireless access point for receiving handoffs from the first wireless access point; and
producing neighbor information associated with the first wireless access point to include an identity of the second wireless access point, the neighbor information indicating that the second wireless access point is a valid wireless access point in which to perform a handoff from the first wireless access point. 19. The computer system as in claim 18, wherein the first wireless access point is manufactured by a first vendor; and
wherein the second wireless access point is manufactured by a second vendor. 20. The computer system as in claim 18, wherein the computer processor hardware further performs operations of:
receiving the notification indicating the presence of the second wireless access point over a wireless medium from the second wireless access point, the notification broadcasted by the second wireless access point to indicate its presence in the wireless network environment. 21. The computer system as in claim 18, wherein the computer processor hardware further performs operations of:
receiving the notification from a mobile communication device that receives a beacon from the second wireless access point, the received beacon indicating presence of the second wireless access point in the wireless network. 22. The computer system as in claim 18, wherein validating the second wireless access point includes: performing authentication of the second wireless access point with a remote authentication server resource. 23. The computer system as in claim 22, wherein performing authentication of the second wireless access point includes:
obtaining a unique identifier value assigned to the first wireless access point; forwarding the unique identifier value to the authentication server resource; and receiving an authentication response from the authentication server resource, the authentication response indicating that the second wireless access point is part of a service provider's wireless network in which the first wireless access point resides. 24. The computer system as in claim 23, wherein producing the neighbor information further comprises:
in accordance with the authentication response, adding an identity of the second wireless access point to the neighbor information, addition of the identity of the second wireless access point to the neighbor information indicating that the second wireless access point is valid in which to perform a handoff from the first wireless access point. 25. The computer system as in claim 18, wherein the computer processor hardware further performs operations of:
providing notification of the neighbor information to a mobile communication device in communication with the first wireless access point via a corresponding communication session. 26. The computer system as in claim 25, wherein the computer processor hardware further performs operations of:
receiving a handoff request from the mobile communication device to perform a handoff of the communication session from the first wireless access point to the second wireless access point, the handoff request received from the mobile communication device through the second wireless access point. 27. The computer system as in claim 26, wherein the computer processor hardware further performs operations of:
to facilitate the handoff of the communication session from the first wireless access point to the second wireless access point, forwarding communication settings information associated with the communication session to the second wireless access point. 28. The computer system as in claim 18, wherein the first wireless access point resides in a first service provider's wireless network and the second wireless access point resides in a second service provider's wireless network, the first service provider and the second service provider partnering to provide shared used of content delivery services to a mobile communication device in communication with the first wireless access point via a corresponding communication session;
wherein authentication of the second wireless access point includes: in response to detecting that the second wireless access point resides outside of the first service provider's wireless network, communicating with an authentication resource operated by the second service provider to verify that the second wireless access point is a valid wireless access point from to handoff the corresponding communication session from the first wireless access point to the second wireless access point. 29. The computer system as in claim 28, wherein the computer processor hardware further performs operations of:
conveying communication settings information associated with the corresponding communication session to the second wireless access point to facilitate the handoff of the corresponding communication session from the first wireless access point to the second wireless access point. 30. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causing the computer processor hardware to perform operations of:
receiving a notification indicating presence of the second wireless access point in the wireless network environment; validating the second wireless access point for receiving handoffs from the first wireless access point; and producing neighbor information associated with the first wireless access point to include an identity of the second wireless access point, the neighbor information indicating that the second wireless access point is a valid wireless access point in which to perform a handoff from the first wireless access point. | 2,400 |
8,301 | 8,301 | 15,495,427 | 2,439 | A device may identify a plurality of files for a multi-file malware analysis. The device may execute the plurality of files in a malware testing environment. The device may monitor the malware testing environment for behavior indicative of malware. The device may detect the behavior indicative of malware. The device may perform a first multi-file malware analysis or a second multi-file malware analysis based on detecting the behavior indicative of malware. The first multi-file malware analysis may include a partitioning technique that partitions the plurality of files into two or more segments of files to identify a file, included in the plurality of files, that includes malware. The second multi-file malware analysis may include a scoring technique that modifies a plurality of malware scores, corresponding to the plurality of files, to identify the file, included in the plurality of files, that includes malware. | 1-20. (canceled) 21. A device, comprising:
one or more processors to:
execute a plurality of files in a testing environment,
the plurality of files being identified for a multi-file malware analysis, and
the plurality of files being associated with a respective plurality of malware scores;
monitor the testing environment to detect a behavior indicative of malware;
modify at least one malware score of the plurality of malware scores based on detecting the behavior indicative of malware,
the at least one malware score being associated with at least one file of the plurality of files;
determine that the at least one malware score satisfies a threshold; and
analyze the at least one file for a presence of malware based on determining that the at least one malware score satisfies the threshold. 22. The device of claim 21, where the at least one malware score includes at least one malware counter, and
where the one or more processors, when modifying the at least one malware score, are to:
increment the at least one malware counter based on detecting the behavior indicative of malware. 23. The device of claim 21, where the one or more processors, prior to executing the plurality of files in the testing environment, are to:
initialize each of the plurality of malware scores based on a likelihood that each respective file of the plurality of files includes malware. 24. The device of claim 21, where the one or more processors, when determining that the at least one malware score satisfies the threshold, are to:
determine that a set of malware scores, associated with a set of files of the plurality of files, satisfies the threshold,
the set of malware scores including the at least one malware score, and
the set of files including the at least one file; and
where the one or more processors, when analyzing the at least one file for the presence of malware, are to:
analyze the set of files for the presence of malware as a group. 25. The device of claim 24, where the one or more processors, when analyzing the set of files for the presence of malware, are to:
analyze the set of files for the presence of malware using a partitioning technique. 26. The device of claim 21, where the one or more processors are further to:
identify another group of files,
the other group of files including the at least one file; and
analyze the other group of files for malware. 27. The device of claim 26, where the one or more processors, when identifying the other group of files, is to:
determine a size for the other group of files based on at least one of:
a likelihood of the other group of files including a file that is malware, or
a likelihood of the testing environment detecting malware in the other group of files. 28. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to:
execute a plurality of files in a testing environment,
the plurality of files being identified for a multi-file malware analysis, and
the plurality of files being associated with a respective plurality of malware scores;
monitor the testing environment to detect a behavior indicative of malware;
modify at least one malware score of the plurality of malware scores based on detecting the behavior indicative of malware,
the at least one malware score being associated with at least one file of the plurality of files;
determine that the at least one malware score satisfies a threshold; and
analyze the at least one file for a presence of malware based on determining that the at least one malware score satisfies the threshold. 29. The non-transitory computer-readable medium of claim 28, where the at least one malware score includes at least one malware counter, and
where the one or more instructions, that cause the one or more processors to modify the at least one malware score, cause the one or more processors to:
increment the at least one malware counter based on detecting the behavior indicative of malware. 30. The non-transitory computer-readable medium of claim 28, where the one or more instructions, prior to causing the one or more processors to execute the plurality of files in the testing environment, cause the one or more processors to:
initialize each of the plurality of malware scores based on a likelihood that each respective file of the plurality of files includes malware. 31. The non-transitory computer-readable medium of claim 28, where the one or more instructions, that cause the one or more processors to determine that the at least one malware score satisfies the threshold, cause the one or more processors to:
determine that a set of malware scores, associated with a set of files of the plurality of files, satisfies the threshold,
the set of malware scores including the at least one malware score, and
the set of files including the at least one file; and
where the one or more instructions, that cause the one or more processors to analyze the at least one file for the presence of malware, cause the one or more processors to:
analyze the set of files for the presence of malware as a group. 32. The non-transitory computer-readable medium of claim 31, where the one or more instructions, that cause the one or more processors to analyze the set of files for the presence of malware, cause the one or more processors to:
analyze the set of files for the presence of malware using a partitioning technique. 33. The non-transitory computer-readable medium of claim 28, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to:
identify another group of files,
the other group of files including the at least one file; and
analyze the other group of files for malware. 34. The non-transitory computer-readable medium of claim 33, where the one or more instructions, that cause the one or more processors to identify the other group of files, cause the one or more processors to:
determine a size for the other group of files based on at least one of:
a likelihood of the other group of files including a file that is malware, or
a likelihood of the testing environment detecting malware in the other group of files. 35. A method, comprising:
executing, by a device, a plurality of files in a testing environment,
the plurality of files being identified for a multi-file malware analysis, and
the plurality of files being associated with a respective plurality of malware scores;
monitoring, by the device, the testing environment to detect a behavior indicative of malware; modifying, by the device, at least one malware score of the plurality of malware scores based on detecting the behavior indicative of malware,
the at least one malware score being associated with at least one file of the plurality of files;
determining, by the device, that the at least one malware score satisfies a threshold; and analyzing, by the device, the at least one file for a presence of malware based on determining that the at least one malware score satisfies the threshold. 36. The method of claim 35, where the at least one malware score includes at least one malware counter, and
where modifying the at least one malware score comprises:
incrementing the at least one malware counter based on detecting the behavior indicative of malware. 37. The method of claim 35, where, prior to executing the plurality of files in the testing environment, the method comprises:
initializing each of the plurality of malware scores based on a likelihood that each respective file of the plurality of files includes malware. 38. The method of claim 35, where determining that the at least one malware score satisfies the threshold comprises:
determining that a set of malware scores, associated with a set of files of the plurality of files, satisfies the threshold,
the set of malware scores including the at least one malware score, and
the set of files including the at least one file; and
where analyzing the at least one file for the presence of malware comprises:
analyzing the set of files for the presence of malware as a group. 39. The method of claim 38, where analyzing the set of files for the presence of malware comprises:
analyzing the set of files for the presence of malware using a partitioning technique. 40. The method of claim 35, further comprising:
identifying another group of files,
the other group of files including the at least one file; and
analyzing the other group of files for malware. | A device may identify a plurality of files for a multi-file malware analysis. The device may execute the plurality of files in a malware testing environment. The device may monitor the malware testing environment for behavior indicative of malware. The device may detect the behavior indicative of malware. The device may perform a first multi-file malware analysis or a second multi-file malware analysis based on detecting the behavior indicative of malware. The first multi-file malware analysis may include a partitioning technique that partitions the plurality of files into two or more segments of files to identify a file, included in the plurality of files, that includes malware. The second multi-file malware analysis may include a scoring technique that modifies a plurality of malware scores, corresponding to the plurality of files, to identify the file, included in the plurality of files, that includes malware.1-20. (canceled) 21. A device, comprising:
one or more processors to:
execute a plurality of files in a testing environment,
the plurality of files being identified for a multi-file malware analysis, and
the plurality of files being associated with a respective plurality of malware scores;
monitor the testing environment to detect a behavior indicative of malware;
modify at least one malware score of the plurality of malware scores based on detecting the behavior indicative of malware,
the at least one malware score being associated with at least one file of the plurality of files;
determine that the at least one malware score satisfies a threshold; and
analyze the at least one file for a presence of malware based on determining that the at least one malware score satisfies the threshold. 22. The device of claim 21, where the at least one malware score includes at least one malware counter, and
where the one or more processors, when modifying the at least one malware score, are to:
increment the at least one malware counter based on detecting the behavior indicative of malware. 23. The device of claim 21, where the one or more processors, prior to executing the plurality of files in the testing environment, are to:
initialize each of the plurality of malware scores based on a likelihood that each respective file of the plurality of files includes malware. 24. The device of claim 21, where the one or more processors, when determining that the at least one malware score satisfies the threshold, are to:
determine that a set of malware scores, associated with a set of files of the plurality of files, satisfies the threshold,
the set of malware scores including the at least one malware score, and
the set of files including the at least one file; and
where the one or more processors, when analyzing the at least one file for the presence of malware, are to:
analyze the set of files for the presence of malware as a group. 25. The device of claim 24, where the one or more processors, when analyzing the set of files for the presence of malware, are to:
analyze the set of files for the presence of malware using a partitioning technique. 26. The device of claim 21, where the one or more processors are further to:
identify another group of files,
the other group of files including the at least one file; and
analyze the other group of files for malware. 27. The device of claim 26, where the one or more processors, when identifying the other group of files, is to:
determine a size for the other group of files based on at least one of:
a likelihood of the other group of files including a file that is malware, or
a likelihood of the testing environment detecting malware in the other group of files. 28. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to:
execute a plurality of files in a testing environment,
the plurality of files being identified for a multi-file malware analysis, and
the plurality of files being associated with a respective plurality of malware scores;
monitor the testing environment to detect a behavior indicative of malware;
modify at least one malware score of the plurality of malware scores based on detecting the behavior indicative of malware,
the at least one malware score being associated with at least one file of the plurality of files;
determine that the at least one malware score satisfies a threshold; and
analyze the at least one file for a presence of malware based on determining that the at least one malware score satisfies the threshold. 29. The non-transitory computer-readable medium of claim 28, where the at least one malware score includes at least one malware counter, and
where the one or more instructions, that cause the one or more processors to modify the at least one malware score, cause the one or more processors to:
increment the at least one malware counter based on detecting the behavior indicative of malware. 30. The non-transitory computer-readable medium of claim 28, where the one or more instructions, prior to causing the one or more processors to execute the plurality of files in the testing environment, cause the one or more processors to:
initialize each of the plurality of malware scores based on a likelihood that each respective file of the plurality of files includes malware. 31. The non-transitory computer-readable medium of claim 28, where the one or more instructions, that cause the one or more processors to determine that the at least one malware score satisfies the threshold, cause the one or more processors to:
determine that a set of malware scores, associated with a set of files of the plurality of files, satisfies the threshold,
the set of malware scores including the at least one malware score, and
the set of files including the at least one file; and
where the one or more instructions, that cause the one or more processors to analyze the at least one file for the presence of malware, cause the one or more processors to:
analyze the set of files for the presence of malware as a group. 32. The non-transitory computer-readable medium of claim 31, where the one or more instructions, that cause the one or more processors to analyze the set of files for the presence of malware, cause the one or more processors to:
analyze the set of files for the presence of malware using a partitioning technique. 33. The non-transitory computer-readable medium of claim 28, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to:
identify another group of files,
the other group of files including the at least one file; and
analyze the other group of files for malware. 34. The non-transitory computer-readable medium of claim 33, where the one or more instructions, that cause the one or more processors to identify the other group of files, cause the one or more processors to:
determine a size for the other group of files based on at least one of:
a likelihood of the other group of files including a file that is malware, or
a likelihood of the testing environment detecting malware in the other group of files. 35. A method, comprising:
executing, by a device, a plurality of files in a testing environment,
the plurality of files being identified for a multi-file malware analysis, and
the plurality of files being associated with a respective plurality of malware scores;
monitoring, by the device, the testing environment to detect a behavior indicative of malware; modifying, by the device, at least one malware score of the plurality of malware scores based on detecting the behavior indicative of malware,
the at least one malware score being associated with at least one file of the plurality of files;
determining, by the device, that the at least one malware score satisfies a threshold; and analyzing, by the device, the at least one file for a presence of malware based on determining that the at least one malware score satisfies the threshold. 36. The method of claim 35, where the at least one malware score includes at least one malware counter, and
where modifying the at least one malware score comprises:
incrementing the at least one malware counter based on detecting the behavior indicative of malware. 37. The method of claim 35, where, prior to executing the plurality of files in the testing environment, the method comprises:
initializing each of the plurality of malware scores based on a likelihood that each respective file of the plurality of files includes malware. 38. The method of claim 35, where determining that the at least one malware score satisfies the threshold comprises:
determining that a set of malware scores, associated with a set of files of the plurality of files, satisfies the threshold,
the set of malware scores including the at least one malware score, and
the set of files including the at least one file; and
where analyzing the at least one file for the presence of malware comprises:
analyzing the set of files for the presence of malware as a group. 39. The method of claim 38, where analyzing the set of files for the presence of malware comprises:
analyzing the set of files for the presence of malware using a partitioning technique. 40. The method of claim 35, further comprising:
identifying another group of files,
the other group of files including the at least one file; and
analyzing the other group of files for malware. | 2,400 |
8,302 | 8,302 | 15,069,600 | 2,439 | Disclosed are various embodiments for generating a physics-based CAPTCHA. In a physics-based CAPTCHA, an object is placed within a scene so that a visually observable change occurs to the object. The scene is animated so that the visually observable change occurs to the object. Before and after imagery can be captured and used as a challenge and a response. Incorrect responses can be generated by altering the scene or object. | 1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein when executed the program causes the at least one computing device to at least:
generate a three-dimensional (3D) scene having an object using a physics engine, the physics engine configured to simulate interactions of the object with an environment within the 3D scene; place the object in the 3D scene so that a visually observable change occurs to the object based upon the interactions of the object with the environment within the 3D scene; generate a first image of the 3D scene representing the object within the 3D scene before the visually observable change; simulate the visually observable change to the object within the 3D scene; generate a second image of the 3D scene representing the object within the 3D scene after the visually observable change; present the first image of the 3D scene to a user in a user interface; present the second image along with a plurality of other images, wherein the plurality of other images represent the object represented in the 3D scene after a respective visually observable change that is inconsistent with a physics model implemented by the physics engine; obtain a selection of one of the second image or one of the plurality of other images; and grant access to a resource when the selection corresponds to the second image. 2. The non-transitory computer-readable medium of claim 1, wherein when executed the program further causes the at least one computing device to deny access to the resource when the selection corresponds to one of the plurality of other images. 3. The non-transitory computer-readable medium of claim 1, wherein when executed the program further causes the at least one computing device to at least:
generate at least one other image of the 3D scene representing the object after another visually observable change, wherein the other visually observable scene is consistent with the physics model; and grant access to the resource when the selection corresponds to the second image and the at least one other image. 4. The non-transitory computer-readable medium of claim 1, wherein when executed the program further causes the at least one computing device to at least generate a determination that the selection was made by a human user in response to the selection corresponding to the second image. 5. A system, comprising:
at least one computing device; and at least one application executed in the at least one computing device, wherein when executed the at least one application causes the at least one computing device to at least:
generate a three-dimensional (3D) scene using a physics engine in which an object is placed, the physics engine configured to simulate interactions of the object with an environment of the 3D scene, wherein the object is placed in a location within the 3D scene at which an observable change can occur in response to interactions with the environment;
generate a first image of the 3D scene representing the object prior to the observable change;
generate a second image of the 3D scene representing the object after the observable change;
generate at least one other image representing the object inconsistent with the physics engine; and
granting or denying access to a resource based upon a selection of the second image or the at least one other image. 6. The system of claim 5, wherein the observable change is consistent with a physics model associated with the physics engine. 7. The system of claim 5, wherein the at least one other image is generated by:
modifying a physical property associated with the object within the scene; and simulating an effect of the modified physical property on the object. 8. The system of claim 7, wherein the physical property is modified by reducing a simulated gravity effect associated with the physics model. 9. The system of claim 7, wherein the physical property is modified by modifying at least one of a friction property, a viscosity property, an elasticity property, or a density property associated with the object. 10. The system of claim 5, wherein the at least one other image is generated by modifying a positional coordinate associated with the object after the observable change. 11. The system of claim 10, wherein modifying the positional coordinate further comprises altering a position of the object such that the position is inconsistent with an effect of the environment on the object according to the physics engine. 12. The system of claim 5, wherein the environment comprises a plurality of other objects affecting a motion of the object through the 3D scene. 13. The system of claim 5, wherein access to the resource is granted or denied by:
generating a first user interface comprising the first image, the first user interface including a question associated with the 3D scene; and generating a second user interface comprising the second image and at least one other image, the second user interface facilitating user selection of the second image or the at least one other image. 14. A method, comprising:
generating, via at least one computing device, a user interface comprising a challenge, the challenge comprising a first image associated with a scene in which an object is placed; generating, via the at least one computing device, a correct response associated with the scene and at least one incorrect response associated with the scene, wherein the correct response comprises a second image associated after an observable change to the object within the scene and the at least one incorrect response comprises at least one respective image after a respective incorrect observable change to the object within the scene; and determining, via the at least one computing device, whether to grant access to a resource based a selection of one of the correct response or the at least one incorrect response. 15. The method of claim 14, wherein the observable change to the object is determined based upon a physics model associated with the scene. 16. The method of claim 15, wherein the respective incorrect observable change to the object is generated by altering the object in a manner that is inconsistent with the physics model. 17. The method of claim 15, wherein the respective incorrect observable change to the object is generated by modifying a gravity property associated with the physics model and determining a position of the object using the modified gravity property. 18. The method of claim 15, wherein the respective incorrect observable change to the object is generated by modifying a coordinate associated with the object in a manger that is inconsistent with the physics model. 19. The method of claim 14, wherein the respective incorrect observable change comprises rotating the object within the scene. 20. The method of claim 14, wherein the scene comprises a plurality of objects and the second image comprises plurality of observable changes to the plurality of objects. 21. The method of claim 14, wherein the respective incorrect observable change to the object is generated by transposing the object with another object that is within the scene. | Disclosed are various embodiments for generating a physics-based CAPTCHA. In a physics-based CAPTCHA, an object is placed within a scene so that a visually observable change occurs to the object. The scene is animated so that the visually observable change occurs to the object. Before and after imagery can be captured and used as a challenge and a response. Incorrect responses can be generated by altering the scene or object.1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein when executed the program causes the at least one computing device to at least:
generate a three-dimensional (3D) scene having an object using a physics engine, the physics engine configured to simulate interactions of the object with an environment within the 3D scene; place the object in the 3D scene so that a visually observable change occurs to the object based upon the interactions of the object with the environment within the 3D scene; generate a first image of the 3D scene representing the object within the 3D scene before the visually observable change; simulate the visually observable change to the object within the 3D scene; generate a second image of the 3D scene representing the object within the 3D scene after the visually observable change; present the first image of the 3D scene to a user in a user interface; present the second image along with a plurality of other images, wherein the plurality of other images represent the object represented in the 3D scene after a respective visually observable change that is inconsistent with a physics model implemented by the physics engine; obtain a selection of one of the second image or one of the plurality of other images; and grant access to a resource when the selection corresponds to the second image. 2. The non-transitory computer-readable medium of claim 1, wherein when executed the program further causes the at least one computing device to deny access to the resource when the selection corresponds to one of the plurality of other images. 3. The non-transitory computer-readable medium of claim 1, wherein when executed the program further causes the at least one computing device to at least:
generate at least one other image of the 3D scene representing the object after another visually observable change, wherein the other visually observable scene is consistent with the physics model; and grant access to the resource when the selection corresponds to the second image and the at least one other image. 4. The non-transitory computer-readable medium of claim 1, wherein when executed the program further causes the at least one computing device to at least generate a determination that the selection was made by a human user in response to the selection corresponding to the second image. 5. A system, comprising:
at least one computing device; and at least one application executed in the at least one computing device, wherein when executed the at least one application causes the at least one computing device to at least:
generate a three-dimensional (3D) scene using a physics engine in which an object is placed, the physics engine configured to simulate interactions of the object with an environment of the 3D scene, wherein the object is placed in a location within the 3D scene at which an observable change can occur in response to interactions with the environment;
generate a first image of the 3D scene representing the object prior to the observable change;
generate a second image of the 3D scene representing the object after the observable change;
generate at least one other image representing the object inconsistent with the physics engine; and
granting or denying access to a resource based upon a selection of the second image or the at least one other image. 6. The system of claim 5, wherein the observable change is consistent with a physics model associated with the physics engine. 7. The system of claim 5, wherein the at least one other image is generated by:
modifying a physical property associated with the object within the scene; and simulating an effect of the modified physical property on the object. 8. The system of claim 7, wherein the physical property is modified by reducing a simulated gravity effect associated with the physics model. 9. The system of claim 7, wherein the physical property is modified by modifying at least one of a friction property, a viscosity property, an elasticity property, or a density property associated with the object. 10. The system of claim 5, wherein the at least one other image is generated by modifying a positional coordinate associated with the object after the observable change. 11. The system of claim 10, wherein modifying the positional coordinate further comprises altering a position of the object such that the position is inconsistent with an effect of the environment on the object according to the physics engine. 12. The system of claim 5, wherein the environment comprises a plurality of other objects affecting a motion of the object through the 3D scene. 13. The system of claim 5, wherein access to the resource is granted or denied by:
generating a first user interface comprising the first image, the first user interface including a question associated with the 3D scene; and generating a second user interface comprising the second image and at least one other image, the second user interface facilitating user selection of the second image or the at least one other image. 14. A method, comprising:
generating, via at least one computing device, a user interface comprising a challenge, the challenge comprising a first image associated with a scene in which an object is placed; generating, via the at least one computing device, a correct response associated with the scene and at least one incorrect response associated with the scene, wherein the correct response comprises a second image associated after an observable change to the object within the scene and the at least one incorrect response comprises at least one respective image after a respective incorrect observable change to the object within the scene; and determining, via the at least one computing device, whether to grant access to a resource based a selection of one of the correct response or the at least one incorrect response. 15. The method of claim 14, wherein the observable change to the object is determined based upon a physics model associated with the scene. 16. The method of claim 15, wherein the respective incorrect observable change to the object is generated by altering the object in a manner that is inconsistent with the physics model. 17. The method of claim 15, wherein the respective incorrect observable change to the object is generated by modifying a gravity property associated with the physics model and determining a position of the object using the modified gravity property. 18. The method of claim 15, wherein the respective incorrect observable change to the object is generated by modifying a coordinate associated with the object in a manger that is inconsistent with the physics model. 19. The method of claim 14, wherein the respective incorrect observable change comprises rotating the object within the scene. 20. The method of claim 14, wherein the scene comprises a plurality of objects and the second image comprises plurality of observable changes to the plurality of objects. 21. The method of claim 14, wherein the respective incorrect observable change to the object is generated by transposing the object with another object that is within the scene. | 2,400 |
8,303 | 8,303 | 15,342,912 | 2,488 | In general, techniques are described that facilitate processing of a depth map image in mobile devices. A mobile device comprising a depth camera, a camera and a processor may be configured to perform various aspects of the techniques. The depth camera may be configured to capture a depth map image of a scene. The camera may include a linear polarization unit configured to linearly polarize light entering into the camera. The camera may be configured to rotate the linearly polarization unit during capture of the scene to generate a sequence of linearly polarized images of the scene having different polarization orientations. The processor may be configured to perform image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images, and generate an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. | 1. A mobile device configured to process a depth map image, the mobile device comprising:
a depth camera configured to capture a depth map image of a scene; a camera including a linear polarization unit configured to linearly polarize light entering into the camera, the camera configured to rotate the linearly polarization unit during capture of the scene to generate a sequence of linearly polarized images of the scene having different polarization orientations; and a processor configured to:
perform image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and
generate an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. 2. The mobile device of claim 1,
wherein the processor is further configured to determine the polarization orientation of each of the sequence of linearly polarized images, and wherein the processor is configured to generate the enhanced depth map image based on the depth map image, the sequence of aligned linearly polarized images, and the determined polarization orientations. 3. The mobile device of claim 2, wherein the camera is further configured to synchronize rotation of the linear polarization unit and the capture of the sequence of linearly polarized images such that the difference in polarization orientations between successive linearly polarized images is fixed, and
wherein the processor is configured to determine the polarization orientation of each of the sequence of linearly polarized images as a fixed polarization orientation for each of the sequence of linearly polarized images. 4. The mobile device of claim 2, wherein the processor is configured to determine the polarization orientation of each of the sequence of linearly polarized images as a function of an extent of rotation of the linear polarization unit at a time of the capture of each of the sequence of linearly polarized images. 5. The mobile device of claim 1, further comprising one or more sensors configured to generate sensor data representative of one or more of movement, orientation, and location of the mobile device,
wherein the processor is configured to perform the image registration with respect to the sequence of linearly polarized images based on the sensor data to generate the sequence of aligned linearly polarized images. 6. The mobile device of claim 1, wherein the camera includes a motor configured to rotate the linear polarization unit. 7. The mobile device of claim 1, wherein the linear polarization unit comprises one of a linearly polarized lens or a linearly polarized filter. 8. The mobile device of claim 1, wherein the processor is configured to:
perform the image registration with respect to the sequence of linearly polarized images and the depth map image to generate a sequence of aligned linearly polarized images and an aligned depth map image; and generate the enhanced depth map image based on the aligned depth map image and the sequence of aligned linearly polarized images. 9. The mobile device of claim 1, wherein the processor is further configured to construct a three-dimensional model of at least one aspect of the scene based on the enhanced depth map image. 10. A method of processing a depth map image, the method comprising:
capturing, by a depth camera, a depth map image of a scene; rotating a linear polarization unit during capture of the scene by a color camera to generate a sequence of linearly polarized images of the scene having different polarization orientations; performing image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and generating an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. 11. The method of claim 10, further comprising determining the polarization orientation of each of the sequence of linearly polarized images, and
wherein generating the enhanced depth map image comprises generating the enhanced depth map image based on the depth map image, the sequence of aligned linearly polarized images, and the determined polarization orientations. 12. The method of claim 11, further comprising synchronizing rotation of the linear polarization unit and the capture of the sequence of linearly polarized images such that the difference in polarization orientations between successive linearly polarized images is fixed, and
wherein determining the polarization orientation comprises determining the polarization orientation of each of the sequence of linearly polarized images as a fixed polarization orientation for each of the sequence of linearly polarized images. 13. The method of claim 11, wherein determining the polarization orientation comprises determining the polarization orientation of each of the sequence of linearly polarized images as a function of an extent of rotation of the linear polarization unit at a time of the capture of each of the sequence of linearly polarized images. 14. The method of claim 10, further comprising obtaining sensor data representative of one or more of movement, orientation, and location of the mobile device,
wherein performing the image registration comprises performing the image registration with respect to the sequence of linearly polarized images based on the sensor data to generate the sequence of aligned linearly polarized images. 15. The method of claim 10, further comprising rotating the linear polarization unit. 16. The method of claim 10, wherein the linear polarization unit comprises one of a linearly polarized lens or a linearly polarized filter. 17. The method of claim 10,
wherein performing the image registration comprises performing the image registration with respect to the sequence of linearly polarized images and the depth map image to generate a sequence of aligned linearly polarized images and an aligned depth map image, and wherein generating the enhanced depth map comprises generating the enhanced depth map image based on the aligned depth map image and the sequence of aligned linearly polarized images. 18. The method of claim 10, further comprising constructing a three-dimensional model of at least one aspect of the scene based on the enhanced depth map image. 19. A device configured to process a depth map image, the device comprising:
means for capturing a depth map image of a scene; means for capturing a sequence of linearly polarized images of the scene having different polarization orientations; means for performing image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and means for generating an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. 20. The device of claim 19, further comprising means for determining the polarization orientation of each of the sequence of linearly polarized images, and
wherein the means for generating the enhanced depth map image comprises means for generating the enhanced depth map image based on the depth map image, the sequence of aligned linearly polarized images, and the determined polarization orientations. 21. The device of claim 20, further comprising means for synchronizing rotation of the linear polarization unit and the capture of the sequence of linearly polarized images such that the difference in polarization orientations between successive linearly polarized images is fixed, and
wherein the means for determining the polarization orientation comprises means for determining the polarization orientation of each of the sequence of linearly polarized images as a fixed polarization orientation for each of the sequence of linearly polarized images. 22. The device of claim 20, wherein the means for determining the polarization orientation comprises means for determining the polarization orientation of each of the sequence of linearly polarized images as a function of an extent of rotation of the linear polarization unit at a time of the capture of each of the sequence of linearly polarized images. 23. The device of claim 19, further comprising means for obtaining sensor data representative of one or more of movement, orientation, and location of the mobile device,
wherein the means for performing the image registration comprises means for performing the image registration with respect to the sequence of linearly polarized images based on the sensor data to generate the sequence of aligned linearly polarized images. 24. The device of claim 19, further comprising means for rotating the linear polarization unit. 25. The device of claim 19, wherein the linear polarization unit comprises one of a linearly polarized lens or a linearly polarized filter. 26. The device of claim 19,
wherein the means for performing the image registration comprises means for performing the image registration with respect to the sequence of linearly polarized images and the depth map image to generate a sequence of aligned linearly polarized images and an aligned depth map image, and wherein the means for generating the enhanced depth map comprises means for generating the enhanced depth map image based on the aligned depth map image and the sequence of aligned linearly polarized images. 27. The device of claim 19, further comprising means for constructing a three-dimensional model of at least one aspect of the scene based on the enhanced depth map image. 28. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause one or more processors of a mobile device to:
interface with a depth camera to capture of a depth map image of a scene; interface with a color camera to capture a sequence of linearly polarized images of the scene having different polarization orientations; perform image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and generate an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. | In general, techniques are described that facilitate processing of a depth map image in mobile devices. A mobile device comprising a depth camera, a camera and a processor may be configured to perform various aspects of the techniques. The depth camera may be configured to capture a depth map image of a scene. The camera may include a linear polarization unit configured to linearly polarize light entering into the camera. The camera may be configured to rotate the linearly polarization unit during capture of the scene to generate a sequence of linearly polarized images of the scene having different polarization orientations. The processor may be configured to perform image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images, and generate an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images.1. A mobile device configured to process a depth map image, the mobile device comprising:
a depth camera configured to capture a depth map image of a scene; a camera including a linear polarization unit configured to linearly polarize light entering into the camera, the camera configured to rotate the linearly polarization unit during capture of the scene to generate a sequence of linearly polarized images of the scene having different polarization orientations; and a processor configured to:
perform image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and
generate an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. 2. The mobile device of claim 1,
wherein the processor is further configured to determine the polarization orientation of each of the sequence of linearly polarized images, and wherein the processor is configured to generate the enhanced depth map image based on the depth map image, the sequence of aligned linearly polarized images, and the determined polarization orientations. 3. The mobile device of claim 2, wherein the camera is further configured to synchronize rotation of the linear polarization unit and the capture of the sequence of linearly polarized images such that the difference in polarization orientations between successive linearly polarized images is fixed, and
wherein the processor is configured to determine the polarization orientation of each of the sequence of linearly polarized images as a fixed polarization orientation for each of the sequence of linearly polarized images. 4. The mobile device of claim 2, wherein the processor is configured to determine the polarization orientation of each of the sequence of linearly polarized images as a function of an extent of rotation of the linear polarization unit at a time of the capture of each of the sequence of linearly polarized images. 5. The mobile device of claim 1, further comprising one or more sensors configured to generate sensor data representative of one or more of movement, orientation, and location of the mobile device,
wherein the processor is configured to perform the image registration with respect to the sequence of linearly polarized images based on the sensor data to generate the sequence of aligned linearly polarized images. 6. The mobile device of claim 1, wherein the camera includes a motor configured to rotate the linear polarization unit. 7. The mobile device of claim 1, wherein the linear polarization unit comprises one of a linearly polarized lens or a linearly polarized filter. 8. The mobile device of claim 1, wherein the processor is configured to:
perform the image registration with respect to the sequence of linearly polarized images and the depth map image to generate a sequence of aligned linearly polarized images and an aligned depth map image; and generate the enhanced depth map image based on the aligned depth map image and the sequence of aligned linearly polarized images. 9. The mobile device of claim 1, wherein the processor is further configured to construct a three-dimensional model of at least one aspect of the scene based on the enhanced depth map image. 10. A method of processing a depth map image, the method comprising:
capturing, by a depth camera, a depth map image of a scene; rotating a linear polarization unit during capture of the scene by a color camera to generate a sequence of linearly polarized images of the scene having different polarization orientations; performing image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and generating an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. 11. The method of claim 10, further comprising determining the polarization orientation of each of the sequence of linearly polarized images, and
wherein generating the enhanced depth map image comprises generating the enhanced depth map image based on the depth map image, the sequence of aligned linearly polarized images, and the determined polarization orientations. 12. The method of claim 11, further comprising synchronizing rotation of the linear polarization unit and the capture of the sequence of linearly polarized images such that the difference in polarization orientations between successive linearly polarized images is fixed, and
wherein determining the polarization orientation comprises determining the polarization orientation of each of the sequence of linearly polarized images as a fixed polarization orientation for each of the sequence of linearly polarized images. 13. The method of claim 11, wherein determining the polarization orientation comprises determining the polarization orientation of each of the sequence of linearly polarized images as a function of an extent of rotation of the linear polarization unit at a time of the capture of each of the sequence of linearly polarized images. 14. The method of claim 10, further comprising obtaining sensor data representative of one or more of movement, orientation, and location of the mobile device,
wherein performing the image registration comprises performing the image registration with respect to the sequence of linearly polarized images based on the sensor data to generate the sequence of aligned linearly polarized images. 15. The method of claim 10, further comprising rotating the linear polarization unit. 16. The method of claim 10, wherein the linear polarization unit comprises one of a linearly polarized lens or a linearly polarized filter. 17. The method of claim 10,
wherein performing the image registration comprises performing the image registration with respect to the sequence of linearly polarized images and the depth map image to generate a sequence of aligned linearly polarized images and an aligned depth map image, and wherein generating the enhanced depth map comprises generating the enhanced depth map image based on the aligned depth map image and the sequence of aligned linearly polarized images. 18. The method of claim 10, further comprising constructing a three-dimensional model of at least one aspect of the scene based on the enhanced depth map image. 19. A device configured to process a depth map image, the device comprising:
means for capturing a depth map image of a scene; means for capturing a sequence of linearly polarized images of the scene having different polarization orientations; means for performing image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and means for generating an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. 20. The device of claim 19, further comprising means for determining the polarization orientation of each of the sequence of linearly polarized images, and
wherein the means for generating the enhanced depth map image comprises means for generating the enhanced depth map image based on the depth map image, the sequence of aligned linearly polarized images, and the determined polarization orientations. 21. The device of claim 20, further comprising means for synchronizing rotation of the linear polarization unit and the capture of the sequence of linearly polarized images such that the difference in polarization orientations between successive linearly polarized images is fixed, and
wherein the means for determining the polarization orientation comprises means for determining the polarization orientation of each of the sequence of linearly polarized images as a fixed polarization orientation for each of the sequence of linearly polarized images. 22. The device of claim 20, wherein the means for determining the polarization orientation comprises means for determining the polarization orientation of each of the sequence of linearly polarized images as a function of an extent of rotation of the linear polarization unit at a time of the capture of each of the sequence of linearly polarized images. 23. The device of claim 19, further comprising means for obtaining sensor data representative of one or more of movement, orientation, and location of the mobile device,
wherein the means for performing the image registration comprises means for performing the image registration with respect to the sequence of linearly polarized images based on the sensor data to generate the sequence of aligned linearly polarized images. 24. The device of claim 19, further comprising means for rotating the linear polarization unit. 25. The device of claim 19, wherein the linear polarization unit comprises one of a linearly polarized lens or a linearly polarized filter. 26. The device of claim 19,
wherein the means for performing the image registration comprises means for performing the image registration with respect to the sequence of linearly polarized images and the depth map image to generate a sequence of aligned linearly polarized images and an aligned depth map image, and wherein the means for generating the enhanced depth map comprises means for generating the enhanced depth map image based on the aligned depth map image and the sequence of aligned linearly polarized images. 27. The device of claim 19, further comprising means for constructing a three-dimensional model of at least one aspect of the scene based on the enhanced depth map image. 28. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause one or more processors of a mobile device to:
interface with a depth camera to capture of a depth map image of a scene; interface with a color camera to capture a sequence of linearly polarized images of the scene having different polarization orientations; perform image registration with respect to the sequence of linearly polarized images to generate a sequence of aligned linearly polarized images; and generate an enhanced depth map image based on the depth map image and the sequence of aligned linearly polarized images. | 2,400 |
8,304 | 8,304 | 14,789,086 | 2,486 | Systems, methods, and computer program products for tracking baggage using images. An image of a bag being checked-in may be captured and uploaded to a baggage tracking system. The system may store the image in a baggage tracking database, and associate the stored image with records identifying the bag and/or a travel itinerary for which the bag is being used. The system may characterize images in the database by identifying keypoints in the image, and extracting descriptors from the keypoints. In response to receiving an image of an unidentified bag from a user device, the baggage tracking system may compare descriptors extracted from the received image to descriptors extracted from images stored in the database. Stored images having a sufficient number of matching descriptors may be transmitted to the user device for display to a user. The user may view the images to confirm the identity of the unidentified bag. | 1. A system for baggage tracking, the system comprising:
one or more processors in communication with a first camera; and a memory coupled to the one or more processors, the memory storing data comprising a database and program code that, when executed by the one or more processors, causes the system to: receive a first request to check-in a first item of baggage; in response to receiving the first request, capture, with the first camera, a first image of the first item of baggage; and associate, in the database, the first image with a first record that identifies the first item of baggage. 2. The system of claim 1 wherein the program code further causes the system to:
receive, from a user device, a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
compare the second image with the first image; and
in response to the second image matching the first image, transmit the first image to the user device. 3. The system of claim 2 wherein the first item of baggage has a characteristic, the database stores a plurality of images that includes the first image, and the program code further causes the system to:
select one of the plurality of images;
determine if a corresponding item of baggage depicted by the selected image has the characteristic;
in response to the corresponding item of baggage having the characteristic, compare the second image with the selected image; and
in response to the corresponding item of baggage not having the characteristic, not compare the second image with the selected image. 4. The system of claim 2 wherein the program code further causes the system to:
receive, from the user device, a message that confirms the second item of baggage is the first item of baggage; and
in response to receiving the message, update a location of the first item of baggage to match the location of the second item of baggage. 5. The system of claim 1 wherein the program code further causes the system to:
identify a first plurality of keypoints in the first image;
extract a descriptor from each of the first plurality of keypoints; and
store each descriptor in the database. 6. The system of claim 1 wherein the database stores data indicating a location of the first item of baggage, and the program code further causes the system to:
receive a second image of a second item of baggage from a second camera;
determine the location of the second camera;
compare the second image with the first image; and
in response to the second image matching the first image, update the location of the first item of baggage based on the location of the second camera. 7. A method of baggage tracking, the method comprising:
receiving, at a server, a first request to check-in a first item of baggage; in response to receiving the first request, capturing, by a first camera in communication with the server, a first image of the first item of baggage; and associating, in a database in communication with the server, the first image with a first record that identifies the first item of baggage. 8. The method of claim 7 further comprising:
receiving, from a user device, a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
comparing the second image with the first image; and
in response to the second image matching the first image, transmitting the first image to the user device. 9. The method of claim 8 wherein the first item of baggage has a characteristic, the database stores a plurality of images that includes the first image, and further comprising:
selecting one of the plurality of images;
determining if a corresponding item of baggage depicted by the selected image has the characteristic;
in response to the corresponding item of baggage having the characteristic, comparing the second image with the selected image; and
in response to the corresponding item of baggage not having the characteristic, not comparing the second image with the selected image. 10. The method of claim 8 further comprising:
receiving, from the user device, a message that confirms the second item of baggage is the first item of baggage; and
in response to receiving the message, updating a location of the first item of baggage to match the location of the second item of baggage. 11. The method of claim 7 wherein the database stores a first plurality of images that includes the first image, and further comprising:
receiving, from a user device, a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
comparing the second image with the first plurality of images using a first matching algorithm;
in response to the first matching algorithm returning a first number of images less than a threshold, returning the first number of images to the user device; and
in response to the first matching algorithm returning a second number of images greater than the threshold, comparing the second image with the first plurality of images using a second matching algorithm more complex than the first matching algorithm. 12. The method of claim 7 further comprising:
identifying a first plurality of keypoints in the first image;
extracting a descriptor from each of the first plurality of keypoints to define a first plurality of descriptors; and
storing the first plurality of descriptors in the database. 13. The method of claim 12 further comprising:
receiving a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
identifying a second plurality of keypoints in the second image;
extracting the descriptor from each of the second plurality of keypoints to define a second plurality of descriptors;
determining a mathematical distance between each the first plurality of descriptors and each of the second plurality of descriptors;
defining a number of matching pairs of descriptors based on the mathematical distances; and
determining if there is a match between the first image and the second image based on the number of matching pairs. 14. The method of claim 7 wherein capturing the first image comprises:
determining a first orientation of the first item of baggage with respect to the first camera;
determining if the first orientation is suitable for capturing the first image; and
in response to the first orientation being suitable, activating the first camera to capture the first image. 15. The method of claim 14 further comprising:
in response to the first orientation being unsuitable, providing an indication that the first orientation is unsuitable. 16. The method of claim 15 wherein the indication comprises an instruction to reposition the first item of baggage relative to the first camera. 17. The method of claim 7 further comprising:
receiving a damaged bag report that includes an identifier of the first item of baggage and a second image of the first item of baggage;
querying the database for the first image using the identifier; and
displaying the first image and the second image on a user device. 18. The method of claim 7 further comprising:
receiving, at a user device, data indicative of a characteristic of the first item of baggage;
in response to receiving the data, displaying, on the user device, a prompt to capture the first image of the first item of baggage; and
in response to capturing the first image, transmitting the data and the first image to the database. 19. The method of claim 7 wherein the database stores data indicating a location of the first item of baggage, and further comprising:
receiving a second image of a second item of baggage from a second camera;
determining the location of the second camera;
comparing the second image with the first image; and
in response to the second image matching the first image, updating the location of the first item of baggage based on the location of the second camera. 20. A computer program product for baggage tracking, the computer program product comprising:
a non-transitory computer-readable storage medium; and program code stored on the non-transitory computer-readable storage medium that, when executed by one or more processors, causes the one or more processors to: receive a first request to check-in a first item of baggage; in response to receiving the first request, capture a first image of the first item of baggage; and associate, in a database, the first image with a first record that identifies the first item of baggage. | Systems, methods, and computer program products for tracking baggage using images. An image of a bag being checked-in may be captured and uploaded to a baggage tracking system. The system may store the image in a baggage tracking database, and associate the stored image with records identifying the bag and/or a travel itinerary for which the bag is being used. The system may characterize images in the database by identifying keypoints in the image, and extracting descriptors from the keypoints. In response to receiving an image of an unidentified bag from a user device, the baggage tracking system may compare descriptors extracted from the received image to descriptors extracted from images stored in the database. Stored images having a sufficient number of matching descriptors may be transmitted to the user device for display to a user. The user may view the images to confirm the identity of the unidentified bag.1. A system for baggage tracking, the system comprising:
one or more processors in communication with a first camera; and a memory coupled to the one or more processors, the memory storing data comprising a database and program code that, when executed by the one or more processors, causes the system to: receive a first request to check-in a first item of baggage; in response to receiving the first request, capture, with the first camera, a first image of the first item of baggage; and associate, in the database, the first image with a first record that identifies the first item of baggage. 2. The system of claim 1 wherein the program code further causes the system to:
receive, from a user device, a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
compare the second image with the first image; and
in response to the second image matching the first image, transmit the first image to the user device. 3. The system of claim 2 wherein the first item of baggage has a characteristic, the database stores a plurality of images that includes the first image, and the program code further causes the system to:
select one of the plurality of images;
determine if a corresponding item of baggage depicted by the selected image has the characteristic;
in response to the corresponding item of baggage having the characteristic, compare the second image with the selected image; and
in response to the corresponding item of baggage not having the characteristic, not compare the second image with the selected image. 4. The system of claim 2 wherein the program code further causes the system to:
receive, from the user device, a message that confirms the second item of baggage is the first item of baggage; and
in response to receiving the message, update a location of the first item of baggage to match the location of the second item of baggage. 5. The system of claim 1 wherein the program code further causes the system to:
identify a first plurality of keypoints in the first image;
extract a descriptor from each of the first plurality of keypoints; and
store each descriptor in the database. 6. The system of claim 1 wherein the database stores data indicating a location of the first item of baggage, and the program code further causes the system to:
receive a second image of a second item of baggage from a second camera;
determine the location of the second camera;
compare the second image with the first image; and
in response to the second image matching the first image, update the location of the first item of baggage based on the location of the second camera. 7. A method of baggage tracking, the method comprising:
receiving, at a server, a first request to check-in a first item of baggage; in response to receiving the first request, capturing, by a first camera in communication with the server, a first image of the first item of baggage; and associating, in a database in communication with the server, the first image with a first record that identifies the first item of baggage. 8. The method of claim 7 further comprising:
receiving, from a user device, a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
comparing the second image with the first image; and
in response to the second image matching the first image, transmitting the first image to the user device. 9. The method of claim 8 wherein the first item of baggage has a characteristic, the database stores a plurality of images that includes the first image, and further comprising:
selecting one of the plurality of images;
determining if a corresponding item of baggage depicted by the selected image has the characteristic;
in response to the corresponding item of baggage having the characteristic, comparing the second image with the selected image; and
in response to the corresponding item of baggage not having the characteristic, not comparing the second image with the selected image. 10. The method of claim 8 further comprising:
receiving, from the user device, a message that confirms the second item of baggage is the first item of baggage; and
in response to receiving the message, updating a location of the first item of baggage to match the location of the second item of baggage. 11. The method of claim 7 wherein the database stores a first plurality of images that includes the first image, and further comprising:
receiving, from a user device, a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
comparing the second image with the first plurality of images using a first matching algorithm;
in response to the first matching algorithm returning a first number of images less than a threshold, returning the first number of images to the user device; and
in response to the first matching algorithm returning a second number of images greater than the threshold, comparing the second image with the first plurality of images using a second matching algorithm more complex than the first matching algorithm. 12. The method of claim 7 further comprising:
identifying a first plurality of keypoints in the first image;
extracting a descriptor from each of the first plurality of keypoints to define a first plurality of descriptors; and
storing the first plurality of descriptors in the database. 13. The method of claim 12 further comprising:
receiving a second request to identify a second item of baggage, the second request including a second image of the second item of baggage;
identifying a second plurality of keypoints in the second image;
extracting the descriptor from each of the second plurality of keypoints to define a second plurality of descriptors;
determining a mathematical distance between each the first plurality of descriptors and each of the second plurality of descriptors;
defining a number of matching pairs of descriptors based on the mathematical distances; and
determining if there is a match between the first image and the second image based on the number of matching pairs. 14. The method of claim 7 wherein capturing the first image comprises:
determining a first orientation of the first item of baggage with respect to the first camera;
determining if the first orientation is suitable for capturing the first image; and
in response to the first orientation being suitable, activating the first camera to capture the first image. 15. The method of claim 14 further comprising:
in response to the first orientation being unsuitable, providing an indication that the first orientation is unsuitable. 16. The method of claim 15 wherein the indication comprises an instruction to reposition the first item of baggage relative to the first camera. 17. The method of claim 7 further comprising:
receiving a damaged bag report that includes an identifier of the first item of baggage and a second image of the first item of baggage;
querying the database for the first image using the identifier; and
displaying the first image and the second image on a user device. 18. The method of claim 7 further comprising:
receiving, at a user device, data indicative of a characteristic of the first item of baggage;
in response to receiving the data, displaying, on the user device, a prompt to capture the first image of the first item of baggage; and
in response to capturing the first image, transmitting the data and the first image to the database. 19. The method of claim 7 wherein the database stores data indicating a location of the first item of baggage, and further comprising:
receiving a second image of a second item of baggage from a second camera;
determining the location of the second camera;
comparing the second image with the first image; and
in response to the second image matching the first image, updating the location of the first item of baggage based on the location of the second camera. 20. A computer program product for baggage tracking, the computer program product comprising:
a non-transitory computer-readable storage medium; and program code stored on the non-transitory computer-readable storage medium that, when executed by one or more processors, causes the one or more processors to: receive a first request to check-in a first item of baggage; in response to receiving the first request, capture a first image of the first item of baggage; and associate, in a database, the first image with a first record that identifies the first item of baggage. | 2,400 |
8,305 | 8,305 | 14,763,190 | 2,439 | A system and method for displaying a number of real-time security events comprises a number of client devices and an administrator device communicatively coupled to the client devices. The administrator device may comprise a preferences module and an event rate adapter module communicatively coupled to the preferences module. The preferences module receives input describing how to display a number of security events on the screen of a graphical user interface the event rate adapter module displays a number of real-time scrolling security events for a relatively longer period of time than other security events. | 1. A system for adapting a display of real-time security events, comprising:
a number of client devices; and an administrator device communicatively coupled to the client devices, the administrator device comprising:
a preferences module; and
an event rate adapter module communicatively coupled to the preferences module;
in which the preferences module receives input describing how to display a number of security events on the screen of a graphical user interface; and in which the event rate adapter module displays a number of real-time scrolling security events until a user of the administrator device acknowledges the events. 2. The system of claim 1, in which the user acknowledges the security events by clicking on the security events and taking steps to address the security events. 3. The system of claim 1, in which the event rate adapter module displays a number of real-time scrolling security events for a relatively longer period of time than other security events based on the criticality of the security event. 4. The system of claim 3, in which the criticality of the of the security event is based on a rating of the security event and in which the input describing how to display a number of security events includes input describing what rating of events are displayed the screen of a graphical user interface until the user of the administrator device acknowledges the security events. 5. The system of claim 1, in which the event rate adapter module displays a scrolling list of relatively more critical security events and a scrolling list of relatively less critical security events and in which the display time of each of the relatively more critical security events and relatively less critical security is different. 6. A method of displaying a number of real-time security events, comprising:
receiving preferences from a preference module of a computer network administrator device; and scrolling security events associated with a number of client devices on the computer network across a graphical user interface leaving relatively more critical security events on the screen until a user of the administrator device acknowledges the relatively more critical security events. 7. The method of claim 6, in which the user acknowledges the security events by clicking on the security events and taking steps to address the security events. 8. The method of claim 6, in which receiving preferences from a preference module of a computer network administrator device further comprises receiving data defining the criticality of the number of security events. 9. The method of claim 8, in which the criticality of the of the security event is based on a rating of the security event and in which the preferences comprises input describing what rating of events are displayed the screen until the user of the administrator device acknowledges the security events. 10. The method of claim 8, in which the criticality of the number of security events determines the length of time that any of the number of security events remain viewable on the graphical user interface. 11. The method of claim 6, further comprising scrolling the list of relatively more critical security events while scrolling a list of relatively less critical security events. 12. A computer program product for displaying a number of real-time security events, the computer program product comprising:
a computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code comprising:
computer usable program code to, when executed by a processor, receive preferences from a preference module of a computer network administrator device; and
computer usable program code to, when executed by a processor,
scroll security events associated with a number of client devices on the computer network across a graphical user interface leaving relatively more critical security events on the screen for a relatively longer period of time. 13. The computer program product of claim 12, further comprising computer usable program code to, when executed by a processor, receive data defining the criticality of the number of security events. 14. The computer program product of claim 13, in which the criticality of the number of security events determines the length of time that any of the number of security events remain viewable on the graphical user interface. 15. The computer program product of claim 12, further comprising computer usable program code to, when executed by a processor, scroll the list of relatively more critical security events while scrolling list of relatively less critical security events. | A system and method for displaying a number of real-time security events comprises a number of client devices and an administrator device communicatively coupled to the client devices. The administrator device may comprise a preferences module and an event rate adapter module communicatively coupled to the preferences module. The preferences module receives input describing how to display a number of security events on the screen of a graphical user interface the event rate adapter module displays a number of real-time scrolling security events for a relatively longer period of time than other security events.1. A system for adapting a display of real-time security events, comprising:
a number of client devices; and an administrator device communicatively coupled to the client devices, the administrator device comprising:
a preferences module; and
an event rate adapter module communicatively coupled to the preferences module;
in which the preferences module receives input describing how to display a number of security events on the screen of a graphical user interface; and in which the event rate adapter module displays a number of real-time scrolling security events until a user of the administrator device acknowledges the events. 2. The system of claim 1, in which the user acknowledges the security events by clicking on the security events and taking steps to address the security events. 3. The system of claim 1, in which the event rate adapter module displays a number of real-time scrolling security events for a relatively longer period of time than other security events based on the criticality of the security event. 4. The system of claim 3, in which the criticality of the of the security event is based on a rating of the security event and in which the input describing how to display a number of security events includes input describing what rating of events are displayed the screen of a graphical user interface until the user of the administrator device acknowledges the security events. 5. The system of claim 1, in which the event rate adapter module displays a scrolling list of relatively more critical security events and a scrolling list of relatively less critical security events and in which the display time of each of the relatively more critical security events and relatively less critical security is different. 6. A method of displaying a number of real-time security events, comprising:
receiving preferences from a preference module of a computer network administrator device; and scrolling security events associated with a number of client devices on the computer network across a graphical user interface leaving relatively more critical security events on the screen until a user of the administrator device acknowledges the relatively more critical security events. 7. The method of claim 6, in which the user acknowledges the security events by clicking on the security events and taking steps to address the security events. 8. The method of claim 6, in which receiving preferences from a preference module of a computer network administrator device further comprises receiving data defining the criticality of the number of security events. 9. The method of claim 8, in which the criticality of the of the security event is based on a rating of the security event and in which the preferences comprises input describing what rating of events are displayed the screen until the user of the administrator device acknowledges the security events. 10. The method of claim 8, in which the criticality of the number of security events determines the length of time that any of the number of security events remain viewable on the graphical user interface. 11. The method of claim 6, further comprising scrolling the list of relatively more critical security events while scrolling a list of relatively less critical security events. 12. A computer program product for displaying a number of real-time security events, the computer program product comprising:
a computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code comprising:
computer usable program code to, when executed by a processor, receive preferences from a preference module of a computer network administrator device; and
computer usable program code to, when executed by a processor,
scroll security events associated with a number of client devices on the computer network across a graphical user interface leaving relatively more critical security events on the screen for a relatively longer period of time. 13. The computer program product of claim 12, further comprising computer usable program code to, when executed by a processor, receive data defining the criticality of the number of security events. 14. The computer program product of claim 13, in which the criticality of the number of security events determines the length of time that any of the number of security events remain viewable on the graphical user interface. 15. The computer program product of claim 12, further comprising computer usable program code to, when executed by a processor, scroll the list of relatively more critical security events while scrolling list of relatively less critical security events. | 2,400 |
8,306 | 8,306 | 15,322,322 | 2,434 | A medical apparatus control system with a simplified release of an operating function is provided. The medical apparatus control system comprises at least one mobile control unit ( 3 ), for at least one medical apparatus ( 2 ), having at least one radio receiving module ( 4 ) for detecting a forwarding radio signals, a control device ( 6 ) connected to the mobile control unit ( 3 ), and at least one separate mobile radio transmitting module ( 5 ) enabled to communicate with the radio receiving module ( 4 ). The at least one radio transmitting module ( 5 ) is configured to send an identification features to the radio receiving module ( 4 ), and the control device ( 6 ) is configured to compare the identification feature with stored identification features and to release an operating function of the mobile control unit ( 3 ) after a positive result of comparison. | 1. 1-15. (canceled) 16. A medical apparatus control system, comprising
at least one mobile control unit, for at least one medical apparatus, with at least one radio receiving module for detecting and forwarding radio signals, a control device connected to the mobile control unit, and at least one separate mobile radio transmitting module enabled to communicate with the radio receiving module, wherein the at least one radio transmitting module is configured to send an identification feature to the radio receiving module, and the control device is configured to compare the identification feature with the stored identification features, and to release an operating function of the mobile control unit after a positive result of comparison. 17. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are Bluetooth Low Energy modules. 18. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are ZigBee modules. 19. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are RFID modules. 20. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are WLAN modules. 21. The medical apparatus control system of claim 16, wherein the radio receiving module is adapted such that it detects a signal strength of the radio signal, and that it comprises a threshold for the signal strength, wherein only radio signals, the signal strength of which is above the threshold, are forwarded. 22. A method for operating a medical apparatus control system comprising
at least one radio transmitting module sending a signal having an identification feature, a radio receiving module receiving the signal and forwarding it to a control device, a control device comparing the identification feature with stored identification features, and the control device releasing the operating function of the mobile control unit if the result of comparison is positive. 23. The method of claim 22, wherein the medical apparatus control system reverses the release if the mobile control unit is not operated after a predefined period. 24. The method of claim 23, wherein a respective passcode is stored for the identification feature of each radio transmitting module, and the mobile control unit outputs a prompt corresponding to the identification feature, and releases the operating function of the mobile control unit if the appropriate passcode is additionally input. 25. The method of claim 22, wherein a respective passcode is stored for the identification feature of each radio transmitting module, and the mobile control unit outputs a prompt corresponding to the identification feature, and releases the operating function of the mobile control unit if the appropriate passcode is additionally input. 26. The method of claim 25, wherein the passcode comprises a graphic pattern that is input. 27. The method of claim 25, wherein inputting the passcode comprises performing a face recognition function. 28. The method of claim 25, wherein, if signals having the respective identification features of several radio transmitting modules are received by the radio receiving module, prompts corresponding to the identification features of all of the signals are output on the mobile control unit, and the operating function of the mobile control unit is released if anyone of the prompts is selected and the respective passcode is input. 29. The method of claim 28, wherein upon a first login at the medical apparatus control system, an expanded passcode being more extensive than the established passcode is input, the medical apparatus control system reverses the release after a predefined period in which the mobile control unit is not operated, and the expanded passcode replaces the prior passcode. 30. The method of claim 29, wherein upon a first login at the medical apparatus control system, an expanded passcode being more extensive than the established passcode is input, the medical apparatus control system reverses the release after a predefined period in which the mobile control unit is not operated, and the expanded passcode replaces the prior passcode. 31. The method of claim 30, with a medical apparatus control system, wherein the threshold is adjusted such that only the respective prompts of radio transmitting modules located within a predefined distance from the mobile control unit are shown. 32. The method of claim 31, wherein only an operating function assigned to the identification feature is released. 33. The method of claim 25, with a medical apparatus control system, wherein the threshold is adjusted such that only the respective prompts of radio transmitting modules located within a predefined distance from the mobile control unit are shown. 34. The method of claim 33, wherein only an operating function assigned to the identification feature is released. | A medical apparatus control system with a simplified release of an operating function is provided. The medical apparatus control system comprises at least one mobile control unit ( 3 ), for at least one medical apparatus ( 2 ), having at least one radio receiving module ( 4 ) for detecting a forwarding radio signals, a control device ( 6 ) connected to the mobile control unit ( 3 ), and at least one separate mobile radio transmitting module ( 5 ) enabled to communicate with the radio receiving module ( 4 ). The at least one radio transmitting module ( 5 ) is configured to send an identification features to the radio receiving module ( 4 ), and the control device ( 6 ) is configured to compare the identification feature with stored identification features and to release an operating function of the mobile control unit ( 3 ) after a positive result of comparison.1. 1-15. (canceled) 16. A medical apparatus control system, comprising
at least one mobile control unit, for at least one medical apparatus, with at least one radio receiving module for detecting and forwarding radio signals, a control device connected to the mobile control unit, and at least one separate mobile radio transmitting module enabled to communicate with the radio receiving module, wherein the at least one radio transmitting module is configured to send an identification feature to the radio receiving module, and the control device is configured to compare the identification feature with the stored identification features, and to release an operating function of the mobile control unit after a positive result of comparison. 17. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are Bluetooth Low Energy modules. 18. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are ZigBee modules. 19. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are RFID modules. 20. The medical apparatus control system of claim 16, wherein the radio receiving module and the radio transmitting module are WLAN modules. 21. The medical apparatus control system of claim 16, wherein the radio receiving module is adapted such that it detects a signal strength of the radio signal, and that it comprises a threshold for the signal strength, wherein only radio signals, the signal strength of which is above the threshold, are forwarded. 22. A method for operating a medical apparatus control system comprising
at least one radio transmitting module sending a signal having an identification feature, a radio receiving module receiving the signal and forwarding it to a control device, a control device comparing the identification feature with stored identification features, and the control device releasing the operating function of the mobile control unit if the result of comparison is positive. 23. The method of claim 22, wherein the medical apparatus control system reverses the release if the mobile control unit is not operated after a predefined period. 24. The method of claim 23, wherein a respective passcode is stored for the identification feature of each radio transmitting module, and the mobile control unit outputs a prompt corresponding to the identification feature, and releases the operating function of the mobile control unit if the appropriate passcode is additionally input. 25. The method of claim 22, wherein a respective passcode is stored for the identification feature of each radio transmitting module, and the mobile control unit outputs a prompt corresponding to the identification feature, and releases the operating function of the mobile control unit if the appropriate passcode is additionally input. 26. The method of claim 25, wherein the passcode comprises a graphic pattern that is input. 27. The method of claim 25, wherein inputting the passcode comprises performing a face recognition function. 28. The method of claim 25, wherein, if signals having the respective identification features of several radio transmitting modules are received by the radio receiving module, prompts corresponding to the identification features of all of the signals are output on the mobile control unit, and the operating function of the mobile control unit is released if anyone of the prompts is selected and the respective passcode is input. 29. The method of claim 28, wherein upon a first login at the medical apparatus control system, an expanded passcode being more extensive than the established passcode is input, the medical apparatus control system reverses the release after a predefined period in which the mobile control unit is not operated, and the expanded passcode replaces the prior passcode. 30. The method of claim 29, wherein upon a first login at the medical apparatus control system, an expanded passcode being more extensive than the established passcode is input, the medical apparatus control system reverses the release after a predefined period in which the mobile control unit is not operated, and the expanded passcode replaces the prior passcode. 31. The method of claim 30, with a medical apparatus control system, wherein the threshold is adjusted such that only the respective prompts of radio transmitting modules located within a predefined distance from the mobile control unit are shown. 32. The method of claim 31, wherein only an operating function assigned to the identification feature is released. 33. The method of claim 25, with a medical apparatus control system, wherein the threshold is adjusted such that only the respective prompts of radio transmitting modules located within a predefined distance from the mobile control unit are shown. 34. The method of claim 33, wherein only an operating function assigned to the identification feature is released. | 2,400 |
8,307 | 8,307 | 15,394,185 | 2,463 | An OFDMA system having a reduced overhead, particularly suitable for narrow bandwidth systems, in which uplink and downlink map messages have reduced length for efficiency. | 1. A computer-readable medium having stored thereon computer-readable instructions that when executed by a processor of a base station in an OFDMA system, cause the processor to:
transmit to remote stations in communication with the base station reduced-length downlink and uplink map messages, wherein the length of a header of said reduced-length uplink and downlink map message is no more than 16 bits. 2. The computer-readable medium of claim 1, wherein the reduced-length downlink map message includes a header consisting essentially of a length field and a header check sequence (HCS). 3. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a header consisting essentially of a first bit indication of an uplink header, a length field, and a header check sequence (HCS). 4. The computer-readable medium according to claim 1, wherein the reduced-length uplink and downlink map messages each include a cyclic redundancy check (CRC) field comprising no more than 8 bits. 5. The computer-readable medium according to claim 1, wherein the reduced-length downlink map message comprises one bandwidth allocation information element (IE) per modulation and forward error correction scheme (“FEC Code”) having no more than 8 bits, said bandwidth allocation IE identifying a two dimensional allocation by indicating the number of slots in the allocation. 6. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a data burst information element (IE), wherein the data burst IE consists essentially of a connection identifier (CID) having no more than 16 bits, an uplink interval usage code (UIUC) having no more than 4 bits, and a duration having no more than 10 bits. 7. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a CDMA allocation information element (IE), wherein the CDMA allocation IE consists essentially of an uplink interval usage code (UIUC) having no more than 4 bits, a duration having no more than 4 bits, a frame number index having no more than 4 bits, a ranging code having no more than 8 bits, and a bandwidth request mandatory indication code. 8. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a power control information element (IE), wherein the power control IE consists essentially of a connection identifier (CID) having no more than 16 bits, an uplink interval usage code (UIUC) having no more than 4 bits, and a power control field having no more than 8 bits. 9. The computer-readable medium according to claim 1, wherein the reduced-length downlink map includes a media access control (MAC) management message (MMM) consisting essentially of a frame number having no more than 16 bits. 10. The computer-readable medium according to claim 1, wherein the reduced-length uplink map does not include a media access control (MAC) management message (MMM). 11. An OFDMA system comprising:
a processor for use in a base station, said processor configured to:
transmit to remote stations in communication with the base station reduced-length downlink and uplink map messages,
wherein the length of a header of said reduced-length uplink and downlink map message is no more than 16 bits,
wherein the channel bandwidth for the OFDMA system is less than or equal to 1.25 MHz. 12. The OFDMA system of claim 11, wherein the per-frame bandwidth required for transmitting the reduced-length downlink and uplink map messages is less than or equal to approximately 10% of the channel bandwidth. | An OFDMA system having a reduced overhead, particularly suitable for narrow bandwidth systems, in which uplink and downlink map messages have reduced length for efficiency.1. A computer-readable medium having stored thereon computer-readable instructions that when executed by a processor of a base station in an OFDMA system, cause the processor to:
transmit to remote stations in communication with the base station reduced-length downlink and uplink map messages, wherein the length of a header of said reduced-length uplink and downlink map message is no more than 16 bits. 2. The computer-readable medium of claim 1, wherein the reduced-length downlink map message includes a header consisting essentially of a length field and a header check sequence (HCS). 3. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a header consisting essentially of a first bit indication of an uplink header, a length field, and a header check sequence (HCS). 4. The computer-readable medium according to claim 1, wherein the reduced-length uplink and downlink map messages each include a cyclic redundancy check (CRC) field comprising no more than 8 bits. 5. The computer-readable medium according to claim 1, wherein the reduced-length downlink map message comprises one bandwidth allocation information element (IE) per modulation and forward error correction scheme (“FEC Code”) having no more than 8 bits, said bandwidth allocation IE identifying a two dimensional allocation by indicating the number of slots in the allocation. 6. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a data burst information element (IE), wherein the data burst IE consists essentially of a connection identifier (CID) having no more than 16 bits, an uplink interval usage code (UIUC) having no more than 4 bits, and a duration having no more than 10 bits. 7. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a CDMA allocation information element (IE), wherein the CDMA allocation IE consists essentially of an uplink interval usage code (UIUC) having no more than 4 bits, a duration having no more than 4 bits, a frame number index having no more than 4 bits, a ranging code having no more than 8 bits, and a bandwidth request mandatory indication code. 8. The computer-readable medium according to claim 1, wherein the reduced-length uplink map message includes a power control information element (IE), wherein the power control IE consists essentially of a connection identifier (CID) having no more than 16 bits, an uplink interval usage code (UIUC) having no more than 4 bits, and a power control field having no more than 8 bits. 9. The computer-readable medium according to claim 1, wherein the reduced-length downlink map includes a media access control (MAC) management message (MMM) consisting essentially of a frame number having no more than 16 bits. 10. The computer-readable medium according to claim 1, wherein the reduced-length uplink map does not include a media access control (MAC) management message (MMM). 11. An OFDMA system comprising:
a processor for use in a base station, said processor configured to:
transmit to remote stations in communication with the base station reduced-length downlink and uplink map messages,
wherein the length of a header of said reduced-length uplink and downlink map message is no more than 16 bits,
wherein the channel bandwidth for the OFDMA system is less than or equal to 1.25 MHz. 12. The OFDMA system of claim 11, wherein the per-frame bandwidth required for transmitting the reduced-length downlink and uplink map messages is less than or equal to approximately 10% of the channel bandwidth. | 2,400 |
8,308 | 8,308 | 13,469,690 | 2,487 | A panorama moving image including panorama images of a real world is pasted on a model in a virtual space as texture, and an image of the model is captured by a virtual camera. An image-capturing direction of the virtual camera is changed in accordance with an attitude of a portable display device, and the image captured by the virtual camera is displayed on the portable display device. | 1. An information processing system for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the information processing system comprising:
a panorama moving image storage unit for storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; a first virtual camera location unit for locating a first virtual camera at a predetermined position in a three-dimensional virtual space; a first model location unit for locating a model surrounding the predetermined position in the virtual space; a first virtual camera control unit for changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; a first pasting unit for sequentially reading the panorama image of each frame from the panorama moving image storage unit and for sequentially pasting the panorama image on a surface of the model on the predetermined position side; and a first display control unit for sequentially capturing an image of the virtual space by the first virtual camera and for sequentially displaying the captured image on the portable display device, in accordance with the pasting of the panorama image of each frame by the first pasting unit. 2. The information processing system according to claim 1, wherein the first pasting unit sequentially pastes the panorama image of each frame such that a fixed position in the panorama image is a fixed position in the model on the surface. 3. The information processing system according to claim 1, wherein the first pasting unit pastes the panorama image of each frame such that a fixed position in the panorama image matches an initial image-capturing direction of the first virtual camera. 4. The information processing system according to claim 1, further comprising an information processing device, separate from the portable display device, capable of transmitting image data to the portable display device by wireless communication; wherein:
the panorama moving image storage unit, the first model location unit, the first virtual camera location unit, the first virtual camera control unit, the first pasting unit, and the first display control unit are included in the information processing device; and the first display control unit transmits the captured image to the portable display device by wireless communication, and the portable display device receives the captured image by wireless communication and displays the captured image. 5. The information processing system according to claim 1, further comprising:
a map image storage unit for storing a map image representing an aerial view of a region in which the panorama image has been captured; and a second display control unit for displaying the map image on a non-portable display device. 6. The information processing system according to claim 5, further comprising an image-capturing position information storage unit for storing information representing an image-capturing position, on the map image, of the panorama image of each frame;
wherein the second display control unit displays information representing the image-capturing position on the map image by use of the information representing the image-capturing position of each frame in accordance with the control on the display performed by the first display control unit based on the panorama image of each frame. 7. The information processing system according to claim 5, further comprising an image-capturing position information storage unit for storing information representing an image-capturing direction, on the map image, of the panorama image of each frame;
wherein the second display control unit displays information representing the image-capturing direction on the map image by use of the information representing the image-capturing direction of each frame in accordance with the control on the display performed by the first display control unit based on the panorama image of each frame. 8. The information processing system according to claim 5, wherein the map image storage unit stores the map image of each frame, and the second display control unit displays the map image of each frame on the portable display device in accordance with the display of the panorama image of each frame performed by the first display control unit on the portable display device. 9. The information processing system according to claim 8, wherein the second display control unit displays the map image in a rotated state in accordance with the attitude of the first virtual camera provided by the first virtual camera control unit. 10. The information processing system according to claim 6, wherein the panorama image of each frame and the information representing the image-capturing position of each frame are saved in one file. 11. The information processing system according to claim 7, wherein the panorama image of each frame and the information representing the image-capturing direction of each frame are saved in one file. 12. The information processing system according to claim 9, wherein the panorama image of each frame and the map image of each frame are saved in one file. 13. The information processing system according to claim 1, further comprising:
a second virtual camera location unit for locating a second virtual camera at the predetermined position; and a second display control unit for sequentially capturing an image of the virtual space by the second virtual camera and displaying the captured image on a non-portable display device; wherein an attitude of the second virtual camera is not changed even when the attitude of the first virtual camera is changed by the first virtual camera location unit. 14. The information processing system according to claim 1, wherein the model is a closed space model. 15. The information processing system according to claim 14, wherein:
the panorama image has an image having a dead angle; and the first pasting unit pastes the panorama image on an area of an inner surface of the closed space model other than an area corresponding to the dead angle. 16. The information processing system according to claim 15, further comprising:
a complementary image storage unit for storing a predetermined complementary image; and a second pasting unit for pasting the complementary image on the area of the inner surface of the closed space model corresponding to the dead angle. 17. The information processing system according to claim 1, wherein:
the panorama image is a spherical panorama image and has a dead angle in a lower area or an upper area thereof; the model includes at least an upper part or a lower part of a sphere; and the first pasting unit pastes the panorama image on an inner surface of the upper part or the lower part. 18. The information processing system according to claim 17, wherein:
the model is a closed space model; and the information processing system further comprises: a complementary image storage unit for storing a predetermined complementary image; and a second pasting unit for pasting the complementary image on an area of an inner surface of the closed space model other than an area on which the panorama image is pasted. 19. The information processing system according to claim 16, wherein:
the complementary image storage unit stores the complementary image of each frame; and the second pasting unit pastes the complementary image of each frame in accordance with the pasting of the panorama image of each frame performed by the first pasting unit. 20. The information processing system according to claim 19, wherein the panorama image of each frame and the complementary image of each frame are saved in one file. 21. The information processing system according to claim 1, further comprising a type information storage unit for storing type information of the panorama image;
wherein the first model location unit uses different models in accordance with the type information. 22. The information processing system according to claim 21, wherein the panorama image and the type information are saved in one file. 23. The information processing system according to claim 1, wherein:
the portable display device further includes an input unit for receiving an input operation; and when data outputted from the input unit represents a predetermined operation, the first virtual camera control unit inverts a line-of-sight direction of the first virtual camera during the reproduction of the moving image. 24. An information processing system for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the information processing system comprising:
a panorama moving image storage unit for storing a moving image captured and recorded in advance, the moving image including frames each including a spherical or all-around panorama image of a real world; a first model location unit for locating a model representing a surface of a sphere or a side surface of a cylinder in a three-dimensional virtual space; a first virtual camera location unit for locating a first virtual camera at a position inside the sphere or the cylinder represented by the model; a first virtual camera control unit for changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; a first pasting unit for sequentially pasting the panorama image of each frame on an inner surface of the model; and a first display control unit for sequentially capturing an image of the virtual space by the first virtual camera and for sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame by the first pasting unit. 25. An information processing device for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the information processing device comprising:
a panorama moving image storage unit for storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; a first virtual camera location unit for locating a first virtual camera at a predetermined position in a three-dimensional virtual space; a first model location unit for locating a model surrounding the predetermined position in the virtual space; a first virtual camera control unit for changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; a first pasting unit for sequentially reading the panorama image of each frame from the panorama moving image storage unit and for sequentially pasting the panorama image on a surface of the model on the predetermined position side; and a first display control unit for sequentially capturing an image of the virtual space by the first virtual camera and for sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame by the first pasting unit. 26. A non-transitory computer-readable storage medium having an information processing program stored thereon, the information processing program being executable by a computer of an information processing device for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, wherein the information processing program allows the computer to execute:
storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; locating a first virtual camera at a predetermined position in a three-dimensional virtual space; locating a model surrounding the predetermined position in the virtual space; changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; sequentially reading the stored panorama image of each frame and sequentially pasting the panorama image on a surface of the model on the predetermined position side; and sequentially capturing an image of the virtual space by the first virtual camera and sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame. 27. A moving image reproduction control method for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the method comprising:
storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; locating a first virtual camera at a predetermined position in a three-dimensional virtual space; locating a model surrounding the predetermined position in the virtual space; changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; sequentially reading the stored panorama image of each frame and sequentially pasting the panorama image on a surface of the model on the predetermined position side; and sequentially capturing an image of the virtual space by the first virtual camera and sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame. | A panorama moving image including panorama images of a real world is pasted on a model in a virtual space as texture, and an image of the model is captured by a virtual camera. An image-capturing direction of the virtual camera is changed in accordance with an attitude of a portable display device, and the image captured by the virtual camera is displayed on the portable display device.1. An information processing system for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the information processing system comprising:
a panorama moving image storage unit for storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; a first virtual camera location unit for locating a first virtual camera at a predetermined position in a three-dimensional virtual space; a first model location unit for locating a model surrounding the predetermined position in the virtual space; a first virtual camera control unit for changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; a first pasting unit for sequentially reading the panorama image of each frame from the panorama moving image storage unit and for sequentially pasting the panorama image on a surface of the model on the predetermined position side; and a first display control unit for sequentially capturing an image of the virtual space by the first virtual camera and for sequentially displaying the captured image on the portable display device, in accordance with the pasting of the panorama image of each frame by the first pasting unit. 2. The information processing system according to claim 1, wherein the first pasting unit sequentially pastes the panorama image of each frame such that a fixed position in the panorama image is a fixed position in the model on the surface. 3. The information processing system according to claim 1, wherein the first pasting unit pastes the panorama image of each frame such that a fixed position in the panorama image matches an initial image-capturing direction of the first virtual camera. 4. The information processing system according to claim 1, further comprising an information processing device, separate from the portable display device, capable of transmitting image data to the portable display device by wireless communication; wherein:
the panorama moving image storage unit, the first model location unit, the first virtual camera location unit, the first virtual camera control unit, the first pasting unit, and the first display control unit are included in the information processing device; and the first display control unit transmits the captured image to the portable display device by wireless communication, and the portable display device receives the captured image by wireless communication and displays the captured image. 5. The information processing system according to claim 1, further comprising:
a map image storage unit for storing a map image representing an aerial view of a region in which the panorama image has been captured; and a second display control unit for displaying the map image on a non-portable display device. 6. The information processing system according to claim 5, further comprising an image-capturing position information storage unit for storing information representing an image-capturing position, on the map image, of the panorama image of each frame;
wherein the second display control unit displays information representing the image-capturing position on the map image by use of the information representing the image-capturing position of each frame in accordance with the control on the display performed by the first display control unit based on the panorama image of each frame. 7. The information processing system according to claim 5, further comprising an image-capturing position information storage unit for storing information representing an image-capturing direction, on the map image, of the panorama image of each frame;
wherein the second display control unit displays information representing the image-capturing direction on the map image by use of the information representing the image-capturing direction of each frame in accordance with the control on the display performed by the first display control unit based on the panorama image of each frame. 8. The information processing system according to claim 5, wherein the map image storage unit stores the map image of each frame, and the second display control unit displays the map image of each frame on the portable display device in accordance with the display of the panorama image of each frame performed by the first display control unit on the portable display device. 9. The information processing system according to claim 8, wherein the second display control unit displays the map image in a rotated state in accordance with the attitude of the first virtual camera provided by the first virtual camera control unit. 10. The information processing system according to claim 6, wherein the panorama image of each frame and the information representing the image-capturing position of each frame are saved in one file. 11. The information processing system according to claim 7, wherein the panorama image of each frame and the information representing the image-capturing direction of each frame are saved in one file. 12. The information processing system according to claim 9, wherein the panorama image of each frame and the map image of each frame are saved in one file. 13. The information processing system according to claim 1, further comprising:
a second virtual camera location unit for locating a second virtual camera at the predetermined position; and a second display control unit for sequentially capturing an image of the virtual space by the second virtual camera and displaying the captured image on a non-portable display device; wherein an attitude of the second virtual camera is not changed even when the attitude of the first virtual camera is changed by the first virtual camera location unit. 14. The information processing system according to claim 1, wherein the model is a closed space model. 15. The information processing system according to claim 14, wherein:
the panorama image has an image having a dead angle; and the first pasting unit pastes the panorama image on an area of an inner surface of the closed space model other than an area corresponding to the dead angle. 16. The information processing system according to claim 15, further comprising:
a complementary image storage unit for storing a predetermined complementary image; and a second pasting unit for pasting the complementary image on the area of the inner surface of the closed space model corresponding to the dead angle. 17. The information processing system according to claim 1, wherein:
the panorama image is a spherical panorama image and has a dead angle in a lower area or an upper area thereof; the model includes at least an upper part or a lower part of a sphere; and the first pasting unit pastes the panorama image on an inner surface of the upper part or the lower part. 18. The information processing system according to claim 17, wherein:
the model is a closed space model; and the information processing system further comprises: a complementary image storage unit for storing a predetermined complementary image; and a second pasting unit for pasting the complementary image on an area of an inner surface of the closed space model other than an area on which the panorama image is pasted. 19. The information processing system according to claim 16, wherein:
the complementary image storage unit stores the complementary image of each frame; and the second pasting unit pastes the complementary image of each frame in accordance with the pasting of the panorama image of each frame performed by the first pasting unit. 20. The information processing system according to claim 19, wherein the panorama image of each frame and the complementary image of each frame are saved in one file. 21. The information processing system according to claim 1, further comprising a type information storage unit for storing type information of the panorama image;
wherein the first model location unit uses different models in accordance with the type information. 22. The information processing system according to claim 21, wherein the panorama image and the type information are saved in one file. 23. The information processing system according to claim 1, wherein:
the portable display device further includes an input unit for receiving an input operation; and when data outputted from the input unit represents a predetermined operation, the first virtual camera control unit inverts a line-of-sight direction of the first virtual camera during the reproduction of the moving image. 24. An information processing system for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the information processing system comprising:
a panorama moving image storage unit for storing a moving image captured and recorded in advance, the moving image including frames each including a spherical or all-around panorama image of a real world; a first model location unit for locating a model representing a surface of a sphere or a side surface of a cylinder in a three-dimensional virtual space; a first virtual camera location unit for locating a first virtual camera at a position inside the sphere or the cylinder represented by the model; a first virtual camera control unit for changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; a first pasting unit for sequentially pasting the panorama image of each frame on an inner surface of the model; and a first display control unit for sequentially capturing an image of the virtual space by the first virtual camera and for sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame by the first pasting unit. 25. An information processing device for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the information processing device comprising:
a panorama moving image storage unit for storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; a first virtual camera location unit for locating a first virtual camera at a predetermined position in a three-dimensional virtual space; a first model location unit for locating a model surrounding the predetermined position in the virtual space; a first virtual camera control unit for changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; a first pasting unit for sequentially reading the panorama image of each frame from the panorama moving image storage unit and for sequentially pasting the panorama image on a surface of the model on the predetermined position side; and a first display control unit for sequentially capturing an image of the virtual space by the first virtual camera and for sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame by the first pasting unit. 26. A non-transitory computer-readable storage medium having an information processing program stored thereon, the information processing program being executable by a computer of an information processing device for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, wherein the information processing program allows the computer to execute:
storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; locating a first virtual camera at a predetermined position in a three-dimensional virtual space; locating a model surrounding the predetermined position in the virtual space; changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; sequentially reading the stored panorama image of each frame and sequentially pasting the panorama image on a surface of the model on the predetermined position side; and sequentially capturing an image of the virtual space by the first virtual camera and sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame. 27. A moving image reproduction control method for displaying an image on a portable display device including a sensor for detecting a value in accordance with a movement or an attitude, the method comprising:
storing a moving image captured and recorded in advance, the moving image including frames each including a panorama image of a real world; locating a first virtual camera at a predetermined position in a three-dimensional virtual space; locating a model surrounding the predetermined position in the virtual space; changing an attitude of the first virtual camera during reproduction of the moving image in accordance with an attitude of the portable display device based on data which is outputted from the sensor; sequentially reading the stored panorama image of each frame and sequentially pasting the panorama image on a surface of the model on the predetermined position side; and sequentially capturing an image of the virtual space by the first virtual camera and sequentially displaying the captured image on the portable display device, in accordance with the sequential pasting of the panorama image of each frame. | 2,400 |
8,309 | 8,309 | 15,359,088 | 2,432 | Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take. | 1. A method of minimizing application-level denial-of-service attacks with respect to compute resources in a multi-tenant shared infrastructure, the method comprising:
profiling anticipated application behavior in response to one or more requests to generate an application profile having at least one workload constraint, the application profile including a mapping of a request type to a workload and a workload limit; upon receipt of a request, and prior to execution, determining whether execution of the request satisfies the at least one workload constraint in the application profile by evaluating whether the request is predicted to result in a workload that exceeds the workload limit; responsive to determining whether execution of the request satisfies the at least one workload constraint in the application profile, taking a given action; wherein the steps are carried out in software executing in a hardware element. 2. The method as described in claim 1 wherein the given action is one of: throttling execution of the request, rejecting the request, and providing a given notification. 3. The method as described in claim 1 wherein determining whether execution of the request satisfies the at least one workload constraint allocates processing or storage in the multi-tenant shared infrastructure to simulate how execution of the request affects availability of the compute resources. 4. The method as described in claim 1 wherein the anticipated application behavior characterizes legitimate behavior for each of one or more tenant applications in the multi-tenant shared infrastructure. 5. The method as described in claim 4 wherein the anticipated application behavior is profiled as a machine-encoded data set. 6. The method as described in claim 1 wherein the determining step executes a number of application operations in a separate execution thread to determine if the number of application operations in the workload exceeds the workload limit. 7. Apparatus, comprising:
a processor; computer memory holding computer program instructions that when executed by the processor minimize application-level denial-of-service with respect to compute resources in a multi-tenant shared infrastructure, the computer program instructions comprising:
program code to profile anticipated application behavior in response to one or more requests to generate an application profile having at least one workload constraint, the application profile including a mapping of a request type to a workload and a workload limit;
program code operative upon receipt of a request, and prior to execution, to determine whether execution of the request satisfies the at least one workload constraint in the application profile by evaluating whether the request is predicted to result in a workload that exceeds the workload limit; and
program code, responsive to determining whether execution of the request satisfies the at least one workload constraint in the application profile, to take a given action. 8. The apparatus as described in claim 7 further including program to take that given action that is one of: throttling execution of the request, rejecting the request, and providing a given notification. 9. The apparatus as described in claim 7 wherein the program code to determine whether execution of the request satisfies the at least one workload constraint includes program code to allocate processing or storage in the multi-tenant shared infrastructure to simulate how execution of the request affects availability of the compute resources. 10. The apparatus as described in claim 7 wherein the anticipated application behavior characterizes legitimate behavior for each of one or more tenant applications in the multi-tenant shared infrastructure. 11. The apparatus as described in claim 10 wherein the anticipated application behavior is profiled as a machine-encoded data set. 12. The apparatus as described in claim 7 wherein the program code to evaluate executes a number of application operations in a separate execution thread to determine if the number of application operations in the workload exceeds the workload limit. 13. A computer program product in a non-transitory computer readable medium for use in a data processing system, the computer program product holding computer program instructions which, when executed by the data processing system, minimize application-level denial-of-service with respect to compute resources in a multi-tenant shared infrastructure, the computer program instructions comprising:
program code to profile anticipated application behavior in response to one or more requests to generate an application profile having at least one workload constraint, the application profile including a mapping of a request type to a workload and a workload limit; program code operative upon receipt of a request, and prior to execution, to determine whether execution of the request satisfies the at least one workload constraint in the application profile by evaluating whether the request is predicted to result in a workload that exceeds the workload limit; and program code, responsive to determining whether execution of the request satisfies the at least one workload constraint in the application profile, to take a given action. 14. The computer program product as described in claim 13 further including program to take that given action that is one of: throttling execution of the request, rejecting the request, and providing a given notification. 15. The computer program product as described in claim 13 wherein the program code to determine whether execution of the request satisfies the at least one workload constraint includes program code to allocate processing or storage in the multi-tenant shared infrastructure to simulate how execution of the request affects availability of the compute resources. 16. The computer program product as described in claim 13 wherein the anticipated application behavior characterizes legitimate behavior for each of one or more tenant applications in the multi-tenant shared infrastructure. 17. The computer program product as described in claim 16 wherein the anticipated application behavior is profiled as a machine-encoded data set. 18. The computer program product as described in claim 13 wherein the program code to evaluate executes a number of application operations in a separate execution thread to determine if the number of application operations in the workload exceeds the workload limit. | Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take.1. A method of minimizing application-level denial-of-service attacks with respect to compute resources in a multi-tenant shared infrastructure, the method comprising:
profiling anticipated application behavior in response to one or more requests to generate an application profile having at least one workload constraint, the application profile including a mapping of a request type to a workload and a workload limit; upon receipt of a request, and prior to execution, determining whether execution of the request satisfies the at least one workload constraint in the application profile by evaluating whether the request is predicted to result in a workload that exceeds the workload limit; responsive to determining whether execution of the request satisfies the at least one workload constraint in the application profile, taking a given action; wherein the steps are carried out in software executing in a hardware element. 2. The method as described in claim 1 wherein the given action is one of: throttling execution of the request, rejecting the request, and providing a given notification. 3. The method as described in claim 1 wherein determining whether execution of the request satisfies the at least one workload constraint allocates processing or storage in the multi-tenant shared infrastructure to simulate how execution of the request affects availability of the compute resources. 4. The method as described in claim 1 wherein the anticipated application behavior characterizes legitimate behavior for each of one or more tenant applications in the multi-tenant shared infrastructure. 5. The method as described in claim 4 wherein the anticipated application behavior is profiled as a machine-encoded data set. 6. The method as described in claim 1 wherein the determining step executes a number of application operations in a separate execution thread to determine if the number of application operations in the workload exceeds the workload limit. 7. Apparatus, comprising:
a processor; computer memory holding computer program instructions that when executed by the processor minimize application-level denial-of-service with respect to compute resources in a multi-tenant shared infrastructure, the computer program instructions comprising:
program code to profile anticipated application behavior in response to one or more requests to generate an application profile having at least one workload constraint, the application profile including a mapping of a request type to a workload and a workload limit;
program code operative upon receipt of a request, and prior to execution, to determine whether execution of the request satisfies the at least one workload constraint in the application profile by evaluating whether the request is predicted to result in a workload that exceeds the workload limit; and
program code, responsive to determining whether execution of the request satisfies the at least one workload constraint in the application profile, to take a given action. 8. The apparatus as described in claim 7 further including program to take that given action that is one of: throttling execution of the request, rejecting the request, and providing a given notification. 9. The apparatus as described in claim 7 wherein the program code to determine whether execution of the request satisfies the at least one workload constraint includes program code to allocate processing or storage in the multi-tenant shared infrastructure to simulate how execution of the request affects availability of the compute resources. 10. The apparatus as described in claim 7 wherein the anticipated application behavior characterizes legitimate behavior for each of one or more tenant applications in the multi-tenant shared infrastructure. 11. The apparatus as described in claim 10 wherein the anticipated application behavior is profiled as a machine-encoded data set. 12. The apparatus as described in claim 7 wherein the program code to evaluate executes a number of application operations in a separate execution thread to determine if the number of application operations in the workload exceeds the workload limit. 13. A computer program product in a non-transitory computer readable medium for use in a data processing system, the computer program product holding computer program instructions which, when executed by the data processing system, minimize application-level denial-of-service with respect to compute resources in a multi-tenant shared infrastructure, the computer program instructions comprising:
program code to profile anticipated application behavior in response to one or more requests to generate an application profile having at least one workload constraint, the application profile including a mapping of a request type to a workload and a workload limit; program code operative upon receipt of a request, and prior to execution, to determine whether execution of the request satisfies the at least one workload constraint in the application profile by evaluating whether the request is predicted to result in a workload that exceeds the workload limit; and program code, responsive to determining whether execution of the request satisfies the at least one workload constraint in the application profile, to take a given action. 14. The computer program product as described in claim 13 further including program to take that given action that is one of: throttling execution of the request, rejecting the request, and providing a given notification. 15. The computer program product as described in claim 13 wherein the program code to determine whether execution of the request satisfies the at least one workload constraint includes program code to allocate processing or storage in the multi-tenant shared infrastructure to simulate how execution of the request affects availability of the compute resources. 16. The computer program product as described in claim 13 wherein the anticipated application behavior characterizes legitimate behavior for each of one or more tenant applications in the multi-tenant shared infrastructure. 17. The computer program product as described in claim 16 wherein the anticipated application behavior is profiled as a machine-encoded data set. 18. The computer program product as described in claim 13 wherein the program code to evaluate executes a number of application operations in a separate execution thread to determine if the number of application operations in the workload exceeds the workload limit. | 2,400 |
8,310 | 8,310 | 15,893,206 | 2,483 | Systems and methods for generating an image of the surroundings of an articulated vehicle are provided. According to an aspect of the invention, a processor determines a relative position between a first vehicle of an articulated vehicle and a second vehicle of the articulated vehicle; receives a first image from a first camera arranged on the first vehicle and a second image from a second camera arranged on the second vehicle; and combines the first image and the second image based on the relative position between the first vehicle and the second vehicle to generate a combined image of surroundings of the articulated vehicle. | 1. A method comprising:
determining, by a processor, an angle between a first vehicle of an articulated vehicle and a second vehicle of the articulated vehicle as the first and second vehicles rotate laterally relative to each other around a point at which the first and second vehicles are connected to each other, based on a relative position between a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second cameras being located on a same side of the articulated vehicle; receiving, by the processor, a first image from the first camera arranged on the first vehicle and a second image from the second camera arranged on the second vehicle, the first and second images being obtained from the same side of the articulated vehicle; and combining, by the processor, the first image and the second image based on the relative position between the first camera and the second camera to generate a combined image of surroundings of the articulated vehicle on the same side thereof, wherein the first image and the second image are combined by rotating the first image and the second image with respect to each other, based on the angle between the first vehicle and the second vehicle. 2. The method according to claim 1, wherein the angle is measured by an angular sensor arranged on the articulated vehicle. 3. The method according to claim 1, wherein the angle between the first vehicle and the second vehicle is determined based on a first motion of the first vehicle and a second motion of the second vehicle, the first motion is measured by at least one first sensor arranged on the first vehicle, and the second motion is measured by at least one second sensor arranged on the second vehicle. 4. The method according to claim 3, wherein each of the first motion and the second motion comprises at least one of a vehicle speed, a wheel speed, a yaw rate, and an acceleration. 5. The method according to claim 1, wherein the angle between the first vehicle and the second vehicle is determined by detecting at least one feature of the second vehicle that appears in at least two images from the first camera. 6. The method according to claim 5, wherein a first one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is zero, and a second one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is non-zero due to the first and second vehicles rotating laterally relative to each other around the point at which the first and second vehicles are connected to each other. 7. The method according to claim 1, wherein the angle between the first vehicle and the second vehicle is determined by detecting at least one feature of the first vehicle that appears in at least two images from the second camera. 8. The method according to claim 7, wherein a first one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is zero, and a second one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is non-zero due to the first and second vehicles rotating laterally relative to each other around the point at which the first and second vehicles are connected to each other. 9. The method according to claim 1, wherein the relative position between the first vehicle and the second vehicle is determined continuously. 10. The method according to claim 1, wherein the first image and the second image are transformed into ground plane images before rotating the first image and the second image. 11. The method according to claim 1, further comprising superimposing information from an active sensing system on the combined image, wherein components of the active sensing system are arranged on at least one of the first vehicle and the second vehicle. 12. The method according to claim 11, wherein the components comprise at least one of ultrasonic sensors and radar sensors. 13. The method according to claim 11, wherein the information is color-coded to indicate a type and a relevance of objects detected by the active sensing system. 14. The method according to claim 1, further comprising displaying the combined image and a forward-view image, wherein the forward-view image is acquired by a forward-facing camera arranged on the first vehicle. 15. The method according to claim 1, wherein the combined image is a birds-eye view image of the surroundings of the articulated vehicle. 16. A system comprising:
a first camera arranged on a first vehicle of an articulated vehicle; a second camera arranged on a second vehicle of the articulated vehicle, wherein the first and second cameras are arranged on a same side of the articulated vehicle; a memory; and a processor coupled to the memory, the processor comprising:
position determining logic that determines an angle between the first vehicle and the second vehicle as the first and second vehicles rotate laterally relative to each other around a point at which the first and second vehicles are connected to each other, based on a relative position between a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second cameras being located on a same side of the articulated vehicle;
image receiving logic that receives a first image from the first camera and a second image from the second camera, the first and second images being obtained from the same side of the articulated vehicle; and
image combination logic that combines the first image and the second image based on the relative position between the first camera and the second camera to generate a combined image of surroundings of the articulated vehicle on the same side thereof, wherein the first image and the second image are combined by rotating the first image and the second image with respect to each other, based on the angle between the first vehicle and the second vehicle. 17. A non-transitory computer-readable medium comprising computer instructions executable by a processor to cause the processor to perform a method comprising:
determining an angle between a first vehicle of an articulated vehicle and a second vehicle of the articulated vehicle as the first and second vehicles rotate laterally relative to each other around a point at which the first and second vehicles are connected to each other, based on a relative position between a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second cameras being located on a same side of the articulated vehicle; receiving images from a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second images being obtained from the same side of the articulated vehicle; and combining the first image and the second image based on the relative position between the first camera and the second camera to generate a combined image of surroundings of the articulated vehicle on the same side thereof, wherein the first image and the second image are combined by rotating the first image and the second image with respect to each other, based on the angle between the first vehicle and the second vehicle. | Systems and methods for generating an image of the surroundings of an articulated vehicle are provided. According to an aspect of the invention, a processor determines a relative position between a first vehicle of an articulated vehicle and a second vehicle of the articulated vehicle; receives a first image from a first camera arranged on the first vehicle and a second image from a second camera arranged on the second vehicle; and combines the first image and the second image based on the relative position between the first vehicle and the second vehicle to generate a combined image of surroundings of the articulated vehicle.1. A method comprising:
determining, by a processor, an angle between a first vehicle of an articulated vehicle and a second vehicle of the articulated vehicle as the first and second vehicles rotate laterally relative to each other around a point at which the first and second vehicles are connected to each other, based on a relative position between a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second cameras being located on a same side of the articulated vehicle; receiving, by the processor, a first image from the first camera arranged on the first vehicle and a second image from the second camera arranged on the second vehicle, the first and second images being obtained from the same side of the articulated vehicle; and combining, by the processor, the first image and the second image based on the relative position between the first camera and the second camera to generate a combined image of surroundings of the articulated vehicle on the same side thereof, wherein the first image and the second image are combined by rotating the first image and the second image with respect to each other, based on the angle between the first vehicle and the second vehicle. 2. The method according to claim 1, wherein the angle is measured by an angular sensor arranged on the articulated vehicle. 3. The method according to claim 1, wherein the angle between the first vehicle and the second vehicle is determined based on a first motion of the first vehicle and a second motion of the second vehicle, the first motion is measured by at least one first sensor arranged on the first vehicle, and the second motion is measured by at least one second sensor arranged on the second vehicle. 4. The method according to claim 3, wherein each of the first motion and the second motion comprises at least one of a vehicle speed, a wheel speed, a yaw rate, and an acceleration. 5. The method according to claim 1, wherein the angle between the first vehicle and the second vehicle is determined by detecting at least one feature of the second vehicle that appears in at least two images from the first camera. 6. The method according to claim 5, wherein a first one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is zero, and a second one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is non-zero due to the first and second vehicles rotating laterally relative to each other around the point at which the first and second vehicles are connected to each other. 7. The method according to claim 1, wherein the angle between the first vehicle and the second vehicle is determined by detecting at least one feature of the first vehicle that appears in at least two images from the second camera. 8. The method according to claim 7, wherein a first one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is zero, and a second one of the images from the first camera is acquired when the angle between the first vehicle and the second vehicle is non-zero due to the first and second vehicles rotating laterally relative to each other around the point at which the first and second vehicles are connected to each other. 9. The method according to claim 1, wherein the relative position between the first vehicle and the second vehicle is determined continuously. 10. The method according to claim 1, wherein the first image and the second image are transformed into ground plane images before rotating the first image and the second image. 11. The method according to claim 1, further comprising superimposing information from an active sensing system on the combined image, wherein components of the active sensing system are arranged on at least one of the first vehicle and the second vehicle. 12. The method according to claim 11, wherein the components comprise at least one of ultrasonic sensors and radar sensors. 13. The method according to claim 11, wherein the information is color-coded to indicate a type and a relevance of objects detected by the active sensing system. 14. The method according to claim 1, further comprising displaying the combined image and a forward-view image, wherein the forward-view image is acquired by a forward-facing camera arranged on the first vehicle. 15. The method according to claim 1, wherein the combined image is a birds-eye view image of the surroundings of the articulated vehicle. 16. A system comprising:
a first camera arranged on a first vehicle of an articulated vehicle; a second camera arranged on a second vehicle of the articulated vehicle, wherein the first and second cameras are arranged on a same side of the articulated vehicle; a memory; and a processor coupled to the memory, the processor comprising:
position determining logic that determines an angle between the first vehicle and the second vehicle as the first and second vehicles rotate laterally relative to each other around a point at which the first and second vehicles are connected to each other, based on a relative position between a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second cameras being located on a same side of the articulated vehicle;
image receiving logic that receives a first image from the first camera and a second image from the second camera, the first and second images being obtained from the same side of the articulated vehicle; and
image combination logic that combines the first image and the second image based on the relative position between the first camera and the second camera to generate a combined image of surroundings of the articulated vehicle on the same side thereof, wherein the first image and the second image are combined by rotating the first image and the second image with respect to each other, based on the angle between the first vehicle and the second vehicle. 17. A non-transitory computer-readable medium comprising computer instructions executable by a processor to cause the processor to perform a method comprising:
determining an angle between a first vehicle of an articulated vehicle and a second vehicle of the articulated vehicle as the first and second vehicles rotate laterally relative to each other around a point at which the first and second vehicles are connected to each other, based on a relative position between a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second cameras being located on a same side of the articulated vehicle; receiving images from a first camera arranged on the first vehicle and a second camera arranged on the second vehicle, the first and second images being obtained from the same side of the articulated vehicle; and combining the first image and the second image based on the relative position between the first camera and the second camera to generate a combined image of surroundings of the articulated vehicle on the same side thereof, wherein the first image and the second image are combined by rotating the first image and the second image with respect to each other, based on the angle between the first vehicle and the second vehicle. | 2,400 |
8,311 | 8,311 | 15,532,209 | 2,469 | The application relates to improved hidden node detection for Long Term Evolution LTE Licensed-Assisted Access LAA. Channel State Information CSI measurements can be seen as one existing solution that could be used for obtaining information about the existence of a hidden node. However, relying on CSI reporting alone is rather unreliable. One of the reasons for this is that the CSI measurements and reporting do not take into account the regulatory requirements such as LBT. A further possible way to detect hidden nodes is to perform LBT (clear channel assessment CCA) at the transmitter (e.g. eNB) and receiver (e.g. UE) at the same time. However, there is still the need for an improved solution for how to detect hidden nodes preventing LTE LAA uplink operation and complicating coexistence. These problems are solved by ensuring that interference from non-hidden nodes (such as WLAN node 1 in FIG. 1 ) is not measured. Therefore the serving eNB detects a free channel during LBT procedure, i.e. that non-hidden nodes are not transmitting, and informs the UE which performs the hidden node detection measurements, by downlink scheduling, whether the serving eNB is active in the current subframe. The UE then performs the measurements only in subframes of the channel occupied by the serving eNB. Thereby, the UE only captures interference coming from hidden nodes. | 1-44. (canceled) 45. A method, performed by a user equipment, for detecting a hidden node in licensed assisted access, comprising:
determining resources for hidden node detection measurement; determining, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not; in case it is determined that the first serving network element is occupying the operating channel:
performing hidden node detection measurement in the determined resources; and
transmitting the hidden node detection measurement results to a second serving network element. 46. The method according to claim 45, wherein the first serving network element corresponds to a first cell on an unlicensed carrier, and the second serving network element corresponds to a second cell on a licensed carrier. 47. The method according to claim 45, wherein, when the first serving network element is not occupying the channel, hidden node measurements are not performed or reported. 48. The method according to claim 45, wherein the first serving network element's channel occupancy is determined based on downlink scheduling, wherein reception of a downlink control information on a physical downlink control channel indicates that the serving network element is occupying the operating channel. 49. A method, performed by a base station or a network element, for detecting a hidden node in licensed assisted access, comprising:
configuring resources for hidden node detection measurement; transmitting an indication to a user equipment enabling the user equipment to determine, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not, and in case it is determined that the first serving network element is occupying the operating channel, to perform hidden node detection measurement by the user equipment in the configured resources; and receiving the hidden node detection measurement results from the user equipment. 50. The method according to claim 49, wherein the indication that the first serving network element occupies the operating channel is that a given subframe or a set of subframes is used for downlink transmission in the licensed assisted access. 51. The method according to claim 49, wherein the indication of first serving network element's channel occupancy is downlink scheduling, wherein transmission of a downlink control information on a physical downlink control channel indicates that the first serving network element is occupying the operating channel. 52. An apparatus for use in a user equipment, for detecting a hidden node in licensed assisted access, comprising:
at least one processor, and at least one memory for storing instructions to be executed by the processor, wherein the at least one memory and the instructions are configured to, with the at least one processor, cause the apparatus at least to: determine resources for hidden node detection measurement; determine, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not; in case it is determined that the first serving network element is occupying the operating channel:
perform hidden node detection measurement in the determined resources; and
transmit the hidden node detection measurement results to a second serving network element. 53. The apparatus according to claim 52, wherein the first serving network element corresponds to a first cell on an unlicensed carrier, and the second serving network element corresponds to a second cell on a licensed carrier. 54. The apparatus according to claim 53, wherein the first and the second network element are aggregated using carrier aggregation, and the first cell is a secondary cell, and the second cell is a primary cell. 55. The apparatus according to claim 52, wherein, when the first serving network element is not occupying the channel, hidden node measurements are not performed or reported. 56. The apparatus according to claim 52, wherein the resources are at least one of time and frequency. 57. The apparatus according to claim 52, wherein the resources are channel state information interference measurement resources and are configured via radio resource control signaling. 58. The apparatus according to claim 52, wherein the first serving network element's channel occupancy is determined based on downlink scheduling, wherein reception of a downlink control information on a physical downlink control channel indicates that the serving network element is occupying the operating channel. 59. The apparatus according to claim 52, wherein the hidden node detection measurement result provides information indicating the observed interference or channel quality level quantized to preset number of bits. 60. The apparatus according to claim 52, wherein the hidden node detection measurement result is periodically reported by physical uplink control channel or physical uplink shared channel resources configured by the second serving network element, or is embedded into periodic or aperiodic channel state information reports. 61. An apparatus for use in a base station or a network element, for detecting a hidden node in licensed assisted access, comprising:
at least one processor, and at least one memory for storing instructions to be executed by the processor, wherein the at least one memory and the instructions are configured to, with the at least one processor, cause the apparatus at least to: configure resources for hidden node detection measurement; transmit an indication to a user equipment enabling the user equipment to determine, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not, and in case it is determined that the first serving network element is occupying the operating channel, to perform hidden node detection measurement by the user equipment in the configured resources; and receive the hidden node detection measurement results from the user equipment. 62. The apparatus according to claim 61, further comprising transmitting, by the base station or the network element, information about the configured resources to the said user equipment. 63. The apparatus according to claim 61, wherein the indication that the first serving network element occupies the operating channel is that a given subframe or a set of subframes is used for downlink transmission in the licensed assisted access. 64. The apparatus according to claim 61, wherein the indication of first serving network element's channel occupancy is downlink scheduling, wherein transmission of a downlink control information on a physical downlink control channel indicates that the first serving network element is occupying the operating channel. | The application relates to improved hidden node detection for Long Term Evolution LTE Licensed-Assisted Access LAA. Channel State Information CSI measurements can be seen as one existing solution that could be used for obtaining information about the existence of a hidden node. However, relying on CSI reporting alone is rather unreliable. One of the reasons for this is that the CSI measurements and reporting do not take into account the regulatory requirements such as LBT. A further possible way to detect hidden nodes is to perform LBT (clear channel assessment CCA) at the transmitter (e.g. eNB) and receiver (e.g. UE) at the same time. However, there is still the need for an improved solution for how to detect hidden nodes preventing LTE LAA uplink operation and complicating coexistence. These problems are solved by ensuring that interference from non-hidden nodes (such as WLAN node 1 in FIG. 1 ) is not measured. Therefore the serving eNB detects a free channel during LBT procedure, i.e. that non-hidden nodes are not transmitting, and informs the UE which performs the hidden node detection measurements, by downlink scheduling, whether the serving eNB is active in the current subframe. The UE then performs the measurements only in subframes of the channel occupied by the serving eNB. Thereby, the UE only captures interference coming from hidden nodes.1-44. (canceled) 45. A method, performed by a user equipment, for detecting a hidden node in licensed assisted access, comprising:
determining resources for hidden node detection measurement; determining, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not; in case it is determined that the first serving network element is occupying the operating channel:
performing hidden node detection measurement in the determined resources; and
transmitting the hidden node detection measurement results to a second serving network element. 46. The method according to claim 45, wherein the first serving network element corresponds to a first cell on an unlicensed carrier, and the second serving network element corresponds to a second cell on a licensed carrier. 47. The method according to claim 45, wherein, when the first serving network element is not occupying the channel, hidden node measurements are not performed or reported. 48. The method according to claim 45, wherein the first serving network element's channel occupancy is determined based on downlink scheduling, wherein reception of a downlink control information on a physical downlink control channel indicates that the serving network element is occupying the operating channel. 49. A method, performed by a base station or a network element, for detecting a hidden node in licensed assisted access, comprising:
configuring resources for hidden node detection measurement; transmitting an indication to a user equipment enabling the user equipment to determine, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not, and in case it is determined that the first serving network element is occupying the operating channel, to perform hidden node detection measurement by the user equipment in the configured resources; and receiving the hidden node detection measurement results from the user equipment. 50. The method according to claim 49, wherein the indication that the first serving network element occupies the operating channel is that a given subframe or a set of subframes is used for downlink transmission in the licensed assisted access. 51. The method according to claim 49, wherein the indication of first serving network element's channel occupancy is downlink scheduling, wherein transmission of a downlink control information on a physical downlink control channel indicates that the first serving network element is occupying the operating channel. 52. An apparatus for use in a user equipment, for detecting a hidden node in licensed assisted access, comprising:
at least one processor, and at least one memory for storing instructions to be executed by the processor, wherein the at least one memory and the instructions are configured to, with the at least one processor, cause the apparatus at least to: determine resources for hidden node detection measurement; determine, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not; in case it is determined that the first serving network element is occupying the operating channel:
perform hidden node detection measurement in the determined resources; and
transmit the hidden node detection measurement results to a second serving network element. 53. The apparatus according to claim 52, wherein the first serving network element corresponds to a first cell on an unlicensed carrier, and the second serving network element corresponds to a second cell on a licensed carrier. 54. The apparatus according to claim 53, wherein the first and the second network element are aggregated using carrier aggregation, and the first cell is a secondary cell, and the second cell is a primary cell. 55. The apparatus according to claim 52, wherein, when the first serving network element is not occupying the channel, hidden node measurements are not performed or reported. 56. The apparatus according to claim 52, wherein the resources are at least one of time and frequency. 57. The apparatus according to claim 52, wherein the resources are channel state information interference measurement resources and are configured via radio resource control signaling. 58. The apparatus according to claim 52, wherein the first serving network element's channel occupancy is determined based on downlink scheduling, wherein reception of a downlink control information on a physical downlink control channel indicates that the serving network element is occupying the operating channel. 59. The apparatus according to claim 52, wherein the hidden node detection measurement result provides information indicating the observed interference or channel quality level quantized to preset number of bits. 60. The apparatus according to claim 52, wherein the hidden node detection measurement result is periodically reported by physical uplink control channel or physical uplink shared channel resources configured by the second serving network element, or is embedded into periodic or aperiodic channel state information reports. 61. An apparatus for use in a base station or a network element, for detecting a hidden node in licensed assisted access, comprising:
at least one processor, and at least one memory for storing instructions to be executed by the processor, wherein the at least one memory and the instructions are configured to, with the at least one processor, cause the apparatus at least to: configure resources for hidden node detection measurement; transmit an indication to a user equipment enabling the user equipment to determine, for a subframe in which resources for hidden node detection measurement are located, whether a first serving network element occupies a respective operating channel or not, and in case it is determined that the first serving network element is occupying the operating channel, to perform hidden node detection measurement by the user equipment in the configured resources; and receive the hidden node detection measurement results from the user equipment. 62. The apparatus according to claim 61, further comprising transmitting, by the base station or the network element, information about the configured resources to the said user equipment. 63. The apparatus according to claim 61, wherein the indication that the first serving network element occupies the operating channel is that a given subframe or a set of subframes is used for downlink transmission in the licensed assisted access. 64. The apparatus according to claim 61, wherein the indication of first serving network element's channel occupancy is downlink scheduling, wherein transmission of a downlink control information on a physical downlink control channel indicates that the first serving network element is occupying the operating channel. | 2,400 |
8,312 | 8,312 | 14,341,008 | 2,441 | One embodiment is directed to a “software only” hosted or cloud-based physical layer management (PLM) system. Another embodiment is directed to a hosted or cloud-based PLM system or Automated Infrastructure Management (AIM) system that uses a hardware appliance that is locally deployed in an enterprises network. Other embodiments are disclosed. | 1. A server system comprising:
one or more server computers operated by a third party; wherein the one or more server computers are configured to execute a respective management application for each of a plurality of networks as a hosted service, wherein each of the plurality of networks is operated by a different enterprise; wherein the hosted management application for each of the plurality of networks is configured to include a documentation function to document connections made using cables in the respective network and a workflow management function to direct a technician in moving, adding, or changing connections made using cables in the respective network; and wherein the hosted management application for at least one of the plurality of networks is configured to support a software only configuration in which the documentation and workflow management functions included in that hosted management application are accessed by entities associated with the respective network only using client software executing on one or more client devices associated with the respective network. 2. The server system of claim 1, wherein the hosted management application for the at least one of the plurality of networks that is configured to support the software only configuration is configured to be accessed using client software that comprises at least one of:
a web browser running a computer that interacts with a web server associated with that hosted management application; a mobile application executing on a smartphone or other portable device; and an application that interacts with the hosted management application for the at least one of the plurality of networks using a web services interface. 3. The server system of claim 1, wherein the hosted management application for each of the plurality of networks comprises a respective one or more instances of the hosted management application executed on one or more of the server computers. 4. The server system of claim 1, wherein the hosted management application for at least one of the plurality of networks is configured to receive physical layer information about cables used to make connections in that network that is automatically captured using physical layer information data acquisition technology included in devices of that network. 5. The server system of claim 4, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 6. A method comprising:
executing a respective management application for each of a plurality of networks as a hosted service on one or more servers computers maintained by a third party, wherein each of the plurality of networks is operated by a different enterprise; wherein the hosted management application for each of the plurality of networks is configured to include a documentation function to document connections made using cables in the respective network and a workflow management function to direct a technician in moving, adding, or changing connections made using cables in the respective network; wherein the method further comprises configuring the hosted management application for at least one of the plurality of networks to support a software only configuration in which the documentation and workflow management functions included in that hosted management application are accessed by entities associated with the respective network only using client software executing on one or more client devices associated with the respective network. 7. The method of claim 6, wherein the hosted management application for the at least one of the plurality of networks that is configured to support the software only configuration is configured to be accessed using client software that comprises at least one of:
a web browser running a computer that interacts with a web server associated with that hosted management application; a mobile application executing on a smartphone or other portable device; and an application that interacts with the hosted management application for the at least one of the plurality of networks using a web services interface. 8. The method of claim 6, wherein executing the respective management application for each of the plurality of networks as a hosted service on one or more servers computers maintained by the third party comprises executing a respective one or more instances of the hosted management application for each of the plurality of networks as a hosted service on the one or more servers computers. 9. The method of claim 6, further comprising: receiving, at the respective hosted management application for at least one of the plurality of networks, physical layer information about cables used to make connections in that network that is automatically captured using physical layer information data acquisition technology included in devices of that network. 10. The method of claim 9, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 11. A system comprising:
one or more server computers operated by a third party, wherein the one or more server computers are configured to aggregate physical layer information about each of a plurality of networks as a hosted service, wherein each of the plurality of networks is operated by a different enterprise; devices deployed in a first network included in the plurality of networks, the devices comprising physical layer information data acquisition technology to automatically capture physical layer information about cables used to make connections using the devices; and an appliance deployed in the first network that is configured to run a local agent that receives physical layer information acquired using the physical layer information data acquisition technology in the devices of the first network and communicates at least some of the received physical layer information to the hosted management application for the first network. 12. The system of claim 11, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 13. The system of claim 11, wherein one or more appliances are installed in the first network, each of the one or more appliances running a respective local agent that communicates physical layer information acquired for the first network using the physical layer information data acquisition technology to the hosted management application associated with the first network. 14. The system of claim 11, wherein the hosted management application for more than one network included in the plurality of networks is configured to receive physical layer information about cables used to make connections in said more than one networks that is automatically captured using physical layer information data acquisition technology included in devices included in said more than one networks; and
wherein, for each of said more than one networks, a respective appliance is installed within that network that runs a local agent that communicates physical layer information acquired for that network using the physical layer information data acquisition technology to the hosted management application associated with that network. 15. The system of claim 11, wherein the local agent running on the appliance implements a first interface to communicate with the hosted management application associated with the first network and a second interface to receive physical layer information acquired for the first network using the physical layer information data acquisition technology included in devices of the first network. 16. The system of claim 11, wherein the local agent running on the appliance is configured to automatically discover devices in the first network that include physical layer information data acquisition technology. 17. The system of claim 11, wherein the local agent running on the appliance is configured to automatically discover the hosted management application associated with the first network. 18. An appliance for use in a network maintained by an enterprise, the appliance comprising:
a programmable processor configured to execute software; and a network interface configured to communicate over the network with devices included in the network that include physical layer information data acquisition technology to automatically capture physical layer information about cables used to make connections at the devices, the network interface further configured to communicate with a hosted management application associated with the network that is running on one or more servers maintained by a third party, the one or more servers not being a part of the network maintained by the enterprise; wherein the software is configured to cause the appliance to receive at least some physical layer information acquired by the physical layer information data acquisition technology included in the devices and to communicate at least some of the received physical layer information to the hosted management application associated with the network. 19. The appliance of claim 18, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 20. The appliance of claim 18, wherein the software implements a first interface to communicate with the hosted management application associated with the network and a second interface to receive at least some physical layer information acquired by the physical layer information data acquisition technology included in the devices. 21. The appliance of claim 18, wherein the software is configured to automatically discover devices in the network that include physical layer information data acquisition technology. 22. The appliance of claim 18, wherein the software is configured to automatically discover the hosted management application associated with the network. | One embodiment is directed to a “software only” hosted or cloud-based physical layer management (PLM) system. Another embodiment is directed to a hosted or cloud-based PLM system or Automated Infrastructure Management (AIM) system that uses a hardware appliance that is locally deployed in an enterprises network. Other embodiments are disclosed.1. A server system comprising:
one or more server computers operated by a third party; wherein the one or more server computers are configured to execute a respective management application for each of a plurality of networks as a hosted service, wherein each of the plurality of networks is operated by a different enterprise; wherein the hosted management application for each of the plurality of networks is configured to include a documentation function to document connections made using cables in the respective network and a workflow management function to direct a technician in moving, adding, or changing connections made using cables in the respective network; and wherein the hosted management application for at least one of the plurality of networks is configured to support a software only configuration in which the documentation and workflow management functions included in that hosted management application are accessed by entities associated with the respective network only using client software executing on one or more client devices associated with the respective network. 2. The server system of claim 1, wherein the hosted management application for the at least one of the plurality of networks that is configured to support the software only configuration is configured to be accessed using client software that comprises at least one of:
a web browser running a computer that interacts with a web server associated with that hosted management application; a mobile application executing on a smartphone or other portable device; and an application that interacts with the hosted management application for the at least one of the plurality of networks using a web services interface. 3. The server system of claim 1, wherein the hosted management application for each of the plurality of networks comprises a respective one or more instances of the hosted management application executed on one or more of the server computers. 4. The server system of claim 1, wherein the hosted management application for at least one of the plurality of networks is configured to receive physical layer information about cables used to make connections in that network that is automatically captured using physical layer information data acquisition technology included in devices of that network. 5. The server system of claim 4, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 6. A method comprising:
executing a respective management application for each of a plurality of networks as a hosted service on one or more servers computers maintained by a third party, wherein each of the plurality of networks is operated by a different enterprise; wherein the hosted management application for each of the plurality of networks is configured to include a documentation function to document connections made using cables in the respective network and a workflow management function to direct a technician in moving, adding, or changing connections made using cables in the respective network; wherein the method further comprises configuring the hosted management application for at least one of the plurality of networks to support a software only configuration in which the documentation and workflow management functions included in that hosted management application are accessed by entities associated with the respective network only using client software executing on one or more client devices associated with the respective network. 7. The method of claim 6, wherein the hosted management application for the at least one of the plurality of networks that is configured to support the software only configuration is configured to be accessed using client software that comprises at least one of:
a web browser running a computer that interacts with a web server associated with that hosted management application; a mobile application executing on a smartphone or other portable device; and an application that interacts with the hosted management application for the at least one of the plurality of networks using a web services interface. 8. The method of claim 6, wherein executing the respective management application for each of the plurality of networks as a hosted service on one or more servers computers maintained by the third party comprises executing a respective one or more instances of the hosted management application for each of the plurality of networks as a hosted service on the one or more servers computers. 9. The method of claim 6, further comprising: receiving, at the respective hosted management application for at least one of the plurality of networks, physical layer information about cables used to make connections in that network that is automatically captured using physical layer information data acquisition technology included in devices of that network. 10. The method of claim 9, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 11. A system comprising:
one or more server computers operated by a third party, wherein the one or more server computers are configured to aggregate physical layer information about each of a plurality of networks as a hosted service, wherein each of the plurality of networks is operated by a different enterprise; devices deployed in a first network included in the plurality of networks, the devices comprising physical layer information data acquisition technology to automatically capture physical layer information about cables used to make connections using the devices; and an appliance deployed in the first network that is configured to run a local agent that receives physical layer information acquired using the physical layer information data acquisition technology in the devices of the first network and communicates at least some of the received physical layer information to the hosted management application for the first network. 12. The system of claim 11, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 13. The system of claim 11, wherein one or more appliances are installed in the first network, each of the one or more appliances running a respective local agent that communicates physical layer information acquired for the first network using the physical layer information data acquisition technology to the hosted management application associated with the first network. 14. The system of claim 11, wherein the hosted management application for more than one network included in the plurality of networks is configured to receive physical layer information about cables used to make connections in said more than one networks that is automatically captured using physical layer information data acquisition technology included in devices included in said more than one networks; and
wherein, for each of said more than one networks, a respective appliance is installed within that network that runs a local agent that communicates physical layer information acquired for that network using the physical layer information data acquisition technology to the hosted management application associated with that network. 15. The system of claim 11, wherein the local agent running on the appliance implements a first interface to communicate with the hosted management application associated with the first network and a second interface to receive physical layer information acquired for the first network using the physical layer information data acquisition technology included in devices of the first network. 16. The system of claim 11, wherein the local agent running on the appliance is configured to automatically discover devices in the first network that include physical layer information data acquisition technology. 17. The system of claim 11, wherein the local agent running on the appliance is configured to automatically discover the hosted management application associated with the first network. 18. An appliance for use in a network maintained by an enterprise, the appliance comprising:
a programmable processor configured to execute software; and a network interface configured to communicate over the network with devices included in the network that include physical layer information data acquisition technology to automatically capture physical layer information about cables used to make connections at the devices, the network interface further configured to communicate with a hosted management application associated with the network that is running on one or more servers maintained by a third party, the one or more servers not being a part of the network maintained by the enterprise; wherein the software is configured to cause the appliance to receive at least some physical layer information acquired by the physical layer information data acquisition technology included in the devices and to communicate at least some of the received physical layer information to the hosted management application associated with the network. 19. The appliance of claim 18, wherein the physical layer information data acquisition technology comprises one or more of EEPROM-based technology, RFID technology, ninth wire technology, and inference-based technology. 20. The appliance of claim 18, wherein the software implements a first interface to communicate with the hosted management application associated with the network and a second interface to receive at least some physical layer information acquired by the physical layer information data acquisition technology included in the devices. 21. The appliance of claim 18, wherein the software is configured to automatically discover devices in the network that include physical layer information data acquisition technology. 22. The appliance of claim 18, wherein the software is configured to automatically discover the hosted management application associated with the network. | 2,400 |
8,313 | 8,313 | 15,560,177 | 2,419 | A stereo camera attached to a vehicular main body has a first image pick-up portion and a second image pick-up portion. An optical axis of the first image pick-up portion and an optical axis of the second image pick-up portion are inclined toward the work implement at angles different from each other with respect to a central axis of a work implement in a plan view as a distance from the vehicular main body is greater. | 1. A work vehicle comprising:
a vehicular main body; a work implement attached to the vehicular main body, the work implement having a central axis in a plan view; and a stereo camera attached to the vehicular main body, the stereo camera having a first image pick-up portion and a second image pick-up portion, and an optical axis of the first image pick-up portion and an optical axis of the second image pick-up portion being inclined toward the work implement at angles different from each other with respect to the central axis in a plan view as a distance from the vehicular main body is greater. 2. The work vehicle according to claim 1, wherein
the first image pick-up portion is arranged at a position more distant from the work implement than the second image pick-up portion in a lateral direction of the vehicular main body, and an angle of inclination of the optical axis of the first image pick-up portion with respect to the central axis is greater than an angle of inclination of the optical axis of the second image pick-up portion with respect to the central axis. 3. The work vehicle according to claim 1, wherein
the stereo camera is configured to be able to pick up a vertically long image. 4. The work vehicle according to claim 1, the work vehicle further comprising another stereo camera attached to the vehicular main body, wherein
the another stereo camera has a third image pick-up portion and a fourth image pick-up portion, and an optical axis of the third image pick-up portion and an optical axis of the fourth image pick-up portion are inclined toward the work implement at angles different from each other with respect to the central axis in the plan view as the distance from the vehicular main body is greater. 5. The work vehicle according to claim 4, wherein
the stereo camera picks up an image of a first image pick-up range, and the another stereo camera picks up an image of a second image pick-up range above or beyond the first image pick-up range. 6. The work vehicle according to claim 4, wherein
the optical axis of the third image pick-up portion and the optical axis of the fourth image pick-up portion form a downward angle from a horizontal direction in front of the vehicular main body. 7. The work vehicle according to claim 4, wherein
the another stereo camera is configured to be able to pick up a vertically long image. 8. The work vehicle according to claim 4, wherein
the first image pick-up portion, the second image pick-up portion, the third image pick-up portion, and the fourth image pick-up portion are arranged at identical positions in an upward/downward direction. 9. The work vehicle according to claim 1, the work vehicle further comprising a cab, wherein
the first image pick-up portion and the second image pick-up portion are arranged in the cab. | A stereo camera attached to a vehicular main body has a first image pick-up portion and a second image pick-up portion. An optical axis of the first image pick-up portion and an optical axis of the second image pick-up portion are inclined toward the work implement at angles different from each other with respect to a central axis of a work implement in a plan view as a distance from the vehicular main body is greater.1. A work vehicle comprising:
a vehicular main body; a work implement attached to the vehicular main body, the work implement having a central axis in a plan view; and a stereo camera attached to the vehicular main body, the stereo camera having a first image pick-up portion and a second image pick-up portion, and an optical axis of the first image pick-up portion and an optical axis of the second image pick-up portion being inclined toward the work implement at angles different from each other with respect to the central axis in a plan view as a distance from the vehicular main body is greater. 2. The work vehicle according to claim 1, wherein
the first image pick-up portion is arranged at a position more distant from the work implement than the second image pick-up portion in a lateral direction of the vehicular main body, and an angle of inclination of the optical axis of the first image pick-up portion with respect to the central axis is greater than an angle of inclination of the optical axis of the second image pick-up portion with respect to the central axis. 3. The work vehicle according to claim 1, wherein
the stereo camera is configured to be able to pick up a vertically long image. 4. The work vehicle according to claim 1, the work vehicle further comprising another stereo camera attached to the vehicular main body, wherein
the another stereo camera has a third image pick-up portion and a fourth image pick-up portion, and an optical axis of the third image pick-up portion and an optical axis of the fourth image pick-up portion are inclined toward the work implement at angles different from each other with respect to the central axis in the plan view as the distance from the vehicular main body is greater. 5. The work vehicle according to claim 4, wherein
the stereo camera picks up an image of a first image pick-up range, and the another stereo camera picks up an image of a second image pick-up range above or beyond the first image pick-up range. 6. The work vehicle according to claim 4, wherein
the optical axis of the third image pick-up portion and the optical axis of the fourth image pick-up portion form a downward angle from a horizontal direction in front of the vehicular main body. 7. The work vehicle according to claim 4, wherein
the another stereo camera is configured to be able to pick up a vertically long image. 8. The work vehicle according to claim 4, wherein
the first image pick-up portion, the second image pick-up portion, the third image pick-up portion, and the fourth image pick-up portion are arranged at identical positions in an upward/downward direction. 9. The work vehicle according to claim 1, the work vehicle further comprising a cab, wherein
the first image pick-up portion and the second image pick-up portion are arranged in the cab. | 2,400 |
8,314 | 8,314 | 15,043,978 | 2,482 | A viewing device, a method of displaying streamed data frames and a client viewing device are disclosed herein. In one embodiment, the video viewing device includes: (1) a screen, (2) a decoder configured to decode a data frame received in a bitstream from a transmitter to provide a decoded data frame, and (3) an error concealer configured to either discard the decoded data frame or select the decoded data frame for display on the screen based on a complexity of the decoded data frame. | 1. A video viewing device, comprising:
a screen; a decoder configured to decode a data frame received in a bitstream from a transmitter to provide a decoded data frame; and an error concealer configured to either discard said decoded data frame or select said decoded data frame for display on said screen based on a complexity of said decoded data frame. 2. The video viewing device as recited in claim 1 wherein said error concealer is further configured to determine said complexity based on frame statistics of said data frame. 3. The video viewing device as recited in claim 2 wherein said frame statistics include at least one statistic selected from the group consisting of:
average bits per macro-block in said data frame, motion information,
number of inter macro-blocks in said data frame,
number of intra macro-blocks in said data frame, and
PSNR between consecutive data frames of said data frame. 4. The video viewing device as recited in claim 2 wherein said error concealer receives at least one of said frame statistics from said transmitter. 5. The video viewing device as recited in claim 1 wherein said frame statistics are generated during decoding by said decoder. 6. The video viewing device as recited in claim 1 wherein said error concealer is configured to discard said decoded data frame when said complexity is greater than a complexity threshold. 7. The video viewing device as recited in claim 1 wherein said error concealer receives a preliminary frame complexity decision from said transmitter. 8. A method of displaying streamed data frames, comprising:
decoding data frames received in a bit stream to generate decoded data frames; determining a complexity of said decoded data frames; and displaying at least some of said decoded data frames based on said determining. 9. The method as recited in claim 8 wherein said determining said complexity is based on statistics selected from the group of frame statistics consisting of:
average bits per macro-block in said data frame, motion information,
number of inter macro-blocks in said data frame,
number of intra macro-blocks in said data frame, and
PSNR between consecutive data frames. 10. The method as recited in claim 8 further comprising discarding B1 frames of said data frames. 11. The method as recited in claim 10 wherein said determining includes determining a complexity of B2 frames of said decoded data frames. 12. The method as recited in claim 9 further comprising generating frame statistics during said decoding. 13. The method as recited in claim 9 further comprising receiving said frame statistics via said bit stream. 14. The method as recited in claim 8 wherein said displaying is based on a low complexity. 15. A client viewing device for displaying video frames, comprising:
a video screen; and a processor configured to select decoded data frames to display on said video screen according to a complexity of said decoded data frames. 16. The client viewing device as recited in claim 15 wherein said decoded data frames are B2 frames. 17. The client viewing device as recited in claim 15 wherein said processor determines said complexity based on frame statistics of said decoded data frames. 18. The client viewing device as recited in claim 15 further comprising a decoder that generates said decoded data frames from a received bit stream. 19. The client viewing device as recited in claim 18 further comprising a network interface configured to receive said bit stream from a transmitter. 20. The client viewing device as recited in claim 15 wherein said processor is configured to determine said complexity of said decoded data frames based on a preliminary frame complexity decision received from said transmitter and frame statistics obtained at said client viewing device. | A viewing device, a method of displaying streamed data frames and a client viewing device are disclosed herein. In one embodiment, the video viewing device includes: (1) a screen, (2) a decoder configured to decode a data frame received in a bitstream from a transmitter to provide a decoded data frame, and (3) an error concealer configured to either discard the decoded data frame or select the decoded data frame for display on the screen based on a complexity of the decoded data frame.1. A video viewing device, comprising:
a screen; a decoder configured to decode a data frame received in a bitstream from a transmitter to provide a decoded data frame; and an error concealer configured to either discard said decoded data frame or select said decoded data frame for display on said screen based on a complexity of said decoded data frame. 2. The video viewing device as recited in claim 1 wherein said error concealer is further configured to determine said complexity based on frame statistics of said data frame. 3. The video viewing device as recited in claim 2 wherein said frame statistics include at least one statistic selected from the group consisting of:
average bits per macro-block in said data frame, motion information,
number of inter macro-blocks in said data frame,
number of intra macro-blocks in said data frame, and
PSNR between consecutive data frames of said data frame. 4. The video viewing device as recited in claim 2 wherein said error concealer receives at least one of said frame statistics from said transmitter. 5. The video viewing device as recited in claim 1 wherein said frame statistics are generated during decoding by said decoder. 6. The video viewing device as recited in claim 1 wherein said error concealer is configured to discard said decoded data frame when said complexity is greater than a complexity threshold. 7. The video viewing device as recited in claim 1 wherein said error concealer receives a preliminary frame complexity decision from said transmitter. 8. A method of displaying streamed data frames, comprising:
decoding data frames received in a bit stream to generate decoded data frames; determining a complexity of said decoded data frames; and displaying at least some of said decoded data frames based on said determining. 9. The method as recited in claim 8 wherein said determining said complexity is based on statistics selected from the group of frame statistics consisting of:
average bits per macro-block in said data frame, motion information,
number of inter macro-blocks in said data frame,
number of intra macro-blocks in said data frame, and
PSNR between consecutive data frames. 10. The method as recited in claim 8 further comprising discarding B1 frames of said data frames. 11. The method as recited in claim 10 wherein said determining includes determining a complexity of B2 frames of said decoded data frames. 12. The method as recited in claim 9 further comprising generating frame statistics during said decoding. 13. The method as recited in claim 9 further comprising receiving said frame statistics via said bit stream. 14. The method as recited in claim 8 wherein said displaying is based on a low complexity. 15. A client viewing device for displaying video frames, comprising:
a video screen; and a processor configured to select decoded data frames to display on said video screen according to a complexity of said decoded data frames. 16. The client viewing device as recited in claim 15 wherein said decoded data frames are B2 frames. 17. The client viewing device as recited in claim 15 wherein said processor determines said complexity based on frame statistics of said decoded data frames. 18. The client viewing device as recited in claim 15 further comprising a decoder that generates said decoded data frames from a received bit stream. 19. The client viewing device as recited in claim 18 further comprising a network interface configured to receive said bit stream from a transmitter. 20. The client viewing device as recited in claim 15 wherein said processor is configured to determine said complexity of said decoded data frames based on a preliminary frame complexity decision received from said transmitter and frame statistics obtained at said client viewing device. | 2,400 |
8,315 | 8,315 | 14,285,483 | 2,484 | Various other embodiments enable a processing device to receive at least a first set of images from a capture device. In some cases, the first set of images is a video clip captured using a first frame rate over a first duration of time. In some embodiments, the processing device analyzes the first set of images to determine one or more properties associated with the images. Based upon the determined properties, some embodiments modify and playback the first set of images at a second frame rate over a second duration of time. | 1. A computer-implemented method comprising:
receiving at least a first set of images; analyzing the at least first set of images to determine at least one property; determining at least one playback parameter; modifying the at least first set of images based, at least in part, upon the at least one playback parameter and the at least one property; and playing back the at least first modified set of images. 2. The computer-implemented method of claim 1, wherein the at least first set of images comprises a video. 3. The computer-implemented method of claim 1, wherein the at least one playback parameter comprises a playback frame rate. 4. The computer-implemented method of claim 3, wherein the playback frame rate is different from a capture frame rate associated with the at least first set of images. 5. The computer-implemented method of claim 1, wherein analyzing the at least first set of images further comprises analyzing image content associated with the at least first set of images. 6. The computer-implemented method of claim 5, wherein analyzing the image content further comprises measuring image similarity. 7. The computer-implemented method of claim 1, wherein modifying the at least first set of images further comprises extracting a subset of images from the at least first set of images. 8. One or more computer-readable storage memories comprising processor-executable instructions which, when executed, are configured to perform operations comprising:
receiving at least a first video; analyzing image content associated with the at least first video to determine at least one image quality metric; modifying the at least first video based, at least in part, on the at least one image quality metric; and playing back the at least first modified video. 9. The one or more computer-readable storage memories of claim 8, wherein determining at least one image quality metric further comprises generating at least one of:
a global domain metric; an intermediate domain metric; a feature point metric; or a geometry metric. 10. The one or more computer-readable storage memories of claim 8, wherein modifying the at least first video further comprises removing at least some images from the at least first video that are identified to be duplicates of one another. 11. The one or more computer-readable storage memories of claim 8, the processor-executable instructions further configured to perform operations comprising:
analyzing at least one audio track effective to determine at least one audio property; and playing back the at least first modified video synchronized to the at least one audio track based, at least in part, on the at least one audio property. 12. The one or more computer-readable storage memories of claim 11, the processor-executable instructions further configured to perform operations comprising:
synchronizing playback of the at least first modified video and the at least one audio track via a photo story. 13. The one or more computer-readable storage memories of claim 12, wherein the photo story comprises at least one still image and at least one video. 14. The one or more computer-readable storage memories of claim 8, wherein playing back the at least first modified video further comprises playing back the at least first modified video at a playback frame rate that is different from a capture frame rate associated with the at least first video. 15. A device comprising:
at least one processor; and one or more computer-readable storage memories comprising processor-executable instructions which, when executed by the at least one processor, are configured to perform operations comprising:
receiving at least a first set of images;
analyzing the at least first set of images to determine at least one property associated with the at least first set of images;
modifying the at least first set of images based, at least in part, on the at least one property; and
playing back the at least first modified set of images. 16. The device of claim 15, wherein analyzing the at least first set of images further comprises analyzing the at least first set of images to determine one or more portions of the at least first set of images that include movement. 17. The device of claim 16, wherein modifying the at least first set of images further comprises:
selecting the one or more determined portions of the at least first set of images that are determined to include movement for playback; and removing one or more portions of the at least first set of images, that are determined to not include movement, from playback. 18. The device of claim 15, wherein the at least first set of images comprises a video. 19. The device of claim 15, wherein playing back of the at least first modified set of images further comprises playing back the at least first modified set of images via a photo story. 20. The device of claim 15, the processor-executable instructions further configured to perform operations comprising:
analyzing at least one audio track effective to determine at least one audio property; and playing back the at least first modified set of images to the at least one audio track based, at least in part, on the at least one audio property. | Various other embodiments enable a processing device to receive at least a first set of images from a capture device. In some cases, the first set of images is a video clip captured using a first frame rate over a first duration of time. In some embodiments, the processing device analyzes the first set of images to determine one or more properties associated with the images. Based upon the determined properties, some embodiments modify and playback the first set of images at a second frame rate over a second duration of time.1. A computer-implemented method comprising:
receiving at least a first set of images; analyzing the at least first set of images to determine at least one property; determining at least one playback parameter; modifying the at least first set of images based, at least in part, upon the at least one playback parameter and the at least one property; and playing back the at least first modified set of images. 2. The computer-implemented method of claim 1, wherein the at least first set of images comprises a video. 3. The computer-implemented method of claim 1, wherein the at least one playback parameter comprises a playback frame rate. 4. The computer-implemented method of claim 3, wherein the playback frame rate is different from a capture frame rate associated with the at least first set of images. 5. The computer-implemented method of claim 1, wherein analyzing the at least first set of images further comprises analyzing image content associated with the at least first set of images. 6. The computer-implemented method of claim 5, wherein analyzing the image content further comprises measuring image similarity. 7. The computer-implemented method of claim 1, wherein modifying the at least first set of images further comprises extracting a subset of images from the at least first set of images. 8. One or more computer-readable storage memories comprising processor-executable instructions which, when executed, are configured to perform operations comprising:
receiving at least a first video; analyzing image content associated with the at least first video to determine at least one image quality metric; modifying the at least first video based, at least in part, on the at least one image quality metric; and playing back the at least first modified video. 9. The one or more computer-readable storage memories of claim 8, wherein determining at least one image quality metric further comprises generating at least one of:
a global domain metric; an intermediate domain metric; a feature point metric; or a geometry metric. 10. The one or more computer-readable storage memories of claim 8, wherein modifying the at least first video further comprises removing at least some images from the at least first video that are identified to be duplicates of one another. 11. The one or more computer-readable storage memories of claim 8, the processor-executable instructions further configured to perform operations comprising:
analyzing at least one audio track effective to determine at least one audio property; and playing back the at least first modified video synchronized to the at least one audio track based, at least in part, on the at least one audio property. 12. The one or more computer-readable storage memories of claim 11, the processor-executable instructions further configured to perform operations comprising:
synchronizing playback of the at least first modified video and the at least one audio track via a photo story. 13. The one or more computer-readable storage memories of claim 12, wherein the photo story comprises at least one still image and at least one video. 14. The one or more computer-readable storage memories of claim 8, wherein playing back the at least first modified video further comprises playing back the at least first modified video at a playback frame rate that is different from a capture frame rate associated with the at least first video. 15. A device comprising:
at least one processor; and one or more computer-readable storage memories comprising processor-executable instructions which, when executed by the at least one processor, are configured to perform operations comprising:
receiving at least a first set of images;
analyzing the at least first set of images to determine at least one property associated with the at least first set of images;
modifying the at least first set of images based, at least in part, on the at least one property; and
playing back the at least first modified set of images. 16. The device of claim 15, wherein analyzing the at least first set of images further comprises analyzing the at least first set of images to determine one or more portions of the at least first set of images that include movement. 17. The device of claim 16, wherein modifying the at least first set of images further comprises:
selecting the one or more determined portions of the at least first set of images that are determined to include movement for playback; and removing one or more portions of the at least first set of images, that are determined to not include movement, from playback. 18. The device of claim 15, wherein the at least first set of images comprises a video. 19. The device of claim 15, wherein playing back of the at least first modified set of images further comprises playing back the at least first modified set of images via a photo story. 20. The device of claim 15, the processor-executable instructions further configured to perform operations comprising:
analyzing at least one audio track effective to determine at least one audio property; and playing back the at least first modified set of images to the at least one audio track based, at least in part, on the at least one audio property. | 2,400 |
8,316 | 8,316 | 15,179,010 | 2,412 | A device, system, and method adaptively adjusts monitoring for opportunities. The method is performed at a user equipment (UE) configured to control an operation of a transceiver, the transceiver configured to enable the UE to establish a connection with a Long Term Evolution (LTE) network, the user equipment and the LTE network configured with and utilizing a Connected Discontinuous Reception (CDRX) functionality. The method includes receiving a response from the LTE network for an uplink transmission. When the response is an acknowledgement (ACK), the method includes determining whether a value of a network parameter associated with the connection with the LTE network satisfies a predetermined threshold. When the network parameter satisfies the predetermined threshold, the method includes omitting a monitoring opportunity to verify that the ACK is a true ACK. | 1. A method, comprising:
at a user equipment (UE) configured to control an operation of a transceiver, the transceiver configured to enable the UE to establish a connection with a Long Term Evolution (LTE) network, the user equipment and the LTE network configured with and utilizing a Connected Discontinuous Reception (CDRX) functionality: receiving a response from the LTE network for an uplink transmission; when the response is an acknowledgement (ACK), determining whether a value of a network parameter associated with the connection with the LTE network satisfies a predetermined threshold; and when the network parameter satisfies the predetermined threshold, omitting a monitoring opportunity to verify that the ACK is a true ACK. 2. The method of claim 1, wherein the network parameter is a block error rate (BLER) value, a downlink signal to noise ratio (SNR), a Doppler value, a transmission time interval (TTI) bundling (TTI-B) value, a power headroom value, or a combination thereof. 3. The method of claim 2, wherein the predetermined threshold for the BLER value is a maximum of 10%. 4. The method of claim 2, wherein the predetermined threshold for the downlink SNR is a minimum value, wherein the predetermined threshold for the Doppler value is a maximum value, wherein the predetermined threshold for the TTI-B value is a disabled value, and wherein the predetermined threshold for the power headroom value is a minimum value. 5. The method of claim 1, further comprising:
determining a time period since the network parameter was last measured; and when the time period is greater than a predetermined amount, monitoring the network parameter to update the value of the network parameter. 6. The method of claim 5, wherein the time period is when thirty-two or sixty-four uplink transmissions have been performed. 7. The method of claim 1, further comprising:
when the response is a negative acknowledgement (NACK), continuously performing the monitoring opportunity until the response is an ACK. 8. The method of claim 1, further comprising:
when the network parameter fails the predetermined threshold, performing the monitoring opportunity to verify that the ACK is a true ACK. 9. The method of claim 1, further comprising:
when the network parameter satisfies the predetermined threshold, determining whether the uplink transmission qualifies as an evaluation transmission; and when the uplink transmission qualifies as the evaluation transmission, performing the monitoring opportunity to verify that the ACK is a true ACK. 10. The method of claim 1, wherein the UE is performing a voice over LTE (VoLTE) call. 11. A user equipment, comprising:
a transceiver configured to enable the user equipment to establish a connection with a network, the user equipment and the network configured with and utilizing a discontinuous reception functionality; and a processor configured to control an operation of the transceiver by: receiving a response from the network for an uplink transmission; when the response is an acknowledgement (ACK), determining whether a value of a network parameter associated with the connection with the network satisfies a predetermined threshold; and when the network parameter satisfies the predetermined threshold, omitting a monitoring opportunity to verify that the ACK is a true ACK. 12. The user equipment of claim 11, wherein the network parameter is a block error rate (BLER) value, a downlink signal to noise ratio (SNR), a Doppler value, a transmission time interval (TTI) bundling (TTI-B) value, a power headroom value, or a combination thereof. 13. The user equipment of claim 12, wherein the predetermined threshold for the BLER value is a maximum of 10%. 14. The user equipment of claim 12, wherein the predetermined threshold for the downlink SNR is a minimum value, wherein the predetermined threshold for the Doppler value is a maximum value, wherein the predetermined threshold for the TTI-B value is a disabled value, and wherein the predetermined threshold for the power headroom value is a minimum value. 15. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
determining a time period since the network parameter was last measured; and when the time period is greater than a predetermined amount, monitoring the network parameter to update the value of the network parameter. 16. The user equipment of claim 15, wherein the time period is when thirty-two or sixty-four uplink transmissions have been performed. 17. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
when the response is a negative acknowledgement (NACK), continuously performing the monitoring opportunity until the response is an ACK. 18. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
when the network parameter fails the predetermined threshold, performing the monitoring opportunity to verify that the ACK is a true ACK. 19. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
when the network parameter satisfies the predetermined threshold, determining whether the uplink transmission qualifies as an evaluation transmission; and when the uplink transmission qualifies as the evaluation transmission, performing the monitoring opportunity to verify that the ACK is a true ACK. 20. An integrated circuit, comprising:
input circuitry configured to receive a response from a Long Term Evolution (LTE) network for an uplink transmission via a connection established with the LTE network; processing circuitry configured to perform a Connected Discontinuous Reception (CDRX) functionality, wherein, when the response is an acknowledgement (ACK), the processing circuitry is configured to determine whether a value of a network parameter associated with the connection with the LTE network satisfies a predetermined threshold, and when the network parameter satisfies the predetermined threshold, the processing circuitry is configured to enter a lower power state and omit a monitoring opportunity to verify that the ACK is a true ACK. | A device, system, and method adaptively adjusts monitoring for opportunities. The method is performed at a user equipment (UE) configured to control an operation of a transceiver, the transceiver configured to enable the UE to establish a connection with a Long Term Evolution (LTE) network, the user equipment and the LTE network configured with and utilizing a Connected Discontinuous Reception (CDRX) functionality. The method includes receiving a response from the LTE network for an uplink transmission. When the response is an acknowledgement (ACK), the method includes determining whether a value of a network parameter associated with the connection with the LTE network satisfies a predetermined threshold. When the network parameter satisfies the predetermined threshold, the method includes omitting a monitoring opportunity to verify that the ACK is a true ACK.1. A method, comprising:
at a user equipment (UE) configured to control an operation of a transceiver, the transceiver configured to enable the UE to establish a connection with a Long Term Evolution (LTE) network, the user equipment and the LTE network configured with and utilizing a Connected Discontinuous Reception (CDRX) functionality: receiving a response from the LTE network for an uplink transmission; when the response is an acknowledgement (ACK), determining whether a value of a network parameter associated with the connection with the LTE network satisfies a predetermined threshold; and when the network parameter satisfies the predetermined threshold, omitting a monitoring opportunity to verify that the ACK is a true ACK. 2. The method of claim 1, wherein the network parameter is a block error rate (BLER) value, a downlink signal to noise ratio (SNR), a Doppler value, a transmission time interval (TTI) bundling (TTI-B) value, a power headroom value, or a combination thereof. 3. The method of claim 2, wherein the predetermined threshold for the BLER value is a maximum of 10%. 4. The method of claim 2, wherein the predetermined threshold for the downlink SNR is a minimum value, wherein the predetermined threshold for the Doppler value is a maximum value, wherein the predetermined threshold for the TTI-B value is a disabled value, and wherein the predetermined threshold for the power headroom value is a minimum value. 5. The method of claim 1, further comprising:
determining a time period since the network parameter was last measured; and when the time period is greater than a predetermined amount, monitoring the network parameter to update the value of the network parameter. 6. The method of claim 5, wherein the time period is when thirty-two or sixty-four uplink transmissions have been performed. 7. The method of claim 1, further comprising:
when the response is a negative acknowledgement (NACK), continuously performing the monitoring opportunity until the response is an ACK. 8. The method of claim 1, further comprising:
when the network parameter fails the predetermined threshold, performing the monitoring opportunity to verify that the ACK is a true ACK. 9. The method of claim 1, further comprising:
when the network parameter satisfies the predetermined threshold, determining whether the uplink transmission qualifies as an evaluation transmission; and when the uplink transmission qualifies as the evaluation transmission, performing the monitoring opportunity to verify that the ACK is a true ACK. 10. The method of claim 1, wherein the UE is performing a voice over LTE (VoLTE) call. 11. A user equipment, comprising:
a transceiver configured to enable the user equipment to establish a connection with a network, the user equipment and the network configured with and utilizing a discontinuous reception functionality; and a processor configured to control an operation of the transceiver by: receiving a response from the network for an uplink transmission; when the response is an acknowledgement (ACK), determining whether a value of a network parameter associated with the connection with the network satisfies a predetermined threshold; and when the network parameter satisfies the predetermined threshold, omitting a monitoring opportunity to verify that the ACK is a true ACK. 12. The user equipment of claim 11, wherein the network parameter is a block error rate (BLER) value, a downlink signal to noise ratio (SNR), a Doppler value, a transmission time interval (TTI) bundling (TTI-B) value, a power headroom value, or a combination thereof. 13. The user equipment of claim 12, wherein the predetermined threshold for the BLER value is a maximum of 10%. 14. The user equipment of claim 12, wherein the predetermined threshold for the downlink SNR is a minimum value, wherein the predetermined threshold for the Doppler value is a maximum value, wherein the predetermined threshold for the TTI-B value is a disabled value, and wherein the predetermined threshold for the power headroom value is a minimum value. 15. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
determining a time period since the network parameter was last measured; and when the time period is greater than a predetermined amount, monitoring the network parameter to update the value of the network parameter. 16. The user equipment of claim 15, wherein the time period is when thirty-two or sixty-four uplink transmissions have been performed. 17. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
when the response is a negative acknowledgement (NACK), continuously performing the monitoring opportunity until the response is an ACK. 18. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
when the network parameter fails the predetermined threshold, performing the monitoring opportunity to verify that the ACK is a true ACK. 19. The user equipment of claim 11, wherein the processor is configured to control the operation of the transceiver by:
when the network parameter satisfies the predetermined threshold, determining whether the uplink transmission qualifies as an evaluation transmission; and when the uplink transmission qualifies as the evaluation transmission, performing the monitoring opportunity to verify that the ACK is a true ACK. 20. An integrated circuit, comprising:
input circuitry configured to receive a response from a Long Term Evolution (LTE) network for an uplink transmission via a connection established with the LTE network; processing circuitry configured to perform a Connected Discontinuous Reception (CDRX) functionality, wherein, when the response is an acknowledgement (ACK), the processing circuitry is configured to determine whether a value of a network parameter associated with the connection with the LTE network satisfies a predetermined threshold, and when the network parameter satisfies the predetermined threshold, the processing circuitry is configured to enter a lower power state and omit a monitoring opportunity to verify that the ACK is a true ACK. | 2,400 |
8,317 | 8,317 | 15,082,768 | 2,493 | A method and proxy device for securing an access to a cloud-based application are presented. The method includes receiving an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receiving, from an agent executed in the client device, a client certificate; retrieving, from a compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identifying an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved device posture; and determining whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy. | 1. A method for securing an access to a cloud-based application, comprising:
receiving an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receiving, from an agent executed in the client device, a client certificate; retrieving, from a compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identifying an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved device posture; and determining whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy. 2. The method of claim 1, further comprising:
checking if the agent is installed in the client device; and causing at least one of: installation of the agent in the client device and execution of the agent in the client device, when the client device does not include the agent. 3. The method of claim 1, wherein the device posture characterizes at least security capabilities that the client device is configured with. 4. The method of claim 3, wherein the device posture includes at least a set of compliance parameters and a unique certificate associated with the client device. 5. The method of claim 4, wherein each compliance parameter includes a compliance status of at least one of: at least one security capability of the client device. 6. The method of claim 4, wherein the device posture is compiled using information provided by at least one of: a central authentication system, an end-point Data Loss Prevention (DLP) service, a network access control (NAC) service, and a mobile device management (MDM) service. 7. The method of claim 1, wherein the access policy includes a plurality of attributes, a plurality of conditions, and a policy action. 8. The method of claim 7, wherein determining whether to grant an access to the cloud-based application further comprises:
determining which of the plurality conditions and of the plurality of attributes set in the access policy are met; and allowing an access to the cloud-based application based on the determined met conditions and attributes. 9. The method of claim 8, wherein the policy action includes any one of:
allow full access, block access, and allow limited access. 10. The method of claim 8, wherein the determination of which of the plurality conditions and attributes are met is performed using information retrieved from at least one of: a central authentication system, a compliance server, an external reputation service, and a lightweight directory access protocol (LDAP) service. 11. The method of claim 1, wherein the client device is any one of: a managed device, and an un-managed device, wherein the managed device and the un-managed device are of the same user. 12. The method of claim 1, wherein the authentication token is received from a central authentication system, wherein the central authentication system is any of: a federated identity management (FIdM) system, and a single-sign-on (SSO) server. 13. A computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 14. A proxy device for securing an access to a cloud-based application, comprising:
a processing system; and a memory, the memory containing instructions that, when executed by the processing system, configure the proxy device to: receive an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receive, from an agent executed in the client device, a client certificate; retrieve, from a compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identify an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved posture; and determine whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy. 15. The proxy device of claim 14, wherein the proxy device is further configured to:
check if the agent is installed in the client device; and cause at least one of installation of the agent in the client device and execution of the agent in the client device, when the client device does not include the agent. 16. The proxy device of claim 14, wherein the device posture characterizes at least security capabilities that the client device is configured with. 17. The proxy device of claim 16, wherein the device posture includes at least a set of compliance parameters and a unique certificate associated with the client device. 18. The proxy device of claim 17, wherein each compliance parameter includes a compliance status of at least one of: at least one security capability of the client device. 19. The proxy device of claim 17, wherein the device posture is compiled using information provided by at least one of: a central authentication system, an end-point Data Loss Prevention (DLP) service, a network access control (NAC) service, and a mobile device management (MDM) service. 20. The proxy device of claim 14, wherein the access policy includes a plurality of attributes, a plurality of conditions, and a policy action. 21. The proxy device of claim 20, wherein the proxy device is further configured to:
determine which of the plurality conditions and of the plurality of attributes set in the access policy are met; and allow an access to the cloud-based application based on the determined met conditions and attributes. 22. The proxy device of claim 20, wherein the policy action includes any one of: allow full access, block access, and allow limited access. 23. The proxy device of claim 14, wherein the determination of which of the plurality conditions and attributes are met is performed using information retrieved from at least one of: a central authentication system, a compliance server, an external reputation service, and a lightweight directory access protocol (LDAP) service. 24. The proxy device of claim 14, wherein the client device is any one of: a managed device and un-managed device, wherein the managed device and the un-managed device are of the same user. 25. The proxy device of claim 14, wherein the authentication token is received from a central authentication system, wherein the central authentication system is any of: a federated identity management (FIdM) system, and a single-sign-on (SSO) server. 26. A cloud computing platform, comprising:
at least one server configured to host at least one cloud-based application; a compliance server; a proxy device communicatively connected to the at least one server, wherein the proxy device includes a processing system and a memory; the memory containing instructions that, when executed by the processing system, configure the proxy device to: receive an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receive, from an agent executed in the client device, a client certificate; retrieve, from the compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identify an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved posture; and determine whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy. | A method and proxy device for securing an access to a cloud-based application are presented. The method includes receiving an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receiving, from an agent executed in the client device, a client certificate; retrieving, from a compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identifying an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved device posture; and determining whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy.1. A method for securing an access to a cloud-based application, comprising:
receiving an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receiving, from an agent executed in the client device, a client certificate; retrieving, from a compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identifying an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved device posture; and determining whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy. 2. The method of claim 1, further comprising:
checking if the agent is installed in the client device; and causing at least one of: installation of the agent in the client device and execution of the agent in the client device, when the client device does not include the agent. 3. The method of claim 1, wherein the device posture characterizes at least security capabilities that the client device is configured with. 4. The method of claim 3, wherein the device posture includes at least a set of compliance parameters and a unique certificate associated with the client device. 5. The method of claim 4, wherein each compliance parameter includes a compliance status of at least one of: at least one security capability of the client device. 6. The method of claim 4, wherein the device posture is compiled using information provided by at least one of: a central authentication system, an end-point Data Loss Prevention (DLP) service, a network access control (NAC) service, and a mobile device management (MDM) service. 7. The method of claim 1, wherein the access policy includes a plurality of attributes, a plurality of conditions, and a policy action. 8. The method of claim 7, wherein determining whether to grant an access to the cloud-based application further comprises:
determining which of the plurality conditions and of the plurality of attributes set in the access policy are met; and allowing an access to the cloud-based application based on the determined met conditions and attributes. 9. The method of claim 8, wherein the policy action includes any one of:
allow full access, block access, and allow limited access. 10. The method of claim 8, wherein the determination of which of the plurality conditions and attributes are met is performed using information retrieved from at least one of: a central authentication system, a compliance server, an external reputation service, and a lightweight directory access protocol (LDAP) service. 11. The method of claim 1, wherein the client device is any one of: a managed device, and an un-managed device, wherein the managed device and the un-managed device are of the same user. 12. The method of claim 1, wherein the authentication token is received from a central authentication system, wherein the central authentication system is any of: a federated identity management (FIdM) system, and a single-sign-on (SSO) server. 13. A computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 14. A proxy device for securing an access to a cloud-based application, comprising:
a processing system; and a memory, the memory containing instructions that, when executed by the processing system, configure the proxy device to: receive an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receive, from an agent executed in the client device, a client certificate; retrieve, from a compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identify an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved posture; and determine whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy. 15. The proxy device of claim 14, wherein the proxy device is further configured to:
check if the agent is installed in the client device; and cause at least one of installation of the agent in the client device and execution of the agent in the client device, when the client device does not include the agent. 16. The proxy device of claim 14, wherein the device posture characterizes at least security capabilities that the client device is configured with. 17. The proxy device of claim 16, wherein the device posture includes at least a set of compliance parameters and a unique certificate associated with the client device. 18. The proxy device of claim 17, wherein each compliance parameter includes a compliance status of at least one of: at least one security capability of the client device. 19. The proxy device of claim 17, wherein the device posture is compiled using information provided by at least one of: a central authentication system, an end-point Data Loss Prevention (DLP) service, a network access control (NAC) service, and a mobile device management (MDM) service. 20. The proxy device of claim 14, wherein the access policy includes a plurality of attributes, a plurality of conditions, and a policy action. 21. The proxy device of claim 20, wherein the proxy device is further configured to:
determine which of the plurality conditions and of the plurality of attributes set in the access policy are met; and allow an access to the cloud-based application based on the determined met conditions and attributes. 22. The proxy device of claim 20, wherein the policy action includes any one of: allow full access, block access, and allow limited access. 23. The proxy device of claim 14, wherein the determination of which of the plurality conditions and attributes are met is performed using information retrieved from at least one of: a central authentication system, a compliance server, an external reputation service, and a lightweight directory access protocol (LDAP) service. 24. The proxy device of claim 14, wherein the client device is any one of: a managed device and un-managed device, wherein the managed device and the un-managed device are of the same user. 25. The proxy device of claim 14, wherein the authentication token is received from a central authentication system, wherein the central authentication system is any of: a federated identity management (FIdM) system, and a single-sign-on (SSO) server. 26. A cloud computing platform, comprising:
at least one server configured to host at least one cloud-based application; a compliance server; a proxy device communicatively connected to the at least one server, wherein the proxy device includes a processing system and a memory; the memory containing instructions that, when executed by the processing system, configure the proxy device to: receive an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receive, from an agent executed in the client device, a client certificate; retrieve, from the compliance server, a device posture of the client device, wherein the device posture is retrieved respective of the received client certificate; identify an access policy for the client device to access the cloud-based application, wherein the access policy is identified based at least on the retrieved posture; and determine whether to grant an access to the cloud-based application based in part on the compliance of the client device with the identified access policy. | 2,400 |
8,318 | 8,318 | 14,579,793 | 2,419 | Embodiments of the present invention provide a gateway system and a communication method. The gateway system includes: a control plane entity, connected or integrated with a mobility management network element, and configured to allocate an IP address to UE and configure a data path for connecting a user plane entity with an RAN, a PDN or another gateway; one or more user plane entities, located between the PDN and the RAN, independent of the control plane entity, configured to forward data on the data path configured by the control plane entity. The gateway system is composed of the control plane entity and the user plane entity which are independent of each other, the number of the user plane entities may be independently changed to adapt to the change of network traffic without replacing all gateway entities, the network deployment is more convenient and the cost is lower. | 1. A gateway system comprising:
a control plane entity configured to:
allocate an internet protocol (IP) address to a user equipment (UE),
generate configuration information of a data path according to the IP address, and
send the configuration information of the data path to a user plane entity, wherein the data path is used for connecting the user plane entity with a radio access network (RAN), a packet data network (PDN) or another network element; and
the user plane entity, which is located between the PDN and the RAN, connected with the control plane entity, and configured to:
receive the configuration information of the data path, and
forward uplink and downlink data of the UE on the data path according to the configuration information of the data path. 2. The gateway system of claim 1, wherein the configuration information of the data path comprises at least one of: identification information for the user plane entity, identification information for a peer network element of the user plane entity on the data path, path information for the data path, and association information for the data path. 3. The gateway system of claim 2, wherein one or more of the following conditions are satisfied:
the identification information comprises at least one of: an IP address, a media access control (MAC) address, a port number, and a protocol type, the path information of the data path comprises at least one of: a protocol of the data path, an identifier of the data path, PDN connection information, bearer information, quality of service (QoS) information, service data stream information, and charging manner information, and the association information of the data path comprises at least one of: association information of the UE with the data path, association information of the service data stream of the UE with the data path, association information between a data path for connecting with the PDN and a data path for connecting with the RAN, association information between the data path for connecting with the PDN and a data path for connecting with the other network element, and association information between the data path for connecting with the other network element and the data path for connecting with the RAN. 4. The gateway system of claim 2, wherein the peer network element comprises at least one of: an RAN network element, a virtual private network (VPN) element, a serving gateway (S-GW), a packet data network gateway (P-GW), a packet data gateway (PDG), and a serving general packet radio service supporting node (SGSN) for data forwarding. 5. The gateway system of claim 1, wherein the control plane entity is further configured to:
acquire an IP address resource from one of the user plane entity or an internal configuration of the control plane entity, and allocate the IP address to the UE from the IP address resource. 6. The gateway system of claim 1, wherein,
the user plane entity is further configured to:
collect use information of the data path, and
send the use information to the control plane entity; and
the control plane entity is further configured to:
receive the use information,
generate a charging data record according to the use information, and
report the charging data record to a charging system. 7. The gateway system of claim 1, wherein one or more of the following conditions are satisfied:
the control plane entity comprises at least one of: a control plane gateway, a gateway controller, a control node, and a control gateway; and the user plane entity comprises at least one of: a user plane gateway, a packet data forwarding gateway, a routing forwarding node and a switch node. 8. A control plane gateway device, comprising:
an internet protocol (IP) address allocating module, configured to allocate an IP address to a user equipment (UE); and a data path configuring module, configured to:
generate configuration information of a data path according to the IP address allocated by the IP address allocating module, and
send the configuration information of the data path to user plane gateway device;
wherein the data path is used for connecting the user plane gateway device with a radio access network (RAN), a packet data network (PDN) or another network element, and wherein the user plane gateway device is located between the PDN and the RAN. 9. The device of claim 8, further comprising:
a session managing module, connected with the data path configuring module and the IP address allocating module and configured to process a session signaling that comprises at least one of:
a general packet radio service tunnel protocol control (GTP-C) message between the control plane entity and a mobility management network element,
a general packet radio service tunnel protocol user (GTP-U) message transmitted on an interface between the RAN and the user plane entity, and
an IP message between the user plane entity and the PDN. 10. The device of claim 8, wherein,
the IP address allocating module is specifically configured to:
acquire an IP address resource from one of the user plane entity or an internal configuration of the control plane entity,
select an IP address for the UE from the IP address resource, and
allocate the selected IP address to the UE, or
the IP address allocating module is specifically configured to acquire the IP address from a server outside the control plane entity and allocate the acquired IP address to the UE. 11. The device of claim 9, wherein the control plane entity further comprises a client module, connected with the session managing module and with a server in the PDN, configured to acquire a result of authenticating or authorizing the UE by the server when a data path is newly established by the UE. 12. The device of claim 11, wherein the client module is further configured to acquire the IP address from the server and send the acquired IP address to the IP address allocating module, and
the IP address allocating module is specifically configured to allocate the IP address acquired from the server to the UE. 13. The device of claim 8, wherein the control plane entity further comprises a charging module, connected with a charging system outside the control plane entity, and
the charging module is configured to receive use information of the data path from the user plane gateway device, generate a charging data record according to the use information, and report the generated charging data record to the charging system. 14. The device of claim 9, wherein the control plane entity further comprises a policy and charging enforcement function (PCEF) module, connected with the data path configuring module or the session managing module, configured to:
acquire policy information from an internal configuration or a policy and charging rule function (PCRF) device outside the control plane entity, acquire QoS information from the policy information and send the QoS information to the data path configuring module or send the QoS information to the data path configuring module through the session managing module; wherein the data path information of the generated configuration information comprises the QoS information, and wherein the data path configuring module is further configured to receive the QoS information. 15. A communication method in a gateway system comprising a control plane entity and at least one user plane entity located between a packet data network (PDN) and a radio access network (RAN), wherein the control plane entity is independent of the user plane entity, the method comprising:
allocating, by the control plane entity, an internet protocol (IP) address for user equipment (UE); generating, according to the IP address, configuration information of a data path used for connecting the user plane entity with the radio access network (RAN), the packet data network (PDN) or another network element; sending the configuration information of the data path to the user plane entity; receiving, by the user plane entity, the configuration information of the data path sent by the control plane entity; and forwarding uplink and downlink data of the UE on the data path. 16. The method of claim 15, wherein the configuration information comprises at least one of: identification information of the user plane entity, identification information of a peer network element of the user plane entity on the data path, data path information, and association information of the data path. 17. The method of claim 16, wherein one or more of the following conditions is satisfied:
the identification information comprises at least one of an internet protocol (IP) address, a media access control (MAC) address, a port number, and a protocol type, the data path information comprises at least one of a data path protocol, a data path identifier, PDN connection information, bearer information, quality of service (QoS) information, service data stream information, and charging manner information, the association information of the data path comprises at least one of association information of the UE with the data path, association information of the service data stream of the UE with the data path, association information between a data path for connecting the PDN and a data path for connecting the RAN, association information between the data path for connecting the PDN and a data path for connecting other network element, and association information between the data path for connecting the other network element and the data path for connecting the RAN. 18. The method of claim 17, wherein the peer network element comprises at least one of: an RAN network element, a virtual private network (VPN) element, a serving gateway (S-GW), a packet data network gateway (P-GW), a packet data gateway (PDG), and a serving general packet radio service supporting node (SGSN) for data forwarding. 19. The method of claim 15, wherein allocating the IP address to the UE when the control plane entity receives the connection establishment request of the UE comprises:
acquiring, by the control plane entity from one of the user plane entity or the internal configuration of the control plane entity, an IP address resource, selecting an IP address for the UE from the IP address resource, and allocating the selected IP address to the UE, or acquiring, by the control plane entity, the IP address from a server outside the control plane entity and allocating the acquired IP address to the UE. 20. The method of claim 15, further comprising:
collecting, by the user plane entity, use information of the data path; reporting the use information to the control plane entity; generating, by the control plane entity, a charging data record according to the use information; and reporting the generated charging data record to a charging system. | Embodiments of the present invention provide a gateway system and a communication method. The gateway system includes: a control plane entity, connected or integrated with a mobility management network element, and configured to allocate an IP address to UE and configure a data path for connecting a user plane entity with an RAN, a PDN or another gateway; one or more user plane entities, located between the PDN and the RAN, independent of the control plane entity, configured to forward data on the data path configured by the control plane entity. The gateway system is composed of the control plane entity and the user plane entity which are independent of each other, the number of the user plane entities may be independently changed to adapt to the change of network traffic without replacing all gateway entities, the network deployment is more convenient and the cost is lower.1. A gateway system comprising:
a control plane entity configured to:
allocate an internet protocol (IP) address to a user equipment (UE),
generate configuration information of a data path according to the IP address, and
send the configuration information of the data path to a user plane entity, wherein the data path is used for connecting the user plane entity with a radio access network (RAN), a packet data network (PDN) or another network element; and
the user plane entity, which is located between the PDN and the RAN, connected with the control plane entity, and configured to:
receive the configuration information of the data path, and
forward uplink and downlink data of the UE on the data path according to the configuration information of the data path. 2. The gateway system of claim 1, wherein the configuration information of the data path comprises at least one of: identification information for the user plane entity, identification information for a peer network element of the user plane entity on the data path, path information for the data path, and association information for the data path. 3. The gateway system of claim 2, wherein one or more of the following conditions are satisfied:
the identification information comprises at least one of: an IP address, a media access control (MAC) address, a port number, and a protocol type, the path information of the data path comprises at least one of: a protocol of the data path, an identifier of the data path, PDN connection information, bearer information, quality of service (QoS) information, service data stream information, and charging manner information, and the association information of the data path comprises at least one of: association information of the UE with the data path, association information of the service data stream of the UE with the data path, association information between a data path for connecting with the PDN and a data path for connecting with the RAN, association information between the data path for connecting with the PDN and a data path for connecting with the other network element, and association information between the data path for connecting with the other network element and the data path for connecting with the RAN. 4. The gateway system of claim 2, wherein the peer network element comprises at least one of: an RAN network element, a virtual private network (VPN) element, a serving gateway (S-GW), a packet data network gateway (P-GW), a packet data gateway (PDG), and a serving general packet radio service supporting node (SGSN) for data forwarding. 5. The gateway system of claim 1, wherein the control plane entity is further configured to:
acquire an IP address resource from one of the user plane entity or an internal configuration of the control plane entity, and allocate the IP address to the UE from the IP address resource. 6. The gateway system of claim 1, wherein,
the user plane entity is further configured to:
collect use information of the data path, and
send the use information to the control plane entity; and
the control plane entity is further configured to:
receive the use information,
generate a charging data record according to the use information, and
report the charging data record to a charging system. 7. The gateway system of claim 1, wherein one or more of the following conditions are satisfied:
the control plane entity comprises at least one of: a control plane gateway, a gateway controller, a control node, and a control gateway; and the user plane entity comprises at least one of: a user plane gateway, a packet data forwarding gateway, a routing forwarding node and a switch node. 8. A control plane gateway device, comprising:
an internet protocol (IP) address allocating module, configured to allocate an IP address to a user equipment (UE); and a data path configuring module, configured to:
generate configuration information of a data path according to the IP address allocated by the IP address allocating module, and
send the configuration information of the data path to user plane gateway device;
wherein the data path is used for connecting the user plane gateway device with a radio access network (RAN), a packet data network (PDN) or another network element, and wherein the user plane gateway device is located between the PDN and the RAN. 9. The device of claim 8, further comprising:
a session managing module, connected with the data path configuring module and the IP address allocating module and configured to process a session signaling that comprises at least one of:
a general packet radio service tunnel protocol control (GTP-C) message between the control plane entity and a mobility management network element,
a general packet radio service tunnel protocol user (GTP-U) message transmitted on an interface between the RAN and the user plane entity, and
an IP message between the user plane entity and the PDN. 10. The device of claim 8, wherein,
the IP address allocating module is specifically configured to:
acquire an IP address resource from one of the user plane entity or an internal configuration of the control plane entity,
select an IP address for the UE from the IP address resource, and
allocate the selected IP address to the UE, or
the IP address allocating module is specifically configured to acquire the IP address from a server outside the control plane entity and allocate the acquired IP address to the UE. 11. The device of claim 9, wherein the control plane entity further comprises a client module, connected with the session managing module and with a server in the PDN, configured to acquire a result of authenticating or authorizing the UE by the server when a data path is newly established by the UE. 12. The device of claim 11, wherein the client module is further configured to acquire the IP address from the server and send the acquired IP address to the IP address allocating module, and
the IP address allocating module is specifically configured to allocate the IP address acquired from the server to the UE. 13. The device of claim 8, wherein the control plane entity further comprises a charging module, connected with a charging system outside the control plane entity, and
the charging module is configured to receive use information of the data path from the user plane gateway device, generate a charging data record according to the use information, and report the generated charging data record to the charging system. 14. The device of claim 9, wherein the control plane entity further comprises a policy and charging enforcement function (PCEF) module, connected with the data path configuring module or the session managing module, configured to:
acquire policy information from an internal configuration or a policy and charging rule function (PCRF) device outside the control plane entity, acquire QoS information from the policy information and send the QoS information to the data path configuring module or send the QoS information to the data path configuring module through the session managing module; wherein the data path information of the generated configuration information comprises the QoS information, and wherein the data path configuring module is further configured to receive the QoS information. 15. A communication method in a gateway system comprising a control plane entity and at least one user plane entity located between a packet data network (PDN) and a radio access network (RAN), wherein the control plane entity is independent of the user plane entity, the method comprising:
allocating, by the control plane entity, an internet protocol (IP) address for user equipment (UE); generating, according to the IP address, configuration information of a data path used for connecting the user plane entity with the radio access network (RAN), the packet data network (PDN) or another network element; sending the configuration information of the data path to the user plane entity; receiving, by the user plane entity, the configuration information of the data path sent by the control plane entity; and forwarding uplink and downlink data of the UE on the data path. 16. The method of claim 15, wherein the configuration information comprises at least one of: identification information of the user plane entity, identification information of a peer network element of the user plane entity on the data path, data path information, and association information of the data path. 17. The method of claim 16, wherein one or more of the following conditions is satisfied:
the identification information comprises at least one of an internet protocol (IP) address, a media access control (MAC) address, a port number, and a protocol type, the data path information comprises at least one of a data path protocol, a data path identifier, PDN connection information, bearer information, quality of service (QoS) information, service data stream information, and charging manner information, the association information of the data path comprises at least one of association information of the UE with the data path, association information of the service data stream of the UE with the data path, association information between a data path for connecting the PDN and a data path for connecting the RAN, association information between the data path for connecting the PDN and a data path for connecting other network element, and association information between the data path for connecting the other network element and the data path for connecting the RAN. 18. The method of claim 17, wherein the peer network element comprises at least one of: an RAN network element, a virtual private network (VPN) element, a serving gateway (S-GW), a packet data network gateway (P-GW), a packet data gateway (PDG), and a serving general packet radio service supporting node (SGSN) for data forwarding. 19. The method of claim 15, wherein allocating the IP address to the UE when the control plane entity receives the connection establishment request of the UE comprises:
acquiring, by the control plane entity from one of the user plane entity or the internal configuration of the control plane entity, an IP address resource, selecting an IP address for the UE from the IP address resource, and allocating the selected IP address to the UE, or acquiring, by the control plane entity, the IP address from a server outside the control plane entity and allocating the acquired IP address to the UE. 20. The method of claim 15, further comprising:
collecting, by the user plane entity, use information of the data path; reporting the use information to the control plane entity; generating, by the control plane entity, a charging data record according to the use information; and reporting the generated charging data record to a charging system. | 2,400 |
8,319 | 8,319 | 13,885,523 | 2,422 | An apparatus for upgrading a projector having a two-dimensional projector lens to display three-dimensional content includes a circular polarized filter having at least two polarized zones, and a motor having a shaft on which is mounted the filter. At least one light sensor is disposed in front of the two-dimensional projector lens for providing a spatial control output signal and a temporal control output signal. A processor controls a speed at which the filter is rotated around the shaft of the motor responsive to information determined from the spatial control output signal and the temporal control output signal, such that the filter is automatically adjusted to spin so as to respectively place an appropriate one of the at least two polarized zones of the filter in front of an applicable frame of the video sequence to obtain a polarization thereof representative of the three-dimensional content. | 1. An apparatus for displaying three-dimensional content from a projector, comprising:
a circular polarized filter having at least two polarized zones, wherein the circular polarized filter is rotatable in proximity of a projector lens; at least one light sensor disposed in front of the projector lens that provides a spatial control output signal and a temporal control output signal; and a processor for controlling a speed at which the circular polarized filter is rotated in response to an output signal of the at least one light sensor to place an appropriate one of the at least two polarized zones of the circular polarized filter in front of an applicable frame of a video sequence to obtain a polarization representative of the three-dimensional content. 2. The apparatus of claim 1, wherein the at least one light sensor comprises a first light sensor disposed in proximity of the projector lens that provides the temporal control output signal from which are determined a frequency at which frames of a video sequence are projected during a sequential showing of a particular video sequence and a time instant at which a particular frame from the video sequence is projected during the sequential showing. 3. The apparatus of claim 2, wherein the frequency and the time instant are determined from the temporal control signal output signal responsive to one or more criterion, the one or more criterion comprising an inclusion of one or more newly displayed objects or an omission of one or more previously displayed objects in a currently displayed frame. 4. The apparatus of claim 2, wherein the speed at which the circular polarized filter is rotated is equal to the frequency. 5. The apparatus of claim 1, wherein the at least one light sensor comprises a second light sensor disposed in proximity of the projector lens for providing the spatial control output signal from which is determined a time instant at which an edge between the at least two polarized zones of the circular polarized filter crosses a particular point. 6. The apparatus of claim 1, wherein the circular polarized filter comprises an opaque portion, disposed in between the at least two polarized zones, to prevent light from passing through. 7. A method for displaying three dimensional content on a projector, comprising:
rotating a circular polarized filter having at least two polarized zones in front of the projector; extracting a spatial control signal and a temporal control signal from at least one sensor in proximity of the projector; and controlling a speed at which the circular polarized filter is rotated in response to an output signal of the at least one sensor to place an appropriate one of the at least two polarized zones in front of a projected applicable frame of a video sequence to obtain a polarization representative of the three-dimensional content. 8. The method of claim 7, further comprising the step of:
determining a frequency at which frames of a video sequence are projected during a sequential showing of a particular video sequence and a time instant at which at a particular frame from the video sequence is projected during the sequential showing responsive to the temporal control signal. 9. The method of claim 8, further comprising the step of:
determining the frequency and the time instant from the temporal control signal responsive to one or more criterion, the one or more criterion comprising an inclusion of one or more newly displayed objects or an omission of one or more previously displayed objects in a currently displayed frame. 10. The method of claim 8, further comprising the step of:
rotating the circular polarized filter at a speed equal to the frequency. 11. The method of claim 7, further comprising the step of:
determining a time instant at which at least one edge between the at least two polarized zones of the circular polarized filter crosses a particular point responsive to the spatial control signal. 12. An apparatus for displaying three-dimensional content from a projector, comprising:
a circular polarized filter having at least two polarized zones, wherein the circular polarized filter is rotatable in proximity of a projector lens; and a user input device that receives a user input and controls a speed at which the circular polarized filter is rotated, wherein the circular polarized filter is spun responsive to the user input to place an appropriate one of the at least two polarized zones of the circular polarized filter in front of an applicable frame of a video sequence to obtain a polarization representative of the three-dimensional content. 13. The apparatus of claim 12, wherein the user input device comprises a processor for judging the user input to provide a judgment result and controlling the speed responsive to the judgment result. 14. A method for displaying three-dimensional content on a, comprising:
rotating a circular polarized filter having at least two polarized zones in front of the projector; receiving a user input and controlling a speed at which the circular polarized filter is rotated, wherein the circular polarized filter is rotated responsive to the user input to place an appropriate one of the at least two polarized zones of the circular polarized filter in front of an applicable projected frame of a video sequence to obtain a polarization representative of the three-dimensional content. | An apparatus for upgrading a projector having a two-dimensional projector lens to display three-dimensional content includes a circular polarized filter having at least two polarized zones, and a motor having a shaft on which is mounted the filter. At least one light sensor is disposed in front of the two-dimensional projector lens for providing a spatial control output signal and a temporal control output signal. A processor controls a speed at which the filter is rotated around the shaft of the motor responsive to information determined from the spatial control output signal and the temporal control output signal, such that the filter is automatically adjusted to spin so as to respectively place an appropriate one of the at least two polarized zones of the filter in front of an applicable frame of the video sequence to obtain a polarization thereof representative of the three-dimensional content.1. An apparatus for displaying three-dimensional content from a projector, comprising:
a circular polarized filter having at least two polarized zones, wherein the circular polarized filter is rotatable in proximity of a projector lens; at least one light sensor disposed in front of the projector lens that provides a spatial control output signal and a temporal control output signal; and a processor for controlling a speed at which the circular polarized filter is rotated in response to an output signal of the at least one light sensor to place an appropriate one of the at least two polarized zones of the circular polarized filter in front of an applicable frame of a video sequence to obtain a polarization representative of the three-dimensional content. 2. The apparatus of claim 1, wherein the at least one light sensor comprises a first light sensor disposed in proximity of the projector lens that provides the temporal control output signal from which are determined a frequency at which frames of a video sequence are projected during a sequential showing of a particular video sequence and a time instant at which a particular frame from the video sequence is projected during the sequential showing. 3. The apparatus of claim 2, wherein the frequency and the time instant are determined from the temporal control signal output signal responsive to one or more criterion, the one or more criterion comprising an inclusion of one or more newly displayed objects or an omission of one or more previously displayed objects in a currently displayed frame. 4. The apparatus of claim 2, wherein the speed at which the circular polarized filter is rotated is equal to the frequency. 5. The apparatus of claim 1, wherein the at least one light sensor comprises a second light sensor disposed in proximity of the projector lens for providing the spatial control output signal from which is determined a time instant at which an edge between the at least two polarized zones of the circular polarized filter crosses a particular point. 6. The apparatus of claim 1, wherein the circular polarized filter comprises an opaque portion, disposed in between the at least two polarized zones, to prevent light from passing through. 7. A method for displaying three dimensional content on a projector, comprising:
rotating a circular polarized filter having at least two polarized zones in front of the projector; extracting a spatial control signal and a temporal control signal from at least one sensor in proximity of the projector; and controlling a speed at which the circular polarized filter is rotated in response to an output signal of the at least one sensor to place an appropriate one of the at least two polarized zones in front of a projected applicable frame of a video sequence to obtain a polarization representative of the three-dimensional content. 8. The method of claim 7, further comprising the step of:
determining a frequency at which frames of a video sequence are projected during a sequential showing of a particular video sequence and a time instant at which at a particular frame from the video sequence is projected during the sequential showing responsive to the temporal control signal. 9. The method of claim 8, further comprising the step of:
determining the frequency and the time instant from the temporal control signal responsive to one or more criterion, the one or more criterion comprising an inclusion of one or more newly displayed objects or an omission of one or more previously displayed objects in a currently displayed frame. 10. The method of claim 8, further comprising the step of:
rotating the circular polarized filter at a speed equal to the frequency. 11. The method of claim 7, further comprising the step of:
determining a time instant at which at least one edge between the at least two polarized zones of the circular polarized filter crosses a particular point responsive to the spatial control signal. 12. An apparatus for displaying three-dimensional content from a projector, comprising:
a circular polarized filter having at least two polarized zones, wherein the circular polarized filter is rotatable in proximity of a projector lens; and a user input device that receives a user input and controls a speed at which the circular polarized filter is rotated, wherein the circular polarized filter is spun responsive to the user input to place an appropriate one of the at least two polarized zones of the circular polarized filter in front of an applicable frame of a video sequence to obtain a polarization representative of the three-dimensional content. 13. The apparatus of claim 12, wherein the user input device comprises a processor for judging the user input to provide a judgment result and controlling the speed responsive to the judgment result. 14. A method for displaying three-dimensional content on a, comprising:
rotating a circular polarized filter having at least two polarized zones in front of the projector; receiving a user input and controlling a speed at which the circular polarized filter is rotated, wherein the circular polarized filter is rotated responsive to the user input to place an appropriate one of the at least two polarized zones of the circular polarized filter in front of an applicable projected frame of a video sequence to obtain a polarization representative of the three-dimensional content. | 2,400 |
8,320 | 8,320 | 15,187,785 | 2,422 | Apparatus, systems, and methods are disclosed for utility locating with tracking of movement over the ground or other surfaces using a dodecahedral antenna array and a stereo-optical ground tracker having two or more spaced apart cameras and an associated processing element to detect ground features in images from the cameras and determine tracking parameters based on the position of the detected ground features. | 1. A buried utility locator, comprising:
a dodecahedral antenna array comprising twelve antenna coils; electronics coupled to an output of the dodecahedral antenna array for determining positional information associated with a buried utility based on signals received from the twelve antenna coils and storing the determined positional information in a non-transitory memory; and a stereo-optical ground tracker, including; a first camera element; a second camera element offset in position relative to the first camera element; and a processing element coupled to an output from the first camera element and the second camera element, the processing element programmed to: receive an image from the first camera element and an image from the second camera element, wherein the first camera element image and the second camera element image are captured with the ground tracking apparatus at a first position; detect a ground feature in both the image from the first camera element and the image from the second camera element; determine, based on a position of the ground feature in the image from the first camera element and a position of the ground feature in the image from the second camera element, a height value of the ground tracker above the ground feature at the first position; and store the height value at the first position in the non-transitory memory. 2. The locator of claim 1, wherein the image from the first camera element and the image from the second camera element are captured at substantially the same time. 3. The locator of claim 1, wherein the processing element is further programmed to:
determine, based on one or both of the image from the first camera element and the image from the second camera element, the height value at the first position, and one or both of another image from the first camera element captured at a second position and another image from the second camera element captured at the second position, a change in position of the ground tracker relative to the first position; and store data associated with the change in position as a tracking parameter in the non-transitory memory. 4. The locator of claim 3, wherein both of another image from the first camera element and another image from the second camera element are captured at the second position, and wherein the processing element is further programmed to:
determine, based on a position of the ground feature in the another image from the first camera element and a position of the ground feature in the another image from the second camera element, a second height value corresponding to the height of the ground tracker above the ground feature at the second position; and store the second height value in the non-transitory memory. 5. The locator of claim 4, wherein the another image from the first camera element and the another image from the second camera element are captured at substantially the same time. 6. The locator of claim 4, wherein the change in position is further based on the second height value. 7. The locator of claim 1, wherein the processing element is further programmed to:
receive another image from the first camera element and another image from the second camera element, wherein the another images are captured at a second position different from the first position; detect a ground feature in the another image from the first camera element and the another image from the second camera element; determine, based on a position of the ground feature in the another image from the first camera element and a position of the ground feature in the another image from the second camera element, a height value of the ground tracker above the ground feature at the second position; and store the height value at the second position in a non-transitory memory. 8. The locator of claim 7, wherein the processing element is further programmed to:
determine, based on one or both of the image from the first camera element and the image from the second camera element, the height value at the first position, the height value at the second position, and one or both of the another image from the first camera element and the another image from the second camera element captured at a second position, a change in position of the ground tracker relative to the first position; and store data corresponding to the change in position as a tracking parameter in the non-transitory memory. 9. The locator of claim 8, wherein the data associated with the change of position includes a relative distance and/or direction between the first position and the second position. 10. The locator of claim 8, wherein the data associated with the change of position includes coordinates of the second position relative to the first position. 11. The locator of claim 8, wherein the first image from the first camera element and the first image from the second camera element are captured at substantially the same time. 12. The locator of claim 3, wherein the data associated with the change of position includes a relative distance and/or direction between the first position and the second position. 13. A buried utility locator, comprising:
a magnetic field antenna array comprising a plurality of antenna coils; electronics coupled to an output of the antenna array for determining positional information associated with a buried utility based on signals received from the plurality of antenna coils and storing the determined positional information in a non-transitory memory; and a stereo-optical ground tracker for determining motion information associated with a movement of the buried utility locator based on receiving and processing stereo image pairs and storing the determined motion information in the non-transitory memory in conjunction with the determined positional information. 14. The locator of claim 13, wherein the antenna array comprises a dodecahedral antenna array including twelve or more antenna coils. 15. The locator of claim 13, further comprising an omnidirectional antenna array positioned above the dodecahedral antenna array when the locator is in an upright orientation. 16. The locator of claim 15, wherein the omnidirectional antenna array includes three orthogonally oriented nested antenna coils. 17. The locator of claim 15, wherein the omnidirectional antenna array and the dodecahedral antenna array are positioned below the stereo-optical ground tracker when the locator is in the upright orientation. 18. The locator of claim 17, wherein the omnidirectional antenna array and the dodecahedral antenna array are positioned with centers of the arrays intersected by a mast element of the locator. | Apparatus, systems, and methods are disclosed for utility locating with tracking of movement over the ground or other surfaces using a dodecahedral antenna array and a stereo-optical ground tracker having two or more spaced apart cameras and an associated processing element to detect ground features in images from the cameras and determine tracking parameters based on the position of the detected ground features.1. A buried utility locator, comprising:
a dodecahedral antenna array comprising twelve antenna coils; electronics coupled to an output of the dodecahedral antenna array for determining positional information associated with a buried utility based on signals received from the twelve antenna coils and storing the determined positional information in a non-transitory memory; and a stereo-optical ground tracker, including; a first camera element; a second camera element offset in position relative to the first camera element; and a processing element coupled to an output from the first camera element and the second camera element, the processing element programmed to: receive an image from the first camera element and an image from the second camera element, wherein the first camera element image and the second camera element image are captured with the ground tracking apparatus at a first position; detect a ground feature in both the image from the first camera element and the image from the second camera element; determine, based on a position of the ground feature in the image from the first camera element and a position of the ground feature in the image from the second camera element, a height value of the ground tracker above the ground feature at the first position; and store the height value at the first position in the non-transitory memory. 2. The locator of claim 1, wherein the image from the first camera element and the image from the second camera element are captured at substantially the same time. 3. The locator of claim 1, wherein the processing element is further programmed to:
determine, based on one or both of the image from the first camera element and the image from the second camera element, the height value at the first position, and one or both of another image from the first camera element captured at a second position and another image from the second camera element captured at the second position, a change in position of the ground tracker relative to the first position; and store data associated with the change in position as a tracking parameter in the non-transitory memory. 4. The locator of claim 3, wherein both of another image from the first camera element and another image from the second camera element are captured at the second position, and wherein the processing element is further programmed to:
determine, based on a position of the ground feature in the another image from the first camera element and a position of the ground feature in the another image from the second camera element, a second height value corresponding to the height of the ground tracker above the ground feature at the second position; and store the second height value in the non-transitory memory. 5. The locator of claim 4, wherein the another image from the first camera element and the another image from the second camera element are captured at substantially the same time. 6. The locator of claim 4, wherein the change in position is further based on the second height value. 7. The locator of claim 1, wherein the processing element is further programmed to:
receive another image from the first camera element and another image from the second camera element, wherein the another images are captured at a second position different from the first position; detect a ground feature in the another image from the first camera element and the another image from the second camera element; determine, based on a position of the ground feature in the another image from the first camera element and a position of the ground feature in the another image from the second camera element, a height value of the ground tracker above the ground feature at the second position; and store the height value at the second position in a non-transitory memory. 8. The locator of claim 7, wherein the processing element is further programmed to:
determine, based on one or both of the image from the first camera element and the image from the second camera element, the height value at the first position, the height value at the second position, and one or both of the another image from the first camera element and the another image from the second camera element captured at a second position, a change in position of the ground tracker relative to the first position; and store data corresponding to the change in position as a tracking parameter in the non-transitory memory. 9. The locator of claim 8, wherein the data associated with the change of position includes a relative distance and/or direction between the first position and the second position. 10. The locator of claim 8, wherein the data associated with the change of position includes coordinates of the second position relative to the first position. 11. The locator of claim 8, wherein the first image from the first camera element and the first image from the second camera element are captured at substantially the same time. 12. The locator of claim 3, wherein the data associated with the change of position includes a relative distance and/or direction between the first position and the second position. 13. A buried utility locator, comprising:
a magnetic field antenna array comprising a plurality of antenna coils; electronics coupled to an output of the antenna array for determining positional information associated with a buried utility based on signals received from the plurality of antenna coils and storing the determined positional information in a non-transitory memory; and a stereo-optical ground tracker for determining motion information associated with a movement of the buried utility locator based on receiving and processing stereo image pairs and storing the determined motion information in the non-transitory memory in conjunction with the determined positional information. 14. The locator of claim 13, wherein the antenna array comprises a dodecahedral antenna array including twelve or more antenna coils. 15. The locator of claim 13, further comprising an omnidirectional antenna array positioned above the dodecahedral antenna array when the locator is in an upright orientation. 16. The locator of claim 15, wherein the omnidirectional antenna array includes three orthogonally oriented nested antenna coils. 17. The locator of claim 15, wherein the omnidirectional antenna array and the dodecahedral antenna array are positioned below the stereo-optical ground tracker when the locator is in the upright orientation. 18. The locator of claim 17, wherein the omnidirectional antenna array and the dodecahedral antenna array are positioned with centers of the arrays intersected by a mast element of the locator. | 2,400 |
8,321 | 8,321 | 14,522,793 | 2,481 | A method of calculating an amount of visible damage on a component includes capturing an image of the component, identifying an area of visible damage, calculating a size of the area, and communicating the size of visible damage to a storage device. A system for evaluating coating loss is also disclosed. | 1. A method of calculating an amount of visible damage on a component comprising:
capturing an image of the component; identifying an area of visible damage; calculating a size of the area; and communicating said size of visible damage to a storage device. 2. The method as set forth in claim 1, wherein said communication step is performed by a one of a hardwired and wireless connection between an image capture tool and said storage device. 3. The method as set forth in claim 2, wherein said capturing an image of the component is performed by an image capturing tool including a display and a camera. 4. The method as set forth in claim 3, wherein lasers assist in providing a scale to the captured image. 5. The method as set forth in claim 4, wherein said area of visible damage is contoured on the captured image. 6. The method as set forth in claim 5, wherein a size of the contoured area is calculated. 7. The method as set forth in claim 6, wherein said image capture tool includes a wireframe used to align the image capture tool with the component to be evaluated. 8. The method as set forth in claim 1, wherein said capturing an image of the component is performed by an image capturing tool including a display and a camera. 9. The method as set forth in claim 1, wherein said image capture tool includes a wireframe used to align the image capture tool with the component to be evaluated. 10. The method as set forth in claim 1, wherein lasers assist in providing a scale to the captured image. 11. The method as set forth in claim 1, wherein said area of visible damage is contoured on the captured image. 12. The method as set forth in claim 11, wherein a size of the contoured area is calculated. 13. The method as set forth in claim 1, wherein the component is a gas turbine engine component. 14. The method as set forth in claim 13, wherein the gas turbine engine component includes one of a blade, a vane, a panel, a flame holder, a lining, a tail cone, a duct, a cover, a heat shield, a flap. 15. The method as set forth in claim 14, wherein the visible damage is damage to the thermal barrier coating on said gas turbine engine component. 16. A system for evaluating coating loss comprising:
an image capture device, said image capture device being capable of capturing an image of a component to be evaluated; and said image capture device capable of communication with an analyzing unit capable of distinguishing a visible damage area from an visible undamaged area and calculating a size of the visible damage area. 17. The system as set forth in clam 16, wherein said image capture device is provided with a camera for capturing said image, and lasers to assist in providing a scale to the captured image. 18. The system as set forth in claim 17, wherein a location of projected laser points on the captured image is utilized to calculate the size of said visible damage on said captured image. 19. The system as set forth in claim 16, wherein a change in the visible damage area is monitored over time. 20. The system as set forth in claim 16, wherein there is a display and a wireframe on said image capture device that allows a user to align the image capture device with one of a component and a structure to be evaluated. | A method of calculating an amount of visible damage on a component includes capturing an image of the component, identifying an area of visible damage, calculating a size of the area, and communicating the size of visible damage to a storage device. A system for evaluating coating loss is also disclosed.1. A method of calculating an amount of visible damage on a component comprising:
capturing an image of the component; identifying an area of visible damage; calculating a size of the area; and communicating said size of visible damage to a storage device. 2. The method as set forth in claim 1, wherein said communication step is performed by a one of a hardwired and wireless connection between an image capture tool and said storage device. 3. The method as set forth in claim 2, wherein said capturing an image of the component is performed by an image capturing tool including a display and a camera. 4. The method as set forth in claim 3, wherein lasers assist in providing a scale to the captured image. 5. The method as set forth in claim 4, wherein said area of visible damage is contoured on the captured image. 6. The method as set forth in claim 5, wherein a size of the contoured area is calculated. 7. The method as set forth in claim 6, wherein said image capture tool includes a wireframe used to align the image capture tool with the component to be evaluated. 8. The method as set forth in claim 1, wherein said capturing an image of the component is performed by an image capturing tool including a display and a camera. 9. The method as set forth in claim 1, wherein said image capture tool includes a wireframe used to align the image capture tool with the component to be evaluated. 10. The method as set forth in claim 1, wherein lasers assist in providing a scale to the captured image. 11. The method as set forth in claim 1, wherein said area of visible damage is contoured on the captured image. 12. The method as set forth in claim 11, wherein a size of the contoured area is calculated. 13. The method as set forth in claim 1, wherein the component is a gas turbine engine component. 14. The method as set forth in claim 13, wherein the gas turbine engine component includes one of a blade, a vane, a panel, a flame holder, a lining, a tail cone, a duct, a cover, a heat shield, a flap. 15. The method as set forth in claim 14, wherein the visible damage is damage to the thermal barrier coating on said gas turbine engine component. 16. A system for evaluating coating loss comprising:
an image capture device, said image capture device being capable of capturing an image of a component to be evaluated; and said image capture device capable of communication with an analyzing unit capable of distinguishing a visible damage area from an visible undamaged area and calculating a size of the visible damage area. 17. The system as set forth in clam 16, wherein said image capture device is provided with a camera for capturing said image, and lasers to assist in providing a scale to the captured image. 18. The system as set forth in claim 17, wherein a location of projected laser points on the captured image is utilized to calculate the size of said visible damage on said captured image. 19. The system as set forth in claim 16, wherein a change in the visible damage area is monitored over time. 20. The system as set forth in claim 16, wherein there is a display and a wireframe on said image capture device that allows a user to align the image capture device with one of a component and a structure to be evaluated. | 2,400 |
8,322 | 8,322 | 15,063,528 | 2,452 | The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. Current application-release-management pipelines are linear, with the stages sequentially ordered within the pipeline. The current document is directed to an automated application-release-management facility that supports branch points within application-release-management pipelines where, as a result of inter-application dependencies, a task within a stage of the first pipeline associated with a first application launches a second pipeline associated with a second application. Branching pipelines and inter-application dependencies provide a significant increase in the scope and power of automated application-release management. | 1. An automated-application-release-management subsystem within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the automated-application-release-management subsystem comprising:
a dashboard user interface; an automated-application-release-management controller, an interface to a workflow-execution engine within the cloud-computing facility; an artifact-storage-and-management subsystem; and representations of branching application-release-management pipelines, stored in one or more memories within the cloud-computing facility, that include one or more branch points corresponding to one or more corresponding inter-application dependencies. 2. The automated-application-release-management subsystem of claim 1 that is further incorporated in a workflow-based cloud-management system that additionally includes an infrastructure-management-and-administration subsystem and the workflow-execution engine. 3. The automated-application-release-management subsystem of claim 1 wherein the automated-application-release-management controller controls execution of application-release-management pipelines, each application-release-management pipeline representing a sequence of tasks carried out by the automated-application-release-management subsystem to generate a releasable version of an application. 4. The automated-application-release-management subsystem of claim 3 wherein each application-release-management pipeline comprises one or more stages; and wherein each application-release-management-pipeline stage comprises a set of one or more tasks. 5. The automated-application-release-management subsystem of claim 4 wherein the tasks includes tasks of task types selected from among:
initialization tasks;
deployment tasks;
run-tests tasks;
gating-rule tasks; and
finalize tasks. 6. The automated-application-release-management subsystem of claim 4 wherein a task within a stage of a first application-release-management pipeline may include control logic that:
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of a second application-release-management pipeline; and
when the artifact-storage-and-management subsystem does not contain one of the one or more artifacts, launches execution of the second application-release-management pipeline. 7. The automated-application-release-management subsystem of claim 6 wherein, following execution of the second application-release-management pipeline, the control logic again determines whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of the second application-release-management-pipeline. 8. The automated-application-release-management subsystem of claim 6 wherein, when the artifact-storage-and-management subsystem contains the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is satisfied: and wherein, when the artifact-storage-and-management subsystem does not contain the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is not satisfied. 9. The automated-application-release-management subsystem of claim 6 wherein the determination of whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of a second application-release-management pipeline represents a single-way branch point that connects the first and second application-release-management pipelines together to form a branching application-release-management pipeline. 10. The automated-application-release-management subsystem of claim 6 wherein the automated-application-release-management subsystem prevents further execution of the first application-release-management pipeline until the one or more artifacts are deposited into the artifact-storage-and-management subsystem. 11. The automated-application-release-management subsystem of claim 4 wherein a task within a stage of a first application-release-management pipeline may include control logic that:
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of two or more additional application-release-management pipelines; and
when the artifact-storage-and-management subsystem does not contain the one of the one or more artifacts, launches execution of one or more of the two or more additional application-release-management pipelines. 12. The automated-application-release-management subsystem of claim 11 wherein the determination of whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of the two or more additional application-release-management pipelines represents a multi-way branch point that connects the first and two or more additional application-release-management pipelines together to form a branching application-release-management pipeline. 13. The automated-application-release-management subsystem of claim 1 wherein a branching application-release-management pipeline includes one or more single-way branch points and/or multi-way branch points that connect together multiple application-release-management pipelines in the tree-like branching application-release-management pipeline. 14. A method that connects two or more multiple application-release-management pipelines at one or more branch points to form a branching application-release-management pipeline, the method carried out by an automated-application-release-management subsystem, operating within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the automated-application-release-management subsystem having a dashboard user interface, an automated-application-release-management controller, an interface to a workflow-execution engine within the cloud-computing facility, an artifact-storage-and-management subsystem, and stored representations of application-release-management pipelines, the method comprising:
including, in a task within a stage of a first application-release-management pipeline, control logic that
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of one or more additional application-release-management pipeline, and
when the artifact-storage-and-management subsystem does not contain one of the one or more artifacts, launches execution of one or more of the one or more additional application-release-management pipelines. 15. The method of claim 14 wherein the automated-application-release-management controller controls execution of application-release-management pipelines, each application-release-management pipeline representing a sequence of tasks carried out by the automated-application-release-management subsystem to generate a releasable version of an application. 16. The method of claim 14 wherein each application-release-management pipeline comprises one or more stages; and wherein each application-release-management-pipeline stage comprises a set of one or more tasks. 17. The method of claim 16 wherein, following execution of the one or more of the one or more additional application-release-management pipelines, the control logic again determines whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of the deposited during execution of one or more additional application-release-management pipeline. 18. The method of claim 17 wherein, when the artifact-storage-and-management subsystem contains the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is satisfied; and wherein, when the artifact-storage-and-management subsystem does not contain the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is not satisfied. 19. The automated-application-release-management subsystem of claim 6 wherein the determination of whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of execution of the one or more additional application-release-management pipeline represents branch point that connects the first and one or more additional application-release-management pipelines together to form a branching application-release-management pipeline. 20. Computer instructions, stored within one or more physical data-storage devices, that, when executed on one or more processors within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, control an automated-application-release-management subsystem, operating within the cloud-computing facility and having a dashboard user interface, an automated-application-release-management controller, an interface to a workflow-execution engine within the cloud-computing facility, an artifact-storage-and-management subsystem, and stored representations of application-release-management pipelines, to connect two or more multiple application-release-management pipelines at a branch point to form a branching application-release-management pipeline by:
including, in a task within a stage of a first application-release-management pipeline, control logic that
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of one or more additional application-release-management pipeline, and
when the artifact-storage-and-management subsystem does not contain one of the one or more artifacts, launches execution of one or more of the one or more additional application-release-management pipelines. | The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. Current application-release-management pipelines are linear, with the stages sequentially ordered within the pipeline. The current document is directed to an automated application-release-management facility that supports branch points within application-release-management pipelines where, as a result of inter-application dependencies, a task within a stage of the first pipeline associated with a first application launches a second pipeline associated with a second application. Branching pipelines and inter-application dependencies provide a significant increase in the scope and power of automated application-release management.1. An automated-application-release-management subsystem within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the automated-application-release-management subsystem comprising:
a dashboard user interface; an automated-application-release-management controller, an interface to a workflow-execution engine within the cloud-computing facility; an artifact-storage-and-management subsystem; and representations of branching application-release-management pipelines, stored in one or more memories within the cloud-computing facility, that include one or more branch points corresponding to one or more corresponding inter-application dependencies. 2. The automated-application-release-management subsystem of claim 1 that is further incorporated in a workflow-based cloud-management system that additionally includes an infrastructure-management-and-administration subsystem and the workflow-execution engine. 3. The automated-application-release-management subsystem of claim 1 wherein the automated-application-release-management controller controls execution of application-release-management pipelines, each application-release-management pipeline representing a sequence of tasks carried out by the automated-application-release-management subsystem to generate a releasable version of an application. 4. The automated-application-release-management subsystem of claim 3 wherein each application-release-management pipeline comprises one or more stages; and wherein each application-release-management-pipeline stage comprises a set of one or more tasks. 5. The automated-application-release-management subsystem of claim 4 wherein the tasks includes tasks of task types selected from among:
initialization tasks;
deployment tasks;
run-tests tasks;
gating-rule tasks; and
finalize tasks. 6. The automated-application-release-management subsystem of claim 4 wherein a task within a stage of a first application-release-management pipeline may include control logic that:
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of a second application-release-management pipeline; and
when the artifact-storage-and-management subsystem does not contain one of the one or more artifacts, launches execution of the second application-release-management pipeline. 7. The automated-application-release-management subsystem of claim 6 wherein, following execution of the second application-release-management pipeline, the control logic again determines whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of the second application-release-management-pipeline. 8. The automated-application-release-management subsystem of claim 6 wherein, when the artifact-storage-and-management subsystem contains the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is satisfied: and wherein, when the artifact-storage-and-management subsystem does not contain the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is not satisfied. 9. The automated-application-release-management subsystem of claim 6 wherein the determination of whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of a second application-release-management pipeline represents a single-way branch point that connects the first and second application-release-management pipelines together to form a branching application-release-management pipeline. 10. The automated-application-release-management subsystem of claim 6 wherein the automated-application-release-management subsystem prevents further execution of the first application-release-management pipeline until the one or more artifacts are deposited into the artifact-storage-and-management subsystem. 11. The automated-application-release-management subsystem of claim 4 wherein a task within a stage of a first application-release-management pipeline may include control logic that:
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of two or more additional application-release-management pipelines; and
when the artifact-storage-and-management subsystem does not contain the one of the one or more artifacts, launches execution of one or more of the two or more additional application-release-management pipelines. 12. The automated-application-release-management subsystem of claim 11 wherein the determination of whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of the two or more additional application-release-management pipelines represents a multi-way branch point that connects the first and two or more additional application-release-management pipelines together to form a branching application-release-management pipeline. 13. The automated-application-release-management subsystem of claim 1 wherein a branching application-release-management pipeline includes one or more single-way branch points and/or multi-way branch points that connect together multiple application-release-management pipelines in the tree-like branching application-release-management pipeline. 14. A method that connects two or more multiple application-release-management pipelines at one or more branch points to form a branching application-release-management pipeline, the method carried out by an automated-application-release-management subsystem, operating within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the automated-application-release-management subsystem having a dashboard user interface, an automated-application-release-management controller, an interface to a workflow-execution engine within the cloud-computing facility, an artifact-storage-and-management subsystem, and stored representations of application-release-management pipelines, the method comprising:
including, in a task within a stage of a first application-release-management pipeline, control logic that
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of one or more additional application-release-management pipeline, and
when the artifact-storage-and-management subsystem does not contain one of the one or more artifacts, launches execution of one or more of the one or more additional application-release-management pipelines. 15. The method of claim 14 wherein the automated-application-release-management controller controls execution of application-release-management pipelines, each application-release-management pipeline representing a sequence of tasks carried out by the automated-application-release-management subsystem to generate a releasable version of an application. 16. The method of claim 14 wherein each application-release-management pipeline comprises one or more stages; and wherein each application-release-management-pipeline stage comprises a set of one or more tasks. 17. The method of claim 16 wherein, following execution of the one or more of the one or more additional application-release-management pipelines, the control logic again determines whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of the deposited during execution of one or more additional application-release-management pipeline. 18. The method of claim 17 wherein, when the artifact-storage-and-management subsystem contains the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is satisfied; and wherein, when the artifact-storage-and-management subsystem does not contain the one or more artifacts, the control logic returns a value indicating that the application dependency represented by the presence or absence of the one or more artifacts in the artifact-storage-and-management subsystem is not satisfied. 19. The automated-application-release-management subsystem of claim 6 wherein the determination of whether the artifact-storage-and-management subsystem contains the one or more artifacts deposited during execution of execution of the one or more additional application-release-management pipeline represents branch point that connects the first and one or more additional application-release-management pipelines together to form a branching application-release-management pipeline. 20. Computer instructions, stored within one or more physical data-storage devices, that, when executed on one or more processors within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, control an automated-application-release-management subsystem, operating within the cloud-computing facility and having a dashboard user interface, an automated-application-release-management controller, an interface to a workflow-execution engine within the cloud-computing facility, an artifact-storage-and-management subsystem, and stored representations of application-release-management pipelines, to connect two or more multiple application-release-management pipelines at a branch point to form a branching application-release-management pipeline by:
including, in a task within a stage of a first application-release-management pipeline, control logic that
determines whether the artifact-storage-and-management subsystem contains one or more artifacts deposited during execution of one or more additional application-release-management pipeline, and
when the artifact-storage-and-management subsystem does not contain one of the one or more artifacts, launches execution of one or more of the one or more additional application-release-management pipelines. | 2,400 |
8,323 | 8,323 | 15,137,546 | 2,446 | A method for managing a flight briefing data system is provided. The method establishes, by a central computer system, a first communication connection with an electronic device and a second communication connection with an aircraft onboard avionics unit; transmits, by the central computer system, flight briefing data via the first communication connection and the second communication connection, wherein the flight briefing data comprises at least a plurality of Notices to Airmen (NOTAMs) associated with a pending flight; receives, by the central computer system, altered flight briefing data; and synchronizes the central computer system, the electronic device, and the aircraft onboard avionics unit, by transmitting the altered flight briefing data via the first communication connection and the second communication connection. | 1. A method for managing a flight briefing data system, the method comprising:
establishing, by a central computer system, a first communication connection with an electronic device and a second communication connection with an aircraft onboard avionics unit; transmitting, by the central computer system, flight briefing data via the first communication connection and the second communication connection, wherein the flight briefing data comprises at least a plurality of Notices to Airmen (NOTAMs) associated with a pending flight; receiving, by the central computer system, altered flight briefing data; and synchronizing the central computer system, the electronic device, and the aircraft onboard avionics unit, by transmitting the altered flight briefing data via the first communication connection and the second communication connection. 2. The method of claim 1, further comprising:
receiving, by the central computer system, the altered flight briefing data comprising the flight briefing data and annotations to the flight briefing data; and storing, by the computer system, the altered flight briefing data; wherein synchronizing further comprises transmitting the flight briefing data and the annotations to the flight briefing data via the first communication connection and the second communication connection. 3. The method of claim 1, further comprising:
receiving, by the central computer system, flagged flight briefing data comprising flags indicating user-designated important conditions associated with the pending flight, wherein the altered flight briefing data comprises the flagged flight briefing data; storing, by the central computer system, the flagged flight briefing data; and transmitting the flagged flight briefing data via the first communication connection and the second communication connection. 4. The method of claim 1, further comprising:
receiving, by the central computer system, a plurality of Notices to Airmen (NOTAMs), wherein the flight briefing data comprises the plurality of NOTAMs; storing the plurality of NOTAMs; in response to a request from the electronic device, transmitting the plurality of NOTAMs via the first communication connection; receiving, by the central computer system, annotated NOTAM data from the electronic device, wherein the annotated NOTAM data comprises user input metadata associated with one or more of the plurality of NOTAMs, and wherein the altered flight briefing data comprises the annotated NOTAM data; and storing the annotated NOTAM data; wherein synchronizing the flight briefing data further comprises:
receiving a request for the annotated NOTAM data from the aircraft onboard avionics unit; and
in response to the request, transmitting the annotated NOTAM data via the second communication connection. 5. The method of claim 1, further comprising:
receiving, by the central computer system, a request for synchronization via at least one of the first communication connection and the second communication connection; wherein synchronizing further comprises:
in response to the request, transmitting the altered flight briefing data via the at least one of the first communication connection and the second communication connection. 6. The method of claim 1, further comprising:
synchronizing the central computer system, the electronic device, and the aircraft onboard avionics unit according to a timed interval schedule. 7. The method of claim 1, further comprising:
synchronizing the central computer system, the electronic device, and the aircraft onboard avionics unit according to an event-driven schedule. 8. A method for manipulating flight briefing data, the method comprising:
presenting, by an electronic device, flight briefing data comprising at least Notices to Airmen (NOTAMs) for a pending flight; receiving, by the electronic device, user input annotations to the flight briefing data; creating annotated flight briefing data, based on the user input; and transmitting the annotated flight briefing data to a remote server for storage. 9. The method of claim 8, wherein receiving the user input annotations further comprises receiving one or more flags associated with the flight briefing data; and
wherein creating the annotated flight briefing data further comprises creating one or more flagged flight briefing notices, wherein the one or more flagged flight briefing notices indicate user-designated important conditions associated with the pending flight. 10. The method of claim 8, wherein receiving the user input annotations further comprises receiving user input text notes associated with the flight briefing data; and
wherein creating the annotated flight briefing data further comprises creating one or more flight briefing notices with associated notes, wherein the associated notes comprise the text notes. 11. The method of claim 8, further comprising presenting, via the electronic device, a pre-flight briefing associated with the pending flight;
wherein the pre-flight briefing comprises the flight briefing data. 12. The method of claim 8, further comprising:
receiving, by the electronic device, a user input selection of one of the NOTAMs for the pending flight; presenting, by the electronic device, the one of the NOTAMs; receiving a second user input selection to view a list of the NOTAMs for the pending flight; presenting the list comprising a plurality of text labels, each of the plurality of text labels being associated with a respective one of the NOTAMs; and presenting one of the plurality of text labels associated with the one of the NOTAMs using distinguishing visual characteristics, wherein the distinguishing visual characteristics indicate a previously-read status for the one of the NOTAMs. 13. The method of claim 12, further comprising:
identifying the previously-read status for the one of the NOTAMs, based on the user input selection of the one of the NOTAMs; and transmitting the previously-read status to the remote server for storage. 14. A method for presenting flight data onboard an aircraft, the method comprising:
accessing, via a communication device onboard the aircraft, a database comprising a plurality of flight briefing notices and associated metadata; uploading the plurality of flight briefing notices and the associated metadata into an avionics system onboard the aircraft; and presenting the plurality of flight briefing notices and the associated metadata via an aircraft onboard display. 15. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices and the associated metadata that have previously been accessed via the onboard avionics system; and presenting the subset using distinguishing visual characteristics, via the aircraft onboard display. 16. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices and the associated metadata that have previously been accessed via a second device communicatively coupled to the database; and presenting the subset using distinguishing visual characteristics, via the aircraft onboard display. 17. The method of claim 14, further comprising:
receiving, by the avionics system, a user input request for updated flight briefing notices; accessing, via the communication device, the updated flight briefing notices and updated associated metadata at the database; uploading the updated flight briefing notices and the updated associated metadata into the avionics system; and presenting the updated flight briefing notices and the updated associated metadata via the aircraft onboard display. 18. The method of claim 14, further comprising:
receiving, by the avionics system, a user input request for continuously updated flight briefing notices according to a timed interval; accessing, via the communication device, the continuously updated flight briefing notices and continuously updated associated metadata, according to the timed interval; uploading, into the avionics system, the continuously updated flight briefing notices and the continuously updated associated metadata, according to the timed interval; and presenting the continuously updated flight briefing notices and the continuously updated associated metadata via the aircraft onboard display, according to the timed interval. 19. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices associated with metadata indicating a flagged flight briefing notice; and presenting the subset, via the aircraft onboard display. 20. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices associated with metadata comprising user-entered annotations to the plurality of flight briefing notices; and presenting the subset, via the aircraft onboard display. | A method for managing a flight briefing data system is provided. The method establishes, by a central computer system, a first communication connection with an electronic device and a second communication connection with an aircraft onboard avionics unit; transmits, by the central computer system, flight briefing data via the first communication connection and the second communication connection, wherein the flight briefing data comprises at least a plurality of Notices to Airmen (NOTAMs) associated with a pending flight; receives, by the central computer system, altered flight briefing data; and synchronizes the central computer system, the electronic device, and the aircraft onboard avionics unit, by transmitting the altered flight briefing data via the first communication connection and the second communication connection.1. A method for managing a flight briefing data system, the method comprising:
establishing, by a central computer system, a first communication connection with an electronic device and a second communication connection with an aircraft onboard avionics unit; transmitting, by the central computer system, flight briefing data via the first communication connection and the second communication connection, wherein the flight briefing data comprises at least a plurality of Notices to Airmen (NOTAMs) associated with a pending flight; receiving, by the central computer system, altered flight briefing data; and synchronizing the central computer system, the electronic device, and the aircraft onboard avionics unit, by transmitting the altered flight briefing data via the first communication connection and the second communication connection. 2. The method of claim 1, further comprising:
receiving, by the central computer system, the altered flight briefing data comprising the flight briefing data and annotations to the flight briefing data; and storing, by the computer system, the altered flight briefing data; wherein synchronizing further comprises transmitting the flight briefing data and the annotations to the flight briefing data via the first communication connection and the second communication connection. 3. The method of claim 1, further comprising:
receiving, by the central computer system, flagged flight briefing data comprising flags indicating user-designated important conditions associated with the pending flight, wherein the altered flight briefing data comprises the flagged flight briefing data; storing, by the central computer system, the flagged flight briefing data; and transmitting the flagged flight briefing data via the first communication connection and the second communication connection. 4. The method of claim 1, further comprising:
receiving, by the central computer system, a plurality of Notices to Airmen (NOTAMs), wherein the flight briefing data comprises the plurality of NOTAMs; storing the plurality of NOTAMs; in response to a request from the electronic device, transmitting the plurality of NOTAMs via the first communication connection; receiving, by the central computer system, annotated NOTAM data from the electronic device, wherein the annotated NOTAM data comprises user input metadata associated with one or more of the plurality of NOTAMs, and wherein the altered flight briefing data comprises the annotated NOTAM data; and storing the annotated NOTAM data; wherein synchronizing the flight briefing data further comprises:
receiving a request for the annotated NOTAM data from the aircraft onboard avionics unit; and
in response to the request, transmitting the annotated NOTAM data via the second communication connection. 5. The method of claim 1, further comprising:
receiving, by the central computer system, a request for synchronization via at least one of the first communication connection and the second communication connection; wherein synchronizing further comprises:
in response to the request, transmitting the altered flight briefing data via the at least one of the first communication connection and the second communication connection. 6. The method of claim 1, further comprising:
synchronizing the central computer system, the electronic device, and the aircraft onboard avionics unit according to a timed interval schedule. 7. The method of claim 1, further comprising:
synchronizing the central computer system, the electronic device, and the aircraft onboard avionics unit according to an event-driven schedule. 8. A method for manipulating flight briefing data, the method comprising:
presenting, by an electronic device, flight briefing data comprising at least Notices to Airmen (NOTAMs) for a pending flight; receiving, by the electronic device, user input annotations to the flight briefing data; creating annotated flight briefing data, based on the user input; and transmitting the annotated flight briefing data to a remote server for storage. 9. The method of claim 8, wherein receiving the user input annotations further comprises receiving one or more flags associated with the flight briefing data; and
wherein creating the annotated flight briefing data further comprises creating one or more flagged flight briefing notices, wherein the one or more flagged flight briefing notices indicate user-designated important conditions associated with the pending flight. 10. The method of claim 8, wherein receiving the user input annotations further comprises receiving user input text notes associated with the flight briefing data; and
wherein creating the annotated flight briefing data further comprises creating one or more flight briefing notices with associated notes, wherein the associated notes comprise the text notes. 11. The method of claim 8, further comprising presenting, via the electronic device, a pre-flight briefing associated with the pending flight;
wherein the pre-flight briefing comprises the flight briefing data. 12. The method of claim 8, further comprising:
receiving, by the electronic device, a user input selection of one of the NOTAMs for the pending flight; presenting, by the electronic device, the one of the NOTAMs; receiving a second user input selection to view a list of the NOTAMs for the pending flight; presenting the list comprising a plurality of text labels, each of the plurality of text labels being associated with a respective one of the NOTAMs; and presenting one of the plurality of text labels associated with the one of the NOTAMs using distinguishing visual characteristics, wherein the distinguishing visual characteristics indicate a previously-read status for the one of the NOTAMs. 13. The method of claim 12, further comprising:
identifying the previously-read status for the one of the NOTAMs, based on the user input selection of the one of the NOTAMs; and transmitting the previously-read status to the remote server for storage. 14. A method for presenting flight data onboard an aircraft, the method comprising:
accessing, via a communication device onboard the aircraft, a database comprising a plurality of flight briefing notices and associated metadata; uploading the plurality of flight briefing notices and the associated metadata into an avionics system onboard the aircraft; and presenting the plurality of flight briefing notices and the associated metadata via an aircraft onboard display. 15. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices and the associated metadata that have previously been accessed via the onboard avionics system; and presenting the subset using distinguishing visual characteristics, via the aircraft onboard display. 16. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices and the associated metadata that have previously been accessed via a second device communicatively coupled to the database; and presenting the subset using distinguishing visual characteristics, via the aircraft onboard display. 17. The method of claim 14, further comprising:
receiving, by the avionics system, a user input request for updated flight briefing notices; accessing, via the communication device, the updated flight briefing notices and updated associated metadata at the database; uploading the updated flight briefing notices and the updated associated metadata into the avionics system; and presenting the updated flight briefing notices and the updated associated metadata via the aircraft onboard display. 18. The method of claim 14, further comprising:
receiving, by the avionics system, a user input request for continuously updated flight briefing notices according to a timed interval; accessing, via the communication device, the continuously updated flight briefing notices and continuously updated associated metadata, according to the timed interval; uploading, into the avionics system, the continuously updated flight briefing notices and the continuously updated associated metadata, according to the timed interval; and presenting the continuously updated flight briefing notices and the continuously updated associated metadata via the aircraft onboard display, according to the timed interval. 19. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices associated with metadata indicating a flagged flight briefing notice; and presenting the subset, via the aircraft onboard display. 20. The method of claim 14, further comprising:
identifying a subset of the plurality of flight briefing notices associated with metadata comprising user-entered annotations to the plurality of flight briefing notices; and presenting the subset, via the aircraft onboard display. | 2,400 |
8,324 | 8,324 | 15,606,813 | 2,438 | A system and method for modeling viable threats and for evading deployed defenses on a network are described. As a defensive tool used for threat modeling, the system and method allows those responsible for the safety of their critical infrastructure and intellectual property to have a clear view of all failures in the security countermeasure products they have deployed. As an offensive tool used for defense evasion modeling, the system and method can be used to quickly ascertain a viable attack vector, select exploitation code, and cross-reference those exploits that will bypass every layer of countermeasure technologies to commercially- and publicly-accessible crimeware and security testing tools. | 1. A method for modeling computer and network threats, comprising:
receiving information about an entity that is to be protected from threats, the entity being one of an application and an operating system; receiving information about one or more security products for protecting the entity; modeling each security product to identify one or more exploits that are not stopped by the security product; and displaying a graphical output of a representation of the one or more security products for protecting the entity and a plurality of known exploits and each exploit is linked to one or more of the security products, each security product having an icon and a particular security product having an indication that more exploits are linked to the particular security product that other security products. 2. The method of claim 1, wherein modeling each security product further comprises using a transform for modeling each security product. 3. The method of claim 2, wherein using the transform for modeling each security product further comprises correlating failures of security products to stop a particular exploit. 4. The method of claim 1 further comprising indicating each security product that best protects the entity against the one or more exploits. 5. The method of claim 1 further comprising indicating the one or more exploits used to threaten the entity. 6. The method of claim 1, wherein the modeling models one of attacker initiated attacks and target initiated attacks. 7. The method of claim 1 further comprising generating correlated failures in the one or more security products to detect an exploit that is not stopped by the one or more security products. 8. The method of claim 1 further comprising indicating if the one or more exploits are in a crimeware kit. 9. The method of claim 1 further comprising generating a common vulnerabilities and exposures (CVE) data for each exploit. 10. The method of claim 9 further comprising displaying the security products known to fail to detect an exploit with the CVE data. 11. The method of claim 1 further comprising using the modeling as one of an offensive tool and a defensive tool. 12. The method of claim 11, wherein using the modeling as an offensive tool further comprises identifying one or more tools that bypass the one or more security products. 13. An apparatus for modeling computer and network threats, comprising:
a computer system having a processor, a memory and a plurality of lines of instructions that is configured to: receive information about an entity that is to be protected from threats, the entity being one of an application and an operating system and to receive information about one or more security products for protecting the entity; model each security product to identify one or more exploits that are not stopped by the security product; and display a graphical output of a representation of the one or more security products for protecting the entity and a plurality of known exploits and each exploit is linked to one or more of the security products, each security product having an icon and a particular security product having an indication that more exploits are linked to the particular security product that other security products. 14. The apparatus of claim 13, wherein the processor configured to model each security product further comprises the processor configured to use a transform for modeling each security product. 15. The apparatus of claim 14, wherein processor configured to use the transform further comprises the processor configured to correlate failures of security products to stop a particular exploit. 16. The apparatus of claim 13, wherein the processor is configured to indicate each security product that best protects the entity against the one or more exploits. 17. The apparatus of claim 13, wherein the processor is configured to indicate the one or more exploits used to threaten the entity. 18. The apparatus of claim 13, wherein the processor is configured to generate correlated failures in the one or more security products to detect an exploit that is not stopped by the one or more security products. 19. The apparatus of claim 13, wherein the processor is configured to indicate if the one or more exploits are in a crimeware kit. 20. The apparatus of claim 13, wherein the processor is configured to generate a common vulnerabilities and exposures (CVE) data for each exploit. 21. The apparatus of claim 20, wherein the processor is configured to display the security products known to fail to detect an exploit with the CVE data. 22. The apparatus of claim 13, wherein the processor is configured to be used as one of an offensive tool and a defensive tool. 23. The apparatus of claim 22, wherein the processor is configured to identify one or more tools that bypass the one or more security products when used as the offensive tool. 24. The apparatus of claim 13, wherein the threat modeling component is remote from the entity being protected. 25. The apparatus of claim 13, wherein the threat modeling component is embedded in a network to which the entity to be protected is connected. | A system and method for modeling viable threats and for evading deployed defenses on a network are described. As a defensive tool used for threat modeling, the system and method allows those responsible for the safety of their critical infrastructure and intellectual property to have a clear view of all failures in the security countermeasure products they have deployed. As an offensive tool used for defense evasion modeling, the system and method can be used to quickly ascertain a viable attack vector, select exploitation code, and cross-reference those exploits that will bypass every layer of countermeasure technologies to commercially- and publicly-accessible crimeware and security testing tools.1. A method for modeling computer and network threats, comprising:
receiving information about an entity that is to be protected from threats, the entity being one of an application and an operating system; receiving information about one or more security products for protecting the entity; modeling each security product to identify one or more exploits that are not stopped by the security product; and displaying a graphical output of a representation of the one or more security products for protecting the entity and a plurality of known exploits and each exploit is linked to one or more of the security products, each security product having an icon and a particular security product having an indication that more exploits are linked to the particular security product that other security products. 2. The method of claim 1, wherein modeling each security product further comprises using a transform for modeling each security product. 3. The method of claim 2, wherein using the transform for modeling each security product further comprises correlating failures of security products to stop a particular exploit. 4. The method of claim 1 further comprising indicating each security product that best protects the entity against the one or more exploits. 5. The method of claim 1 further comprising indicating the one or more exploits used to threaten the entity. 6. The method of claim 1, wherein the modeling models one of attacker initiated attacks and target initiated attacks. 7. The method of claim 1 further comprising generating correlated failures in the one or more security products to detect an exploit that is not stopped by the one or more security products. 8. The method of claim 1 further comprising indicating if the one or more exploits are in a crimeware kit. 9. The method of claim 1 further comprising generating a common vulnerabilities and exposures (CVE) data for each exploit. 10. The method of claim 9 further comprising displaying the security products known to fail to detect an exploit with the CVE data. 11. The method of claim 1 further comprising using the modeling as one of an offensive tool and a defensive tool. 12. The method of claim 11, wherein using the modeling as an offensive tool further comprises identifying one or more tools that bypass the one or more security products. 13. An apparatus for modeling computer and network threats, comprising:
a computer system having a processor, a memory and a plurality of lines of instructions that is configured to: receive information about an entity that is to be protected from threats, the entity being one of an application and an operating system and to receive information about one or more security products for protecting the entity; model each security product to identify one or more exploits that are not stopped by the security product; and display a graphical output of a representation of the one or more security products for protecting the entity and a plurality of known exploits and each exploit is linked to one or more of the security products, each security product having an icon and a particular security product having an indication that more exploits are linked to the particular security product that other security products. 14. The apparatus of claim 13, wherein the processor configured to model each security product further comprises the processor configured to use a transform for modeling each security product. 15. The apparatus of claim 14, wherein processor configured to use the transform further comprises the processor configured to correlate failures of security products to stop a particular exploit. 16. The apparatus of claim 13, wherein the processor is configured to indicate each security product that best protects the entity against the one or more exploits. 17. The apparatus of claim 13, wherein the processor is configured to indicate the one or more exploits used to threaten the entity. 18. The apparatus of claim 13, wherein the processor is configured to generate correlated failures in the one or more security products to detect an exploit that is not stopped by the one or more security products. 19. The apparatus of claim 13, wherein the processor is configured to indicate if the one or more exploits are in a crimeware kit. 20. The apparatus of claim 13, wherein the processor is configured to generate a common vulnerabilities and exposures (CVE) data for each exploit. 21. The apparatus of claim 20, wherein the processor is configured to display the security products known to fail to detect an exploit with the CVE data. 22. The apparatus of claim 13, wherein the processor is configured to be used as one of an offensive tool and a defensive tool. 23. The apparatus of claim 22, wherein the processor is configured to identify one or more tools that bypass the one or more security products when used as the offensive tool. 24. The apparatus of claim 13, wherein the threat modeling component is remote from the entity being protected. 25. The apparatus of claim 13, wherein the threat modeling component is embedded in a network to which the entity to be protected is connected. | 2,400 |
8,325 | 8,325 | 13,801,947 | 2,498 | A medical information navigation engine (“MINE”) is provided. In some embodiments, the system computes a current patient encounter vector for a current patient encounter, and then an optimal patient encounter vector is computed by assuming a best case patient encounter in accordance with the organizational objectives. The system is then able to compute the difference between the best case encounter and the current patient encounter. This difference is used to compute a corresponding payoff using an intelligent matrix. | 1. In a Medical Information Navigation Engine (“MINE”), a computerized method for knowledge extraction and exchange, the method comprising:
computing a current patient encounter vector for a current patient encounter;
computing an optimal patient encounter vector by assuming a substantially best case patient encounter in accordance with at least one organizational objective;
computing at least one difference between the substantially best case encounter and the current patient encounter;
computing a corresponding payoff for each of the at least one difference; and
providing, in order of potential payoff, at least one difference between the optimal patient encounter vector and the current patient encounter vector. 2. In a Medical Information Navigation Engine (“MINE”), a method for identifying gaps, the method comprising:
receiving clinical history of a patient; and
comparing the received clinical history of the patient with a history of claims or billing documentation regarding the patient and if the comparison reveals gaps, presenting and ranking the gaps. 3. The method of claim 2 further comprising presenting the gaps using at least one of a single click and a notification. 4. In a Medical Information Navigation Engine (“MINE”), a method for increasing revenues, the method comprising:
computing future expected costs related to a patient;
identifying a sets of patients with similar situations, the set of patients including the patient; and
by reviewing lower and higher cost trajectories, identifying one or more actions to be performed to allow the patient or set of patients to be moved into the lower cost trajectory. | A medical information navigation engine (“MINE”) is provided. In some embodiments, the system computes a current patient encounter vector for a current patient encounter, and then an optimal patient encounter vector is computed by assuming a best case patient encounter in accordance with the organizational objectives. The system is then able to compute the difference between the best case encounter and the current patient encounter. This difference is used to compute a corresponding payoff using an intelligent matrix.1. In a Medical Information Navigation Engine (“MINE”), a computerized method for knowledge extraction and exchange, the method comprising:
computing a current patient encounter vector for a current patient encounter;
computing an optimal patient encounter vector by assuming a substantially best case patient encounter in accordance with at least one organizational objective;
computing at least one difference between the substantially best case encounter and the current patient encounter;
computing a corresponding payoff for each of the at least one difference; and
providing, in order of potential payoff, at least one difference between the optimal patient encounter vector and the current patient encounter vector. 2. In a Medical Information Navigation Engine (“MINE”), a method for identifying gaps, the method comprising:
receiving clinical history of a patient; and
comparing the received clinical history of the patient with a history of claims or billing documentation regarding the patient and if the comparison reveals gaps, presenting and ranking the gaps. 3. The method of claim 2 further comprising presenting the gaps using at least one of a single click and a notification. 4. In a Medical Information Navigation Engine (“MINE”), a method for increasing revenues, the method comprising:
computing future expected costs related to a patient;
identifying a sets of patients with similar situations, the set of patients including the patient; and
by reviewing lower and higher cost trajectories, identifying one or more actions to be performed to allow the patient or set of patients to be moved into the lower cost trajectory. | 2,400 |
8,326 | 8,326 | 15,017,555 | 2,457 | Disclosed aspects relate to asset management with respect to a shared pool of configurable computing resources. With respect to a set of assets which share a resource on a first compute node, a set of asset weight values is identified. The set of asset weight values indicates a set of utilization shares of the resource by the set of assets. A set of asset priority values is identified with respect to the set of assets on the first compute node. The set of asset priority values indicates a relative status arrangement for the set of assets. Using the set of asset weight values and the set of asset priority values, a determination is made to migrate a first asset of the set of assets from the first compute node to a second compute node. Accordingly, the first asset of the set of assets is migrated from the first compute node to the second compute node. | 1. A computer-implemented method for asset management with respect to a shared pool of configurable computing resources, the method comprising:
identifying, with respect to a set of assets which share a resource on a first compute node, a set of asset weight values which indicates a set of utilization shares of the resource by the set of assets; identifying, with respect to the set of assets on the first compute node, a set of asset priority values which indicates a relative status arrangement for the set of assets; determining, using both the set of asset weight values and the set of asset priority values, to migrate a first asset of the set of assets from the first compute node to a second compute node; and migrating the first asset of the set of assets from the first compute node to the second compute node. 2. The method of claim 1, wherein the set of assets includes a selection from a group consisting of at least one of: a set of virtual machines, or a set of logical partitions. 3. The method of claim 1, wherein the resource includes a processor capacity remainder. 4. The method of claim 3, wherein the set of utilization shares indicates an allocation of the processor capacity remainder to the set of assets. 5. The method of claim 1, wherein the migration includes a live migration that is performed by a native operating system, and wherein the resource includes a processor allocation. 6. The method of claim 1, wherein migrating the first asset of the set of assets from the first compute node to the second compute node includes:
migrating, in response to detecting a triggering event, the first asset. 7. The method of claim 6, wherein the triggering event includes a selection from a group consisting of at least one of:
a threshold temporal period is achieved, a threshold resource utilization is achieved, a threshold expected-error-event-impact value is achieved, or the set of assets is changed. 8. The method of claim 1, wherein identifying the set of asset weight values, identifying the set of asset priority values, determining to migrate the first asset, and migrating the first asset each occur in an automated fashion without user intervention. 9. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining to migrate the first asset to balance, with respect to the first and second compute nodes, the set of asset weight values and the set of asset priority values. 10. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining to migrate the first asset based on a striping criterion. 11. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining to migrate the first asset based on a packing criterion. 12. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining, by analyzing a combination of assets of both the first and second compute nodes, a relationship between a first expected burden of a first compute node error event and a second expected burden of a second compute node error event. 13. The method of claim 12, wherein the first expected burden of the first compute node error event exceeds the second expected burden of the second compute node error event, and wherein a first asset priority of the set of asset priority values indicates a relative status of the first asset which exceeds a status threshold with respect to the relative status arrangement for the set of assets. 14. The method of claim 12, wherein the second expected burden of the second compute node error event exceeds the first expected burden of the first compute node error event, and wherein a first asset priority of the set of asset priority values indicates a relative status of the first asset which does not exceed a status threshold with respect to the relative status arrangement for the set of assets. 15. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
comparing, using the set of asset priority values which indicates the relative status arrangement for the set of assets, a first asset priority value of the first asset of the set of assets with a second asset priority value of a second asset of the set of assets. 16. The method of claim 15, wherein the first asset priority value and the second asset priority value are within a threshold difference, further comprising:
comparing, using the set of asset weight values which indicates a set of utilization shares of the resource by the set of assets, a first asset weight value of the first asset of the set of assets with a second asset weight value of the second asset of the set of assets. 17. The method of claim 1, further comprising:
metering use of the asset management; and generating an invoice based on the metered use. 18. A system for asset management with respect to a shared pool of configurable computing resources, the system comprising:
a memory having a set of computer readable computer instructions, and a processor for executing the set of computer readable instructions, the set of computer readable instructions including: identifying, with respect to a set of assets which share a resource on a first compute node, a set of asset weight values which indicates a set of utilization shares of the resource by the set of assets; identifying, with respect to the set of assets on the first compute node, a set of asset priority values which indicates a relative status arrangement for the set of assets; determining, using both the set of asset weight values and the set of asset priority values, to migrate a first asset of the set of assets from the first compute node to a second compute node; and migrating the first asset of the set of assets from the first compute node to the second compute node. 19. A computer program product for asset management with respect to a shared pool of configurable computing resources, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, the program instructions executable by a processor to cause the processor to perform a method comprising:
identifying, with respect to a set of assets which share a resource on a first compute node, a set of asset weight values which indicates a set of utilization shares of the resource by the set of assets; identifying, with respect to the set of assets on the first compute node, a set of asset priority values which indicates a relative status arrangement for the set of assets; determining, using both the set of asset weight values and the set of asset priority values, to migrate a first asset of the set of assets from the first compute node to a second compute node; and migrating the first asset of the set of assets from the first compute node to the second compute node. 20. The computer program product of claim 19, wherein at least one of:
the program instructions are stored in a computer readable storage medium in a data processing system, and wherein the program instructions were downloaded over a network from a remote data processing system; or the program instructions are stored in a computer readable storage medium in a server data processing system, and wherein the program instructions are downloaded over a network to a remote data processing system for use in a computer readable storage medium with the remote data processing system. | Disclosed aspects relate to asset management with respect to a shared pool of configurable computing resources. With respect to a set of assets which share a resource on a first compute node, a set of asset weight values is identified. The set of asset weight values indicates a set of utilization shares of the resource by the set of assets. A set of asset priority values is identified with respect to the set of assets on the first compute node. The set of asset priority values indicates a relative status arrangement for the set of assets. Using the set of asset weight values and the set of asset priority values, a determination is made to migrate a first asset of the set of assets from the first compute node to a second compute node. Accordingly, the first asset of the set of assets is migrated from the first compute node to the second compute node.1. A computer-implemented method for asset management with respect to a shared pool of configurable computing resources, the method comprising:
identifying, with respect to a set of assets which share a resource on a first compute node, a set of asset weight values which indicates a set of utilization shares of the resource by the set of assets; identifying, with respect to the set of assets on the first compute node, a set of asset priority values which indicates a relative status arrangement for the set of assets; determining, using both the set of asset weight values and the set of asset priority values, to migrate a first asset of the set of assets from the first compute node to a second compute node; and migrating the first asset of the set of assets from the first compute node to the second compute node. 2. The method of claim 1, wherein the set of assets includes a selection from a group consisting of at least one of: a set of virtual machines, or a set of logical partitions. 3. The method of claim 1, wherein the resource includes a processor capacity remainder. 4. The method of claim 3, wherein the set of utilization shares indicates an allocation of the processor capacity remainder to the set of assets. 5. The method of claim 1, wherein the migration includes a live migration that is performed by a native operating system, and wherein the resource includes a processor allocation. 6. The method of claim 1, wherein migrating the first asset of the set of assets from the first compute node to the second compute node includes:
migrating, in response to detecting a triggering event, the first asset. 7. The method of claim 6, wherein the triggering event includes a selection from a group consisting of at least one of:
a threshold temporal period is achieved, a threshold resource utilization is achieved, a threshold expected-error-event-impact value is achieved, or the set of assets is changed. 8. The method of claim 1, wherein identifying the set of asset weight values, identifying the set of asset priority values, determining to migrate the first asset, and migrating the first asset each occur in an automated fashion without user intervention. 9. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining to migrate the first asset to balance, with respect to the first and second compute nodes, the set of asset weight values and the set of asset priority values. 10. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining to migrate the first asset based on a striping criterion. 11. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining to migrate the first asset based on a packing criterion. 12. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
determining, by analyzing a combination of assets of both the first and second compute nodes, a relationship between a first expected burden of a first compute node error event and a second expected burden of a second compute node error event. 13. The method of claim 12, wherein the first expected burden of the first compute node error event exceeds the second expected burden of the second compute node error event, and wherein a first asset priority of the set of asset priority values indicates a relative status of the first asset which exceeds a status threshold with respect to the relative status arrangement for the set of assets. 14. The method of claim 12, wherein the second expected burden of the second compute node error event exceeds the first expected burden of the first compute node error event, and wherein a first asset priority of the set of asset priority values indicates a relative status of the first asset which does not exceed a status threshold with respect to the relative status arrangement for the set of assets. 15. The method of claim 1, wherein determining, using both the set of asset weight values and the set of asset priority values, to migrate the first asset of the set of assets from the first compute node to the second compute node includes:
comparing, using the set of asset priority values which indicates the relative status arrangement for the set of assets, a first asset priority value of the first asset of the set of assets with a second asset priority value of a second asset of the set of assets. 16. The method of claim 15, wherein the first asset priority value and the second asset priority value are within a threshold difference, further comprising:
comparing, using the set of asset weight values which indicates a set of utilization shares of the resource by the set of assets, a first asset weight value of the first asset of the set of assets with a second asset weight value of the second asset of the set of assets. 17. The method of claim 1, further comprising:
metering use of the asset management; and generating an invoice based on the metered use. 18. A system for asset management with respect to a shared pool of configurable computing resources, the system comprising:
a memory having a set of computer readable computer instructions, and a processor for executing the set of computer readable instructions, the set of computer readable instructions including: identifying, with respect to a set of assets which share a resource on a first compute node, a set of asset weight values which indicates a set of utilization shares of the resource by the set of assets; identifying, with respect to the set of assets on the first compute node, a set of asset priority values which indicates a relative status arrangement for the set of assets; determining, using both the set of asset weight values and the set of asset priority values, to migrate a first asset of the set of assets from the first compute node to a second compute node; and migrating the first asset of the set of assets from the first compute node to the second compute node. 19. A computer program product for asset management with respect to a shared pool of configurable computing resources, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, the program instructions executable by a processor to cause the processor to perform a method comprising:
identifying, with respect to a set of assets which share a resource on a first compute node, a set of asset weight values which indicates a set of utilization shares of the resource by the set of assets; identifying, with respect to the set of assets on the first compute node, a set of asset priority values which indicates a relative status arrangement for the set of assets; determining, using both the set of asset weight values and the set of asset priority values, to migrate a first asset of the set of assets from the first compute node to a second compute node; and migrating the first asset of the set of assets from the first compute node to the second compute node. 20. The computer program product of claim 19, wherein at least one of:
the program instructions are stored in a computer readable storage medium in a data processing system, and wherein the program instructions were downloaded over a network from a remote data processing system; or the program instructions are stored in a computer readable storage medium in a server data processing system, and wherein the program instructions are downloaded over a network to a remote data processing system for use in a computer readable storage medium with the remote data processing system. | 2,400 |
8,327 | 8,327 | 14,788,573 | 2,465 | A method of performing ingress traffic optimization for active/active data centers. The method creates site-specific grouping constructs for virtual machines that run applications that are advertised to the external networks. The site specific grouping constructs provide an abstraction to decouple virtual machines from traditional networks for common ingress network policies. Each site-specific container includes a list of the virtual machines currently located at the site as well as a unique identifier of the site. Each virtual machine in a container is identified through the abstraction of metadata tag, logical data center objects, or the virtual machine's unique name. The IP address of each virtual machine is retrieved from the guest operating system and a network policy is generated to advertise the IP addresses of the virtual machines to the site's routing peer. | 1. A method of ingress traffic optimization in a datacenter comprising a plurality of sites, each site associated with a different network, the method comprising:
placing a unique identifier of each of a first set of data compute nodes (DCNs) located at a first site in a first route advertisement group associated with the first site; retrieving the Internet protocol (IP) addresses of each DCN in the first set using the unique identifier of the DCN, the IP address of a first DCN in the first set comprising a network address corresponding to a first network associated with the first site; advertising the IP addresses of the DCNs in the first route advertisement group to a routing peer associated with the first site; determining that the first DCN has moved from the first site to a second site, the second site associated with a second network having a second network address different than the first network address; placing the unique identifier of the first DCN in a second route advertisement group associated with the second site; and advertising the IP address of the first DCN along with the IP addresses of a second set of DCNs in the second route advertisement group to a routing peer associated with the second site. 2. The method of claim 1, wherein placing the unique identifier of a DCN in the first route advertisement group comprises placing the unique identifier of a DCN in the first route advertisement group only when the DCN is located at the first site and the DCN satisfies a set of criteria for being placed in a route advertisement group. 3. The method of claim 2, wherein the set of criteria comprises at least one of the DCN being addressable from a network outside the first site and the DCN is not provisioned to remain at the first site. 4. The method of claim 1, wherein retrieving the IP addresses of a DCN comprises querying a guest operating system associated with the CDN using the unique identifier of the DCN to retrieve the IP address of the DCN. 5. The method of claim 1 further comprising storing a mapping between the unique identifier and the retrieved IP address of each DCN at the first site, wherein advertising the IP addresses of the DCNs in the first route advertisement group comprises using the unique identifier of each DCN and the mapping to retrieve the IP address of each DCN in the first route advertisement group. 6. The method of claim 1 further comprising:
after determining that the first DCN has moved from the first site to the second site, removing the unique identifier of the first DCN from the first route advertisement group; and
withdrawing the IP address of the DCN from the advertisement by the routing peer associated with the first site. 7. The method of claim 1, wherein the unique identifier of a DCN comprises one of a unique name associated with the DCN, a fully qualified domain name (FQDN) of an application running on the DCN, an identifier of a guest operating system associated with the DCN, and a metadata tag associated with the DCN. 8. The method of claim 1, wherein advertising the IP address of the first DCN to the routing peer associated with the second site causes the ingress traffic directed to the first DCN to be delivered to the routing peer associated with the second site despite the IP address of the first DCN having a different network address than the second network connected to the second site. 9. The method of claim 1, wherein determining that the first DCN has moved from the first site to a second site comprises:
receiving a notification that the first DCN has moved from a first host to a second host; and determining that the second host is associated a site with a different site-specific identifier than the first site. 10. The method of claim 1, wherein the IP address of each DCN comprises a first field comprising said network address identifying a particular sub-network and a second field identifying a host connected to the particular sub-network. 11. A non-transitory machine readable medium storing a program for ingress traffic optimization in a datacenter comprising a plurality of sites, each site associated with a different network, the program comprising sets of instructions for:
placing a unique identifier of each of a first set of data compute nodes (DCNs) located at a first site in a first route advertisement group associated with the first site; retrieving the Internet protocol (IP) addresses of each DCN in the first set using the unique identifier of the DCN, the IP address of a first DCN in the first set comprising a network address corresponding to a first network associated with the first site; advertising the IP addresses of the DCNs in the first route advertisement group to a routing peer associated with the first site; determining that the first DCN has moved from the first site to a second site, the second site associated with a second network having a second network address different than the first network address; placing the unique identifier of the first DCN in a second route advertisement group associated with the second site; and advertising the IP address of the first DCN along with the IP addresses of a second set of DCNs in the second route advertisement group to a routing peer associated with the second site. 12. The non-transitory machine readable medium of claim 11, wherein the set of instructions for placing the unique identifier of a DCN in the first route advertisement group comprises a set of instructions for placing the unique identifier of a DCN in the first route advertisement group only when the DCN is located at the first site and the DCN satisfies a set of criteria for being placed in a route advertisement group. 13. The non-transitory machine readable medium of claim 12, wherein the set of criteria comprises at least one of the DCN being addressable from a network outside the first site and the DCN is not provisioned to remain at the first site. 14. The non-transitory machine readable medium of claim 11, wherein the set of instructions for retrieving the IP addresses of a DCN comprises a set of instructions for querying a guest operating system associated with the CDN using the unique identifier of the DCN to retrieve the IP address of the DCN. 15. The non-transitory machine readable medium of claim 11, the program further comprising a set of instructions for storing a mapping between the unique identifier and the retrieved IP address of each DCN at the first site, wherein the set of instructions for advertising the IP addresses of the DCNs in the first route advertisement group comprises a set of instructions for using the unique identifier of each DCN and the mapping to retrieve the IP address of each DCN in the first route advertisement group. 16. The non-transitory machine readable medium of claim 11, the program further comprising sets of instructions for:
removing, after determining that the first DCN has moved from the first site to the second site, the unique identifier of the first DCN from the first route advertisement group; and withdrawing the IP address of the DCN from the advertisement by the routing peer associated with the first site. 17. The non-transitory machine readable medium of claim 11, wherein the unique identifier of a DCN comprises one of a unique name associated with the DCN, a fully qualified domain name (FQDN) of an application running on the DCN, an identifier of a guest operating system associated with the DCN, and a metadata tag associated with the DCN. 18. The non-transitory machine readable medium of claim 11, wherein advertising the IP address of the first DCN to the routing peer associated with the second site causes the ingress traffic directed to the first DCN to be delivered to the routing peer associated with the second site despite the IP address of the first DCN having a different network address than the second network connected to the second site. 19. The non-transitory machine readable medium of claim 11, wherein the set of instructions for determining that the first DCN has moved from the first site to a second site comprises sets of instructions for:
receiving a notification that the first DCN has moved from a first host to a second host; and determining that the second host is associated a site with a different site-specific identifier than the first site. 20. The non-transitory machine readable medium of claim 11, wherein the IP address of each DCN comprises a first field comprising said network address identifying a particular sub-network and a second field identifying a host connected to the particular sub-network. | A method of performing ingress traffic optimization for active/active data centers. The method creates site-specific grouping constructs for virtual machines that run applications that are advertised to the external networks. The site specific grouping constructs provide an abstraction to decouple virtual machines from traditional networks for common ingress network policies. Each site-specific container includes a list of the virtual machines currently located at the site as well as a unique identifier of the site. Each virtual machine in a container is identified through the abstraction of metadata tag, logical data center objects, or the virtual machine's unique name. The IP address of each virtual machine is retrieved from the guest operating system and a network policy is generated to advertise the IP addresses of the virtual machines to the site's routing peer.1. A method of ingress traffic optimization in a datacenter comprising a plurality of sites, each site associated with a different network, the method comprising:
placing a unique identifier of each of a first set of data compute nodes (DCNs) located at a first site in a first route advertisement group associated with the first site; retrieving the Internet protocol (IP) addresses of each DCN in the first set using the unique identifier of the DCN, the IP address of a first DCN in the first set comprising a network address corresponding to a first network associated with the first site; advertising the IP addresses of the DCNs in the first route advertisement group to a routing peer associated with the first site; determining that the first DCN has moved from the first site to a second site, the second site associated with a second network having a second network address different than the first network address; placing the unique identifier of the first DCN in a second route advertisement group associated with the second site; and advertising the IP address of the first DCN along with the IP addresses of a second set of DCNs in the second route advertisement group to a routing peer associated with the second site. 2. The method of claim 1, wherein placing the unique identifier of a DCN in the first route advertisement group comprises placing the unique identifier of a DCN in the first route advertisement group only when the DCN is located at the first site and the DCN satisfies a set of criteria for being placed in a route advertisement group. 3. The method of claim 2, wherein the set of criteria comprises at least one of the DCN being addressable from a network outside the first site and the DCN is not provisioned to remain at the first site. 4. The method of claim 1, wherein retrieving the IP addresses of a DCN comprises querying a guest operating system associated with the CDN using the unique identifier of the DCN to retrieve the IP address of the DCN. 5. The method of claim 1 further comprising storing a mapping between the unique identifier and the retrieved IP address of each DCN at the first site, wherein advertising the IP addresses of the DCNs in the first route advertisement group comprises using the unique identifier of each DCN and the mapping to retrieve the IP address of each DCN in the first route advertisement group. 6. The method of claim 1 further comprising:
after determining that the first DCN has moved from the first site to the second site, removing the unique identifier of the first DCN from the first route advertisement group; and
withdrawing the IP address of the DCN from the advertisement by the routing peer associated with the first site. 7. The method of claim 1, wherein the unique identifier of a DCN comprises one of a unique name associated with the DCN, a fully qualified domain name (FQDN) of an application running on the DCN, an identifier of a guest operating system associated with the DCN, and a metadata tag associated with the DCN. 8. The method of claim 1, wherein advertising the IP address of the first DCN to the routing peer associated with the second site causes the ingress traffic directed to the first DCN to be delivered to the routing peer associated with the second site despite the IP address of the first DCN having a different network address than the second network connected to the second site. 9. The method of claim 1, wherein determining that the first DCN has moved from the first site to a second site comprises:
receiving a notification that the first DCN has moved from a first host to a second host; and determining that the second host is associated a site with a different site-specific identifier than the first site. 10. The method of claim 1, wherein the IP address of each DCN comprises a first field comprising said network address identifying a particular sub-network and a second field identifying a host connected to the particular sub-network. 11. A non-transitory machine readable medium storing a program for ingress traffic optimization in a datacenter comprising a plurality of sites, each site associated with a different network, the program comprising sets of instructions for:
placing a unique identifier of each of a first set of data compute nodes (DCNs) located at a first site in a first route advertisement group associated with the first site; retrieving the Internet protocol (IP) addresses of each DCN in the first set using the unique identifier of the DCN, the IP address of a first DCN in the first set comprising a network address corresponding to a first network associated with the first site; advertising the IP addresses of the DCNs in the first route advertisement group to a routing peer associated with the first site; determining that the first DCN has moved from the first site to a second site, the second site associated with a second network having a second network address different than the first network address; placing the unique identifier of the first DCN in a second route advertisement group associated with the second site; and advertising the IP address of the first DCN along with the IP addresses of a second set of DCNs in the second route advertisement group to a routing peer associated with the second site. 12. The non-transitory machine readable medium of claim 11, wherein the set of instructions for placing the unique identifier of a DCN in the first route advertisement group comprises a set of instructions for placing the unique identifier of a DCN in the first route advertisement group only when the DCN is located at the first site and the DCN satisfies a set of criteria for being placed in a route advertisement group. 13. The non-transitory machine readable medium of claim 12, wherein the set of criteria comprises at least one of the DCN being addressable from a network outside the first site and the DCN is not provisioned to remain at the first site. 14. The non-transitory machine readable medium of claim 11, wherein the set of instructions for retrieving the IP addresses of a DCN comprises a set of instructions for querying a guest operating system associated with the CDN using the unique identifier of the DCN to retrieve the IP address of the DCN. 15. The non-transitory machine readable medium of claim 11, the program further comprising a set of instructions for storing a mapping between the unique identifier and the retrieved IP address of each DCN at the first site, wherein the set of instructions for advertising the IP addresses of the DCNs in the first route advertisement group comprises a set of instructions for using the unique identifier of each DCN and the mapping to retrieve the IP address of each DCN in the first route advertisement group. 16. The non-transitory machine readable medium of claim 11, the program further comprising sets of instructions for:
removing, after determining that the first DCN has moved from the first site to the second site, the unique identifier of the first DCN from the first route advertisement group; and withdrawing the IP address of the DCN from the advertisement by the routing peer associated with the first site. 17. The non-transitory machine readable medium of claim 11, wherein the unique identifier of a DCN comprises one of a unique name associated with the DCN, a fully qualified domain name (FQDN) of an application running on the DCN, an identifier of a guest operating system associated with the DCN, and a metadata tag associated with the DCN. 18. The non-transitory machine readable medium of claim 11, wherein advertising the IP address of the first DCN to the routing peer associated with the second site causes the ingress traffic directed to the first DCN to be delivered to the routing peer associated with the second site despite the IP address of the first DCN having a different network address than the second network connected to the second site. 19. The non-transitory machine readable medium of claim 11, wherein the set of instructions for determining that the first DCN has moved from the first site to a second site comprises sets of instructions for:
receiving a notification that the first DCN has moved from a first host to a second host; and determining that the second host is associated a site with a different site-specific identifier than the first site. 20. The non-transitory machine readable medium of claim 11, wherein the IP address of each DCN comprises a first field comprising said network address identifying a particular sub-network and a second field identifying a host connected to the particular sub-network. | 2,400 |
8,328 | 8,328 | 15,545,342 | 2,484 | The present disclosure proposes an improved apparatus and method for counting of sea lice by providing a stable and controlled light environment which ensures counting of sea lice reliably and independent of weather conditions and an optimized spectral power distribution and intensity of the light for improved observation (detectability) of sea lice with respect to fish skin. An embodiment of the disclosed light system comprises multiple LEDs, at least two LEDs providing a light colour with peaks in the range 490-540 nm (Cyan/Green) respectively 620-660 nm (Red). | 1. An apparatus for counting sea lice, comprising at least one light source for providing a light output with a spectral power distribution for observation of sea lice on fish skin, where said spectral power distribution is characterized within the visible wavelength range from 380 nm to 780 nm by at least two dominant wavelength peaks, a first dominant wavelength peak in the range of 490-540 nm and a second dominant wavelength peak in the range of 620-660 nm,
wherein the apparatus further comprises a sensor for measuring an environmental light condition and a processor for adapting an intensity and/or a colour balance of the light output of the light source to the measured environmental light condition for increasing visual contrast when counting sea lice. 2. The apparatus of claim 1, wherein a peak distribution of at least one of the first and the second dominant wavelength peak has a typical spectral half-width of 15-35 nm. 3. The apparatus of claim 1, wherein the at least one light source is adapted to provide an illuminance larger or equal to 500 lux as measured on a target surface, wherein the target surface is fish skin. 4. The apparatus of claim 1, comprising at least a first light source for providing light output having the first dominant wavelength peak and a second light source for providing light output having the second dominant wavelength peak. 5. The apparatus of claim 1, wherein the light output in at least one dominant wavelength peak is produced via phosphor conversion from light in a UV or blue wavelength range. 6. The apparatus of claim 1, further comprising a light fixture comprising the at least one light source and at least a reflector or diffuser for homogenizing the lighting output from the at least one light source. 7. (canceled) 8. (canceled) 9. (canceled) 10. The apparatus of claim 1 wherein the apparatus is a wearable device. 11. The apparatus of claim 1 wherein the at least one light source is a direct LED or a phosphor converted LED. 12. A method of counting sea lice on skin of fish sample comprising the steps of:
providing a fish sample; illuminating the fish sample using an apparatus according to any the preceding claims; and counting the sea lice on skin of the fish sample. 13. The apparatus of claim 1, further comprising a box for receiving a fish sample for the purpose of counting sea lice and being adapted to support the at least one light source providing the light output for observation of the sea lice on the fish sample. 14. The apparatus of claim 2, wherein the box further comprises a camera for taking an image of the fish sample placed in the box and image analysis means for counting the sea lice from the image, wherein the image analysis means comprises either an image processing software incorporated in the camera of the counting box or an image processing software provided on an external computing device capable of receiving the image from the camera. 15. The apparatus of claim 2, wherein the box further comprises a reservoir for receiving an amount of water from an aqueous habitat of the fish sample such that the fish sample can be received in the amount of water and survive when counting the sea lice. 16. The method of claim 12, wherein the step of counting the sea lice includes taking an image of the fish sample and analyzing the image to count sea lice on skin of the fish sample. | The present disclosure proposes an improved apparatus and method for counting of sea lice by providing a stable and controlled light environment which ensures counting of sea lice reliably and independent of weather conditions and an optimized spectral power distribution and intensity of the light for improved observation (detectability) of sea lice with respect to fish skin. An embodiment of the disclosed light system comprises multiple LEDs, at least two LEDs providing a light colour with peaks in the range 490-540 nm (Cyan/Green) respectively 620-660 nm (Red).1. An apparatus for counting sea lice, comprising at least one light source for providing a light output with a spectral power distribution for observation of sea lice on fish skin, where said spectral power distribution is characterized within the visible wavelength range from 380 nm to 780 nm by at least two dominant wavelength peaks, a first dominant wavelength peak in the range of 490-540 nm and a second dominant wavelength peak in the range of 620-660 nm,
wherein the apparatus further comprises a sensor for measuring an environmental light condition and a processor for adapting an intensity and/or a colour balance of the light output of the light source to the measured environmental light condition for increasing visual contrast when counting sea lice. 2. The apparatus of claim 1, wherein a peak distribution of at least one of the first and the second dominant wavelength peak has a typical spectral half-width of 15-35 nm. 3. The apparatus of claim 1, wherein the at least one light source is adapted to provide an illuminance larger or equal to 500 lux as measured on a target surface, wherein the target surface is fish skin. 4. The apparatus of claim 1, comprising at least a first light source for providing light output having the first dominant wavelength peak and a second light source for providing light output having the second dominant wavelength peak. 5. The apparatus of claim 1, wherein the light output in at least one dominant wavelength peak is produced via phosphor conversion from light in a UV or blue wavelength range. 6. The apparatus of claim 1, further comprising a light fixture comprising the at least one light source and at least a reflector or diffuser for homogenizing the lighting output from the at least one light source. 7. (canceled) 8. (canceled) 9. (canceled) 10. The apparatus of claim 1 wherein the apparatus is a wearable device. 11. The apparatus of claim 1 wherein the at least one light source is a direct LED or a phosphor converted LED. 12. A method of counting sea lice on skin of fish sample comprising the steps of:
providing a fish sample; illuminating the fish sample using an apparatus according to any the preceding claims; and counting the sea lice on skin of the fish sample. 13. The apparatus of claim 1, further comprising a box for receiving a fish sample for the purpose of counting sea lice and being adapted to support the at least one light source providing the light output for observation of the sea lice on the fish sample. 14. The apparatus of claim 2, wherein the box further comprises a camera for taking an image of the fish sample placed in the box and image analysis means for counting the sea lice from the image, wherein the image analysis means comprises either an image processing software incorporated in the camera of the counting box or an image processing software provided on an external computing device capable of receiving the image from the camera. 15. The apparatus of claim 2, wherein the box further comprises a reservoir for receiving an amount of water from an aqueous habitat of the fish sample such that the fish sample can be received in the amount of water and survive when counting the sea lice. 16. The method of claim 12, wherein the step of counting the sea lice includes taking an image of the fish sample and analyzing the image to count sea lice on skin of the fish sample. | 2,400 |
8,329 | 8,329 | 15,097,710 | 2,416 | A method for limiting Channel Quality Indicator (CQI) reporting from a User Equipment to a network node is provided where a User Equipment can transmit CQI reports to a network node, such as e.g. a base station, when the User Equipment is operating in low transmission and/or low reception activity mode. A limited CQI reporting is obtained by triggering the reporting according to one or more predefined rules, which to at least some extent depend on CQI specific information provided to the User Equipment from the network node. A User Equipment and a network node adapted to operate in accordance with the suggested method are also provided. | 1. A method for limiting Channel Quality Indicator (CQI) reporting from a User Equipment to a network node, comprising:
determining that at least one CQI reporting trigger rules is satisfied; transmitting, responsive to the determination that at least one CQI reporting trigger rules is satisfied, at least one CQI report to said network node by said User Equipment. 2. A method according to claim 1, wherein at least one of said trigger rules is based on a comparison between an estimated CQI and a predefined threshold. 3. A method according to claim 1, wherein at least one of said trigger rules is based on a comparison between an estimated CQI and a number of re-transmissions required for a delivery of a transport block received by said User Equipment 4. A method according to claim 1, wherein a comparison rule is based on a switching between different CQI reporting modes, wherein
a first CQI reporting mode is used when no data is sent between the User Equipment and the network node and in the first CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between an estimated CQI and a predefined CQI threshold; and a second CQI reporting mode is used when data is sent between the User Equipment and the network node and in the second CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between the transport block size corresponding to an estimated CQI and a received transport block size. 5. A method according to claim 1, wherein at least one of said CQI reporting trigger rules is based on a CQI reporting probability provided to said User Equipment from said network node. 6. A method according to claim 5, wherein said CQI reporting probability is provided to said UE from said network node in any of the following forms:
as one or more cell specific values, each of which is valid for all low activity states in a respective cell, as one or more state specific values, each of which is valid for a specific state, or as one or more User Equipment specific values, each of which is valid for a specific User Equipment in a specific cell. 7. A method according to claim 5, wherein said CQI reporting probability is broadcasted from said network node to said User Equipment. 8. A method according to claim 7, wherein said CQI reporting probability is transmitted from said network node to said User Equipment on a dedicated control channel. 9. A method according to claim 8, wherein said CQI reporting probability is transmitted from said network node to said User Equipment also on a broadcast channel. 10. A method according to claim 1, further comprising:
receiving updated CQI reporting trigger rules from the network node; and updating stored CQI reporting trigger rules based on the received updated CQI reporting trigger rules. 11. A method at a network node for limiting Channel Quality Indicator (CQI) reporting from a User Equipment to the network node, comprising:
determining rules for triggering reporting of CQIs specified for the User Equipment; and transmitting CQI specific information to the User Equipment, wherein the CQI specific information includes the rules for triggering reporting of CQIs specified for the User Equipment. 12. A method according to claim 11, wherein at least one of said triggering rules is based on a comparison between an estimated CQI and a predefined threshold. 13. A method according to claim 11, wherein at least one of said triggering rules is based on a comparison between an estimated CQI and a number of re-transmissions required for a delivery of a transport block received by said User Equipment 14. A method according to claim 11, wherein a comparison rule is based on a switching between different CQI reporting modes, wherein
a first CQI reporting mode is used when no data is sent between the User Equipment and the network node and in the first CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between an estimated CQI and a predefined CQI threshold; and a second CQI reporting mode is used when data is sent between the User Equipment and the network node and in the second CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between the transport block size corresponding to an estimated CQI and a received transport block size. 15. A method according to claim 11, wherein at least one of said CQI reporting trigger rules is based on a CQI reporting probability provided to said User Equipment from said network node. 16. A method according to claim 15, wherein said CQI reporting probability is provided to said UE from said network node in any of the following forms:
as one or more cell specific values, each of which is valid for all low activity states in a respective cell, as one or more state specific values, each of which is valid for a specific state, or as one or more User Equipment specific values, each of which is valid for a specific User Equipment in a specific cell. 17. A method according to claim 15, wherein said CQI reporting probability is broadcasted from said network node to said User Equipment. 18. A method according to claim 17, wherein said CQI reporting probability is transmitted from said network node to said User Equipment on a dedicated control channel. 19. A method according to claim 18, wherein said CQI reporting probability is transmitted from said network node to said User Equipment also on a broadcast channel. 20. A method according to claim 11, further comprising:
determining updated CQI reporting trigger rules; and transmitting the updated CQI reporting trigger rules to the User Equipment. | A method for limiting Channel Quality Indicator (CQI) reporting from a User Equipment to a network node is provided where a User Equipment can transmit CQI reports to a network node, such as e.g. a base station, when the User Equipment is operating in low transmission and/or low reception activity mode. A limited CQI reporting is obtained by triggering the reporting according to one or more predefined rules, which to at least some extent depend on CQI specific information provided to the User Equipment from the network node. A User Equipment and a network node adapted to operate in accordance with the suggested method are also provided.1. A method for limiting Channel Quality Indicator (CQI) reporting from a User Equipment to a network node, comprising:
determining that at least one CQI reporting trigger rules is satisfied; transmitting, responsive to the determination that at least one CQI reporting trigger rules is satisfied, at least one CQI report to said network node by said User Equipment. 2. A method according to claim 1, wherein at least one of said trigger rules is based on a comparison between an estimated CQI and a predefined threshold. 3. A method according to claim 1, wherein at least one of said trigger rules is based on a comparison between an estimated CQI and a number of re-transmissions required for a delivery of a transport block received by said User Equipment 4. A method according to claim 1, wherein a comparison rule is based on a switching between different CQI reporting modes, wherein
a first CQI reporting mode is used when no data is sent between the User Equipment and the network node and in the first CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between an estimated CQI and a predefined CQI threshold; and a second CQI reporting mode is used when data is sent between the User Equipment and the network node and in the second CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between the transport block size corresponding to an estimated CQI and a received transport block size. 5. A method according to claim 1, wherein at least one of said CQI reporting trigger rules is based on a CQI reporting probability provided to said User Equipment from said network node. 6. A method according to claim 5, wherein said CQI reporting probability is provided to said UE from said network node in any of the following forms:
as one or more cell specific values, each of which is valid for all low activity states in a respective cell, as one or more state specific values, each of which is valid for a specific state, or as one or more User Equipment specific values, each of which is valid for a specific User Equipment in a specific cell. 7. A method according to claim 5, wherein said CQI reporting probability is broadcasted from said network node to said User Equipment. 8. A method according to claim 7, wherein said CQI reporting probability is transmitted from said network node to said User Equipment on a dedicated control channel. 9. A method according to claim 8, wherein said CQI reporting probability is transmitted from said network node to said User Equipment also on a broadcast channel. 10. A method according to claim 1, further comprising:
receiving updated CQI reporting trigger rules from the network node; and updating stored CQI reporting trigger rules based on the received updated CQI reporting trigger rules. 11. A method at a network node for limiting Channel Quality Indicator (CQI) reporting from a User Equipment to the network node, comprising:
determining rules for triggering reporting of CQIs specified for the User Equipment; and transmitting CQI specific information to the User Equipment, wherein the CQI specific information includes the rules for triggering reporting of CQIs specified for the User Equipment. 12. A method according to claim 11, wherein at least one of said triggering rules is based on a comparison between an estimated CQI and a predefined threshold. 13. A method according to claim 11, wherein at least one of said triggering rules is based on a comparison between an estimated CQI and a number of re-transmissions required for a delivery of a transport block received by said User Equipment 14. A method according to claim 11, wherein a comparison rule is based on a switching between different CQI reporting modes, wherein
a first CQI reporting mode is used when no data is sent between the User Equipment and the network node and in the first CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between an estimated CQI and a predefined CQI threshold; and a second CQI reporting mode is used when data is sent between the User Equipment and the network node and in the second CQI reporting mode the at least one of said CQI reporting trigger rules is based on a comparison between the transport block size corresponding to an estimated CQI and a received transport block size. 15. A method according to claim 11, wherein at least one of said CQI reporting trigger rules is based on a CQI reporting probability provided to said User Equipment from said network node. 16. A method according to claim 15, wherein said CQI reporting probability is provided to said UE from said network node in any of the following forms:
as one or more cell specific values, each of which is valid for all low activity states in a respective cell, as one or more state specific values, each of which is valid for a specific state, or as one or more User Equipment specific values, each of which is valid for a specific User Equipment in a specific cell. 17. A method according to claim 15, wherein said CQI reporting probability is broadcasted from said network node to said User Equipment. 18. A method according to claim 17, wherein said CQI reporting probability is transmitted from said network node to said User Equipment on a dedicated control channel. 19. A method according to claim 18, wherein said CQI reporting probability is transmitted from said network node to said User Equipment also on a broadcast channel. 20. A method according to claim 11, further comprising:
determining updated CQI reporting trigger rules; and transmitting the updated CQI reporting trigger rules to the User Equipment. | 2,400 |
8,330 | 8,330 | 14,244,688 | 2,483 | In an example, a method of coding video data includes determining a first palette having first entries indicating first pixel values, determining, based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette, and coding pixels of a block of video data using the second palette. | 1. A method of coding video data, the method comprising:
determining a first palette having first entries indicating first pixel values; determining, based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and coding pixels of a block of video data using the second palette. 2. The method of claim 1, wherein the block is included in a picture having a plurality of blocks, and wherein determining the first palette comprises determining the first entries based on entries associated with more than one block of the plurality of blocks. 3. The method of claim 1, further comprising:
when the one or more second entries include all of the first entries, coding data indicating that the one or more second entries include all of the first entries; and when the one or more second entries include fewer than all of the first entries coding, for each entry of the second palette, data indicating whether the respective entry is included in the first palette and data indicating pixel values for entries that are not included in the first palette. 4. The method of claim 1, further comprising:
determining a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assigning index values to entries of the second palette based on the probability of occurrence, including assigning entries having a relatively higher probability of occurrence a relatively lower index value. 5. The method of claim 1, further comprising:
determining a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assigning index values to the one or more second entries of the second palette based on the one or more second entries being included in the first palette, including assigning a relatively lower index value to the one or more second entries than any other entries of the second palette; and 6. The method of claim 1, wherein the first palette is associated with a first block of video data, the method further comprising:
coding data indicating a location of the first block relative to the block of video data coded using the second palette. 7. The method of claim 6, wherein coding the data indicating the location comprises coding data indicating whether the first block is a top neighbor block located above the block of video data coded using the second palette, or whether the first block is a left neighbor block located to the left of the block of video data coded using the second palette. 8. The method of claim 1, wherein the first palette is used to code a block of pixels different than the block coded with the second palette, the method further comprising:
determining a frequency with which each entry of the first palette is used to code the block of pixels coded with the first palette; coding data identifying each of the one or more second entries based on the frequency. 9. The method of claim 1, further comprising:
coding a prediction syntax element indicating that the one or more second entries are based on the first entries. 10. The method of claim 1, further comprising quantizing the one or more entries of the second palette by combining the one or more entries of the second palette. 11. The method of claim 1, further comprising:
adding an entry to the second palette based on whether a difference between a pixel value of the entry to be added and pixel values of each of the one or more entries of the second palette is greater than a delta value. 12. The method of claim 1, further comprising determining a size of the second palette, wherein determining the size of the second palette comprises at least one of:
determining that the size of the second palette is fixed; determining that the size of the second palette is variable and based on data coded with the block of video data; determining the size of the palette based on a characteristic of the block of video data; or determining the size of the palette based on data coded with the block of video data indicating a final entry in the second palette. 13. The method of claim 1, wherein coding the pixels of the block comprises decoding the pixels, and wherein decoding the pixels comprises:
obtaining, from an encoded bitstream, respective index values for one or more of the pixels, wherein the respective index values identify an entry of the second palette; and determining values for the one more pixels by matching the respective index values to at least one of the entries of the second palette. 14. The method of claim 1, wherein coding the pixels of the block comprises encoding the pixels, and wherein encoding the pixels comprises:
determining respective index values for one or more of the pixels, wherein the respective index values identify respective entries of the second palette; and encoding the index values in an encoded bitstream. 15. An apparatus for coding video data, the apparatus comprising:
a memory storing video data; and one or more processors configured to:
determine a first palette having first entries indicating first pixel values;
determine based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and
code pixels of a block of the video data using the second palette. 16. The apparatus of claim 15, wherein the block is included in a picture having a plurality of blocks, and wherein to determine the first palette, the one or more processors are configured to determine the first entries based on entries associated with more than one block of the plurality of blocks. 17. The apparatus of claim 15, wherein the one or more processors are further configured to:
when the one or more second entries include all of the first entries, code data indicating that the one or more second entries include all of the first entries; and when the one or more second entries include fewer than all of the first entries code, for each entry of the second palette, data indicating whether the respective entry is included in the first palette and data indicating pixel values for entries that are not included in the first palette. 18. The apparatus of claim 1, wherein the one or more processors are further configured to:
determine a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assign index values to entries of the second palette based on the probability of occurrence, including assigning entries having a relatively higher probability of occurrence a relatively lower index value. 19. The apparatus of claim 15, wherein the one or more processors are further configured to:
determine a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assign index values to the one or more second entries of the second palette based on the one or more second entries being included in the first palette, including assigning a relatively lower index value to the one or more second entries than any other entries of the second palette; and 20. The apparatus of claim 15, wherein the first palette is associated with a first block of video data, wherein the one or more processors are further configured to code data indicating a location of the first block relative to the block of video data coded using the second palette. 21. The apparatus of claim 20, wherein to code the data indicating the location, the one or more processors are configured to code data indicating whether the first block is a top neighbor block located above the block of video data coded using the second palette, or whether the first block is a left neighbor block located to the left of the block of video data coded using the second palette. 22. The apparatus of claim 15, wherein the first palette is used to code a block of pixels different than the block coded with the second palette, wherein the one or more processors are further configured to:
determine a frequency with which each entry of the first palette is used to code the block of pixels coded with the first palette; code data identifying each of the one or more second entries based on the frequency. 23. The apparatus of claim 15, wherein the one or more processors are further configured to code a prediction syntax element indicating that the one or more second entries are based on the first entries. 24. The apparatus of claim 15, wherein the one or more processors are further configured to quantize the one or more entries of the second palette by combining the one or more entries of the second palette. 25. The apparatus of claim 15, wherein the one or more processors are further configured to add an entry to the second palette based on whether a difference between a pixel value of the entry to be added and pixel values of each of the one or more entries of the second palette is greater than a delta value. 26. The apparatus of claim 15, wherein the one or more processors are further configured to determine a size of the second palette, wherein to determine the size of the second palette, the one or more processors are configured to:
determine that the size of the second palette is fixed; determine that the size of the second palette is variable and based on data coded with the block of video data; determine the size of the palette based on a characteristic of the block of video data; or determine the size of the palette based on data coded with the block of video data indicating a final entry in the second palette. 27. The apparatus of claim 15, wherein to code the pixels of the block, the one or more processors are configured to decode the pixels, and wherein to decode the pixels, the one or more processors are configured to:
obtain, from an encoded bitstream, respective index values for one or more of the pixels, wherein the respective index values identify an entry of the second palette; and determine values for the one more pixels by matching the respective index values to at least one of the entries of the second palette. 28. The apparatus of claim 15, wherein to code the pixels of the block, the one or more processors are configured to encode the pixels, and wherein to encode the pixels, the one or more processors are configured to:
determine respective index values for one or more of the pixels, wherein the respective index values identify respective entries of the second palette; and encode the index values in an encoded bitstream. 29. An apparatus for coding video data, the apparatus comprising:
means for determining a first palette having first entries indicating first pixel values; means for determining, based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and means for coding pixels of a block of video data using the second palette. 30. A non-transitory computer-readable medium storing instructions thereon that, when executed, cause one or more processors to:
determine a first palette having first entries indicating first pixel values; determine based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and code pixels of a block of the video data using the second palette. | In an example, a method of coding video data includes determining a first palette having first entries indicating first pixel values, determining, based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette, and coding pixels of a block of video data using the second palette.1. A method of coding video data, the method comprising:
determining a first palette having first entries indicating first pixel values; determining, based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and coding pixels of a block of video data using the second palette. 2. The method of claim 1, wherein the block is included in a picture having a plurality of blocks, and wherein determining the first palette comprises determining the first entries based on entries associated with more than one block of the plurality of blocks. 3. The method of claim 1, further comprising:
when the one or more second entries include all of the first entries, coding data indicating that the one or more second entries include all of the first entries; and when the one or more second entries include fewer than all of the first entries coding, for each entry of the second palette, data indicating whether the respective entry is included in the first palette and data indicating pixel values for entries that are not included in the first palette. 4. The method of claim 1, further comprising:
determining a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assigning index values to entries of the second palette based on the probability of occurrence, including assigning entries having a relatively higher probability of occurrence a relatively lower index value. 5. The method of claim 1, further comprising:
determining a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assigning index values to the one or more second entries of the second palette based on the one or more second entries being included in the first palette, including assigning a relatively lower index value to the one or more second entries than any other entries of the second palette; and 6. The method of claim 1, wherein the first palette is associated with a first block of video data, the method further comprising:
coding data indicating a location of the first block relative to the block of video data coded using the second palette. 7. The method of claim 6, wherein coding the data indicating the location comprises coding data indicating whether the first block is a top neighbor block located above the block of video data coded using the second palette, or whether the first block is a left neighbor block located to the left of the block of video data coded using the second palette. 8. The method of claim 1, wherein the first palette is used to code a block of pixels different than the block coded with the second palette, the method further comprising:
determining a frequency with which each entry of the first palette is used to code the block of pixels coded with the first palette; coding data identifying each of the one or more second entries based on the frequency. 9. The method of claim 1, further comprising:
coding a prediction syntax element indicating that the one or more second entries are based on the first entries. 10. The method of claim 1, further comprising quantizing the one or more entries of the second palette by combining the one or more entries of the second palette. 11. The method of claim 1, further comprising:
adding an entry to the second palette based on whether a difference between a pixel value of the entry to be added and pixel values of each of the one or more entries of the second palette is greater than a delta value. 12. The method of claim 1, further comprising determining a size of the second palette, wherein determining the size of the second palette comprises at least one of:
determining that the size of the second palette is fixed; determining that the size of the second palette is variable and based on data coded with the block of video data; determining the size of the palette based on a characteristic of the block of video data; or determining the size of the palette based on data coded with the block of video data indicating a final entry in the second palette. 13. The method of claim 1, wherein coding the pixels of the block comprises decoding the pixels, and wherein decoding the pixels comprises:
obtaining, from an encoded bitstream, respective index values for one or more of the pixels, wherein the respective index values identify an entry of the second palette; and determining values for the one more pixels by matching the respective index values to at least one of the entries of the second palette. 14. The method of claim 1, wherein coding the pixels of the block comprises encoding the pixels, and wherein encoding the pixels comprises:
determining respective index values for one or more of the pixels, wherein the respective index values identify respective entries of the second palette; and encoding the index values in an encoded bitstream. 15. An apparatus for coding video data, the apparatus comprising:
a memory storing video data; and one or more processors configured to:
determine a first palette having first entries indicating first pixel values;
determine based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and
code pixels of a block of the video data using the second palette. 16. The apparatus of claim 15, wherein the block is included in a picture having a plurality of blocks, and wherein to determine the first palette, the one or more processors are configured to determine the first entries based on entries associated with more than one block of the plurality of blocks. 17. The apparatus of claim 15, wherein the one or more processors are further configured to:
when the one or more second entries include all of the first entries, code data indicating that the one or more second entries include all of the first entries; and when the one or more second entries include fewer than all of the first entries code, for each entry of the second palette, data indicating whether the respective entry is included in the first palette and data indicating pixel values for entries that are not included in the first palette. 18. The apparatus of claim 1, wherein the one or more processors are further configured to:
determine a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assign index values to entries of the second palette based on the probability of occurrence, including assigning entries having a relatively higher probability of occurrence a relatively lower index value. 19. The apparatus of claim 15, wherein the one or more processors are further configured to:
determine a probability of occurrence for respective pixel values of the video data based a number of pixels of a predetermined area of the video data having the respective pixel values; and assign index values to the one or more second entries of the second palette based on the one or more second entries being included in the first palette, including assigning a relatively lower index value to the one or more second entries than any other entries of the second palette; and 20. The apparatus of claim 15, wherein the first palette is associated with a first block of video data, wherein the one or more processors are further configured to code data indicating a location of the first block relative to the block of video data coded using the second palette. 21. The apparatus of claim 20, wherein to code the data indicating the location, the one or more processors are configured to code data indicating whether the first block is a top neighbor block located above the block of video data coded using the second palette, or whether the first block is a left neighbor block located to the left of the block of video data coded using the second palette. 22. The apparatus of claim 15, wherein the first palette is used to code a block of pixels different than the block coded with the second palette, wherein the one or more processors are further configured to:
determine a frequency with which each entry of the first palette is used to code the block of pixels coded with the first palette; code data identifying each of the one or more second entries based on the frequency. 23. The apparatus of claim 15, wherein the one or more processors are further configured to code a prediction syntax element indicating that the one or more second entries are based on the first entries. 24. The apparatus of claim 15, wherein the one or more processors are further configured to quantize the one or more entries of the second palette by combining the one or more entries of the second palette. 25. The apparatus of claim 15, wherein the one or more processors are further configured to add an entry to the second palette based on whether a difference between a pixel value of the entry to be added and pixel values of each of the one or more entries of the second palette is greater than a delta value. 26. The apparatus of claim 15, wherein the one or more processors are further configured to determine a size of the second palette, wherein to determine the size of the second palette, the one or more processors are configured to:
determine that the size of the second palette is fixed; determine that the size of the second palette is variable and based on data coded with the block of video data; determine the size of the palette based on a characteristic of the block of video data; or determine the size of the palette based on data coded with the block of video data indicating a final entry in the second palette. 27. The apparatus of claim 15, wherein to code the pixels of the block, the one or more processors are configured to decode the pixels, and wherein to decode the pixels, the one or more processors are configured to:
obtain, from an encoded bitstream, respective index values for one or more of the pixels, wherein the respective index values identify an entry of the second palette; and determine values for the one more pixels by matching the respective index values to at least one of the entries of the second palette. 28. The apparatus of claim 15, wherein to code the pixels of the block, the one or more processors are configured to encode the pixels, and wherein to encode the pixels, the one or more processors are configured to:
determine respective index values for one or more of the pixels, wherein the respective index values identify respective entries of the second palette; and encode the index values in an encoded bitstream. 29. An apparatus for coding video data, the apparatus comprising:
means for determining a first palette having first entries indicating first pixel values; means for determining, based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and means for coding pixels of a block of video data using the second palette. 30. A non-transitory computer-readable medium storing instructions thereon that, when executed, cause one or more processors to:
determine a first palette having first entries indicating first pixel values; determine based on the first entries of the first palette, one or more second entries indicating second pixel values of a second palette; and code pixels of a block of the video data using the second palette. | 2,400 |
8,331 | 8,331 | 15,173,807 | 2,487 | An apparatus for determining a distance to a target area, including at least one imaging system configured to provide at least two images of a target area, the images being associated with different imaging axes for forming a stereo image of the target area. The apparatus also includes a Lidar system including at least one laser configured to direct an optical beam to the target area and an optical detection system configured to receive a portion of the optical beam from the target area and establish a distance to the target area based on the received portion. | 1. An apparatus for determining a distance to a target area, comprising:
at least one imaging system configured to provide at least two images of a target area, wherein the images are associated with different imaging axes for forming a stereo image of the target area; and a Lidar system including at least one laser configured to direct an optical beam to the target area and an optical detection system configured to receive a portion of the optical beam from the target area and establish a distance to the target area based on the received portion. 2. The apparatus of claim 1, wherein the at least one laser emits a single pulse laser beam to the target area. 3. The apparatus of claim 2, further comprising:
an image processor coupled to the imaging system and laser system connected to a memory, wherein the memory includes instructions recorded thereon that, when read by the processor, cause the processor to: receive the at least two images of the target area; receive the portion of the laser beam from the target area; and determine an imaging range to multiple points in the target area based on the at least two images and a laser range to the target area based on the received portion of the laser beam. 4. The apparatus of claim 3, wherein the processor is further configured to correlate the imaging range to the multiple points in the target area with the laser range to the target area. 5. The apparatus of claim 4, wherein the processor is further configured to correct one or more errors in a stereo pair parallax angle or baseline positions of the at least two images based on the correlation. 6. The apparatus of claim 1, wherein the imaging system includes a camera configured to produce a first image associated with a first axis at a first time and a second image associated with a second axis at a second time. 7. The apparatus of claim 1, wherein the Lidar system is co-aligned with the at least one imaging system. 8. The apparatus of claim 1, wherein the at least one imaging system and the Lidar system are mounted to a space borne system. 9. A method for determining distance to a target area, comprising
receiving two images of a target area, wherein the two images are taken at different imaging axes for stereo imaging; directing an optical beam from a Lidar system to the target area; receiving a portion of the optical beam from the target area to establish an estimate of a target distance based on the received portion to extend the range accuracy of the stereo imaging. 10. The method of claim 9, wherein directing the optical beam includes directing a single pulse optical beam emitted by a laser of the Lidar system. 11. The method of claim 10, further comprising determining an imaging range to multiple points in the target area based on the at least two images and a laser range to the target area based on the received portion of the optical beam. 12. The method of claim 11, further comprising correlating the imaging range to the multiple points in the target area with the laser range to the target area. 13. The method of claim 12, further comprising correcting one or more errors in a stereo pair parallax angle or baseline positions of the at least two images based on the correlation. | An apparatus for determining a distance to a target area, including at least one imaging system configured to provide at least two images of a target area, the images being associated with different imaging axes for forming a stereo image of the target area. The apparatus also includes a Lidar system including at least one laser configured to direct an optical beam to the target area and an optical detection system configured to receive a portion of the optical beam from the target area and establish a distance to the target area based on the received portion.1. An apparatus for determining a distance to a target area, comprising:
at least one imaging system configured to provide at least two images of a target area, wherein the images are associated with different imaging axes for forming a stereo image of the target area; and a Lidar system including at least one laser configured to direct an optical beam to the target area and an optical detection system configured to receive a portion of the optical beam from the target area and establish a distance to the target area based on the received portion. 2. The apparatus of claim 1, wherein the at least one laser emits a single pulse laser beam to the target area. 3. The apparatus of claim 2, further comprising:
an image processor coupled to the imaging system and laser system connected to a memory, wherein the memory includes instructions recorded thereon that, when read by the processor, cause the processor to: receive the at least two images of the target area; receive the portion of the laser beam from the target area; and determine an imaging range to multiple points in the target area based on the at least two images and a laser range to the target area based on the received portion of the laser beam. 4. The apparatus of claim 3, wherein the processor is further configured to correlate the imaging range to the multiple points in the target area with the laser range to the target area. 5. The apparatus of claim 4, wherein the processor is further configured to correct one or more errors in a stereo pair parallax angle or baseline positions of the at least two images based on the correlation. 6. The apparatus of claim 1, wherein the imaging system includes a camera configured to produce a first image associated with a first axis at a first time and a second image associated with a second axis at a second time. 7. The apparatus of claim 1, wherein the Lidar system is co-aligned with the at least one imaging system. 8. The apparatus of claim 1, wherein the at least one imaging system and the Lidar system are mounted to a space borne system. 9. A method for determining distance to a target area, comprising
receiving two images of a target area, wherein the two images are taken at different imaging axes for stereo imaging; directing an optical beam from a Lidar system to the target area; receiving a portion of the optical beam from the target area to establish an estimate of a target distance based on the received portion to extend the range accuracy of the stereo imaging. 10. The method of claim 9, wherein directing the optical beam includes directing a single pulse optical beam emitted by a laser of the Lidar system. 11. The method of claim 10, further comprising determining an imaging range to multiple points in the target area based on the at least two images and a laser range to the target area based on the received portion of the optical beam. 12. The method of claim 11, further comprising correlating the imaging range to the multiple points in the target area with the laser range to the target area. 13. The method of claim 12, further comprising correcting one or more errors in a stereo pair parallax angle or baseline positions of the at least two images based on the correlation. | 2,400 |
8,332 | 8,332 | 14,885,210 | 2,442 | The liveness of routing protocols can be determined using a mechanism to aggregate liveness information for the protocols. The ability of an interface to send and receive packets and the forwarding capability of an interface can also be determined using this mechanism. Since liveness information for multiple protocols, the liveness of interfaces, the forwarding capability of interfaces, or both, may be aggregated in a message, the message can be sent more often than could individual messages for each of the multiple protocols. This allows fast detection of failures, and sending connectivity messages for the individual protocols, such as neighbor “hellos,” to be sent less often. | 1. For use with a node of a communication network, a method comprising:
a) accepting, using the node, status information from a routing protocol; b) composing, using the node, a message including explicit status information from the routing protocol; c) sending, using the node, the message towards a neighbor node; and d) periodically repeating acts (a)-(c) in accordance with a send time interval. 2. The method of claim 1 further comprising:
sending, using the node, a dead time interval towards the neighbor node, wherein the send time interval is less than the dead time interval. 3. The method of claim 1 wherein the send time interval is less than one second. 4. The method of claim 1 wherein the send time interval is less than 100 msec. 5. The method of claim 1 wherein the act of sending the message includes providing the message in an Internet protocol packet. 6. The method of claim 5 wherein the act of sending the message towards the neighbor node includes setting a destination address in the Internet protocol packet to a multicast address associated with routers that support protocol liveness. 7. The method of claim 1 wherein the status information is local routing protocol status information. 8. The method of claim 1 wherein the status information of the routing protocol is set to one of (A) protocol not reporting, (B) protocol restarting, (C) protocol up, and (D) protocol down. 9. The method of claim 1 wherein the routing protocol is selected from a group of routing protocols consisting of (A) Border Gateway Protocol (BGP), (B) Intermediate system to intermediate system (IS-IS), (C) Open Shortest Path First-Version 2 (OSPF v2), (D) Open Shortest Path First-Version 3 (OSPF v3), (E) Routing Information Protocol Version 1/Version 2 (RIP v1/v2), (F) Routing Information Protocol next generation (RIP-ng), (G) Protocol-Independent Multicast (PIM), (H) Distance Vector Multicast Routing Protocol (DVMRP), (I) Label Distribution Protocol (LDP), (J) Resource Reservation Protocol (RSVP) and (K) Link Management Protocol (LMP). 10. Apparatus comprising:
a) at least one processor; and b) at least one storage device storing processor-executable instructions which, when executed by the at least one processor, perform a method including
1) accepting, using the apparatus, status information from a routing protocol,
2) composing, using the apparatus, a message including explicit status information from the routing protocol,
3) sending, using the apparatus, the message towards a neighbor node, and
4) periodically repeating acts (1)-(3) in accordance with a send time interval. 11. The apparatus of claim 10, wherein the method further includes
sending, using the apparatus, a dead time interval towards the neighbor node, wherein the send time interval is less than the dead time interval. 12. The apparatus of claim 10, wherein the send time interval is less than one second. 13. The apparatus of claim 10, wherein the send time interval is less than 100 msec. 14. The apparatus of claim 10, wherein the act of sending the message includes providing the message in an Internet protocol packet. 15. The apparatus of claim 10, wherein the act of sending the message towards the neighbor node includes setting a destination address in the Internet protocol packet to a multicast address associated with routers that support protocol liveness. 16. The apparatus of claim 10, wherein the status information is local routing protocol status information. 17. The apparatus of claim 10, wherein the status information of the routing protocol is set to one of (A) protocol not reporting, (B) protocol restarting, (C) protocol up, and (D) protocol down. 18. The apparatus of claim 10, wherein the routing protocol is selected from a group of routing protocols consisting of (A) Border Gateway Protocol (BGP), (B) Intermediate system to intermediate system (IS-IS), (C) Open Shortest Path First-Version 2 (OSPF v2), (D) Open Shortest Path First-Version 3 (OSPF v3), (E) Routing Information Protocol Version 1/Version 2 (RIP v1/v2), (F) Routing Information Protocol next generation (RIP-ng), (G) Protocol-Independent Multicast (PIM), (H) Distance Vector Multicast Routing Protocol (DVMRP), (I) Label Distribution Protocol (LDP), (J) Resource Reservation Protocol (RSVP) and (K) Link Management Protocol (LMP). 19. A non-transitory, computer-readable storage device storing processor-executable instructions which, when executed by at least one processor, perform a method including
a) accepting, using a node of a communications network, status information from a routing protocol; b) composing, using the node, a message including explicit status information from the routing protocol; c) sending, using the node, the message towards a neighbor node; and d) periodically repeating acts (a)-(c) in accordance with a send time interval. 20. The non-transitory, computer-readable storage device of claim 18, wherein the method further includes
sending, using the node, a dead time interval towards the neighbor node, wherein the send time interval is less than the dead time interval. | The liveness of routing protocols can be determined using a mechanism to aggregate liveness information for the protocols. The ability of an interface to send and receive packets and the forwarding capability of an interface can also be determined using this mechanism. Since liveness information for multiple protocols, the liveness of interfaces, the forwarding capability of interfaces, or both, may be aggregated in a message, the message can be sent more often than could individual messages for each of the multiple protocols. This allows fast detection of failures, and sending connectivity messages for the individual protocols, such as neighbor “hellos,” to be sent less often.1. For use with a node of a communication network, a method comprising:
a) accepting, using the node, status information from a routing protocol; b) composing, using the node, a message including explicit status information from the routing protocol; c) sending, using the node, the message towards a neighbor node; and d) periodically repeating acts (a)-(c) in accordance with a send time interval. 2. The method of claim 1 further comprising:
sending, using the node, a dead time interval towards the neighbor node, wherein the send time interval is less than the dead time interval. 3. The method of claim 1 wherein the send time interval is less than one second. 4. The method of claim 1 wherein the send time interval is less than 100 msec. 5. The method of claim 1 wherein the act of sending the message includes providing the message in an Internet protocol packet. 6. The method of claim 5 wherein the act of sending the message towards the neighbor node includes setting a destination address in the Internet protocol packet to a multicast address associated with routers that support protocol liveness. 7. The method of claim 1 wherein the status information is local routing protocol status information. 8. The method of claim 1 wherein the status information of the routing protocol is set to one of (A) protocol not reporting, (B) protocol restarting, (C) protocol up, and (D) protocol down. 9. The method of claim 1 wherein the routing protocol is selected from a group of routing protocols consisting of (A) Border Gateway Protocol (BGP), (B) Intermediate system to intermediate system (IS-IS), (C) Open Shortest Path First-Version 2 (OSPF v2), (D) Open Shortest Path First-Version 3 (OSPF v3), (E) Routing Information Protocol Version 1/Version 2 (RIP v1/v2), (F) Routing Information Protocol next generation (RIP-ng), (G) Protocol-Independent Multicast (PIM), (H) Distance Vector Multicast Routing Protocol (DVMRP), (I) Label Distribution Protocol (LDP), (J) Resource Reservation Protocol (RSVP) and (K) Link Management Protocol (LMP). 10. Apparatus comprising:
a) at least one processor; and b) at least one storage device storing processor-executable instructions which, when executed by the at least one processor, perform a method including
1) accepting, using the apparatus, status information from a routing protocol,
2) composing, using the apparatus, a message including explicit status information from the routing protocol,
3) sending, using the apparatus, the message towards a neighbor node, and
4) periodically repeating acts (1)-(3) in accordance with a send time interval. 11. The apparatus of claim 10, wherein the method further includes
sending, using the apparatus, a dead time interval towards the neighbor node, wherein the send time interval is less than the dead time interval. 12. The apparatus of claim 10, wherein the send time interval is less than one second. 13. The apparatus of claim 10, wherein the send time interval is less than 100 msec. 14. The apparatus of claim 10, wherein the act of sending the message includes providing the message in an Internet protocol packet. 15. The apparatus of claim 10, wherein the act of sending the message towards the neighbor node includes setting a destination address in the Internet protocol packet to a multicast address associated with routers that support protocol liveness. 16. The apparatus of claim 10, wherein the status information is local routing protocol status information. 17. The apparatus of claim 10, wherein the status information of the routing protocol is set to one of (A) protocol not reporting, (B) protocol restarting, (C) protocol up, and (D) protocol down. 18. The apparatus of claim 10, wherein the routing protocol is selected from a group of routing protocols consisting of (A) Border Gateway Protocol (BGP), (B) Intermediate system to intermediate system (IS-IS), (C) Open Shortest Path First-Version 2 (OSPF v2), (D) Open Shortest Path First-Version 3 (OSPF v3), (E) Routing Information Protocol Version 1/Version 2 (RIP v1/v2), (F) Routing Information Protocol next generation (RIP-ng), (G) Protocol-Independent Multicast (PIM), (H) Distance Vector Multicast Routing Protocol (DVMRP), (I) Label Distribution Protocol (LDP), (J) Resource Reservation Protocol (RSVP) and (K) Link Management Protocol (LMP). 19. A non-transitory, computer-readable storage device storing processor-executable instructions which, when executed by at least one processor, perform a method including
a) accepting, using a node of a communications network, status information from a routing protocol; b) composing, using the node, a message including explicit status information from the routing protocol; c) sending, using the node, the message towards a neighbor node; and d) periodically repeating acts (a)-(c) in accordance with a send time interval. 20. The non-transitory, computer-readable storage device of claim 18, wherein the method further includes
sending, using the node, a dead time interval towards the neighbor node, wherein the send time interval is less than the dead time interval. | 2,400 |
8,333 | 8,333 | 15,797,702 | 2,494 | With the success of programming models such as OpenCL and CUDA, heterogeneous computing platforms are becoming mainstream. However, these heterogeneous systems are low-level, not composable, and their behavior is often implementation defined even for standardized programming models. In contrast, the method and system embodiments for the heterogeneous parallel primitives (HPP) programming model disclosed herein provide a flexible and composable programming platform that guarantees behavior even in the case of developing high-performance code. | 1. A method for managing memory comprising:
generating an unbound distributed array in a plurality of memories of different types associated with a heterogeneous computing platform; binding the distributed array for a kernel configured to execute a workgroup on a processor in the heterogeneous computing platform; and accessing the distributed array bound to the kernel as the kernel executes the workgroup. 2. The method of claim 1, further comprising:
generalizing the plurality of memories of different types into a persistent global address space (PGAS) abstraction; and receiving an indication from the kernel for managing a region in the PGAS abstraction. 3. The method of claim 1, wherein a memory in the plurality of memories is a global chip memory. 4. The method of claim 1, wherein the memory is a cache memory. 5. The method of claim 1, further comprising allocating a plurality of regions and a plurality of segments within the distributed array. 6. The method of claim 5, wherein the accessing further comprises accessing a region in a plurality of regions using a workgroup ID index associated with the workgroup. 7. The method of claim 6, wherein the workgroup further comprises a plurality of workitems, and the workgroup ID index identifies a workitem in the plurality of workitems. 8. The method of claim 5, further comprising moving the plurality of regions in the distributed array to a scratch pad memory on a graphics processing unit (GPU) device. 9. The method of claim 1, further comprising performing a cache memory prefetching for the distributed array on a central processing unit (CPU). 10. A system comprising:
a heterogeneous parallel primitives (HPP) platform configured to:
generate an unbound distributed array in a plurality of memories of different types;
bind the distributed array to a kernel configured to execute a workgroup on a processor in a heterogeneous computing platform; and
access the distributed array bound to the kernel as the kernel executes the workgroup. 11. The system of claim 10, wherein the HPP platform is further configured to:
generalize the plurality of memories of different types into a persistent global address space (PGAS) abstraction; and receive an indication from the kernel for managing a region in the PGAS abstraction. 12. The system of claim 10, wherein a memory in the plurality of memories is a global chip memory. 13. The system of claim 10, wherein the memory is a cache memory. 14. The system of claim 10, wherein the HPP platform is further configured to allocate a plurality of regions and a plurality of segments within the distributed array. 15. The system of claim 14, wherein the HPP platform is further configured to access a region in the plurality of regions using a workgroup ID index associated with the workgroup. 16. The system of claim 15, wherein the workgroup further comprises a plurality of workitems, and the workgroup ID index identifies a workitem in the plurality of workitems. 17. The system of claim 14, wherein the HPP platform is further configured to move the plurality of regions in the distributed array to a scratch pad memory on a graphics processing unit (GPU) device. 18. The system of claim 10, wherein the HPP platform is further configured to perform a cache memory prefetching for the distributed array on a central processing unit (CPU). | With the success of programming models such as OpenCL and CUDA, heterogeneous computing platforms are becoming mainstream. However, these heterogeneous systems are low-level, not composable, and their behavior is often implementation defined even for standardized programming models. In contrast, the method and system embodiments for the heterogeneous parallel primitives (HPP) programming model disclosed herein provide a flexible and composable programming platform that guarantees behavior even in the case of developing high-performance code.1. A method for managing memory comprising:
generating an unbound distributed array in a plurality of memories of different types associated with a heterogeneous computing platform; binding the distributed array for a kernel configured to execute a workgroup on a processor in the heterogeneous computing platform; and accessing the distributed array bound to the kernel as the kernel executes the workgroup. 2. The method of claim 1, further comprising:
generalizing the plurality of memories of different types into a persistent global address space (PGAS) abstraction; and receiving an indication from the kernel for managing a region in the PGAS abstraction. 3. The method of claim 1, wherein a memory in the plurality of memories is a global chip memory. 4. The method of claim 1, wherein the memory is a cache memory. 5. The method of claim 1, further comprising allocating a plurality of regions and a plurality of segments within the distributed array. 6. The method of claim 5, wherein the accessing further comprises accessing a region in a plurality of regions using a workgroup ID index associated with the workgroup. 7. The method of claim 6, wherein the workgroup further comprises a plurality of workitems, and the workgroup ID index identifies a workitem in the plurality of workitems. 8. The method of claim 5, further comprising moving the plurality of regions in the distributed array to a scratch pad memory on a graphics processing unit (GPU) device. 9. The method of claim 1, further comprising performing a cache memory prefetching for the distributed array on a central processing unit (CPU). 10. A system comprising:
a heterogeneous parallel primitives (HPP) platform configured to:
generate an unbound distributed array in a plurality of memories of different types;
bind the distributed array to a kernel configured to execute a workgroup on a processor in a heterogeneous computing platform; and
access the distributed array bound to the kernel as the kernel executes the workgroup. 11. The system of claim 10, wherein the HPP platform is further configured to:
generalize the plurality of memories of different types into a persistent global address space (PGAS) abstraction; and receive an indication from the kernel for managing a region in the PGAS abstraction. 12. The system of claim 10, wherein a memory in the plurality of memories is a global chip memory. 13. The system of claim 10, wherein the memory is a cache memory. 14. The system of claim 10, wherein the HPP platform is further configured to allocate a plurality of regions and a plurality of segments within the distributed array. 15. The system of claim 14, wherein the HPP platform is further configured to access a region in the plurality of regions using a workgroup ID index associated with the workgroup. 16. The system of claim 15, wherein the workgroup further comprises a plurality of workitems, and the workgroup ID index identifies a workitem in the plurality of workitems. 17. The system of claim 14, wherein the HPP platform is further configured to move the plurality of regions in the distributed array to a scratch pad memory on a graphics processing unit (GPU) device. 18. The system of claim 10, wherein the HPP platform is further configured to perform a cache memory prefetching for the distributed array on a central processing unit (CPU). | 2,400 |
8,334 | 8,334 | 15,282,038 | 2,424 | Systems and methods for managing the storage of content are described. A video stream may include a content identifier and content information relating to a boundary that may be used to facilitate recording of at least a portion of the video stream. | 1. A method comprising:
receiving, at a computing device, a linear video stream comprising content and content information; determining, based on at least the content information, a content identifier relating to the content; determining, based on at least the content information, a boundary point of the content; and conditioning, based on at least the determined content identifier and the determined boundary point, the linear video stream, wherein the conditioning the linear video stream facilitates recording, based on at least the determined content identifier and the determined boundary point, the content independent of a scheduled time of delivery of the content. 2. The method of claim 1, wherein the linear video stream comprises an MPEG transport stream. 3. The method of claim 1, wherein the linear video stream comprises a time signal mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the time signal mechanism. 4. The method of claim 1, wherein the linear video stream comprises a segmentation descriptor mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the segmentation descriptor mechanism. 5. The method of claim 1, wherein the content identifier comprises a unique identifier associated with the content. 6. The method of claim 1, wherein conditioning the linear video stream comprises fragmenting the linear video stream and generating a manifest relating to the fragmented linear video stream, wherein the manifest comprises at least a portion of the content information. 7. A method comprising:
receiving, at a computing device, a request to record a content asset; receiving a video comprising the content asset and content information; determining, based on at least the content information, a content identifier relating to the content asset; determining, based on at least the content information, a boundary point of the content asset; and causing at least a portion of the content asset to be recorded using the determined content identifier and the determined boundary point of the content asset. 8. The method of claim 7, wherein at least the portion of the content asset is recorded independent of a scheduled time for delivery of the content asset. 9. The method of claim 7, wherein the request to record the content asset comprises a recording command configured to control an operation of the causing at least the portion of the content asset to be recorded. 10. The method of claim 7, wherein the video comprises a time signal mechanism in accordance with SCTE 35 and at least a portion of the content information is associated with the time signal mechanism. 11. The method of claim 7, wherein the video comprises a segmentation descriptor mechanism in accordance with SCTE 35 and at least a portion of the content information is associated with the segmentation descriptor mechanism. 12. The method of claim 7, wherein the content asset comprise a linear content program. 13. The method of claim 7, wherein the causing at least a portion of the content asset to be recorded comprises storing at least the portion of the content asset in memory. 14. A method comprising:
receiving, at a computing device, schedule information associated with one or more recording operations, wherein the schedule information comprises a content identifier associated with a content asset; receiving an indication that a video stream comprising the content identifier is being transmitted; determining, based on at least content information in the video stream, a boundary point of the content asset; and causing at least a portion of the content asset to be recorded using the content identifier and the determined boundary point of the content asset. 15. The method of claim 14, wherein the schedule information comprises a schedule time for delivery of the content asset, and wherein at least the portion of the content asset is recorded independent of the scheduled time for delivery of the content asset. 16. The method of claim 14, wherein the video stream comprises a time signal mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the time signal mechanism. 17. The method of claim 14, wherein the video stream comprises a segmentation descriptor mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the segmentation descriptor mechanism. 18. The method of claim 14, wherein the causing at least a portion of the content asset to be recorded comprises storing a copy of the content asset in a network storage medium. 19. The method of claim 14, wherein the video stream comprises a transport stream and the content asset comprise a linear content program. 20. The method of claim 14, wherein the boundary point comprises one or more of a content break and content resumption point. | Systems and methods for managing the storage of content are described. A video stream may include a content identifier and content information relating to a boundary that may be used to facilitate recording of at least a portion of the video stream.1. A method comprising:
receiving, at a computing device, a linear video stream comprising content and content information; determining, based on at least the content information, a content identifier relating to the content; determining, based on at least the content information, a boundary point of the content; and conditioning, based on at least the determined content identifier and the determined boundary point, the linear video stream, wherein the conditioning the linear video stream facilitates recording, based on at least the determined content identifier and the determined boundary point, the content independent of a scheduled time of delivery of the content. 2. The method of claim 1, wherein the linear video stream comprises an MPEG transport stream. 3. The method of claim 1, wherein the linear video stream comprises a time signal mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the time signal mechanism. 4. The method of claim 1, wherein the linear video stream comprises a segmentation descriptor mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the segmentation descriptor mechanism. 5. The method of claim 1, wherein the content identifier comprises a unique identifier associated with the content. 6. The method of claim 1, wherein conditioning the linear video stream comprises fragmenting the linear video stream and generating a manifest relating to the fragmented linear video stream, wherein the manifest comprises at least a portion of the content information. 7. A method comprising:
receiving, at a computing device, a request to record a content asset; receiving a video comprising the content asset and content information; determining, based on at least the content information, a content identifier relating to the content asset; determining, based on at least the content information, a boundary point of the content asset; and causing at least a portion of the content asset to be recorded using the determined content identifier and the determined boundary point of the content asset. 8. The method of claim 7, wherein at least the portion of the content asset is recorded independent of a scheduled time for delivery of the content asset. 9. The method of claim 7, wherein the request to record the content asset comprises a recording command configured to control an operation of the causing at least the portion of the content asset to be recorded. 10. The method of claim 7, wherein the video comprises a time signal mechanism in accordance with SCTE 35 and at least a portion of the content information is associated with the time signal mechanism. 11. The method of claim 7, wherein the video comprises a segmentation descriptor mechanism in accordance with SCTE 35 and at least a portion of the content information is associated with the segmentation descriptor mechanism. 12. The method of claim 7, wherein the content asset comprise a linear content program. 13. The method of claim 7, wherein the causing at least a portion of the content asset to be recorded comprises storing at least the portion of the content asset in memory. 14. A method comprising:
receiving, at a computing device, schedule information associated with one or more recording operations, wherein the schedule information comprises a content identifier associated with a content asset; receiving an indication that a video stream comprising the content identifier is being transmitted; determining, based on at least content information in the video stream, a boundary point of the content asset; and causing at least a portion of the content asset to be recorded using the content identifier and the determined boundary point of the content asset. 15. The method of claim 14, wherein the schedule information comprises a schedule time for delivery of the content asset, and wherein at least the portion of the content asset is recorded independent of the scheduled time for delivery of the content asset. 16. The method of claim 14, wherein the video stream comprises a time signal mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the time signal mechanism. 17. The method of claim 14, wherein the video stream comprises a segmentation descriptor mechanism in accordance with SCTE 35 and wherein at least a portion of the content information is associated with the segmentation descriptor mechanism. 18. The method of claim 14, wherein the causing at least a portion of the content asset to be recorded comprises storing a copy of the content asset in a network storage medium. 19. The method of claim 14, wherein the video stream comprises a transport stream and the content asset comprise a linear content program. 20. The method of claim 14, wherein the boundary point comprises one or more of a content break and content resumption point. | 2,400 |
8,335 | 8,335 | 14,388,746 | 2,495 | Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions. | 1. A method, implemented by one or more processors, comprising:
duplicating a first operation of a plurality of operations to be executed by a computer system during execution of a program to create a first operation copy, the plurality of operations comprising a prior operation to be executed before the first operation and a subsequent operation to be executed after the first operation; and modifying the program to execute the first operation copy subsequent to the prior operation and prior to the subsequent operation, instead of the first operation; wherein a result of executing the first operation copy is equivalent to a result of executing the first operation. 2. The method of claim 1, further comprising:
duplicating each of a plurality of operations to be executed by the computer system during execution of the program to create a corresponding operation copy; and for operation of the plurality of operations, randomly selecting between leaving the program unmodified to execute the operation, and modifying the program to execute the operation copy instead of the operation. 3. The method of claim 2, further comprising:
encoding each of an operation and the corresponding operation copy using a different encoding. 4. The method claim 1, further comprising:
randomly selecting one or more pairs, each pair comprising of an operation and a corresponding operation copy; and modifying the program to add the difference between a result of the operation and a result of the operation copy to the result obtained when the operation or the operation copy is executed. 5. The method of claim 1, further comprising:
multiplying the result of the operation by the inverse of the result of the operation copy to obtain a check value; and multiplying the result of execution of either the first copy or the second copy by the check value. 6. The method of claim 1, wherein each of the plurality of operations is located in a code segment selected from the group consisting of: a base function;
and an operation in an existing computer-executable program. 7. The method of claim 1, further comprising:
modifying the program to apply multiple encodings to a value associated with the first operation to create a fracture. 8. A method, implemented by one or more processors, comprising:
during execution of a program by the one or more a processors, the program comprising a plurality operations performed during execution of the program, each operation having a first copy and a second copy, upon reaching an execution point at which an operation of the plurality of operations should be performed, randomly executing either the first copy or the second copy of the operation; wherein the result of executing the plurality of randomly selected operations is equivalent to a result of executing only the first copies of the plurality of operations. 9. The method of claim 8, wherein each first copy of each operation is encoded using a different encoding than the corresponding second copy of the operation. 10. The method of claim 8, further comprising:
adding the difference between a result of the first copy of a first operation of the plurality of operations and a result of the second copy of the first operation to the result obtained when either the first copy or the second copy is executed. 11. The method of claim 8, further comprising:
multiplying the result of execution of the first copy by the inverse of the result of the second copy to obtain a check value; and multiplying the result of execution of either the first copy or the second copy by the check value. 12. The method of claim 8, further comprising applying multiple encodings to a value associated with the first operation to create a fracture. 13. A system comprising:
one or more processors; and a computer-readable storage medium storing instructions which cause the one or more processors to: duplicate a first operation of a plurality of operations to be executed by a computer system during execution of a program to create a first operation copy, the plurality of operations comprising a prior operation to be executed before the first operation and a subsequent operation to be executed after the first operation; and modify the program to execute the first operation copy subsequent to the prior operation and prior to the subsequent operation, instead of the first operation; wherein a result of executing the first operation copy is equivalent to a result of executing the first operation. 14. A system comprising:
one or more processors; and a computer-readable storage medium storing a program comprising a plurality operations for performance by the one or more processors during execution of the program, each operation having a first copy and a second copy, the system being arranged so that, during execution of the program by the one or more processor, upon reaching an execution point at which an operation of the plurality of operations should be performed, the one or more processors randomly execute either the first copy or the second copy of the operation; wherein the result of executing the plurality of randomly selected operations is equivalent to a result of executing only the first copies of the plurality of operations. | Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions.1. A method, implemented by one or more processors, comprising:
duplicating a first operation of a plurality of operations to be executed by a computer system during execution of a program to create a first operation copy, the plurality of operations comprising a prior operation to be executed before the first operation and a subsequent operation to be executed after the first operation; and modifying the program to execute the first operation copy subsequent to the prior operation and prior to the subsequent operation, instead of the first operation; wherein a result of executing the first operation copy is equivalent to a result of executing the first operation. 2. The method of claim 1, further comprising:
duplicating each of a plurality of operations to be executed by the computer system during execution of the program to create a corresponding operation copy; and for operation of the plurality of operations, randomly selecting between leaving the program unmodified to execute the operation, and modifying the program to execute the operation copy instead of the operation. 3. The method of claim 2, further comprising:
encoding each of an operation and the corresponding operation copy using a different encoding. 4. The method claim 1, further comprising:
randomly selecting one or more pairs, each pair comprising of an operation and a corresponding operation copy; and modifying the program to add the difference between a result of the operation and a result of the operation copy to the result obtained when the operation or the operation copy is executed. 5. The method of claim 1, further comprising:
multiplying the result of the operation by the inverse of the result of the operation copy to obtain a check value; and multiplying the result of execution of either the first copy or the second copy by the check value. 6. The method of claim 1, wherein each of the plurality of operations is located in a code segment selected from the group consisting of: a base function;
and an operation in an existing computer-executable program. 7. The method of claim 1, further comprising:
modifying the program to apply multiple encodings to a value associated with the first operation to create a fracture. 8. A method, implemented by one or more processors, comprising:
during execution of a program by the one or more a processors, the program comprising a plurality operations performed during execution of the program, each operation having a first copy and a second copy, upon reaching an execution point at which an operation of the plurality of operations should be performed, randomly executing either the first copy or the second copy of the operation; wherein the result of executing the plurality of randomly selected operations is equivalent to a result of executing only the first copies of the plurality of operations. 9. The method of claim 8, wherein each first copy of each operation is encoded using a different encoding than the corresponding second copy of the operation. 10. The method of claim 8, further comprising:
adding the difference between a result of the first copy of a first operation of the plurality of operations and a result of the second copy of the first operation to the result obtained when either the first copy or the second copy is executed. 11. The method of claim 8, further comprising:
multiplying the result of execution of the first copy by the inverse of the result of the second copy to obtain a check value; and multiplying the result of execution of either the first copy or the second copy by the check value. 12. The method of claim 8, further comprising applying multiple encodings to a value associated with the first operation to create a fracture. 13. A system comprising:
one or more processors; and a computer-readable storage medium storing instructions which cause the one or more processors to: duplicate a first operation of a plurality of operations to be executed by a computer system during execution of a program to create a first operation copy, the plurality of operations comprising a prior operation to be executed before the first operation and a subsequent operation to be executed after the first operation; and modify the program to execute the first operation copy subsequent to the prior operation and prior to the subsequent operation, instead of the first operation; wherein a result of executing the first operation copy is equivalent to a result of executing the first operation. 14. A system comprising:
one or more processors; and a computer-readable storage medium storing a program comprising a plurality operations for performance by the one or more processors during execution of the program, each operation having a first copy and a second copy, the system being arranged so that, during execution of the program by the one or more processor, upon reaching an execution point at which an operation of the plurality of operations should be performed, the one or more processors randomly execute either the first copy or the second copy of the operation; wherein the result of executing the plurality of randomly selected operations is equivalent to a result of executing only the first copies of the plurality of operations. | 2,400 |
8,336 | 8,336 | 15,449,699 | 2,431 | In some embodiments, techniques for computer security comprise parsing an electronic document; determining that a first element of the electronic document specifies immutability of a second element of the electronic document; setting an immutability indicator associated with the second element of the electronic document; receiving a request to modify the second element of the electronic document; determining that the immutability indicator associated with the second element of the electronic document is set; and responsive to determining that the immutability indicator associated with the second element of the electronic document is set, preventing the second element of the electronic document from being modified. | 1. A method for computer security, comprising:
displaying, by a programmable computing device executing instructions, an electronic document; detecting, by the computing device, a request to traverse a link, wherein the link is associated with an element of the document; determining, by the computing device, whether the link is an allowable link based on link validation information, wherein the link validation information is contained within the document; and determining, by the computing device, whether to traverse the link based on the determination. 2. The method of claim 1, wherein the document is an HTML document. 3. The method of claim 1, wherein the element of the document is associated with a document object model. 4. The method of claim 1, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is contained in or matches a pattern specified in the validation information. 5. The method of claim 1, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is validly signed using a key associated with the validation information. 6. The method of claim 1, wherein determining, by the computing device, whether to traverse the link based on the determination comprises:
determining, by the computing device, the link is an allowable link, and traversing the link; or determining, by the computing device, the link is not an allowable link, presenting a user interface to receive an input, determining, by the computing device, whether to traverse the link based on the input. 7. The method of claim 4, wherein the document is an HTML document and the validation information is contained in a head section associated with the document. 8. The method of claim 1, wherein the link is associated with submitting a form. 9. The method of claim 1, wherein the link validation information is specified by website provider. 10. The method of claim 1, performed by a web browser. 11. A system for computer security, comprising:
a processor configured to: displaying an electronic document; detecting a request to traverse a link, wherein the link is associated with an element of the document; determining whether the link is an allowable link based on link validation information, wherein the link validation information is contained within the document; and determining whether to traverse the link based on the determination; and a memory coupled with the processor, wherein the memory provides instructions to the processor. 12. The system of claim 11, wherein the document is an HTML document. 13. The system of claim 11, wherein the element of the document is associated with a document object model. 14. The system of claim 11, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is contained in or matches a pattern specified in the validation information. 15. The system of claim 11, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is validly signed using a key associated with the validation information. 16. The system of claim 11, wherein determining, by the computing device, whether to traverse the link based on the determination comprises:
determining, by the computing device, the link is an allowable link, and traversing the link; or determining, by the computing device, the link is not an allowable link, presenting a user interface used to receive an input, wherein the input is an options to approve or deny the link traversal; determining, by the computing device, whether to traverse the link based on the input. 17. The system of claim 14, wherein the document is an HTML document and the validation information is contained in a head section associated with the document. 18. The system of claim 11, wherein the link is associated with submitting a form. 19. The system of claim 11, wherein the link validation information is specified by website provider. 20. A non-transitory computer readable medium and comprising computer instructions for:
displaying an electronic document; detecting a request to traverse a link, wherein the link is associated with an element of the document; determining whether the link is an allowable link based on link validation information, wherein the link validation information is contained within the document; and determining whether to traverse the link based on the determination. | In some embodiments, techniques for computer security comprise parsing an electronic document; determining that a first element of the electronic document specifies immutability of a second element of the electronic document; setting an immutability indicator associated with the second element of the electronic document; receiving a request to modify the second element of the electronic document; determining that the immutability indicator associated with the second element of the electronic document is set; and responsive to determining that the immutability indicator associated with the second element of the electronic document is set, preventing the second element of the electronic document from being modified.1. A method for computer security, comprising:
displaying, by a programmable computing device executing instructions, an electronic document; detecting, by the computing device, a request to traverse a link, wherein the link is associated with an element of the document; determining, by the computing device, whether the link is an allowable link based on link validation information, wherein the link validation information is contained within the document; and determining, by the computing device, whether to traverse the link based on the determination. 2. The method of claim 1, wherein the document is an HTML document. 3. The method of claim 1, wherein the element of the document is associated with a document object model. 4. The method of claim 1, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is contained in or matches a pattern specified in the validation information. 5. The method of claim 1, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is validly signed using a key associated with the validation information. 6. The method of claim 1, wherein determining, by the computing device, whether to traverse the link based on the determination comprises:
determining, by the computing device, the link is an allowable link, and traversing the link; or determining, by the computing device, the link is not an allowable link, presenting a user interface to receive an input, determining, by the computing device, whether to traverse the link based on the input. 7. The method of claim 4, wherein the document is an HTML document and the validation information is contained in a head section associated with the document. 8. The method of claim 1, wherein the link is associated with submitting a form. 9. The method of claim 1, wherein the link validation information is specified by website provider. 10. The method of claim 1, performed by a web browser. 11. A system for computer security, comprising:
a processor configured to: displaying an electronic document; detecting a request to traverse a link, wherein the link is associated with an element of the document; determining whether the link is an allowable link based on link validation information, wherein the link validation information is contained within the document; and determining whether to traverse the link based on the determination; and a memory coupled with the processor, wherein the memory provides instructions to the processor. 12. The system of claim 11, wherein the document is an HTML document. 13. The system of claim 11, wherein the element of the document is associated with a document object model. 14. The system of claim 11, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is contained in or matches a pattern specified in the validation information. 15. The system of claim 11, wherein determining, by the computing device, whether the link is an allowable link based on link validation information comprises:
determining, by the computing device, whether a URL associated the link is validly signed using a key associated with the validation information. 16. The system of claim 11, wherein determining, by the computing device, whether to traverse the link based on the determination comprises:
determining, by the computing device, the link is an allowable link, and traversing the link; or determining, by the computing device, the link is not an allowable link, presenting a user interface used to receive an input, wherein the input is an options to approve or deny the link traversal; determining, by the computing device, whether to traverse the link based on the input. 17. The system of claim 14, wherein the document is an HTML document and the validation information is contained in a head section associated with the document. 18. The system of claim 11, wherein the link is associated with submitting a form. 19. The system of claim 11, wherein the link validation information is specified by website provider. 20. A non-transitory computer readable medium and comprising computer instructions for:
displaying an electronic document; detecting a request to traverse a link, wherein the link is associated with an element of the document; determining whether the link is an allowable link based on link validation information, wherein the link validation information is contained within the document; and determining whether to traverse the link based on the determination. | 2,400 |
8,337 | 8,337 | 14,459,072 | 2,455 | Embodiments are directed to communicating between computing nodes in a cluster of nodes. In one scenario, a computer system receives a data packet from a worker node including the worker node's current workload identifiers and health status, where the data packet includes an associated version number. The computer system determines that the version number in the received data packet is different than a previously received data packet and evaluates the worker node's current workload configuration to determine whether workload changes are to be made on the worker node. Then, upon determining that workload changes are to be made on the worker node, the computer system selects a subset of workload changes to apply to the worker node, generates an indication of the selected subset of workload changes to the worker node and sends the generated indication of workload changes to the worker node. | 1. At a computer system including at least one processor, a computer-implemented method for communicating between computing nodes in a cluster of nodes, the method comprising:
an act of receiving a data packet from a worker node including the worker node's current workload identifiers and health status, the data packet including an associated version identifier; an act of determining that the version identifier in the received data packet is different than a previously received data packet; an act of evaluating the worker node's current workload configuration to determine whether workload changes are to be made on the worker node; upon determining that workload changes are to be made on the worker node, an act of selecting a subset of workload changes to apply to the worker node; an act of generating an indication of the selected subset of workload changes to the worker node; and an act of sending the generated indication of workload changes to the worker node. 2. The method of claim 1, wherein the generated indication of workload changes are sent to the worker node via a fault tolerant communication protocol. 3. The method of claim 2, wherein the fault tolerant communication protocol specifies an upper bound on the number of data packets that are transmitted or received by the computing system per time period. 4. The method of claim 1, wherein the workload changes comprise at least one of adding workloads to the worker node, removing workloads from the worker node or changing one or more workloads on the worker node. 5. The method of claim 1, further comprising:
an act of determining that a bandwidth limitation applies to the indication of workload changes; and upon determining that a bandwidth limitation applies to the indication of workload changes, an act of dividing the selected subset of workload changes into at least two indication messages. 6. The method of claim 1, wherein evaluating the worker node's current workload configuration to determine whether workload changes are to be made on the worker node comprises comparing the worker node's current workload configuration against a master node's indication of which workloads are to be processed by the worker node. 7. The method of claim 6, wherein the generated indication of workload changes to the worker node comprises the delta between the worker node's indication of workload configuration and the master node's indication of which workloads are to be processed by the worker node. 8. The method of claim 1, wherein a bandwidth limit is specified for each protocol that is used to communicate with the computing system or with the worker node. 9. The method of claim 1, wherein the generated indication of workload changes is sent to the worker node as part of a status query message. 10. The method of claim 9, wherein the status query message is sent to the worker node a specified interval, the specified interval corresponding to a priority level for the workload being processed by the worker node. 11. The method of claim 10, wherein the specified interval at which the status query message is sent to the worker node changes dynamically according to the priority level specified for the workload. 12. At a computer system including at least one processor, a computer-implemented method for communicating between computing nodes in a cluster of nodes, the method comprising:
an act of generating a data packet that includes a listing of workload identifiers (IDs) for which a worker node is responsible, the data packet further including a version identifier and workload health status for each workload ID; an act of sending the generated data packet to a master node in the cluster of nodes; an act of receiving a delta data packet that includes information specifying a subset of selected changes that are to be applied to at least one of the worker node's workloads; and an act of applying the selected subset of workload changes specified in the delta data packet to the at least one workload on the worker node. 13. The method of claim 12, wherein the generated data packet is sent to the master node at a randomized time, such that data packets from multiple worker nodes are sent at different times. 14. The method of claim 13, wherein the randomized time is based on a specified heartbeat time interval with an added delta time that is between zero and the specified heartbeat time interval. 15. The method of claim 12, wherein the generated data packet is sent using a fault tolerant communication protocol that has been limited by the master node to a specified amount of bandwidth per time period. 16. The method of claim 12, further comprising:
an act of sending a status query packet to the master node to verify that a physical link between the computing system and the master node is functioning properly; an act of determining that a specified period of time has passed without receiving an acknowledgement packet from the master node; and an act of decreasing a reliability score for the master node, the reliability score indicating the likelihood that the physical link between the master node and the computing system is functioning properly. 17. The method of claim 16, further comprising:
an act of sending a second status query packet to the master node to verify that the physical link between the computing system and the master node is functioning properly; an act of determining that an acknowledgement packet has been received from the master node; and an act of increasing the reliability score for the master node to a maximum level, indicating that the physical link between the master node and the computing system is functioning properly. 18. The method of claim 16, further comprising:
an act of determining that a threshold number of master nodes have failed or become unavailable; and an act of dynamically decreasing the amount of time that is allowed to pass without receiving an acknowledgement packet from the master node before the reliability score is reduced. 19. A computer system comprising the following:
one or more processors; one or more computer-readable storage media having stored thereon computer-executable instructions that, when executed by the one or more processors, cause the computing system to perform a method for communicating between computing nodes in a cluster of nodes, the method comprising:
an act of receiving a data packet from a worker node including the worker node's current workload identifiers and health status, the data packet including an associated version number;
an act of determining that the version number in the received data packet is different than a previously received data packet;
an act of evaluating the worker node's current workload configuration to determine whether workload changes are to be made on the worker node;
upon determining that workload changes are to be made on the worker node, an act of selecting a subset of workload changes to apply to the worker node;
an act of generating an indication of the selected subset of workload changes to the worker node; and
an act of sending the generated indication of workload changes to the worker node. 20. The computer system of claim 19, wherein the generated indication of workload changes are sent to the worker node via a fault tolerant communication protocol, and wherein the fault tolerant communication protocol specifies an upper bound on the number of data packets that are transmitted or received by the computing system per time period. | Embodiments are directed to communicating between computing nodes in a cluster of nodes. In one scenario, a computer system receives a data packet from a worker node including the worker node's current workload identifiers and health status, where the data packet includes an associated version number. The computer system determines that the version number in the received data packet is different than a previously received data packet and evaluates the worker node's current workload configuration to determine whether workload changes are to be made on the worker node. Then, upon determining that workload changes are to be made on the worker node, the computer system selects a subset of workload changes to apply to the worker node, generates an indication of the selected subset of workload changes to the worker node and sends the generated indication of workload changes to the worker node.1. At a computer system including at least one processor, a computer-implemented method for communicating between computing nodes in a cluster of nodes, the method comprising:
an act of receiving a data packet from a worker node including the worker node's current workload identifiers and health status, the data packet including an associated version identifier; an act of determining that the version identifier in the received data packet is different than a previously received data packet; an act of evaluating the worker node's current workload configuration to determine whether workload changes are to be made on the worker node; upon determining that workload changes are to be made on the worker node, an act of selecting a subset of workload changes to apply to the worker node; an act of generating an indication of the selected subset of workload changes to the worker node; and an act of sending the generated indication of workload changes to the worker node. 2. The method of claim 1, wherein the generated indication of workload changes are sent to the worker node via a fault tolerant communication protocol. 3. The method of claim 2, wherein the fault tolerant communication protocol specifies an upper bound on the number of data packets that are transmitted or received by the computing system per time period. 4. The method of claim 1, wherein the workload changes comprise at least one of adding workloads to the worker node, removing workloads from the worker node or changing one or more workloads on the worker node. 5. The method of claim 1, further comprising:
an act of determining that a bandwidth limitation applies to the indication of workload changes; and upon determining that a bandwidth limitation applies to the indication of workload changes, an act of dividing the selected subset of workload changes into at least two indication messages. 6. The method of claim 1, wherein evaluating the worker node's current workload configuration to determine whether workload changes are to be made on the worker node comprises comparing the worker node's current workload configuration against a master node's indication of which workloads are to be processed by the worker node. 7. The method of claim 6, wherein the generated indication of workload changes to the worker node comprises the delta between the worker node's indication of workload configuration and the master node's indication of which workloads are to be processed by the worker node. 8. The method of claim 1, wherein a bandwidth limit is specified for each protocol that is used to communicate with the computing system or with the worker node. 9. The method of claim 1, wherein the generated indication of workload changes is sent to the worker node as part of a status query message. 10. The method of claim 9, wherein the status query message is sent to the worker node a specified interval, the specified interval corresponding to a priority level for the workload being processed by the worker node. 11. The method of claim 10, wherein the specified interval at which the status query message is sent to the worker node changes dynamically according to the priority level specified for the workload. 12. At a computer system including at least one processor, a computer-implemented method for communicating between computing nodes in a cluster of nodes, the method comprising:
an act of generating a data packet that includes a listing of workload identifiers (IDs) for which a worker node is responsible, the data packet further including a version identifier and workload health status for each workload ID; an act of sending the generated data packet to a master node in the cluster of nodes; an act of receiving a delta data packet that includes information specifying a subset of selected changes that are to be applied to at least one of the worker node's workloads; and an act of applying the selected subset of workload changes specified in the delta data packet to the at least one workload on the worker node. 13. The method of claim 12, wherein the generated data packet is sent to the master node at a randomized time, such that data packets from multiple worker nodes are sent at different times. 14. The method of claim 13, wherein the randomized time is based on a specified heartbeat time interval with an added delta time that is between zero and the specified heartbeat time interval. 15. The method of claim 12, wherein the generated data packet is sent using a fault tolerant communication protocol that has been limited by the master node to a specified amount of bandwidth per time period. 16. The method of claim 12, further comprising:
an act of sending a status query packet to the master node to verify that a physical link between the computing system and the master node is functioning properly; an act of determining that a specified period of time has passed without receiving an acknowledgement packet from the master node; and an act of decreasing a reliability score for the master node, the reliability score indicating the likelihood that the physical link between the master node and the computing system is functioning properly. 17. The method of claim 16, further comprising:
an act of sending a second status query packet to the master node to verify that the physical link between the computing system and the master node is functioning properly; an act of determining that an acknowledgement packet has been received from the master node; and an act of increasing the reliability score for the master node to a maximum level, indicating that the physical link between the master node and the computing system is functioning properly. 18. The method of claim 16, further comprising:
an act of determining that a threshold number of master nodes have failed or become unavailable; and an act of dynamically decreasing the amount of time that is allowed to pass without receiving an acknowledgement packet from the master node before the reliability score is reduced. 19. A computer system comprising the following:
one or more processors; one or more computer-readable storage media having stored thereon computer-executable instructions that, when executed by the one or more processors, cause the computing system to perform a method for communicating between computing nodes in a cluster of nodes, the method comprising:
an act of receiving a data packet from a worker node including the worker node's current workload identifiers and health status, the data packet including an associated version number;
an act of determining that the version number in the received data packet is different than a previously received data packet;
an act of evaluating the worker node's current workload configuration to determine whether workload changes are to be made on the worker node;
upon determining that workload changes are to be made on the worker node, an act of selecting a subset of workload changes to apply to the worker node;
an act of generating an indication of the selected subset of workload changes to the worker node; and
an act of sending the generated indication of workload changes to the worker node. 20. The computer system of claim 19, wherein the generated indication of workload changes are sent to the worker node via a fault tolerant communication protocol, and wherein the fault tolerant communication protocol specifies an upper bound on the number of data packets that are transmitted or received by the computing system per time period. | 2,400 |
8,338 | 8,338 | 13,939,869 | 2,411 | User equipment (UE) connection handling is disclosed in which UE environmental status information is used at a network entity to make informed decisions regarding mobility handling and data offloading. A UE determines its environmental status information based on input from at least one non-RF sensor located in the UE. The UE generates and then transmits a control message comprising the UE environmental status information to a network entity in communication with the UE. The network entity receives the control message and uses the UE environmental status information to manage a connection of the associated UE based at least in part on the UE environmental status information. | 1. A method of wireless communication, comprising:
determining, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE; generating a control message comprising the UE environmental status information; and transmitting the control message to a base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 2. The method of claim 1, wherein the control message comprises a radio resource control (RRC) message. 3. The method of claim 2, wherein the control message comprises a non-access stratum (NAS) message encapsulated in the RRC message. 4. The method of claim 3, wherein the NAS message comprises one of a service request, attach, tracking area update, routing area update, location area update directed to a network entity of the wireless communication network. 5. The method of claim 4, wherein the network entity comprises one of:
a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 6. The method of claim 1, wherein the UE environmental status information relates to a mobility level of the UE. 7. The method of claim 6, wherein the UE environmental status information comprises an estimated duration for the mobility level. 8. The method of claim 1, wherein the at least one non-RF sensor is selected from the group comprising:
an accelerometer; a gyroscope; a global positioning system (GPS) receiver; a thermometer; a camera; a microphone; an altimeter; a heart rate monitor; a humidity detector; a photodetector; a charging indicator; and a barometer. 9. The method of claim 1, wherein the transmitting is performed in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the UE to the base station; and detecting a change in the UE environmental status information. 10. The method of claim 9, further comprising:
delaying the transmitting when the change is detected within a predetermined time period from transmitting a previous control message. 11. The method of claim 1, further comprising:
determining, by the UE, application information available from at least one user application operable on the UE, wherein the UE environmental status information is further determined based, at least in part, on the application information. 12. The method of claim 1, wherein the determining the UE environmental status information comprises:
selecting the UE environmental status information from a predetermined set of UE environmental statuses, wherein the selecting is based on the input from the at least one non-RF sensor. 13. The method of claim 12, wherein the predetermined set of UE environmental statuses comprises two or more of:
in vehicle status; outdoors status; and indoors status. 14. The method of claim 13, wherein the predetermined set of UE environmental statuses further comprises at least one of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 15. The method of claim 1, further comprising:
maintaining the connection with the wireless network when the connection is managed based at least in part of the UE environmental status information. 16. The method of claim 15, further comprising one of:
receiving a handover instruction based at least in part on the UE environmental status information from the base station to hand over to a small cell base station; receiving instructions based at least in part on the UE environmental status information from the base station to offload data traffic to second base station while maintaining connection with the base station; receiving a paging area parameter from the base station defining a paging area for the UE based at least in part on the UE environmental status information; receiving registration timing from the base station based at least in part on the UE environmental status information, wherein the registration timing defines a frequency at which the UE registers with an associated network; and receiving a parameter for discontinuous reception from the base station based at least in part on the UE environmental status information. 17. The method of claim 16, wherein the second base station comprises one of: a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 18. A method of wireless communication, comprising:
receiving, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and managing a connection of the associated UE based at least in part on the UE environmental status information. 19. The method of claim 18, further comprising:
determining a network policy applicable to the connection based at least in part on the UE environmental status information. 20. The method of claim 18, wherein the receiving is in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the associated UE to the network entity; and an update to the UE environmental status information by the associated UE. 21. The method of claim 18, wherein managing the connection comprises one or more of:
determining whether to offload data traffic of the associated UE from the network entity to a first base station; determining whether to maintain connection with the associated UE when the associated UE is within a coverage area of the first base station; determining whether to handover the associated UE to the first base station; determining whether to maintain connection with the associated UE and direct the associated UE to transmit data traffic through the first base station; determining a paging area for the associated UE; determining how often to require the associated UE to register for paging; and determining a discontinuous reception setting for the associate UE, wherein the method further comprises: transmitting a connection management signal to the associated UE in response to the determining. 22. The method of claim 21, wherein the first base station comprises one of: a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 23. The method of claim 18, wherein the UE environmental status information comprises two or more of:
in vehicle status; outdoors status; and indoors status. 24. The method of claim 23, wherein the UE environmental status information additionally comprises one or more of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 25. The method of claim 18, wherein the UE environmental status information is received via one of:
a radio resource control (RRC) message; and a non-access stratum (NAS) message; and wherein the network entity comprises one of: a base station; a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 26. The method of claim 25, wherein the network entity comprises a second base station and the UE environmental status information is received via the RRC message, the method further comprising:
transmitting the UE environmental status information to one of: the MME and the SGSN, associated with the second base station. 27. The method of claim 25, wherein the network entity comprises one of: the MME and the SGSN, and the UE environmental status information is received via the NAS message, the method further comprising:
transmitting the UE environmental status information to the second base station associated with the associated UE. 28. The method of claim 18, wherein the UE environmental status information is additionally based on application information available from at least one user application of the UE. 29. The method of claim 18, wherein the UE environmental status information comprises an estimated duration. 30. A system of wireless communication, comprising:
means for determining, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE; means for generating a control message comprising the UE environmental status information; and means for transmitting the control message to a base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 31. A system of wireless communication, comprising:
means for receiving, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and means for managing a connection of the associated UE based at least in part on the UE environmental status information. 32. A computer program product for wireless communications in a wireless network, comprising:
a non-transitory computer-readable medium having program code recorded thereon, the program code including:
program code to determine, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE;
program code to generate a control message comprising the UE environmental status information; and
program code to transmit the control message to a base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 33. A computer program product for wireless communications in a wireless network, comprising:
a non-transitory computer-readable medium having program code recorded thereon, the program code including:
program code to receive, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and
program code to manage a connection of the associated UE based at least in part on the UE environmental status information. 34. An apparatus configured for wireless communication, the apparatus comprising:
at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured:
to determine, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE;
to generate a control message comprising the UE environmental status information; and
to transmit the control message to a first base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 35. The apparatus of claim 34, wherein the control message comprises a radio resource control (RRC) message. 36. The apparatus of claim 35, wherein the control message comprises a non-access stratum (NAS) message encapsulated in the RRC message. 37. The apparatus of claim 36, wherein the NAS message comprises one of a service request, attach, tracking area update, routing area update, location area update directed to a network entity of the wireless communication network. 38. The apparatus of claim 37, wherein the network entity comprises one of:
a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 39. The apparatus of claim 34, wherein the UE environmental status information relates to a mobility level of the UE. 40. The apparatus of claim 39, wherein the UE environmental status information comprises an estimated duration for the mobility level. 41. The apparatus of claim 34, wherein the at least one non-RF sensor is selected from the group comprising:
an accelerometer; a gyroscope; a global positioning system (GPS) receiver; a thermometer; a camera; a microphone; an altimeter; a heart rate monitor; a humidity detector; a photodetector; a charging indicator; and a barometer. 42. The apparatus of claim 34, wherein the configuration of the at least one processor to transmit is performed in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the UE to the first base station; and detecting a change in the UE environmental status information. 43. The apparatus of claim 42, wherein the at least one processor is further configured:
to delay the transmitting when the change is detected within a predetermined time period from transmitting a previous control message. 44. The apparatus of claim 34, wherein the at least one processor is further configured:
to determine, by the UE, application information available from at least one user application operable on the UE, wherein the UE environmental status information is further determined based, at least in part, on the application information. 45. The apparatus of claim 34, wherein the configuration of the at least one processor to determine the UE environmental status information comprises configuration:
to select the UE environmental status information from a predetermined set of UE environmental statuses, wherein the selection is based on the input from the at least one non-RF sensor. 46. The apparatus of claim 45, wherein the predetermined set of UE environmental statuses comprises two or more of:
in vehicle status; outdoors status; and indoors status. 47. The apparatus of claim 46, wherein the predetermined set of UE environmental statuses further comprises at least one of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 48. The apparatus of claim 34, wherein the at least one processor is further configured:
to maintain the connection when the connection is managed by the wireless communication network based at least in part of the UE environmental status information. 49. The apparatus of claim 48 wherein the at least one processor is further configured to one of:
receive a handover instruction based at least in part on the UE environmental status information from the first base station to hand over to a second base station;
receive instructions based at least in part on the UE environmental status information from the first base station to offload data traffic to the second base station while maintaining connection with the first base station;
receive a paging area parameter from the first base station defining a paging area for the UE based at least in part on the UE environmental status information;
receive registration timing from the first base station based at least in part on the UE environmental status information, wherein the registration timing defines a frequency at which the UE registers with an associated network; and
receive a parameter for discontinuous reception from the first base station based at least in part on the UE environmental status information. 50. The apparatus of claim 49, wherein the second base station comprises one of:
a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 51. An apparatus configured for wireless communication, the apparatus comprising:
at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured:
to receive, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and
to manage a connection of the associated UE based at least in part on the UE environmental status information. 52. The apparatus of claim 51, wherein the at least one processor is further configured:
to determine a network policy applicable to the connection based at least in part on the UE environmental status information. 53. The apparatus of claim 51, wherein the configuration of the at least one processor to receive is in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the associated UE to the network entity; and an update to the UE environmental status information by the associated UE. 54. The apparatus of claim 51, wherein configuration of the at least one processor to manage the connection comprises configuration to one or more of:
determine whether to offload data traffic of the associated UE from the network entity to a second base station; determine whether to maintain connection with the associated UE when the associated UE is within a coverage area of the second base station; determine whether to handover the associated UE to the second base station; determine whether to maintain connection with the associated UE and direct the associated UE to transmit data traffic through the second base station; determine a paging area for the associated UE; determine how often to require the associated UE to register for paging; and determine a discontinuous reception setting for the associate UE, wherein the at least one processor is further configured: transmit a connection management signal to the associated UE in response to the determination. 55. The apparatus of claim 54, wherein the second base station comprises one of:
a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 56. The apparatus of claim 51, wherein the UE environmental status information comprises two or more of:
in vehicle status; outdoors status; and indoors status. 57. The apparatus of claim 56, wherein the UE environmental status information additionally comprises one or more of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 58. The apparatus of claim 51, wherein the UE environmental status information is received via one of:
a radio resource control (RRC) message; and a non-access stratum (NAS) message; and wherein the network entity comprises one of: a base station; a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 59. The apparatus of claim 58, wherein the network entity comprises a first base station and the UE environmental status information is received via the RRC message, the at least one processor further configured:
to transmit the UE environmental status information to one of: the MME and the SGSN, associated with the first base station. 60. The apparatus of claim 58, wherein the network entity comprises one of: the MME and the SGSN, and the UE environmental status information is received via the NAS message, the at least one processor is further configured:
to transmit the UE environmental status information to the base station associated with the associated UE. 61. The apparatus of claim 51, wherein the UE environmental status information is additionally based on application information available from at least one user application of the UE. 62. The apparatus of claim 51, wherein the UE environmental status information comprises an estimated duration. | User equipment (UE) connection handling is disclosed in which UE environmental status information is used at a network entity to make informed decisions regarding mobility handling and data offloading. A UE determines its environmental status information based on input from at least one non-RF sensor located in the UE. The UE generates and then transmits a control message comprising the UE environmental status information to a network entity in communication with the UE. The network entity receives the control message and uses the UE environmental status information to manage a connection of the associated UE based at least in part on the UE environmental status information.1. A method of wireless communication, comprising:
determining, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE; generating a control message comprising the UE environmental status information; and transmitting the control message to a base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 2. The method of claim 1, wherein the control message comprises a radio resource control (RRC) message. 3. The method of claim 2, wherein the control message comprises a non-access stratum (NAS) message encapsulated in the RRC message. 4. The method of claim 3, wherein the NAS message comprises one of a service request, attach, tracking area update, routing area update, location area update directed to a network entity of the wireless communication network. 5. The method of claim 4, wherein the network entity comprises one of:
a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 6. The method of claim 1, wherein the UE environmental status information relates to a mobility level of the UE. 7. The method of claim 6, wherein the UE environmental status information comprises an estimated duration for the mobility level. 8. The method of claim 1, wherein the at least one non-RF sensor is selected from the group comprising:
an accelerometer; a gyroscope; a global positioning system (GPS) receiver; a thermometer; a camera; a microphone; an altimeter; a heart rate monitor; a humidity detector; a photodetector; a charging indicator; and a barometer. 9. The method of claim 1, wherein the transmitting is performed in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the UE to the base station; and detecting a change in the UE environmental status information. 10. The method of claim 9, further comprising:
delaying the transmitting when the change is detected within a predetermined time period from transmitting a previous control message. 11. The method of claim 1, further comprising:
determining, by the UE, application information available from at least one user application operable on the UE, wherein the UE environmental status information is further determined based, at least in part, on the application information. 12. The method of claim 1, wherein the determining the UE environmental status information comprises:
selecting the UE environmental status information from a predetermined set of UE environmental statuses, wherein the selecting is based on the input from the at least one non-RF sensor. 13. The method of claim 12, wherein the predetermined set of UE environmental statuses comprises two or more of:
in vehicle status; outdoors status; and indoors status. 14. The method of claim 13, wherein the predetermined set of UE environmental statuses further comprises at least one of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 15. The method of claim 1, further comprising:
maintaining the connection with the wireless network when the connection is managed based at least in part of the UE environmental status information. 16. The method of claim 15, further comprising one of:
receiving a handover instruction based at least in part on the UE environmental status information from the base station to hand over to a small cell base station; receiving instructions based at least in part on the UE environmental status information from the base station to offload data traffic to second base station while maintaining connection with the base station; receiving a paging area parameter from the base station defining a paging area for the UE based at least in part on the UE environmental status information; receiving registration timing from the base station based at least in part on the UE environmental status information, wherein the registration timing defines a frequency at which the UE registers with an associated network; and receiving a parameter for discontinuous reception from the base station based at least in part on the UE environmental status information. 17. The method of claim 16, wherein the second base station comprises one of: a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 18. A method of wireless communication, comprising:
receiving, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and managing a connection of the associated UE based at least in part on the UE environmental status information. 19. The method of claim 18, further comprising:
determining a network policy applicable to the connection based at least in part on the UE environmental status information. 20. The method of claim 18, wherein the receiving is in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the associated UE to the network entity; and an update to the UE environmental status information by the associated UE. 21. The method of claim 18, wherein managing the connection comprises one or more of:
determining whether to offload data traffic of the associated UE from the network entity to a first base station; determining whether to maintain connection with the associated UE when the associated UE is within a coverage area of the first base station; determining whether to handover the associated UE to the first base station; determining whether to maintain connection with the associated UE and direct the associated UE to transmit data traffic through the first base station; determining a paging area for the associated UE; determining how often to require the associated UE to register for paging; and determining a discontinuous reception setting for the associate UE, wherein the method further comprises: transmitting a connection management signal to the associated UE in response to the determining. 22. The method of claim 21, wherein the first base station comprises one of: a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 23. The method of claim 18, wherein the UE environmental status information comprises two or more of:
in vehicle status; outdoors status; and indoors status. 24. The method of claim 23, wherein the UE environmental status information additionally comprises one or more of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 25. The method of claim 18, wherein the UE environmental status information is received via one of:
a radio resource control (RRC) message; and a non-access stratum (NAS) message; and wherein the network entity comprises one of: a base station; a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 26. The method of claim 25, wherein the network entity comprises a second base station and the UE environmental status information is received via the RRC message, the method further comprising:
transmitting the UE environmental status information to one of: the MME and the SGSN, associated with the second base station. 27. The method of claim 25, wherein the network entity comprises one of: the MME and the SGSN, and the UE environmental status information is received via the NAS message, the method further comprising:
transmitting the UE environmental status information to the second base station associated with the associated UE. 28. The method of claim 18, wherein the UE environmental status information is additionally based on application information available from at least one user application of the UE. 29. The method of claim 18, wherein the UE environmental status information comprises an estimated duration. 30. A system of wireless communication, comprising:
means for determining, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE; means for generating a control message comprising the UE environmental status information; and means for transmitting the control message to a base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 31. A system of wireless communication, comprising:
means for receiving, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and means for managing a connection of the associated UE based at least in part on the UE environmental status information. 32. A computer program product for wireless communications in a wireless network, comprising:
a non-transitory computer-readable medium having program code recorded thereon, the program code including:
program code to determine, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE;
program code to generate a control message comprising the UE environmental status information; and
program code to transmit the control message to a base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 33. A computer program product for wireless communications in a wireless network, comprising:
a non-transitory computer-readable medium having program code recorded thereon, the program code including:
program code to receive, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and
program code to manage a connection of the associated UE based at least in part on the UE environmental status information. 34. An apparatus configured for wireless communication, the apparatus comprising:
at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured:
to determine, by a user equipment (UE), UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in the UE;
to generate a control message comprising the UE environmental status information; and
to transmit the control message to a first base station in communication with the UE, wherein the control message relates to managing a connection with the UE by an associated wireless communication network. 35. The apparatus of claim 34, wherein the control message comprises a radio resource control (RRC) message. 36. The apparatus of claim 35, wherein the control message comprises a non-access stratum (NAS) message encapsulated in the RRC message. 37. The apparatus of claim 36, wherein the NAS message comprises one of a service request, attach, tracking area update, routing area update, location area update directed to a network entity of the wireless communication network. 38. The apparatus of claim 37, wherein the network entity comprises one of:
a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 39. The apparatus of claim 34, wherein the UE environmental status information relates to a mobility level of the UE. 40. The apparatus of claim 39, wherein the UE environmental status information comprises an estimated duration for the mobility level. 41. The apparatus of claim 34, wherein the at least one non-RF sensor is selected from the group comprising:
an accelerometer; a gyroscope; a global positioning system (GPS) receiver; a thermometer; a camera; a microphone; an altimeter; a heart rate monitor; a humidity detector; a photodetector; a charging indicator; and a barometer. 42. The apparatus of claim 34, wherein the configuration of the at least one processor to transmit is performed in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the UE to the first base station; and detecting a change in the UE environmental status information. 43. The apparatus of claim 42, wherein the at least one processor is further configured:
to delay the transmitting when the change is detected within a predetermined time period from transmitting a previous control message. 44. The apparatus of claim 34, wherein the at least one processor is further configured:
to determine, by the UE, application information available from at least one user application operable on the UE, wherein the UE environmental status information is further determined based, at least in part, on the application information. 45. The apparatus of claim 34, wherein the configuration of the at least one processor to determine the UE environmental status information comprises configuration:
to select the UE environmental status information from a predetermined set of UE environmental statuses, wherein the selection is based on the input from the at least one non-RF sensor. 46. The apparatus of claim 45, wherein the predetermined set of UE environmental statuses comprises two or more of:
in vehicle status; outdoors status; and indoors status. 47. The apparatus of claim 46, wherein the predetermined set of UE environmental statuses further comprises at least one of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 48. The apparatus of claim 34, wherein the at least one processor is further configured:
to maintain the connection when the connection is managed by the wireless communication network based at least in part of the UE environmental status information. 49. The apparatus of claim 48 wherein the at least one processor is further configured to one of:
receive a handover instruction based at least in part on the UE environmental status information from the first base station to hand over to a second base station;
receive instructions based at least in part on the UE environmental status information from the first base station to offload data traffic to the second base station while maintaining connection with the first base station;
receive a paging area parameter from the first base station defining a paging area for the UE based at least in part on the UE environmental status information;
receive registration timing from the first base station based at least in part on the UE environmental status information, wherein the registration timing defines a frequency at which the UE registers with an associated network; and
receive a parameter for discontinuous reception from the first base station based at least in part on the UE environmental status information. 50. The apparatus of claim 49, wherein the second base station comprises one of:
a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 51. An apparatus configured for wireless communication, the apparatus comprising:
at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured:
to receive, by a network entity, a control message from an associated user equipment (UE), wherein the control message comprises UE environmental status information based on input from at least one non-radio frequency (RF) sensor located in an associated UE; and
to manage a connection of the associated UE based at least in part on the UE environmental status information. 52. The apparatus of claim 51, wherein the at least one processor is further configured:
to determine a network policy applicable to the connection based at least in part on the UE environmental status information. 53. The apparatus of claim 51, wherein the configuration of the at least one processor to receive is in response to one or more of:
expiration of a timer associated with the UE environmental status information; connection establishment by the associated UE to the network entity; and an update to the UE environmental status information by the associated UE. 54. The apparatus of claim 51, wherein configuration of the at least one processor to manage the connection comprises configuration to one or more of:
determine whether to offload data traffic of the associated UE from the network entity to a second base station; determine whether to maintain connection with the associated UE when the associated UE is within a coverage area of the second base station; determine whether to handover the associated UE to the second base station; determine whether to maintain connection with the associated UE and direct the associated UE to transmit data traffic through the second base station; determine a paging area for the associated UE; determine how often to require the associated UE to register for paging; and determine a discontinuous reception setting for the associate UE, wherein the at least one processor is further configured: transmit a connection management signal to the associated UE in response to the determination. 55. The apparatus of claim 54, wherein the second base station comprises one of:
a wireless local area network (WLAN) base station, a small cell base station, or a combination thereof. 56. The apparatus of claim 51, wherein the UE environmental status information comprises two or more of:
in vehicle status; outdoors status; and indoors status. 57. The apparatus of claim 56, wherein the UE environmental status information additionally comprises one or more of:
in transit status; at work status; at home status; amount of data traffic; and UE state. 58. The apparatus of claim 51, wherein the UE environmental status information is received via one of:
a radio resource control (RRC) message; and a non-access stratum (NAS) message; and wherein the network entity comprises one of: a base station; a mobility management entity (MME); and a serving general packet radio service (GPRS) service node (SGSN). 59. The apparatus of claim 58, wherein the network entity comprises a first base station and the UE environmental status information is received via the RRC message, the at least one processor further configured:
to transmit the UE environmental status information to one of: the MME and the SGSN, associated with the first base station. 60. The apparatus of claim 58, wherein the network entity comprises one of: the MME and the SGSN, and the UE environmental status information is received via the NAS message, the at least one processor is further configured:
to transmit the UE environmental status information to the base station associated with the associated UE. 61. The apparatus of claim 51, wherein the UE environmental status information is additionally based on application information available from at least one user application of the UE. 62. The apparatus of claim 51, wherein the UE environmental status information comprises an estimated duration. | 2,400 |
8,339 | 8,339 | 16,027,026 | 2,425 | In accordance with some embodiments of the disclosed subject matter, mechanisms for providing media guidance with media content from alternate sources are provided. In some embodiments, a method for providing media guidance with a plurality of media sources is provided, the method comprising: storing a plurality of media content listings corresponding to a plurality of media content items, wherein each of the plurality of media content items is provided by a content source; determining a subset of the plurality of media content listings for presenting to a user; determining, for each media content listing in the subset of the plurality of media content listings, whether an alternate source for providing a media content item corresponding to a media content listing is available, wherein the alternate source is different from the content source; and causing a subset of the plurality of media content listings to be presented to the user, wherein a selectable alternate source indicator is presented within the corresponding media content listing in response to determining that the media content item is available from the alternate source. | 1. A method for providing media guidance with a plurality of media sources, the method comprising:
receiving, using a hardware processor, at least one media content listing for presenting to a user, wherein each of the at least one media content listing is associated with one or more media content sources; transmitting, to an alternate source of media content of one or more alternate sources of media content, a request as to whether the alternate source of media content can provide a media content item corresponding to one or more of the at least one media content listing; receiving, from the alternate source of media content, a response to the request, wherein the response contains an indication of whether the alternate source of media content can provide the media content item; determining, based on the indication, an availability of the media content item from the one or more alternate sources of media content, wherein each of the one or more alternate sources of media content is different than the one or more media content sources; causing a plurality of media content listings to be presented to the user, wherein the plurality of media content listings comprises the at least one media content listing; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user with at least one of the plurality of media content listings in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the media content item to be presented in response to receiving a selection of the alternate source indicator. 2. The method of claim 1, further comprising determining a subset of the plurality of media content listings for presenting to the user. 3. The method of claim 2, wherein the determining the subset of the plurality of media content listings is performed based at least in part on a search query inputted by the user. 4. The method of claim 2, wherein the causing the plurality of media content listings to be presented to the user comprises presenting only the subset of the plurality of media content listings to the user. 5. The method of claim 1, further comprising determining which content sources have been configured on a media playback device, wherein the transmitting the request is performed based at least in part on the determination of which content sources have been configured on the media playback device. 6. The method of claim 1, wherein the alternate source indicator comprises a “play” icon. 7. The method of claim 1, further comprising presenting the alternate source indicator within a detailed information region for the media content item in response to a selection by the user of one of the plurality of media content listings. 8. The method of claim 1, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 9. The method of claim 8, wherein the plurality of media content listings is presented to the user in one or more rows of media content listings. 10. The method of claim 1, further comprising:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 11. A system for providing media guidance with a plurality of media sources, the system comprising:
a memory; and a hardware processor that, when executing computer executable instructions stored in the memory, is configured to:
receive at least one media content listing for presenting to a user, wherein each of the at least one media content listing is associated with one or more media content sources;
transmit, to an alternate source of media content of one or more alternate sources of media content, a request as to whether the alternate source of media content can provide a media content item corresponding to one or more of the at least one media content listing;
receive, from the alternate source of media content, a response to the request, wherein the response contains an indication of whether the alternate source of media content can provide the media content item;
determine, based on the indication, an availability of the media content item from the one or more alternate sources of media content, wherein each of the one or more alternate sources of media content is different than the one or more media content sources;
cause a plurality of media content listings to be presented to the user, wherein the plurality of media content listings comprises the at least one media content listing;
concurrently with causing the plurality of media content listings to be presented, cause an alternate source indicator to be presented to the user with at least one of the plurality of media content listings in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and
cause the media content item to be presented in response to receiving a selection of the alternate source indicator. 12. The system of claim 11, wherein the hardware processor is further configured to determine a subset of the plurality of media content listings for presenting to the user, wherein the determining the subset of the plurality of media content listings is performed based at least in part on a search query inputted by the user and wherein the causing the plurality of media content listings to be presented to the user comprises presenting only the subset of the plurality of media content listings to the user. 13. The system of claim 11, wherein the hardware processor is further configured to determine which content sources have been configured on a media playback device, wherein the transmitting the request is performed based at least in part on the determination of which content sources have been configured on the media playback device. 14. The system of claim 11, wherein the hardware processor is further configured to present the alternate source indicator as a “play” icon within a detailed information region for the media content item in response to a selection by the user of one of the plurality of media content listings, wherein the plurality of media content listings is presented to the user in one or more rows of media content listings and as a list of search results responsive to a search query from the user. 15. The system of claim 11, wherein the hardware processor is further configured to:
store login information associated with the one or more alternate sources; and retrieve, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 16. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the process to perform a method for providing media guidance with a plurality of media sources, the method comprising:
receiving at least one media content listing for presenting to a user, wherein each of the at least one media content listing is associated with one or more media content sources; transmitting, to an alternate source of media content of one or more alternate sources of media content, a request as to whether the alternate source of media content can provide a media content item corresponding to one or more of the at least one media content listing; receiving, from the alternate source of media content, a response to the request, wherein the response contains an indication of whether the alternate source of media content can provide the media content item; determining, based on the indication, an availability of the media content item from the one or more alternate sources of media content, wherein each of the one or more alternate sources of media content is different than the one or more media content sources; causing a plurality of media content listings to be presented to the user, wherein the plurality of media content listings comprises the at least one media content listing; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user with at least one of the plurality of media content listings in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the media content item to be presented in response to receiving a selection of the alternate source indicator. 17. The non-transitory computer-readable medium of claim 16, wherein the method further comprises determining a subset of the plurality of media content listings for presenting to the user, wherein the determining the subset of the plurality of media content listings is performed based at least in part on a search query inputted by the user and wherein the causing the plurality of media content listings to be presented to the user comprises presenting only the subset of the plurality of media content listings to the user. 18. The non-transitory computer-readable medium of claim 16, wherein the method further comprises determining which content sources have been configured on a media playback device, wherein the transmitting the request is performed based at least in part on the determination of which content sources have been configured on the media playback device. 19. The non-transitory computer-readable medium of claim 16, wherein the method further comprises presenting the alternate source indicator as a “play” icon within a detailed information region for the media content item in response to a selection by the user of one of the plurality of media content listings, wherein the plurality of media content listings is presented to the user in one or more rows of media content listings and as a list of search results responsive to a search query from the user. 20. The non-transitory computer-readable medium of claim 16, wherein the method further comprises:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. | In accordance with some embodiments of the disclosed subject matter, mechanisms for providing media guidance with media content from alternate sources are provided. In some embodiments, a method for providing media guidance with a plurality of media sources is provided, the method comprising: storing a plurality of media content listings corresponding to a plurality of media content items, wherein each of the plurality of media content items is provided by a content source; determining a subset of the plurality of media content listings for presenting to a user; determining, for each media content listing in the subset of the plurality of media content listings, whether an alternate source for providing a media content item corresponding to a media content listing is available, wherein the alternate source is different from the content source; and causing a subset of the plurality of media content listings to be presented to the user, wherein a selectable alternate source indicator is presented within the corresponding media content listing in response to determining that the media content item is available from the alternate source.1. A method for providing media guidance with a plurality of media sources, the method comprising:
receiving, using a hardware processor, at least one media content listing for presenting to a user, wherein each of the at least one media content listing is associated with one or more media content sources; transmitting, to an alternate source of media content of one or more alternate sources of media content, a request as to whether the alternate source of media content can provide a media content item corresponding to one or more of the at least one media content listing; receiving, from the alternate source of media content, a response to the request, wherein the response contains an indication of whether the alternate source of media content can provide the media content item; determining, based on the indication, an availability of the media content item from the one or more alternate sources of media content, wherein each of the one or more alternate sources of media content is different than the one or more media content sources; causing a plurality of media content listings to be presented to the user, wherein the plurality of media content listings comprises the at least one media content listing; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user with at least one of the plurality of media content listings in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the media content item to be presented in response to receiving a selection of the alternate source indicator. 2. The method of claim 1, further comprising determining a subset of the plurality of media content listings for presenting to the user. 3. The method of claim 2, wherein the determining the subset of the plurality of media content listings is performed based at least in part on a search query inputted by the user. 4. The method of claim 2, wherein the causing the plurality of media content listings to be presented to the user comprises presenting only the subset of the plurality of media content listings to the user. 5. The method of claim 1, further comprising determining which content sources have been configured on a media playback device, wherein the transmitting the request is performed based at least in part on the determination of which content sources have been configured on the media playback device. 6. The method of claim 1, wherein the alternate source indicator comprises a “play” icon. 7. The method of claim 1, further comprising presenting the alternate source indicator within a detailed information region for the media content item in response to a selection by the user of one of the plurality of media content listings. 8. The method of claim 1, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 9. The method of claim 8, wherein the plurality of media content listings is presented to the user in one or more rows of media content listings. 10. The method of claim 1, further comprising:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 11. A system for providing media guidance with a plurality of media sources, the system comprising:
a memory; and a hardware processor that, when executing computer executable instructions stored in the memory, is configured to:
receive at least one media content listing for presenting to a user, wherein each of the at least one media content listing is associated with one or more media content sources;
transmit, to an alternate source of media content of one or more alternate sources of media content, a request as to whether the alternate source of media content can provide a media content item corresponding to one or more of the at least one media content listing;
receive, from the alternate source of media content, a response to the request, wherein the response contains an indication of whether the alternate source of media content can provide the media content item;
determine, based on the indication, an availability of the media content item from the one or more alternate sources of media content, wherein each of the one or more alternate sources of media content is different than the one or more media content sources;
cause a plurality of media content listings to be presented to the user, wherein the plurality of media content listings comprises the at least one media content listing;
concurrently with causing the plurality of media content listings to be presented, cause an alternate source indicator to be presented to the user with at least one of the plurality of media content listings in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and
cause the media content item to be presented in response to receiving a selection of the alternate source indicator. 12. The system of claim 11, wherein the hardware processor is further configured to determine a subset of the plurality of media content listings for presenting to the user, wherein the determining the subset of the plurality of media content listings is performed based at least in part on a search query inputted by the user and wherein the causing the plurality of media content listings to be presented to the user comprises presenting only the subset of the plurality of media content listings to the user. 13. The system of claim 11, wherein the hardware processor is further configured to determine which content sources have been configured on a media playback device, wherein the transmitting the request is performed based at least in part on the determination of which content sources have been configured on the media playback device. 14. The system of claim 11, wherein the hardware processor is further configured to present the alternate source indicator as a “play” icon within a detailed information region for the media content item in response to a selection by the user of one of the plurality of media content listings, wherein the plurality of media content listings is presented to the user in one or more rows of media content listings and as a list of search results responsive to a search query from the user. 15. The system of claim 11, wherein the hardware processor is further configured to:
store login information associated with the one or more alternate sources; and retrieve, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 16. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the process to perform a method for providing media guidance with a plurality of media sources, the method comprising:
receiving at least one media content listing for presenting to a user, wherein each of the at least one media content listing is associated with one or more media content sources; transmitting, to an alternate source of media content of one or more alternate sources of media content, a request as to whether the alternate source of media content can provide a media content item corresponding to one or more of the at least one media content listing; receiving, from the alternate source of media content, a response to the request, wherein the response contains an indication of whether the alternate source of media content can provide the media content item; determining, based on the indication, an availability of the media content item from the one or more alternate sources of media content, wherein each of the one or more alternate sources of media content is different than the one or more media content sources; causing a plurality of media content listings to be presented to the user, wherein the plurality of media content listings comprises the at least one media content listing; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user with at least one of the plurality of media content listings in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the media content item to be presented in response to receiving a selection of the alternate source indicator. 17. The non-transitory computer-readable medium of claim 16, wherein the method further comprises determining a subset of the plurality of media content listings for presenting to the user, wherein the determining the subset of the plurality of media content listings is performed based at least in part on a search query inputted by the user and wherein the causing the plurality of media content listings to be presented to the user comprises presenting only the subset of the plurality of media content listings to the user. 18. The non-transitory computer-readable medium of claim 16, wherein the method further comprises determining which content sources have been configured on a media playback device, wherein the transmitting the request is performed based at least in part on the determination of which content sources have been configured on the media playback device. 19. The non-transitory computer-readable medium of claim 16, wherein the method further comprises presenting the alternate source indicator as a “play” icon within a detailed information region for the media content item in response to a selection by the user of one of the plurality of media content listings, wherein the plurality of media content listings is presented to the user in one or more rows of media content listings and as a list of search results responsive to a search query from the user. 20. The non-transitory computer-readable medium of claim 16, wherein the method further comprises:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. | 2,400 |
8,340 | 8,340 | 15,502,187 | 2,419 | A microscopy high-resolution scanning method, including exciting a sample with illumination radiation focused at a point to form a diffraction-limited illumination spot so as to emit fluorescence radiation. The point is imaged in a diffraction image on a spatially resolving two-dimensional detector. The sample is scanned at scanning positions with increments that are smaller than half the diameter of the spot. An image of the sample with a resolution increased beyond a resolution limit of the image is generated from the data of the two-dimensional detector and the scanning positions. To discriminate between at least two predetermined wavelength ranges in the fluorescence radiation of the sample, Airy disks corresponding to the wavelength ranges are generated on the two-dimensional detector, the Airy disks being offset laterally from one another such that the diffraction image consists of the mutually offset Airy disks. The Airy disks are evaluated when generating the sample image. | 1. A method for high-resolution scanning microscopy of a sample, including:
exciting the sample by illumination radiation to emit fluorescent radiation, wherein the illumination radiation is focused to a point in or on the sample to form a diffraction-limited illumination spot, imaging the point to a diffraction image on a spatially resolving two-dimensional detector in diffraction-limited manner, wherein the two-dimensional detector has a spatial resolution which resolves a diffraction structure of the diffraction image, displacing the point into various scanning positions relative to the sample with an increment which is smaller than half a diameter of the illumination spot, reading the two-dimensional detector and an image of the sample with a resolution which is increased beyond a resolution limit of the imaging is generated from data of the two-dimensional detector and from the scanning positions assigned to these data, for the purposes of discriminating between at least two predetermined wavelength ranges in the fluorescent radiation of the sample, generating on the two-dimensional detector by means of a spectrally selective element a number of Airy disks, with the number corresponding to the at least two predetermined wavelength ranges, the Airy disks being offset laterally from one another such that the diffraction image consists of the mutually offset Airy disks, wherein the Airy disks lie completely on the two-dimensional detector, and evaluating the Airy disks when generating the image of the sample. 2. The method according to claim 1, wherein the Airy disks overlap but do not cover each other completely. 3. The method according to claim 1, wherein the spectrally selective element spaces the Airy disks apart on the two-dimensional detector such that the center of each Airy disk lies outside the other Airy disk. 4. The method according to one of claim 1, wherein the spectrally selective element is chromatically corrected in such a way that the mutually offset Airy disks have the same size. 5. The method according to claim 1, wherein the spectrally selective element only modifies illumination in such a way that the illumination spot consists of illumination Airy disks which are offset laterally from one another. 6. The method according to claim 1, wherein the spectrally selective element only influences the imaging, and is arranged upstream of the two-dimensional detector. 7. The method according to claim 1, wherein the point is displaced into various scanning positions relative to the sample, in that the sample is shifted. 8. The method according to claim 1, wherein the Airy disks offset laterally from one another lie in a common image plane. 9. A microscope for high-resolution scanning microscopy, the microscope comprising:
a sample space for receiving a sample which can be excited to emit fluorescent radiation, a lens system comprising a focal plane lying in the sample space and a resolution limit, an illumination device comprising an input for receiving illumination radiation and illuminating the sample space with the illumination radiation via the lens system, wherein the lens system focuses the illumination radiation to a diffraction-limited illumination spot at a point in the focal plane, an imaging apparatus for imaging the point in the focal plane to a diffraction-limited manner through the lens system to a diffraction image on a spatially resolving two-dimensional detector which lies in a detector plane conjugate with the focal plane, wherein the two-dimensional detector has a spatial resolution which resolves a diffraction structure of the diffraction image, a scanning device for displacing the point into various scanning positions with an increment which is smaller than the diameter of the illumination spot, an evaluation device for reading the two-dimensional detector, for evaluating the diffraction structure of the diffraction image from data of the two-dimensional detector and from the scanning positions assigned to the data and for generating an image of the sample with a resolution which is increased beyond the resolution limit, wherein for the purposes of discriminating between at least two predetermined wavelength ranges in the fluorescent radiation of the sample, the microscope comprises a spectrally selective element which generates a number of Airy disks corresponding to the at least two predetermined wavelength ranges on the two-dimensional detector, the Airy disks being offset laterally from one another such that the diffraction image consists of the mutually offset Airy disks, wherein the two-dimensional detector and the spectrally selective element are formed such that the Airy disks lie completely on the two-dimensional detector, and wherein the evaluation device analyzes the Airy disks when generating the image of the sample. 10. The microscope according to claim 9, wherein the Airy disks overlap but do not cover each other completely. 11. The microscope according to claim 9, wherein the spectrally selective element spaces the Airy disks apart on the two-dimensional detector such that the center of each Airy disk lies outside the other Airy disk. 12. The microscope according to claim 9, wherein the spectrally selective element is chromatically corrected in such a way that the mutually offset Airy disks have the same size. 13. The microscope according to claim 9, wherein the spectrally selective element is arranged in the illumination device but not in the lens system which also acts for the imaging with the result that the illumination spot consists of illumination Airy disks which are offset laterally from one another. 14. The microscope according to claim 9, wherein the spectrally selective element is arranged in the imaging device but not in the lens system which also acts for the illumination. 15. The microscope according to claim 9, wherein the scanning device is a sample stage for shifting the sample in the sample volume. 16. The microscope according to claim 9, wherein the spectrally selective element comprises a grating, a prism, a wedge plate and/or a doublet lens. 17. The microscope according to claim 9, wherein the Airy disks offset laterally from one another lie in a common image plane. | A microscopy high-resolution scanning method, including exciting a sample with illumination radiation focused at a point to form a diffraction-limited illumination spot so as to emit fluorescence radiation. The point is imaged in a diffraction image on a spatially resolving two-dimensional detector. The sample is scanned at scanning positions with increments that are smaller than half the diameter of the spot. An image of the sample with a resolution increased beyond a resolution limit of the image is generated from the data of the two-dimensional detector and the scanning positions. To discriminate between at least two predetermined wavelength ranges in the fluorescence radiation of the sample, Airy disks corresponding to the wavelength ranges are generated on the two-dimensional detector, the Airy disks being offset laterally from one another such that the diffraction image consists of the mutually offset Airy disks. The Airy disks are evaluated when generating the sample image.1. A method for high-resolution scanning microscopy of a sample, including:
exciting the sample by illumination radiation to emit fluorescent radiation, wherein the illumination radiation is focused to a point in or on the sample to form a diffraction-limited illumination spot, imaging the point to a diffraction image on a spatially resolving two-dimensional detector in diffraction-limited manner, wherein the two-dimensional detector has a spatial resolution which resolves a diffraction structure of the diffraction image, displacing the point into various scanning positions relative to the sample with an increment which is smaller than half a diameter of the illumination spot, reading the two-dimensional detector and an image of the sample with a resolution which is increased beyond a resolution limit of the imaging is generated from data of the two-dimensional detector and from the scanning positions assigned to these data, for the purposes of discriminating between at least two predetermined wavelength ranges in the fluorescent radiation of the sample, generating on the two-dimensional detector by means of a spectrally selective element a number of Airy disks, with the number corresponding to the at least two predetermined wavelength ranges, the Airy disks being offset laterally from one another such that the diffraction image consists of the mutually offset Airy disks, wherein the Airy disks lie completely on the two-dimensional detector, and evaluating the Airy disks when generating the image of the sample. 2. The method according to claim 1, wherein the Airy disks overlap but do not cover each other completely. 3. The method according to claim 1, wherein the spectrally selective element spaces the Airy disks apart on the two-dimensional detector such that the center of each Airy disk lies outside the other Airy disk. 4. The method according to one of claim 1, wherein the spectrally selective element is chromatically corrected in such a way that the mutually offset Airy disks have the same size. 5. The method according to claim 1, wherein the spectrally selective element only modifies illumination in such a way that the illumination spot consists of illumination Airy disks which are offset laterally from one another. 6. The method according to claim 1, wherein the spectrally selective element only influences the imaging, and is arranged upstream of the two-dimensional detector. 7. The method according to claim 1, wherein the point is displaced into various scanning positions relative to the sample, in that the sample is shifted. 8. The method according to claim 1, wherein the Airy disks offset laterally from one another lie in a common image plane. 9. A microscope for high-resolution scanning microscopy, the microscope comprising:
a sample space for receiving a sample which can be excited to emit fluorescent radiation, a lens system comprising a focal plane lying in the sample space and a resolution limit, an illumination device comprising an input for receiving illumination radiation and illuminating the sample space with the illumination radiation via the lens system, wherein the lens system focuses the illumination radiation to a diffraction-limited illumination spot at a point in the focal plane, an imaging apparatus for imaging the point in the focal plane to a diffraction-limited manner through the lens system to a diffraction image on a spatially resolving two-dimensional detector which lies in a detector plane conjugate with the focal plane, wherein the two-dimensional detector has a spatial resolution which resolves a diffraction structure of the diffraction image, a scanning device for displacing the point into various scanning positions with an increment which is smaller than the diameter of the illumination spot, an evaluation device for reading the two-dimensional detector, for evaluating the diffraction structure of the diffraction image from data of the two-dimensional detector and from the scanning positions assigned to the data and for generating an image of the sample with a resolution which is increased beyond the resolution limit, wherein for the purposes of discriminating between at least two predetermined wavelength ranges in the fluorescent radiation of the sample, the microscope comprises a spectrally selective element which generates a number of Airy disks corresponding to the at least two predetermined wavelength ranges on the two-dimensional detector, the Airy disks being offset laterally from one another such that the diffraction image consists of the mutually offset Airy disks, wherein the two-dimensional detector and the spectrally selective element are formed such that the Airy disks lie completely on the two-dimensional detector, and wherein the evaluation device analyzes the Airy disks when generating the image of the sample. 10. The microscope according to claim 9, wherein the Airy disks overlap but do not cover each other completely. 11. The microscope according to claim 9, wherein the spectrally selective element spaces the Airy disks apart on the two-dimensional detector such that the center of each Airy disk lies outside the other Airy disk. 12. The microscope according to claim 9, wherein the spectrally selective element is chromatically corrected in such a way that the mutually offset Airy disks have the same size. 13. The microscope according to claim 9, wherein the spectrally selective element is arranged in the illumination device but not in the lens system which also acts for the imaging with the result that the illumination spot consists of illumination Airy disks which are offset laterally from one another. 14. The microscope according to claim 9, wherein the spectrally selective element is arranged in the imaging device but not in the lens system which also acts for the illumination. 15. The microscope according to claim 9, wherein the scanning device is a sample stage for shifting the sample in the sample volume. 16. The microscope according to claim 9, wherein the spectrally selective element comprises a grating, a prism, a wedge plate and/or a doublet lens. 17. The microscope according to claim 9, wherein the Airy disks offset laterally from one another lie in a common image plane. | 2,400 |
8,341 | 8,341 | 15,258,551 | 2,482 | Eye-tracking systems and methods for use in consumer-class virtual reality (VR)/augmented reality (AR) applications, among other uses, are described. Certain embodiments combine optical eye tracking that uses camera-based pupil and corneal reflection detection with optical flow hardware running at a higher frequency. This combination provides the accuracy that can be attained with the former and at the same time adds the desirable precision and latency characteristics of the latter, resulting in a higher performing overall system at a relatively reduced cost. By augmenting a camera tracker with an array of optical flow sensors pointed at different targets on the visual field, one can perform sensor fusion to improve precision. Since the camera image provides an overall picture of eye position, that information can be used to cull occluded optical flow sensors, thus mitigating drift and errors due to blinking and other similar phenomena. | 1. An eye-tracking apparatus, comprising;
an eye-tracking camera subsystem that captures sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate, wherein said observation field comprises a portion of a person's eye comprising a pupil, and generates a camera-based eye position estimate; a plurality of optical flow sensors, each pointed at a different subregion of said observation field, wherein each of said optical flow sensors captures sequential samples representing optical flow within its corresponding subregion at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate and generates an optical-flow-based eye position estimate; and a sensor fusion module that combines said camera-based eye position estimate from said eye-tracking camera subsystem and said optical-flow-based eye position estimates from each of said plurality of optical flow sensors to generate a final eye position estimate. 2. The eye-tracking apparatus of claim 1, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 3. The eye-tracking apparatus of claim 1, further comprising a noise squelching system that determines a subset of said plurality optical flow sensors to ignore at any given time based on said camera-based eye position estimate from said eye-tracking camera subsystem. 4. The eye-tracking apparatus of claim 1, wherein said eye-tracking camera subsystem and said plurality of optical flow sensors are housed within a head-mounted display. 5. The eye-tracking apparatus of claim 1, wherein said sensor fusion module comprises a Kalman filter. 6. An eye-tracking method, comprising;
capturing sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate with an eye-tracking camera subsystem to generate a camera-based eye position estimate, wherein said observation field comprises a portion of a person's eye comprising a pupil; capturing sequential samples representing optical flow within a plurality of subregions of said observation field at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate with a plurality of optical flow sensors to generate a plurality of optical-flow-based eye position estimates; and combining said camera-based eye position estimate and said optical-flow-based eye position estimates to generate a final eye position estimate using sensor fusion functions. 7. The eye-tracking method of claim 6, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 8. The eye-tracking method of claim 6, further comprising determining a subset of said plurality optical flow sensors to ignore at any given time based on said camera-based eye position estimate from said eye-tracking camera subsystem. 9. The eye-tracking method of claim 6, wherein said eye-tracking camera subsystem and said plurality of optical flow sensors are housed within a head-mounted display. 10. The eye-tracking method of claim 6, wherein said sensor fusion functions comprise a Kalman filter. 11. An eye-tracking apparatus, comprising;
an eye-tracking camera subsystem that captures sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate, wherein said observation field comprises a portion of a person's eye comprising a pupil, and generates a camera-based eye position estimate; one or more optical flow sensors, each pointed at a different subregion of said observation field, wherein each of said optical flow sensors captures sequential samples representing optical flow within its corresponding subregion at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate and generates an optical-flow-based eye position estimate; and a sensor fusion module that combines said camera-based eye position estimate from said eye-tracking camera subsystem and said optical-flow-based eye position estimates from each of said one or more optical flow sensors to generate a final eye position estimate. 12. The eye-tracking apparatus of claim 11, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 13. The eye-tracking apparatus of claim 11, wherein said eye-tracking camera subsystem and said one or more optical flow sensors are housed within a head-mounted display. 14. The eye-tracking apparatus of claim 11, wherein said sensor fusion module comprises a Kalman filter. 15. An eye-tracking method, comprising;
capturing sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate with an eye-tracking camera subsystem to generate a camera-based eye position estimate, wherein said observation field comprises a portion of a person's eye comprising a pupil; capturing sequential samples representing optical flow within a one or more subregions of said observation field at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate with one or more optical flow sensors to generate a plurality of optical-flow-based eye position estimates; and combining said camera-based eye position estimate and said optical-flow-based eye position estimates to generate a final eye position estimate using sensor fusion functions. 16. The eye-tracking method of claim 15, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 17. The eye-tracking method of claim 15, wherein said eye-tracking camera subsystem and said plurality of optical flow sensors are housed within a head-mounted display. 18. The eye-tracking method of claim 15, wherein said sensor fusion functions comprise a Kalman filter. | Eye-tracking systems and methods for use in consumer-class virtual reality (VR)/augmented reality (AR) applications, among other uses, are described. Certain embodiments combine optical eye tracking that uses camera-based pupil and corneal reflection detection with optical flow hardware running at a higher frequency. This combination provides the accuracy that can be attained with the former and at the same time adds the desirable precision and latency characteristics of the latter, resulting in a higher performing overall system at a relatively reduced cost. By augmenting a camera tracker with an array of optical flow sensors pointed at different targets on the visual field, one can perform sensor fusion to improve precision. Since the camera image provides an overall picture of eye position, that information can be used to cull occluded optical flow sensors, thus mitigating drift and errors due to blinking and other similar phenomena.1. An eye-tracking apparatus, comprising;
an eye-tracking camera subsystem that captures sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate, wherein said observation field comprises a portion of a person's eye comprising a pupil, and generates a camera-based eye position estimate; a plurality of optical flow sensors, each pointed at a different subregion of said observation field, wherein each of said optical flow sensors captures sequential samples representing optical flow within its corresponding subregion at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate and generates an optical-flow-based eye position estimate; and a sensor fusion module that combines said camera-based eye position estimate from said eye-tracking camera subsystem and said optical-flow-based eye position estimates from each of said plurality of optical flow sensors to generate a final eye position estimate. 2. The eye-tracking apparatus of claim 1, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 3. The eye-tracking apparatus of claim 1, further comprising a noise squelching system that determines a subset of said plurality optical flow sensors to ignore at any given time based on said camera-based eye position estimate from said eye-tracking camera subsystem. 4. The eye-tracking apparatus of claim 1, wherein said eye-tracking camera subsystem and said plurality of optical flow sensors are housed within a head-mounted display. 5. The eye-tracking apparatus of claim 1, wherein said sensor fusion module comprises a Kalman filter. 6. An eye-tracking method, comprising;
capturing sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate with an eye-tracking camera subsystem to generate a camera-based eye position estimate, wherein said observation field comprises a portion of a person's eye comprising a pupil; capturing sequential samples representing optical flow within a plurality of subregions of said observation field at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate with a plurality of optical flow sensors to generate a plurality of optical-flow-based eye position estimates; and combining said camera-based eye position estimate and said optical-flow-based eye position estimates to generate a final eye position estimate using sensor fusion functions. 7. The eye-tracking method of claim 6, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 8. The eye-tracking method of claim 6, further comprising determining a subset of said plurality optical flow sensors to ignore at any given time based on said camera-based eye position estimate from said eye-tracking camera subsystem. 9. The eye-tracking method of claim 6, wherein said eye-tracking camera subsystem and said plurality of optical flow sensors are housed within a head-mounted display. 10. The eye-tracking method of claim 6, wherein said sensor fusion functions comprise a Kalman filter. 11. An eye-tracking apparatus, comprising;
an eye-tracking camera subsystem that captures sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate, wherein said observation field comprises a portion of a person's eye comprising a pupil, and generates a camera-based eye position estimate; one or more optical flow sensors, each pointed at a different subregion of said observation field, wherein each of said optical flow sensors captures sequential samples representing optical flow within its corresponding subregion at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate and generates an optical-flow-based eye position estimate; and a sensor fusion module that combines said camera-based eye position estimate from said eye-tracking camera subsystem and said optical-flow-based eye position estimates from each of said one or more optical flow sensors to generate a final eye position estimate. 12. The eye-tracking apparatus of claim 11, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 13. The eye-tracking apparatus of claim 11, wherein said eye-tracking camera subsystem and said one or more optical flow sensors are housed within a head-mounted display. 14. The eye-tracking apparatus of claim 11, wherein said sensor fusion module comprises a Kalman filter. 15. An eye-tracking method, comprising;
capturing sequential two-dimensional samples representing images of an observation field at a first resolution level and at a first sample rate with an eye-tracking camera subsystem to generate a camera-based eye position estimate, wherein said observation field comprises a portion of a person's eye comprising a pupil; capturing sequential samples representing optical flow within a one or more subregions of said observation field at a resolution level lower than said first resolution level and at a sample rate faster than said first sample rate with one or more optical flow sensors to generate a plurality of optical-flow-based eye position estimates; and combining said camera-based eye position estimate and said optical-flow-based eye position estimates to generate a final eye position estimate using sensor fusion functions. 16. The eye-tracking method of claim 15, wherein said eye-tracking camera subsystem operates in the infrared optical frequency range. 17. The eye-tracking method of claim 15, wherein said eye-tracking camera subsystem and said plurality of optical flow sensors are housed within a head-mounted display. 18. The eye-tracking method of claim 15, wherein said sensor fusion functions comprise a Kalman filter. | 2,400 |
8,342 | 8,342 | 14,091,936 | 2,483 | This display device includes a display panel including a rear side holding member made of resin, holding a display cell from the rear side and a substrate mounting member made of sheet metal, mounted with a circuit substrate, while the substrate mounting member made of sheet metal includes a drawn portion formed by a first protruding portion, and the rear side holding member made of resin includes a second protruding portion corresponding to the first protruding portion on a portion corresponding to the drawn portion of the substrate mounting member made of sheet metal. | 1. A display device comprising:
a display panel including a rear side holding member made of resin, holding a display cell from a rear side; and a substrate mounting member made of sheet metal, mounted on the rear side holding member made of resin, mounted with a circuit substrate, wherein at least the rear side holding member made of resin constitutes a rear housing, and the substrate mounting member made of sheet metal includes a drawn portion formed by a first protruding portion, and the rear side holding member made of resin includes a second protruding portion corresponding to the first protruding portion on a portion corresponding to the drawn portion of the substrate mounting member made of sheet metal. 2. The display device according to claim 1, wherein
the rear side holding member made of resin includes a region formed by an opening or a notch, and the substrate mounting member made of sheet metal is arranged in the region formed by the opening or the notch of the rear side holding member made of resin. 3. The display device according to claim 1, wherein
the drawn portion formed by the first protruding portion is arranged on an outer periphery of the substrate mounting member made of sheet metal, and the second protruding portion is arranged on a portion of the rear side holding member made of resin corresponding to the outer periphery of the substrate mounting member made of sheet metal. 4. The display device according to claim 2, further comprising a cover member made of resin, arranged in the region formed by the opening or the notch of the rear side holding member, covering the substrate mounting member from the rear side in a state where a rear surface of the rear side holding member is exposed, wherein
the rear side holding member made of resin and the cover member made of resin constitute the rear housing. 5. The display device according to claim 2, wherein
the rear side holding member made of resin has the region formed by the opening having a rectangular shape, and the substrate mounting member made of sheet metal has a rectangular shape, is mounted with the circuit substrate having a rectangular shape, and is arranged in the region formed by the opening having the rectangular shape of the rear side holding member made of resin. 6. The display device according to claim 1, wherein
the circuit substrate is grounded through the substrate mounting member made of sheet metal. 7. The display device according to claim 1, wherein
a groove-like recess portion is formed on a portion of the rear side holding member other than a portion formed with the second protruding portion. 8. The display device according to claim 7, wherein
a stiffening rib extending in a direction intersecting with the groove-like recess portion is formed inside the groove-like recess portion. 9. The display device according to claim 1, wherein
the drawn portion formed by the first protruding portion has an inclined side wall. 10. The display device according to claim 1, further comprising an optical member arranged on a rear side of the display cell including a liquid crystal cell, wherein
at least a positioning portion configured to position the optical member is integrally formed on a front surface of the rear side holding member made of resin, constituting the rear housing. 11. The display device according to claim 10, wherein
the optical member includes a reflective sheet reflecting light from a light source to the display cell and a light guide plate arranged on a surface of the reflective sheet, guiding the light from the light source to the display cell, and the positioning portion includes a positioning rib arranged to circumferentially surround the reflective sheet and the light guide plate, configured to hold the reflective sheet and the light guide plate at a prescribed position. 12. The display device according to claim 11, wherein
the optical member further includes an optical sheet arranged between the display cell and the light guide plate, and the positioning portion includes an optical sheet positioning portion formed to protrude from the front surface of the rear side holding member toward the optical sheet to be inserted into a first hole formed in the optical sheet, configured to position the optical sheet. 13. The display device according to claim 10, wherein
the display panel further includes a bezel holding the display cell and the optical member from a front side and a resin frame arranged between the bezel and the rear side holding member, and a bezel fastening portion configured to fasten the bezel and the resin frame together to the rear side holding member is also integrally formed on the front surface of the rear side holding member made of resin. 14. The display device according to claim 10, wherein
the display panel further includes a heat radiation member made of sheet metal, configured to radiate heat generated from a light source, and a heat radiation member positioning portion formed to protrude from the front surface of the rear side holding member toward the heat radiation member to be inserted into a second hole formed in the heat radiation member, configured to position the heat radiation member and a heat radiation member fastening portion configured to screw the heat radiation member to the rear side holding member are also integrally formed on the front surface of the rear side holding member made of resin. 15. The display device according to claim 1, wherein
a plurality of stiffening ribs are formed on a front surface of the rear side holding member made of resin to intersect with each other in the form of a lattice. 16. A thin television set comprising:
a display panel including a rear side holding member made of resin, holding a display cell from a rear side; and a substrate mounting member made of sheet metal, mounted on the rear side holding member made of resin, mounted with a circuit substrate, wherein at least the rear side holding member made of resin constitutes a rear housing, and the substrate mounting member made of sheet metal includes a drawn portion formed by a first protruding portion, and the rear side holding member made of resin includes a second protruding portion corresponding to the first protruding portion on a portion corresponding to the drawn portion of the substrate mounting member made of sheet metal. 17. The thin television set according to claim 16, wherein
the rear side holding member made of resin includes a region formed by an opening or a notch, and the substrate mounting member made of sheet metal is arranged in the region formed by the opening or the notch of the rear side holding member made of resin. 18. The thin television set according to claim 16, wherein
the drawn portion formed by the first protruding portion is arranged on an outer periphery of the substrate mounting member made of sheet metal, and the second protruding portion is arranged on a portion of the rear side holding member made of resin corresponding to the outer periphery of the substrate mounting member made of sheet metal. 19. The thin television set according to claim 16, further comprising an optical member arranged on a rear side of the display cell including a liquid crystal cell, wherein
at least a positioning portion configured to position the optical member is integrally formed on a front surface of the rear side holding member made of resin, constituting the rear housing. 20. The thin television set according to claim 19, wherein
the optical member includes a reflective sheet reflecting light from a light source to the display cell and a light guide plate arranged on a surface of the reflective sheet, guiding the light from the light source to the display cell, and the positioning portion includes a positioning rib arranged to circumferentially surround the reflective sheet and the light guide plate, configured to hold the reflective sheet and the light guide plate at a prescribed position. | This display device includes a display panel including a rear side holding member made of resin, holding a display cell from the rear side and a substrate mounting member made of sheet metal, mounted with a circuit substrate, while the substrate mounting member made of sheet metal includes a drawn portion formed by a first protruding portion, and the rear side holding member made of resin includes a second protruding portion corresponding to the first protruding portion on a portion corresponding to the drawn portion of the substrate mounting member made of sheet metal.1. A display device comprising:
a display panel including a rear side holding member made of resin, holding a display cell from a rear side; and a substrate mounting member made of sheet metal, mounted on the rear side holding member made of resin, mounted with a circuit substrate, wherein at least the rear side holding member made of resin constitutes a rear housing, and the substrate mounting member made of sheet metal includes a drawn portion formed by a first protruding portion, and the rear side holding member made of resin includes a second protruding portion corresponding to the first protruding portion on a portion corresponding to the drawn portion of the substrate mounting member made of sheet metal. 2. The display device according to claim 1, wherein
the rear side holding member made of resin includes a region formed by an opening or a notch, and the substrate mounting member made of sheet metal is arranged in the region formed by the opening or the notch of the rear side holding member made of resin. 3. The display device according to claim 1, wherein
the drawn portion formed by the first protruding portion is arranged on an outer periphery of the substrate mounting member made of sheet metal, and the second protruding portion is arranged on a portion of the rear side holding member made of resin corresponding to the outer periphery of the substrate mounting member made of sheet metal. 4. The display device according to claim 2, further comprising a cover member made of resin, arranged in the region formed by the opening or the notch of the rear side holding member, covering the substrate mounting member from the rear side in a state where a rear surface of the rear side holding member is exposed, wherein
the rear side holding member made of resin and the cover member made of resin constitute the rear housing. 5. The display device according to claim 2, wherein
the rear side holding member made of resin has the region formed by the opening having a rectangular shape, and the substrate mounting member made of sheet metal has a rectangular shape, is mounted with the circuit substrate having a rectangular shape, and is arranged in the region formed by the opening having the rectangular shape of the rear side holding member made of resin. 6. The display device according to claim 1, wherein
the circuit substrate is grounded through the substrate mounting member made of sheet metal. 7. The display device according to claim 1, wherein
a groove-like recess portion is formed on a portion of the rear side holding member other than a portion formed with the second protruding portion. 8. The display device according to claim 7, wherein
a stiffening rib extending in a direction intersecting with the groove-like recess portion is formed inside the groove-like recess portion. 9. The display device according to claim 1, wherein
the drawn portion formed by the first protruding portion has an inclined side wall. 10. The display device according to claim 1, further comprising an optical member arranged on a rear side of the display cell including a liquid crystal cell, wherein
at least a positioning portion configured to position the optical member is integrally formed on a front surface of the rear side holding member made of resin, constituting the rear housing. 11. The display device according to claim 10, wherein
the optical member includes a reflective sheet reflecting light from a light source to the display cell and a light guide plate arranged on a surface of the reflective sheet, guiding the light from the light source to the display cell, and the positioning portion includes a positioning rib arranged to circumferentially surround the reflective sheet and the light guide plate, configured to hold the reflective sheet and the light guide plate at a prescribed position. 12. The display device according to claim 11, wherein
the optical member further includes an optical sheet arranged between the display cell and the light guide plate, and the positioning portion includes an optical sheet positioning portion formed to protrude from the front surface of the rear side holding member toward the optical sheet to be inserted into a first hole formed in the optical sheet, configured to position the optical sheet. 13. The display device according to claim 10, wherein
the display panel further includes a bezel holding the display cell and the optical member from a front side and a resin frame arranged between the bezel and the rear side holding member, and a bezel fastening portion configured to fasten the bezel and the resin frame together to the rear side holding member is also integrally formed on the front surface of the rear side holding member made of resin. 14. The display device according to claim 10, wherein
the display panel further includes a heat radiation member made of sheet metal, configured to radiate heat generated from a light source, and a heat radiation member positioning portion formed to protrude from the front surface of the rear side holding member toward the heat radiation member to be inserted into a second hole formed in the heat radiation member, configured to position the heat radiation member and a heat radiation member fastening portion configured to screw the heat radiation member to the rear side holding member are also integrally formed on the front surface of the rear side holding member made of resin. 15. The display device according to claim 1, wherein
a plurality of stiffening ribs are formed on a front surface of the rear side holding member made of resin to intersect with each other in the form of a lattice. 16. A thin television set comprising:
a display panel including a rear side holding member made of resin, holding a display cell from a rear side; and a substrate mounting member made of sheet metal, mounted on the rear side holding member made of resin, mounted with a circuit substrate, wherein at least the rear side holding member made of resin constitutes a rear housing, and the substrate mounting member made of sheet metal includes a drawn portion formed by a first protruding portion, and the rear side holding member made of resin includes a second protruding portion corresponding to the first protruding portion on a portion corresponding to the drawn portion of the substrate mounting member made of sheet metal. 17. The thin television set according to claim 16, wherein
the rear side holding member made of resin includes a region formed by an opening or a notch, and the substrate mounting member made of sheet metal is arranged in the region formed by the opening or the notch of the rear side holding member made of resin. 18. The thin television set according to claim 16, wherein
the drawn portion formed by the first protruding portion is arranged on an outer periphery of the substrate mounting member made of sheet metal, and the second protruding portion is arranged on a portion of the rear side holding member made of resin corresponding to the outer periphery of the substrate mounting member made of sheet metal. 19. The thin television set according to claim 16, further comprising an optical member arranged on a rear side of the display cell including a liquid crystal cell, wherein
at least a positioning portion configured to position the optical member is integrally formed on a front surface of the rear side holding member made of resin, constituting the rear housing. 20. The thin television set according to claim 19, wherein
the optical member includes a reflective sheet reflecting light from a light source to the display cell and a light guide plate arranged on a surface of the reflective sheet, guiding the light from the light source to the display cell, and the positioning portion includes a positioning rib arranged to circumferentially surround the reflective sheet and the light guide plate, configured to hold the reflective sheet and the light guide plate at a prescribed position. | 2,400 |
8,343 | 8,343 | 15,178,402 | 2,492 | Techniques for transferring connection data for a migrated virtual computing instance are described. The connection data transfer process includes the steps of, responsive to determining the virtual computing instance is to be migrated, transmitting the connection data, from a first memory buffer shared between a first instance of a service virtual computing instance and a first hardware abstraction layer executing in a source host, to a second memory buffer shared between a second instance of the service virtual computing instance and a second hardware abstraction layer executing in a destination host; responsive to determining the virtual computing instance is stopped in the source host, packing connection data changes including changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and transmitting the connection data changes to the destination host. | 1. A method for transferring connection data for a virtual computing instance migrated from a source host to a destination host, the connection data specifying data for management of network traffic for the virtual computing instance by a service virtual computing instance, the method comprising:
responsive to determining the virtual computing instance is to be migrated, transmitting the connection data, from a first memory buffer between a first instance of the service virtual computing instance executing in the source host and a first hardware abstraction layer executing in the source host, to a second memory buffer shared between a second instance of the service virtual computing instance executing in the destination host and a second hardware abstraction layer executing in the destination host; responsive to determining the virtual computing instance is stopped in the source host, packing connection data changes which include changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and transmitting the connection data changes to the destination host. 2. The method of claim 1, further comprising:
blocking network traffic for the virtual computing instance at the destination host until the second instance of the service virtual computing instance is ready to process network traffic for the virtual computing instance at the destination host. 3. The method of claim 2, wherein:
the second instance of the service virtual computing instance is ready to process network traffic when the second instance of the service virtual computing instance has received at least a threshold amount of connection data from the source host. 4. The method of claim 1, further comprising:
processing network traffic based on first hardware abstraction layer firewall connection data for the virtual computing instance via a first firewall executing in the first hardware abstraction layer when the virtual computing instance is operating in the source host; and processing network traffic based on second hardware abstraction layer firewall connection data for the virtual computing instance via a second firewall executing in the second hardware abstraction layer when the virtual computing instance is operating in the destination host. 5. The method of claim 4, further comprising:
copying the first hardware abstraction layer firewall connection data from the source host to the destination host. 6. The method of claim 4, wherein the first hardware abstraction layer firewall connection data and the second hardware abstraction layer firewall connection data comprise indications of open network connections involving the virtual computing instance. 7. The method of claim 1, further comprising:
filtering network traffic based on the first hardware abstraction layer firewall connection data. 8. The method of claim 1, wherein:
transmitting the connection data and the connection data changes to the destination host is performed without involvement of an intermediary computer system. 9. The method of claim 1, wherein transmitting the connection data and the connection data changes to the destination host comprises:
transmitting the connection data and the connection data changes to an intermediary computer system, which forwards the connection data and connection data host to the destination host. 10. The method of claim 1, wherein the virtual computing instance is a virtual machine. 11. The method of claim 1, wherein the virtual computing instance is a container not including an operating system. 12. A system for transferring connection data for a virtual computing instance migrated from a source host to a destination host, the connection data specifying data for management of network traffic for the virtual computing instance by a service virtual computing instance, the system comprising:
the source host; a virtual computing instance executing in the source host; a service virtual computing instance executing in the source host; and a hardware abstraction layer configured to support the virtual computing instance and the service virtual computing instance, and configured to:
responsive to determining the virtual computing instance is to be migrated, transmit the connection data, from a first memory buffer between a first instance of the service virtual computing instance executing in the source host and a first hardware abstraction layer executing in the source host, to a second memory buffer shared between a second instance of the service virtual computing instance executing in the destination host and a second hardware abstraction layer executing in the destination host;
responsive to determining the virtual computing instance is stopped in the source host, pack connection data changes which include changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and
transmit the connection data changes to the destination host. 13. The system of claim 12, wherein the destination host is configured to:
block network traffic for the virtual computing instance at the destination host until the second instance of the service virtual computing instance is ready to process network traffic for the virtual computing instance at the destination host. 14. The system of claim 13, wherein:
the second instance of the service virtual computing instance is ready to process network traffic when the second instance of the service virtual computing instance has received at least a threshold amount of connection data from the source host. 15. The system of claim 12, wherein:
a first firewall executing in the first hardware abstraction layer is configured to process network traffic based on first hardware abstraction layer firewall connection data for the virtual computing instance when the virtual computing instance is operating in the source host; and a second firewall executing in the second hardware abstraction layer is configured to process network traffic based on second hardware abstraction layer firewall connection data for the virtual computing instance when the virtual computing instance is operating in the destination host. 16. The system of claim 15, wherein the hardware abstraction layer is further configured to:
copy the first hardware abstraction layer firewall connection data from the source host to the destination host. 17. The system of claim 15, wherein the first hardware abstraction layer firewall connection data and the second hardware abstraction layer firewall connection data comprise indications of open network connections involving the virtual computing instance. 18. The system of claim 12, wherein the hardware abstraction layer is further configured to:
filter network traffic based on the first hardware abstraction layer firewall connection data. 19. The system of claim 12, wherein:
the hardware abstraction layer is configured to transmit the connection data and the connection data changes to the destination host without involvement of an intermediary computer system. 20. The system of claim 12, wherein the hardware abstraction layer is configured to transmit the connection data and the connection data changes to the destination host by:
transmitting the connection data and the connection data changes to an intermediary computer system, which forwards the connection data and connection data host to the destination host. 21. The system of claim 12, wherein the virtual computing instance is a virtual machine. 22. The system of claim 12, wherein the virtual computing instance is a container not including an operating system. 23. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform a method for transferring connection data for a virtual computing instance migrated from a source host to a destination host, the connection data specifying data for management of network traffic for the virtual computing instance by a service virtual computing instance, the method comprising:
responsive to determining the virtual computing instance is to be migrated, transmitting the connection data, from a first memory buffer between a first instance of the service virtual computing instance executing in the source host and a first hardware abstraction layer executing in the source host, to a second memory buffer shared between a second instance of the service virtual computing instance executing in the destination host and a second hardware abstraction layer executing in the destination host; responsive to determining the virtual computing instance is stopped in the source host, packing connection data changes which include changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and transmitting the connection data changes to the destination host. | Techniques for transferring connection data for a migrated virtual computing instance are described. The connection data transfer process includes the steps of, responsive to determining the virtual computing instance is to be migrated, transmitting the connection data, from a first memory buffer shared between a first instance of a service virtual computing instance and a first hardware abstraction layer executing in a source host, to a second memory buffer shared between a second instance of the service virtual computing instance and a second hardware abstraction layer executing in a destination host; responsive to determining the virtual computing instance is stopped in the source host, packing connection data changes including changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and transmitting the connection data changes to the destination host.1. A method for transferring connection data for a virtual computing instance migrated from a source host to a destination host, the connection data specifying data for management of network traffic for the virtual computing instance by a service virtual computing instance, the method comprising:
responsive to determining the virtual computing instance is to be migrated, transmitting the connection data, from a first memory buffer between a first instance of the service virtual computing instance executing in the source host and a first hardware abstraction layer executing in the source host, to a second memory buffer shared between a second instance of the service virtual computing instance executing in the destination host and a second hardware abstraction layer executing in the destination host; responsive to determining the virtual computing instance is stopped in the source host, packing connection data changes which include changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and transmitting the connection data changes to the destination host. 2. The method of claim 1, further comprising:
blocking network traffic for the virtual computing instance at the destination host until the second instance of the service virtual computing instance is ready to process network traffic for the virtual computing instance at the destination host. 3. The method of claim 2, wherein:
the second instance of the service virtual computing instance is ready to process network traffic when the second instance of the service virtual computing instance has received at least a threshold amount of connection data from the source host. 4. The method of claim 1, further comprising:
processing network traffic based on first hardware abstraction layer firewall connection data for the virtual computing instance via a first firewall executing in the first hardware abstraction layer when the virtual computing instance is operating in the source host; and processing network traffic based on second hardware abstraction layer firewall connection data for the virtual computing instance via a second firewall executing in the second hardware abstraction layer when the virtual computing instance is operating in the destination host. 5. The method of claim 4, further comprising:
copying the first hardware abstraction layer firewall connection data from the source host to the destination host. 6. The method of claim 4, wherein the first hardware abstraction layer firewall connection data and the second hardware abstraction layer firewall connection data comprise indications of open network connections involving the virtual computing instance. 7. The method of claim 1, further comprising:
filtering network traffic based on the first hardware abstraction layer firewall connection data. 8. The method of claim 1, wherein:
transmitting the connection data and the connection data changes to the destination host is performed without involvement of an intermediary computer system. 9. The method of claim 1, wherein transmitting the connection data and the connection data changes to the destination host comprises:
transmitting the connection data and the connection data changes to an intermediary computer system, which forwards the connection data and connection data host to the destination host. 10. The method of claim 1, wherein the virtual computing instance is a virtual machine. 11. The method of claim 1, wherein the virtual computing instance is a container not including an operating system. 12. A system for transferring connection data for a virtual computing instance migrated from a source host to a destination host, the connection data specifying data for management of network traffic for the virtual computing instance by a service virtual computing instance, the system comprising:
the source host; a virtual computing instance executing in the source host; a service virtual computing instance executing in the source host; and a hardware abstraction layer configured to support the virtual computing instance and the service virtual computing instance, and configured to:
responsive to determining the virtual computing instance is to be migrated, transmit the connection data, from a first memory buffer between a first instance of the service virtual computing instance executing in the source host and a first hardware abstraction layer executing in the source host, to a second memory buffer shared between a second instance of the service virtual computing instance executing in the destination host and a second hardware abstraction layer executing in the destination host;
responsive to determining the virtual computing instance is stopped in the source host, pack connection data changes which include changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and
transmit the connection data changes to the destination host. 13. The system of claim 12, wherein the destination host is configured to:
block network traffic for the virtual computing instance at the destination host until the second instance of the service virtual computing instance is ready to process network traffic for the virtual computing instance at the destination host. 14. The system of claim 13, wherein:
the second instance of the service virtual computing instance is ready to process network traffic when the second instance of the service virtual computing instance has received at least a threshold amount of connection data from the source host. 15. The system of claim 12, wherein:
a first firewall executing in the first hardware abstraction layer is configured to process network traffic based on first hardware abstraction layer firewall connection data for the virtual computing instance when the virtual computing instance is operating in the source host; and a second firewall executing in the second hardware abstraction layer is configured to process network traffic based on second hardware abstraction layer firewall connection data for the virtual computing instance when the virtual computing instance is operating in the destination host. 16. The system of claim 15, wherein the hardware abstraction layer is further configured to:
copy the first hardware abstraction layer firewall connection data from the source host to the destination host. 17. The system of claim 15, wherein the first hardware abstraction layer firewall connection data and the second hardware abstraction layer firewall connection data comprise indications of open network connections involving the virtual computing instance. 18. The system of claim 12, wherein the hardware abstraction layer is further configured to:
filter network traffic based on the first hardware abstraction layer firewall connection data. 19. The system of claim 12, wherein:
the hardware abstraction layer is configured to transmit the connection data and the connection data changes to the destination host without involvement of an intermediary computer system. 20. The system of claim 12, wherein the hardware abstraction layer is configured to transmit the connection data and the connection data changes to the destination host by:
transmitting the connection data and the connection data changes to an intermediary computer system, which forwards the connection data and connection data host to the destination host. 21. The system of claim 12, wherein the virtual computing instance is a virtual machine. 22. The system of claim 12, wherein the virtual computing instance is a container not including an operating system. 23. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform a method for transferring connection data for a virtual computing instance migrated from a source host to a destination host, the connection data specifying data for management of network traffic for the virtual computing instance by a service virtual computing instance, the method comprising:
responsive to determining the virtual computing instance is to be migrated, transmitting the connection data, from a first memory buffer between a first instance of the service virtual computing instance executing in the source host and a first hardware abstraction layer executing in the source host, to a second memory buffer shared between a second instance of the service virtual computing instance executing in the destination host and a second hardware abstraction layer executing in the destination host; responsive to determining the virtual computing instance is stopped in the source host, packing connection data changes which include changes made to the connection data at the source host during a time period beginning when the connection data is copied and ending when the virtual computing instance is stopped; and transmitting the connection data changes to the destination host. | 2,400 |
8,344 | 8,344 | 14,921,054 | 2,456 | Systems and methods that substantially or fully remove a commanding server from a data path (e.g., as part of a data migration, disaster recovery, and/or the like) to improve data movement performance and make additional bandwidth available for other system processes and the like. Broadly, a network interface card (e.g., host bus adapter (HBA)) of a tape drive may be configured in both a target mode to allow the tape drive to be a recipient of control commands from a server to request and/or otherwise obtain data from one or more source tape drives, and in an initiator mode to allow the tape drive to send commands to the one or more tape drives specified in the commands received from the server to request/read data from and/or write data to such one or more tape drives. | 1. A tape drive, comprising:
a housing; a network interface card (NIC) disposed within the housing, wherein the NIC includes:
at least one port configured in a target mode to receive first commands from a server over at least one network; and
at least one port configured in an initiator mode to send second commands to other tape drives over at least one network; and
a processor associated within the housing that receives the first commands from the server and generates the second commands based on information in the first commands. 2. The tape drive of claim 1, wherein the at least one port configured in a target mode to receive first commands from a server over at least one network comprises a first port, and wherein the at least one port configured in an initiator mode to send second commands to other tape drives over at least one network comprises the first port. 3. The tape drive of claim 1, wherein the at least one port configured in a target mode to receive first commands from a server over at least one network comprises a first port, and wherein the at least one port configured in an initiator mode to send second commands to other tape drives over at least one network comprises a second port. 4. The tape drive of claim 3, wherein the NIC is identified by a world wide node name (WWNN), and wherein the first and second ports are identified by different respective first and second world wide port names (WWPNs). 5. The tape drive of claim 1, wherein the second commands comprise commands to at least one of return data identified in the first command from one or more other tape drives to the tape drive, or write data from the tape drive to the one or more other tape drives. 6. The tape drive of claim 5, wherein the processor parses the first commands to extract one or more identifiers that respectively identify the one or more other tape drives. 7. The tape drive of claim 6, wherein the processor uses the one or more identifiers to generate the second commands responsive to the processor determining that each of the one or more identifiers is present in a database of previously-discovered identifiers. 8. The tape drive of claim 6, further including a cache, wherein the processor stores the one or more extracted identifiers in the cache. 9. The tape drive of claim 8, wherein the processor generates one second command to a first of the one or more other tape drives to return particular data from the first other tape drive, and wherein the processor generates another second command to write the returned particular data to a second of the one or more other tape drives. 10. The tape drive of claim 9, wherein the processor stores the returned particular data in the cache before generation of the another second command. 11. The tape drive of claim 5, wherein the processor generates one second command to a first of the one or more other tape drives to return particular data from the first other tape drive, and wherein the processor generates another second command to write the returned particular data to a second of the one or more other tape drives. | Systems and methods that substantially or fully remove a commanding server from a data path (e.g., as part of a data migration, disaster recovery, and/or the like) to improve data movement performance and make additional bandwidth available for other system processes and the like. Broadly, a network interface card (e.g., host bus adapter (HBA)) of a tape drive may be configured in both a target mode to allow the tape drive to be a recipient of control commands from a server to request and/or otherwise obtain data from one or more source tape drives, and in an initiator mode to allow the tape drive to send commands to the one or more tape drives specified in the commands received from the server to request/read data from and/or write data to such one or more tape drives.1. A tape drive, comprising:
a housing; a network interface card (NIC) disposed within the housing, wherein the NIC includes:
at least one port configured in a target mode to receive first commands from a server over at least one network; and
at least one port configured in an initiator mode to send second commands to other tape drives over at least one network; and
a processor associated within the housing that receives the first commands from the server and generates the second commands based on information in the first commands. 2. The tape drive of claim 1, wherein the at least one port configured in a target mode to receive first commands from a server over at least one network comprises a first port, and wherein the at least one port configured in an initiator mode to send second commands to other tape drives over at least one network comprises the first port. 3. The tape drive of claim 1, wherein the at least one port configured in a target mode to receive first commands from a server over at least one network comprises a first port, and wherein the at least one port configured in an initiator mode to send second commands to other tape drives over at least one network comprises a second port. 4. The tape drive of claim 3, wherein the NIC is identified by a world wide node name (WWNN), and wherein the first and second ports are identified by different respective first and second world wide port names (WWPNs). 5. The tape drive of claim 1, wherein the second commands comprise commands to at least one of return data identified in the first command from one or more other tape drives to the tape drive, or write data from the tape drive to the one or more other tape drives. 6. The tape drive of claim 5, wherein the processor parses the first commands to extract one or more identifiers that respectively identify the one or more other tape drives. 7. The tape drive of claim 6, wherein the processor uses the one or more identifiers to generate the second commands responsive to the processor determining that each of the one or more identifiers is present in a database of previously-discovered identifiers. 8. The tape drive of claim 6, further including a cache, wherein the processor stores the one or more extracted identifiers in the cache. 9. The tape drive of claim 8, wherein the processor generates one second command to a first of the one or more other tape drives to return particular data from the first other tape drive, and wherein the processor generates another second command to write the returned particular data to a second of the one or more other tape drives. 10. The tape drive of claim 9, wherein the processor stores the returned particular data in the cache before generation of the another second command. 11. The tape drive of claim 5, wherein the processor generates one second command to a first of the one or more other tape drives to return particular data from the first other tape drive, and wherein the processor generates another second command to write the returned particular data to a second of the one or more other tape drives. | 2,400 |
8,345 | 8,345 | 14,743,776 | 2,419 | A device for decoding video data includes a memory configured to store video data and one or more processors configured to: receive a first block of the video data; determine a quantization parameter for the first block; in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block; perform a dequantization process for the first block based on the modified quantization parameter for the first block; receive a second block of the video data; receive a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; determine the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and decode the second block based on the determined quantization parameter. | 1. A method of decoding video data, the method comprising:
receiving a first block of the video data; receiving information to determine a quantization parameter for the first block; in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modifying the quantization parameter for the first block; performing a dequantization process for the first block based on the modified quantization parameter for the first block; receiving a second block of the video data; receiving for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; determining the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and decoding the second block based on the determined quantization parameter for the second block. 2. The method of claim 1, further comprising:
in response to determining that the color-space transform mode is enabled for the second block of video data, modifying the determined quantization parameter for the second block, wherein decoding the second block based on the determined quantization parameter for the second block comprises: performing a dequantization process for the second block based on the modified quantization parameter for the second block. 3. The method of claim 1, wherein decoding the second block based on the determined quantization parameter for the second block comprises:
in response to determining that the color-space transform mode is disabled for the second block, performing a dequantization process for the second block based on the determined quantization parameter for the second block. 4. The method of claim 1, further comprising:
receiving a flag for the first block to determine that the first block of video data is coded using the color-space transform mode for residual data of the first block. 5. The method of claim 1, wherein receiving information to determine the quantization parameter for the first block comprises receiving an initial value for the quantization parameter for the first block. 6. The method of claim 5, wherein receiving the initial value comprises receiving, at a slice level, the initial value for the quantization parameter. 7. The method of claim 1, further comprising:
receiving, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 8. The method of claim 1, wherein receiving the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block comprises receiving a syntax element indicating the absolute value of the difference and receiving a syntax element indicating a sign of the difference. 9. The method of claim 1, further comprising:
determining a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and performing the deblock filtering process on the first block. 10. A method of encoding video data, the method comprising:
determining a quantization parameter for a first block of video data; in response to determining that the first block of video data is coded using a color-space transform mode for residual data of the first block, modifying the quantization parameter for the first block; performing a quantization process for the first block based on the modified quantization parameter for the first block; determining a quantization parameter for a second block of video data; and signaling a difference value between the quantization parameter for the first block and the quantization parameter for the second block. 11. The method of claim 10, further comprising:
in response to determining a color-space transform mode is enabled for the second block of video data, modifying the quantization parameter for the second block; performing a quantization process for the second block based on the modified quantization parameter for the second block. 12. The method of claim 10, further comprising:
in response to determining a color-space transform mode is disabled for the second block of video data, performing a quantization process for the second block based on the quantization parameter for the second block. 13. The method of claim 10, further comprising:
generating a flag for the first block to indicate if the first block of video data is coded using the color-space transform mode for residual data of the first block. 14. The method of claim 10, wherein determining the quantization parameter for the first block of video data comprises determining an initial value for the quantization parameter for the first block, the method further comprising:
signaling the initial value in a slice header for a slice comprising the first block. 15. The method of claim 10, further comprising:
signaling, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 16. The method of claim 10, wherein signaling the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block comprises generating a syntax element indicating the absolute value of the difference and generating a syntax element indicating a sign of the difference. 17. The method of claim 10, further comprising:
determining a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and performing the deblock filtering process on the first block. 18. A device for decoding video data, the device comprising:
a memory configured to store video data; one or more processors configured to:
receive a first block of the video data;
receive information to determine a quantization parameter for the first block;
in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block;
perform a dequantization process for the first block based on the modified quantization parameter for the first block;
receive a second block of the video data;
receive for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block;
determine the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and
decode the second block based on the determined quantization parameter for the second block. 19. The device of claim 18, wherein the one or more processors are further configured to:
in response to determining that the color-space transform mode is enabled for the second block of video data, modify the determined quantization parameter for the second block, wherein to decode the second block based on the determined quantization parameter for the second block, the one or more processors perform a dequantization process for the second block based on the modified quantization parameter for the second block. 20. The device of claim 18, wherein to decode the second block based on the determined quantization parameter for the second block, the one or more processors are configured to:
in response to determining that the color-space transform mode is disabled for the second block, perform a dequantization process for the second block based on the determined quantization parameter for the second block. 21. The device of claim 18, wherein the one or more processors are further configured to:
receive a flag for the first block to determine that the first block of video data is coded using the color-space transform mode for residual data of the first block. 22. The device of claim 18, wherein to receive information to determine the quantization parameter for the first block, the one or more processors receive an initial value for the quantization parameter for the first block. 23. The device of claim 22, wherein to receive the initial value, the one or more processors receive, at a slice level, the initial value for the quantization parameter. 24. The device of claim 18, wherein the one or more processors are further configured to:
receive, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 25. The device of claim 18, wherein to receive the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block, the one or more processors receive a syntax element indicating the absolute value of the difference and receiving a syntax element indicating a sign of the difference. 26. The device of claim 18, wherein the one or more processors are further configured to:
determine a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and perform the deblock filtering process on the first block. 27. The device of claim 18, wherein the device comprises one of:
a microprocessor; an integrated circuit (IC); and a wireless communication device comprising the video decoder. 28. A device for encoding video data, the device comprising:
a memory configured to store video data; one or more processors configured to:
determine a quantization parameter for a first block of video data,
in response to determining that the first block of video data is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block;
perform a quantization process for the first block based on the modified quantization parameter for the first block;
determine a quantization parameter for a second block of video data; and
signal a difference value between the quantization parameter for the first block and the quantization parameter for the second block. 29. The device of claim 28, wherein the one or more processors are further configured to:
in response to determining a color-space transform mode is enabled for the second block of video data, modify the quantization parameter for the second block; perform a quantization process for the second block based on the modified quantization parameter for the second block. 30. The device of claim 28, wherein the one or more processors are further configured to
in response to determining a color-space transform mode is disabled for the second block of video data, perform a quantization process for the second block based on the quantization parameter for the second block. 31. The device of claim 28, wherein the one or more processors are further configured to:
generate a flag for the first block to indicate if the first block of video data is coded using the color-space transform mode for residual data of the first block. 32. The device of claim 28, wherein to determine the quantization parameter for the first block of video data comprises determining an initial value for the quantization parameter for the first block, wherein the one or more processors are further configured to
signal the initial value in a slice header for a slice comprising the first block. 33. The device of claim 28, wherein the one or more processors are further configured to
signal, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 34. The device of claim 28, wherein to signal the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block, the one or more processors are further configured to generate a syntax element indicating the absolute value of the difference and generating a syntax element indicating a sign of the difference. 35. The device of claim 28, wherein the one or more processors are further configured to:
determine a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and perform the deblock filtering process on the first block. 36. The device of claim 28, wherein the device comprises at least one of:
a microprocessor; an integrated circuit (IC); or a wireless communication device comprising the video encoder. 37. An apparatus for video decoding, the apparatus comprising:
means for receiving a first block of the video data; means for receiving information to determine a quantization parameter for the first block; means for modifying the quantization parameter for the first block in response to determining that the first block is coded using a color-space transform mode for residual data of the first block; means for performing a dequantization process for the first block based on the modified quantization parameter for the first block; means for receiving a second block of the video data; means for receiving for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; means for determining the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and means for decoding the second block based on the determined quantization parameter for the second block. 38. A computer-readable storage medium storing instructions that when executed by one or more processors cause the one or more processors to:
receive a first block of the video data; receive information to determine a quantization parameter for the first block; in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block; perform a dequantization process for the first block based on the modified quantization parameter for the first block; receive a second block of the video data; receive for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; determine the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and decode the second block based on the determined quantization parameter for the second block. | A device for decoding video data includes a memory configured to store video data and one or more processors configured to: receive a first block of the video data; determine a quantization parameter for the first block; in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block; perform a dequantization process for the first block based on the modified quantization parameter for the first block; receive a second block of the video data; receive a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; determine the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and decode the second block based on the determined quantization parameter.1. A method of decoding video data, the method comprising:
receiving a first block of the video data; receiving information to determine a quantization parameter for the first block; in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modifying the quantization parameter for the first block; performing a dequantization process for the first block based on the modified quantization parameter for the first block; receiving a second block of the video data; receiving for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; determining the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and decoding the second block based on the determined quantization parameter for the second block. 2. The method of claim 1, further comprising:
in response to determining that the color-space transform mode is enabled for the second block of video data, modifying the determined quantization parameter for the second block, wherein decoding the second block based on the determined quantization parameter for the second block comprises: performing a dequantization process for the second block based on the modified quantization parameter for the second block. 3. The method of claim 1, wherein decoding the second block based on the determined quantization parameter for the second block comprises:
in response to determining that the color-space transform mode is disabled for the second block, performing a dequantization process for the second block based on the determined quantization parameter for the second block. 4. The method of claim 1, further comprising:
receiving a flag for the first block to determine that the first block of video data is coded using the color-space transform mode for residual data of the first block. 5. The method of claim 1, wherein receiving information to determine the quantization parameter for the first block comprises receiving an initial value for the quantization parameter for the first block. 6. The method of claim 5, wherein receiving the initial value comprises receiving, at a slice level, the initial value for the quantization parameter. 7. The method of claim 1, further comprising:
receiving, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 8. The method of claim 1, wherein receiving the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block comprises receiving a syntax element indicating the absolute value of the difference and receiving a syntax element indicating a sign of the difference. 9. The method of claim 1, further comprising:
determining a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and performing the deblock filtering process on the first block. 10. A method of encoding video data, the method comprising:
determining a quantization parameter for a first block of video data; in response to determining that the first block of video data is coded using a color-space transform mode for residual data of the first block, modifying the quantization parameter for the first block; performing a quantization process for the first block based on the modified quantization parameter for the first block; determining a quantization parameter for a second block of video data; and signaling a difference value between the quantization parameter for the first block and the quantization parameter for the second block. 11. The method of claim 10, further comprising:
in response to determining a color-space transform mode is enabled for the second block of video data, modifying the quantization parameter for the second block; performing a quantization process for the second block based on the modified quantization parameter for the second block. 12. The method of claim 10, further comprising:
in response to determining a color-space transform mode is disabled for the second block of video data, performing a quantization process for the second block based on the quantization parameter for the second block. 13. The method of claim 10, further comprising:
generating a flag for the first block to indicate if the first block of video data is coded using the color-space transform mode for residual data of the first block. 14. The method of claim 10, wherein determining the quantization parameter for the first block of video data comprises determining an initial value for the quantization parameter for the first block, the method further comprising:
signaling the initial value in a slice header for a slice comprising the first block. 15. The method of claim 10, further comprising:
signaling, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 16. The method of claim 10, wherein signaling the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block comprises generating a syntax element indicating the absolute value of the difference and generating a syntax element indicating a sign of the difference. 17. The method of claim 10, further comprising:
determining a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and performing the deblock filtering process on the first block. 18. A device for decoding video data, the device comprising:
a memory configured to store video data; one or more processors configured to:
receive a first block of the video data;
receive information to determine a quantization parameter for the first block;
in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block;
perform a dequantization process for the first block based on the modified quantization parameter for the first block;
receive a second block of the video data;
receive for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block;
determine the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and
decode the second block based on the determined quantization parameter for the second block. 19. The device of claim 18, wherein the one or more processors are further configured to:
in response to determining that the color-space transform mode is enabled for the second block of video data, modify the determined quantization parameter for the second block, wherein to decode the second block based on the determined quantization parameter for the second block, the one or more processors perform a dequantization process for the second block based on the modified quantization parameter for the second block. 20. The device of claim 18, wherein to decode the second block based on the determined quantization parameter for the second block, the one or more processors are configured to:
in response to determining that the color-space transform mode is disabled for the second block, perform a dequantization process for the second block based on the determined quantization parameter for the second block. 21. The device of claim 18, wherein the one or more processors are further configured to:
receive a flag for the first block to determine that the first block of video data is coded using the color-space transform mode for residual data of the first block. 22. The device of claim 18, wherein to receive information to determine the quantization parameter for the first block, the one or more processors receive an initial value for the quantization parameter for the first block. 23. The device of claim 22, wherein to receive the initial value, the one or more processors receive, at a slice level, the initial value for the quantization parameter. 24. The device of claim 18, wherein the one or more processors are further configured to:
receive, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 25. The device of claim 18, wherein to receive the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block, the one or more processors receive a syntax element indicating the absolute value of the difference and receiving a syntax element indicating a sign of the difference. 26. The device of claim 18, wherein the one or more processors are further configured to:
determine a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and perform the deblock filtering process on the first block. 27. The device of claim 18, wherein the device comprises one of:
a microprocessor; an integrated circuit (IC); and a wireless communication device comprising the video decoder. 28. A device for encoding video data, the device comprising:
a memory configured to store video data; one or more processors configured to:
determine a quantization parameter for a first block of video data,
in response to determining that the first block of video data is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block;
perform a quantization process for the first block based on the modified quantization parameter for the first block;
determine a quantization parameter for a second block of video data; and
signal a difference value between the quantization parameter for the first block and the quantization parameter for the second block. 29. The device of claim 28, wherein the one or more processors are further configured to:
in response to determining a color-space transform mode is enabled for the second block of video data, modify the quantization parameter for the second block; perform a quantization process for the second block based on the modified quantization parameter for the second block. 30. The device of claim 28, wherein the one or more processors are further configured to
in response to determining a color-space transform mode is disabled for the second block of video data, perform a quantization process for the second block based on the quantization parameter for the second block. 31. The device of claim 28, wherein the one or more processors are further configured to:
generate a flag for the first block to indicate if the first block of video data is coded using the color-space transform mode for residual data of the first block. 32. The device of claim 28, wherein to determine the quantization parameter for the first block of video data comprises determining an initial value for the quantization parameter for the first block, wherein the one or more processors are further configured to
signal the initial value in a slice header for a slice comprising the first block. 33. The device of claim 28, wherein the one or more processors are further configured to
signal, at a coded unit level, the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block. 34. The device of claim 28, wherein to signal the difference value indicating the difference between the quantization parameter for the second block and the quantization parameter for the first block, the one or more processors are further configured to generate a syntax element indicating the absolute value of the difference and generating a syntax element indicating a sign of the difference. 35. The device of claim 28, wherein the one or more processors are further configured to:
determine a boundary strength parameter for a deblock filtering process based on the modified quantization parameter for the first block; and perform the deblock filtering process on the first block. 36. The device of claim 28, wherein the device comprises at least one of:
a microprocessor; an integrated circuit (IC); or a wireless communication device comprising the video encoder. 37. An apparatus for video decoding, the apparatus comprising:
means for receiving a first block of the video data; means for receiving information to determine a quantization parameter for the first block; means for modifying the quantization parameter for the first block in response to determining that the first block is coded using a color-space transform mode for residual data of the first block; means for performing a dequantization process for the first block based on the modified quantization parameter for the first block; means for receiving a second block of the video data; means for receiving for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; means for determining the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and means for decoding the second block based on the determined quantization parameter for the second block. 38. A computer-readable storage medium storing instructions that when executed by one or more processors cause the one or more processors to:
receive a first block of the video data; receive information to determine a quantization parameter for the first block; in response to determining that the first block is coded using a color-space transform mode for residual data of the first block, modify the quantization parameter for the first block; perform a dequantization process for the first block based on the modified quantization parameter for the first block; receive a second block of the video data; receive for the second block, a difference value indicating a difference between a quantization parameter for the second block and the quantization parameter for the first block; determine the quantization parameter for the second block based on the received difference value and the quantization parameter for the first block; and decode the second block based on the determined quantization parameter for the second block. | 2,400 |
8,346 | 8,346 | 15,584,054 | 2,473 | The technology disclosed herein enables load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment. In a particular embodiment, a method provides assigning a virtual network address to the pair of virtual edge systems. The method further provides generating state information used by one or more stateful functions of a first virtual edge system of the pair of virtual edge systems and transferring the state information to a second virtual edge system of the pair of virtual edge systems. Also, the method provides directing a first portion of network traffic to the first virtual edge system and a second portion of the network traffic to the second virtual edge system. The network traffic comprises packets addressed with the virtual network address. | 1. A method of load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment, the method comprising;
assigning a virtual network address to the pair of virtual edge systems; generating state information used by one or more stateful functions of a first virtual edge system of the pair of virtual edge systems; transferring the state information to a second virtual edge system of the pair of virtual edge systems; and directing a first portion of network traffic to the first virtual edge system and a second portion of the network traffic to the second virtual edge system, wherein the network traffic comprises packets addressed with the virtual network address. 2. The method of claim 1, further comprising:
upon determining that the first virtual edge system is unavailable, directing all the network traffic to the second virtual edge system. 3. The method of claim 1, further comprising:
executing a state information daemon in the first virtual edge system and the second virtual edge system, wherein the state information daemon controls the generation and exchange of the state information. 4. The method of claim 3, wherein the state information daemon further synchronizes processing of network requests in the network traffic between the first virtual edge system and the second virtual edge system. 5. The method of claim 1, wherein all wide area network (WAN) traffic of the network traffic is directed through the first virtual edge system between a WAN and the local network environment. 6. The method of claim 1, wherein the second portion of the network traffic comprises traffic between local area networks (LANs) of the local network environment. 7. The method of claim 1, wherein the state information includes Transmission Control Protocol (TCP) connection information for a plurality of TCP connections between systems on a wide area network (WAN) and systems in the local network environment. 8. The method of claim 1, further comprising:
applying network rules to the network traffic based on the virtual network address. 9. The method of claim 1, wherein the first virtual edge system is implemented on a host computing system different from a host computing system on which the second virtual edge system is implemented. 10. The method of claim 1, wherein the first virtual edge system is designated as a master edge system and the second virtual edge system is designated as a slave edge system. 11. A system for load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment, the system comprising:
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media that, when read and executed by the processing system, direct the processing system to:
assign a virtual network address to the pair of virtual edge systems;
generate state information used by one or more stateful functions of a first virtual edge system of the pair of virtual edge systems;
transfer the state information to a second virtual edge system of the pair of virtual edge systems; and
direct a first portion of network traffic to the first virtual edge system and a second portion of the network traffic to the second virtual edge system, wherein the network traffic comprises packets addressed with the virtual network address. 12. The system of claim 11, wherein the program instructions further direct the processing system to:
upon determining that the first virtual edge system is unavailable, direct all the network traffic to the second virtual edge system. 13. The system of claim wherein the program instructions further direct the processing system to:
execute a state information daemon in the first virtual edge system and the second virtual edge system, wherein the state information daemon controls the generation and exchange of the state information. 14. The system of claim 13, wherein the state information daemon further synchronizes processing of network requests in the, network traffic between the first virtual edge system and the second virtual edge system. 15. The system of claim 11, wherein all wide area network (WAN) traffic of the network traffic is directed through the first virtual edge system between a WAN and the local network environment. 16. The system of claim 11, wherein the second portion of the network traffic comprises traffic between local area networks (LANs) of the local network environment. 17. The system of claim 11, wherein the state information includes Transmission Control Protocol (TCP) connection information for a plurality of TCP connections between systems on a wide area network (WAN) and systems in the local network environment. 18. The system of claim 11, wherein the program instructions further direct the processing system to:
apply network rules to the network traffic based on the virtual network address. 19. The system of claim 11, wherein the first virtual edge system is implemented on a host computing system different from a host computing system on which the second virtual edge system is implemented. 20. The system of claim 11, wherein the first virtual edge system is designated as a master edge system and the second virtual edge system is designated as a slave edge system. | The technology disclosed herein enables load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment. In a particular embodiment, a method provides assigning a virtual network address to the pair of virtual edge systems. The method further provides generating state information used by one or more stateful functions of a first virtual edge system of the pair of virtual edge systems and transferring the state information to a second virtual edge system of the pair of virtual edge systems. Also, the method provides directing a first portion of network traffic to the first virtual edge system and a second portion of the network traffic to the second virtual edge system. The network traffic comprises packets addressed with the virtual network address.1. A method of load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment, the method comprising;
assigning a virtual network address to the pair of virtual edge systems; generating state information used by one or more stateful functions of a first virtual edge system of the pair of virtual edge systems; transferring the state information to a second virtual edge system of the pair of virtual edge systems; and directing a first portion of network traffic to the first virtual edge system and a second portion of the network traffic to the second virtual edge system, wherein the network traffic comprises packets addressed with the virtual network address. 2. The method of claim 1, further comprising:
upon determining that the first virtual edge system is unavailable, directing all the network traffic to the second virtual edge system. 3. The method of claim 1, further comprising:
executing a state information daemon in the first virtual edge system and the second virtual edge system, wherein the state information daemon controls the generation and exchange of the state information. 4. The method of claim 3, wherein the state information daemon further synchronizes processing of network requests in the network traffic between the first virtual edge system and the second virtual edge system. 5. The method of claim 1, wherein all wide area network (WAN) traffic of the network traffic is directed through the first virtual edge system between a WAN and the local network environment. 6. The method of claim 1, wherein the second portion of the network traffic comprises traffic between local area networks (LANs) of the local network environment. 7. The method of claim 1, wherein the state information includes Transmission Control Protocol (TCP) connection information for a plurality of TCP connections between systems on a wide area network (WAN) and systems in the local network environment. 8. The method of claim 1, further comprising:
applying network rules to the network traffic based on the virtual network address. 9. The method of claim 1, wherein the first virtual edge system is implemented on a host computing system different from a host computing system on which the second virtual edge system is implemented. 10. The method of claim 1, wherein the first virtual edge system is designated as a master edge system and the second virtual edge system is designated as a slave edge system. 11. A system for load balancing between a pair of virtual edge systems configured for high availability at an edge of a local network environment, the system comprising:
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media that, when read and executed by the processing system, direct the processing system to:
assign a virtual network address to the pair of virtual edge systems;
generate state information used by one or more stateful functions of a first virtual edge system of the pair of virtual edge systems;
transfer the state information to a second virtual edge system of the pair of virtual edge systems; and
direct a first portion of network traffic to the first virtual edge system and a second portion of the network traffic to the second virtual edge system, wherein the network traffic comprises packets addressed with the virtual network address. 12. The system of claim 11, wherein the program instructions further direct the processing system to:
upon determining that the first virtual edge system is unavailable, direct all the network traffic to the second virtual edge system. 13. The system of claim wherein the program instructions further direct the processing system to:
execute a state information daemon in the first virtual edge system and the second virtual edge system, wherein the state information daemon controls the generation and exchange of the state information. 14. The system of claim 13, wherein the state information daemon further synchronizes processing of network requests in the, network traffic between the first virtual edge system and the second virtual edge system. 15. The system of claim 11, wherein all wide area network (WAN) traffic of the network traffic is directed through the first virtual edge system between a WAN and the local network environment. 16. The system of claim 11, wherein the second portion of the network traffic comprises traffic between local area networks (LANs) of the local network environment. 17. The system of claim 11, wherein the state information includes Transmission Control Protocol (TCP) connection information for a plurality of TCP connections between systems on a wide area network (WAN) and systems in the local network environment. 18. The system of claim 11, wherein the program instructions further direct the processing system to:
apply network rules to the network traffic based on the virtual network address. 19. The system of claim 11, wherein the first virtual edge system is implemented on a host computing system different from a host computing system on which the second virtual edge system is implemented. 20. The system of claim 11, wherein the first virtual edge system is designated as a master edge system and the second virtual edge system is designated as a slave edge system. | 2,400 |
8,347 | 8,347 | 14,768,929 | 2,486 | A method for decoding a picture block is disclosed. The decoding method comprises:
reconstructing reference picture from another reference picture of a decoder picture buffer of a first layer of a multi-layered stream and from data decoded from a second layer of said multi-layered stream and storing said reference picture in a decoder picture buffer of said second layer, wherein said reference picture is indicated as not to be displayed; decoding a flag indicating that a subsequently decoded picture of the second layer is not using any inter-layer prediction; and reconstructing a picture block of said subsequently decoded picture at least from said reference picture. | 1. A method comprising:
reconstructing reference picture from another reference picture of a decoder picture buffer of a first layer of a multi-layered stream and from data decoded from a second layer of said multi-layered stream and storing said reference picture in a decoder picture buffer of said second layer, wherein said reference picture is indicated as not to be displayed; decoding a flag indicating that a subsequently decoded picture of the second layer is not using any inter-layer prediction; and reconstructing a picture block of said subsequently decoded picture at least from said reference picture. 2. The method according to claim 1, wherein said data decoded from said second layer are representative of a pixel by pixel difference between said reference picture and said another reference picture. 3. The method according to claim 1, wherein the first layer is a base layer. 4. A method for comprising:
encoding in a second layer of a multi-layered stream a reference picture of a decoder picture buffer of said second layer from another reference picture of a decoder picture buffer of a first layer of said multi-layered stream, wherein said reference picture is indicated as not to be displayed; encoding a flag indicating that a subsequently encoded picture of said second layer is not using any inter-layer prediction; encoding a picture block of said subsequently encoded picture at least from said reference picture. 5. The method according to claim 4, wherein encoding in said second layer said reference picture comprises determining the pixel by pixel difference between said reference picture and said another reference picture and encoding said pixel by pixel difference. 6. The method according to claim 4, wherein the first layer is a base layer. 7-12. (canceled) 13. The method of claim 1 further comprising:
decoding from said second layer information for identifying said another reference picture. 14. The method of claim 1, wherein said reference picture and said another reference picture are temporally aligned. 15. The method of claim 4 further comprising:
encoding in said second layer information for identifying said another reference picture. 16. The method of claim 4, wherein said reference picture and said another reference picture are temporally aligned. 17. A decoder comprising at least a processor configured to:
reconstruct a reference picture from another reference picture of a decoder picture buffer of a first layer of a multi-layered stream and from data decoded from a second layer of said multi-layered stream and store said reference picture in a decoder picture buffer of said second layer, wherein said reference picture is indicated as not to be displayed; decode a flag indicating that a subsequently decoded picture of the second layer is not using any inter-layer prediction; and reconstruct a picture block of said subsequently decoded picture at least from said reference picture. 18. The decoder according to claim 17, wherein said data decoded from said second layer are representative of a pixel by pixel difference between said reference picture and said another reference picture. 19. The decoder according to claim 17, wherein the first layer is a base layer. 20. The decoder according to claim 17, wherein said reference picture and said another reference picture are temporally aligned. 21. An encoder comprising at least a processor configured to:
encode in a second layer of a multi-layered stream a reference picture of a decoder picture buffer of said second layer from another reference picture of a decoder picture buffer of a first layer of said multi-layered stream, wherein said reference picture is indicated as not to be displayed; encode a flag indicating that a subsequently encoded picture of said second layer is not using any inter-layer prediction; encode a picture block of said subsequently encoded picture at least from said reference picture. 22. The encoder according to claim 21, wherein to encode in said second layer said reference picture comprises determining the pixel by pixel difference between said reference picture and said another reference picture and encoding said pixel by pixel difference. 23. The encoder according to claim 21, wherein the first layer is a base layer. 24. The encoder according to claim 21, wherein said reference picture and said another reference picture are temporally aligned. | A method for decoding a picture block is disclosed. The decoding method comprises:
reconstructing reference picture from another reference picture of a decoder picture buffer of a first layer of a multi-layered stream and from data decoded from a second layer of said multi-layered stream and storing said reference picture in a decoder picture buffer of said second layer, wherein said reference picture is indicated as not to be displayed; decoding a flag indicating that a subsequently decoded picture of the second layer is not using any inter-layer prediction; and reconstructing a picture block of said subsequently decoded picture at least from said reference picture.1. A method comprising:
reconstructing reference picture from another reference picture of a decoder picture buffer of a first layer of a multi-layered stream and from data decoded from a second layer of said multi-layered stream and storing said reference picture in a decoder picture buffer of said second layer, wherein said reference picture is indicated as not to be displayed; decoding a flag indicating that a subsequently decoded picture of the second layer is not using any inter-layer prediction; and reconstructing a picture block of said subsequently decoded picture at least from said reference picture. 2. The method according to claim 1, wherein said data decoded from said second layer are representative of a pixel by pixel difference between said reference picture and said another reference picture. 3. The method according to claim 1, wherein the first layer is a base layer. 4. A method for comprising:
encoding in a second layer of a multi-layered stream a reference picture of a decoder picture buffer of said second layer from another reference picture of a decoder picture buffer of a first layer of said multi-layered stream, wherein said reference picture is indicated as not to be displayed; encoding a flag indicating that a subsequently encoded picture of said second layer is not using any inter-layer prediction; encoding a picture block of said subsequently encoded picture at least from said reference picture. 5. The method according to claim 4, wherein encoding in said second layer said reference picture comprises determining the pixel by pixel difference between said reference picture and said another reference picture and encoding said pixel by pixel difference. 6. The method according to claim 4, wherein the first layer is a base layer. 7-12. (canceled) 13. The method of claim 1 further comprising:
decoding from said second layer information for identifying said another reference picture. 14. The method of claim 1, wherein said reference picture and said another reference picture are temporally aligned. 15. The method of claim 4 further comprising:
encoding in said second layer information for identifying said another reference picture. 16. The method of claim 4, wherein said reference picture and said another reference picture are temporally aligned. 17. A decoder comprising at least a processor configured to:
reconstruct a reference picture from another reference picture of a decoder picture buffer of a first layer of a multi-layered stream and from data decoded from a second layer of said multi-layered stream and store said reference picture in a decoder picture buffer of said second layer, wherein said reference picture is indicated as not to be displayed; decode a flag indicating that a subsequently decoded picture of the second layer is not using any inter-layer prediction; and reconstruct a picture block of said subsequently decoded picture at least from said reference picture. 18. The decoder according to claim 17, wherein said data decoded from said second layer are representative of a pixel by pixel difference between said reference picture and said another reference picture. 19. The decoder according to claim 17, wherein the first layer is a base layer. 20. The decoder according to claim 17, wherein said reference picture and said another reference picture are temporally aligned. 21. An encoder comprising at least a processor configured to:
encode in a second layer of a multi-layered stream a reference picture of a decoder picture buffer of said second layer from another reference picture of a decoder picture buffer of a first layer of said multi-layered stream, wherein said reference picture is indicated as not to be displayed; encode a flag indicating that a subsequently encoded picture of said second layer is not using any inter-layer prediction; encode a picture block of said subsequently encoded picture at least from said reference picture. 22. The encoder according to claim 21, wherein to encode in said second layer said reference picture comprises determining the pixel by pixel difference between said reference picture and said another reference picture and encoding said pixel by pixel difference. 23. The encoder according to claim 21, wherein the first layer is a base layer. 24. The encoder according to claim 21, wherein said reference picture and said another reference picture are temporally aligned. | 2,400 |
8,348 | 8,348 | 14,971,596 | 2,422 | An electronic assembly is provided comprising an electronic device and a self-aligning electronic accessory. The device includes a housing, a device connector and one or more processors to manage operation of the electronic device. The housing includes a device mating face that includes a device alignment feature. The self-aligning electronic accessory includes a body with electronic components and an accessory connector. The body includes an accessory mating face that includes an accessory alignment feature. The accessory alignment feature and accessory connector are spaced and dimensioned to align with the device alignment feature and device connector to physically join and communicatively couple the accessory and electronic device. | 1. An electronic assembly, comprising:
an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing, the housing including a device alignment feature and device connector; and a self-aligning electronic accessory including a body with electronic components therein, the body including an accessory alignment feature and accessory connector, the accessory alignment feature and accessory connector spaced and dimensioned to align with the respective device alignment feature and device connector to physically join and communicatively couple the self-aligning electronic accessory and electronic device. 2. The electronic assembly of claim 1, wherein the body and housing include assembly and device magnetic elements that magnetically couple with one another when proximate to one another, the assembly and device magnetic elements pulling the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device. 3. The electronic assembly of claim 2, wherein the assembly and device magnetic elements include magnets that are located proximate to mating faces of the body and housing. 4. The electronic assembly of claim 1, wherein the body of the electronic accessory is elongated and includes a mating face, the accessory alignment feature includes a standoff that projects from the mating face, the device alignment feature including a cavity within a mating face provide on the housing, the standoff sized and dimensioned to fit the cavity in connection with self-alignment. 5. The electronic assembly of claim 1, wherein the accessory alignment feature and housing alignment feature include magnets that are oriented to have opposite polarities relative to one another to facilitate magnetic coupling there between. 6. The electronic assembly of claim 1, wherein the accessory connector is located within the accessory alignment feature and the device connector is located within the device alignment feature. 7. The electronic assembly of claim 1, wherein the body of the electronic accessory is directly mounted to an edge of the housing proximate to an extremity of the housing where the extremity is a top, bottom or side of the housing. 8. The electronic assembly of claim 1, wherein the electronic device comprises a display presenting video content that is received by the electronic accessory and conveyed from the electronic accessory to the electronic device through the accessory and device connectors. 9. The electronic assembly of claim 1, wherein the electronic accessory includes a processor, a wireless transceiver that receives streaming video, and local storage storing program instructions to direct the processor to manage transfer of the streaming video to the electronic device through the accessory and device connectors. 10. The electronic assembly of claim 1, wherein the accessory connector includes a transmitter and the device connector includes a receiver, the transmitter and receiver wirelessly conveying content there between in connection with communication between the electronic accessory and electronic device. 11. An electronic assembly, comprising:
an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing, the housing including a device connector and a device magnetic element; and a self-aligning electronic accessory including a body with electronic components therein, the body including an accessory connector and accessory magnetic element, the accessory magnetic element and accessory connector spaced and dimensioned to align with the device magnetic element and device connector to physically join and communicatively couple the accessory and electronic device, the accessory and device magnetic elements magnetically coupled with one another and pulling the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device. 12. The electronic assembly of claim 11, wherein the body and housing include an accessory alignment feature and a device alignment feature, respectively, the accessory and device alignment features positioned relative to the accessory and device magnetic elements to align and physically join with one another when in the select self-alignment position. 13. A method for self-aligning an electronic assembly with an electronic device, comprising:
providing an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing, the housing including a device alignment feature and device connector; and providing a self-aligning electronic accessory including a body with electronic components therein, the body including an accessory alignment feature and accessory connector, the accessory alignment feature and accessory connector spaced and dimensioned to align with the device alignment feature and device connector to physically join and communicatively couple the accessory and electronic device. 14. The method of claim 13, further comprising utilizing magnetic coupling forces between assembly and device magnetic elements provided on the body and housing, respectively, to pull the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device. 15. The method of claim 14, further comprising locating magnets, as the assembly and device magnetic elements, proximate to mating faces of the body and housing. 16. The method of claim 13, further comprising sizing and dimensioning a standoff on a mating face of the body to fit a cavity within a mating face provide on the housing in connection with self-alignment. 17. The method of claim 13, further comprising facilitating the magnetic coupling by orienting magnets within the accessory alignment feature and housing alignment feature to have opposite polarities relative to one another. 18. The method of claim 13, further comprising locating the accessory connector within the accessory alignment feature and the device connector within the device alignment feature. 19. The method of claim 13, receiving video content at the electronic accessory and conveying the video content from the electronic accessory to the electronic device. 20. The method of claim 13, further comprising receiving streaming video at the electronic accessory and managing transfer of the streaming video to the electronic device. 21. An electronic assembly, comprising:
an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing; and a self-aligning electronic accessory including a body with electronic components therein, the housing and body including assembly and device magnetic elements that are configured to magnetically couple with one another when proximate to one another, the assembly and device magnetic elements configured to pull the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device, wherein the assembly and device magnetic elements include magnets that are located proximate to mating faces of the body and housing. 22. The electronic assembly of claim 1, wherein the device alignment feature defines a cavity; and
wherein the accessory alignment feature includes a standoff sized and dimensioned to fit the cavity in connection with self-alignment. | An electronic assembly is provided comprising an electronic device and a self-aligning electronic accessory. The device includes a housing, a device connector and one or more processors to manage operation of the electronic device. The housing includes a device mating face that includes a device alignment feature. The self-aligning electronic accessory includes a body with electronic components and an accessory connector. The body includes an accessory mating face that includes an accessory alignment feature. The accessory alignment feature and accessory connector are spaced and dimensioned to align with the device alignment feature and device connector to physically join and communicatively couple the accessory and electronic device.1. An electronic assembly, comprising:
an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing, the housing including a device alignment feature and device connector; and a self-aligning electronic accessory including a body with electronic components therein, the body including an accessory alignment feature and accessory connector, the accessory alignment feature and accessory connector spaced and dimensioned to align with the respective device alignment feature and device connector to physically join and communicatively couple the self-aligning electronic accessory and electronic device. 2. The electronic assembly of claim 1, wherein the body and housing include assembly and device magnetic elements that magnetically couple with one another when proximate to one another, the assembly and device magnetic elements pulling the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device. 3. The electronic assembly of claim 2, wherein the assembly and device magnetic elements include magnets that are located proximate to mating faces of the body and housing. 4. The electronic assembly of claim 1, wherein the body of the electronic accessory is elongated and includes a mating face, the accessory alignment feature includes a standoff that projects from the mating face, the device alignment feature including a cavity within a mating face provide on the housing, the standoff sized and dimensioned to fit the cavity in connection with self-alignment. 5. The electronic assembly of claim 1, wherein the accessory alignment feature and housing alignment feature include magnets that are oriented to have opposite polarities relative to one another to facilitate magnetic coupling there between. 6. The electronic assembly of claim 1, wherein the accessory connector is located within the accessory alignment feature and the device connector is located within the device alignment feature. 7. The electronic assembly of claim 1, wherein the body of the electronic accessory is directly mounted to an edge of the housing proximate to an extremity of the housing where the extremity is a top, bottom or side of the housing. 8. The electronic assembly of claim 1, wherein the electronic device comprises a display presenting video content that is received by the electronic accessory and conveyed from the electronic accessory to the electronic device through the accessory and device connectors. 9. The electronic assembly of claim 1, wherein the electronic accessory includes a processor, a wireless transceiver that receives streaming video, and local storage storing program instructions to direct the processor to manage transfer of the streaming video to the electronic device through the accessory and device connectors. 10. The electronic assembly of claim 1, wherein the accessory connector includes a transmitter and the device connector includes a receiver, the transmitter and receiver wirelessly conveying content there between in connection with communication between the electronic accessory and electronic device. 11. An electronic assembly, comprising:
an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing, the housing including a device connector and a device magnetic element; and a self-aligning electronic accessory including a body with electronic components therein, the body including an accessory connector and accessory magnetic element, the accessory magnetic element and accessory connector spaced and dimensioned to align with the device magnetic element and device connector to physically join and communicatively couple the accessory and electronic device, the accessory and device magnetic elements magnetically coupled with one another and pulling the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device. 12. The electronic assembly of claim 11, wherein the body and housing include an accessory alignment feature and a device alignment feature, respectively, the accessory and device alignment features positioned relative to the accessory and device magnetic elements to align and physically join with one another when in the select self-alignment position. 13. A method for self-aligning an electronic assembly with an electronic device, comprising:
providing an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing, the housing including a device alignment feature and device connector; and providing a self-aligning electronic accessory including a body with electronic components therein, the body including an accessory alignment feature and accessory connector, the accessory alignment feature and accessory connector spaced and dimensioned to align with the device alignment feature and device connector to physically join and communicatively couple the accessory and electronic device. 14. The method of claim 13, further comprising utilizing magnetic coupling forces between assembly and device magnetic elements provided on the body and housing, respectively, to pull the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device. 15. The method of claim 14, further comprising locating magnets, as the assembly and device magnetic elements, proximate to mating faces of the body and housing. 16. The method of claim 13, further comprising sizing and dimensioning a standoff on a mating face of the body to fit a cavity within a mating face provide on the housing in connection with self-alignment. 17. The method of claim 13, further comprising facilitating the magnetic coupling by orienting magnets within the accessory alignment feature and housing alignment feature to have opposite polarities relative to one another. 18. The method of claim 13, further comprising locating the accessory connector within the accessory alignment feature and the device connector within the device alignment feature. 19. The method of claim 13, receiving video content at the electronic accessory and conveying the video content from the electronic accessory to the electronic device. 20. The method of claim 13, further comprising receiving streaming video at the electronic accessory and managing transfer of the streaming video to the electronic device. 21. An electronic assembly, comprising:
an electronic device having a housing and one or more processors to manage operation of the electronic device, the one or more processors provided within the housing; and a self-aligning electronic accessory including a body with electronic components therein, the housing and body including assembly and device magnetic elements that are configured to magnetically couple with one another when proximate to one another, the assembly and device magnetic elements configured to pull the body of the electronic accessory to a select self-alignment position with respect to the housing of the electronic device, wherein the assembly and device magnetic elements include magnets that are located proximate to mating faces of the body and housing. 22. The electronic assembly of claim 1, wherein the device alignment feature defines a cavity; and
wherein the accessory alignment feature includes a standoff sized and dimensioned to fit the cavity in connection with self-alignment. | 2,400 |
8,349 | 8,349 | 14,988,949 | 2,482 | An interface actuator device, an interface actuator system, and a system and method for remotely controlling an interface of a control panel are disclosed. The interface actuator device includes an actuator for controlling the interface of the control panel and an attachment mechanism for mounting the interface actuator device to the control panel. The system can further include a camera for capturing images of the interface and a mobile device for controlling the actuator and viewing the images from the camera. | 1. An interface actuator device for a control panel of a fire alarm system, comprising:
an actuator for controlling an interface of the control panel; and an attachment mechanism for mounting the interface actuator device to the control panel. 2. The interface actuator device of claim 1, further comprising an actuator communication port for receiving an activation command from a service box causing the actuator to control the interface of the control panel. 3. The interface actuator device of claim 1, further comprising an actuator wireless interface for receiving an activation command from a service box or a mobile device causing the actuator to control the interface of the control panel. 4. The interface actuator device of claim 1, wherein the actuator comprises an actuator plunger and a solenoid for driving the actuator plunger to control the interface of the control panel. 5. The interface actuator device of claim 1, further comprising an electronics module having a battery for powering the actuator and a charger port for receiving power for recharging the battery. 6. The interface actuator device of claim 1, wherein the attachment mechanism is a magnet, an adhesive pad, or a suction device. 7. The interface actuator device of claim 1, further comprising a frame for supporting the actuator on the attachment mechanism, wherein the frame includes an extension arm that telescopes to enable positioning of the actuator relative to the attachment mechanism. 8. The interface actuator device of claim 7, wherein the frame provides for height adjustment of the actuator relative to a surface of the control panel. 9. An interface actuator system for a control panel of a fire alarm system, comprising:
an actuator for controlling an interface of the control panel; a camera for capturing images of the interface; and a mobile device for controlling the actuator and viewing the images from the camera. 10. The system of claim 9, further comprising a service box for receiving wireless communication from the mobile device and for controlling the actuator based on the received wireless communication. 11. The system of claim 9, further comprising a service box for powering the actuator. 12. The system of claim 9, wherein the actuator comprises an actuator plunger and a solenoid for driving the actuator plunger to control the interface of the control panel. 13. The system of claim 9, further comprising an attachment mechanism for mounting the actuator to the control panel. 14. A system for remotely controlling an interface of a control panel of a fire alarm system, comprising:
an interface actuator device including an actuator for controlling the interface of the control panel, and an attachment mechanism for mounting the interface actuator device to the control panel; and a mobile device for communicating an activation command to the interface actuator device causing the actuator to control the interface. 15. The system of claim 14, further comprising a service box for wirelessly receiving the activation command, wherein the service box directs the interface actuator device to control the interface based on receipt of the activation command. 16. The system of claim 14, wherein the interface comprises a rubber switch, a membrane switch, or a touch-screen interface switch. 17. The system of claim 14, wherein the actuator comprises an actuator plunger and a solenoid for driving the actuator plunger to control the interface of the control panel. 18. A method for remotely controlling an interface of a control panel of a fire alarm system, comprising:
mounting an interface actuator device to the control panel; using a mobile device to communicate an activation command to the interface actuator device; and the interface actuator device controlling the interface of the control panel. 19. The method of claim 18, further comprising a camera capturing images of the interface and using the mobile device to view the images from the camera. 20. The method of claim 19, further comprising using the mobile device to confirm that the interface actuator device controlled the interface based on the images from the camera. | An interface actuator device, an interface actuator system, and a system and method for remotely controlling an interface of a control panel are disclosed. The interface actuator device includes an actuator for controlling the interface of the control panel and an attachment mechanism for mounting the interface actuator device to the control panel. The system can further include a camera for capturing images of the interface and a mobile device for controlling the actuator and viewing the images from the camera.1. An interface actuator device for a control panel of a fire alarm system, comprising:
an actuator for controlling an interface of the control panel; and an attachment mechanism for mounting the interface actuator device to the control panel. 2. The interface actuator device of claim 1, further comprising an actuator communication port for receiving an activation command from a service box causing the actuator to control the interface of the control panel. 3. The interface actuator device of claim 1, further comprising an actuator wireless interface for receiving an activation command from a service box or a mobile device causing the actuator to control the interface of the control panel. 4. The interface actuator device of claim 1, wherein the actuator comprises an actuator plunger and a solenoid for driving the actuator plunger to control the interface of the control panel. 5. The interface actuator device of claim 1, further comprising an electronics module having a battery for powering the actuator and a charger port for receiving power for recharging the battery. 6. The interface actuator device of claim 1, wherein the attachment mechanism is a magnet, an adhesive pad, or a suction device. 7. The interface actuator device of claim 1, further comprising a frame for supporting the actuator on the attachment mechanism, wherein the frame includes an extension arm that telescopes to enable positioning of the actuator relative to the attachment mechanism. 8. The interface actuator device of claim 7, wherein the frame provides for height adjustment of the actuator relative to a surface of the control panel. 9. An interface actuator system for a control panel of a fire alarm system, comprising:
an actuator for controlling an interface of the control panel; a camera for capturing images of the interface; and a mobile device for controlling the actuator and viewing the images from the camera. 10. The system of claim 9, further comprising a service box for receiving wireless communication from the mobile device and for controlling the actuator based on the received wireless communication. 11. The system of claim 9, further comprising a service box for powering the actuator. 12. The system of claim 9, wherein the actuator comprises an actuator plunger and a solenoid for driving the actuator plunger to control the interface of the control panel. 13. The system of claim 9, further comprising an attachment mechanism for mounting the actuator to the control panel. 14. A system for remotely controlling an interface of a control panel of a fire alarm system, comprising:
an interface actuator device including an actuator for controlling the interface of the control panel, and an attachment mechanism for mounting the interface actuator device to the control panel; and a mobile device for communicating an activation command to the interface actuator device causing the actuator to control the interface. 15. The system of claim 14, further comprising a service box for wirelessly receiving the activation command, wherein the service box directs the interface actuator device to control the interface based on receipt of the activation command. 16. The system of claim 14, wherein the interface comprises a rubber switch, a membrane switch, or a touch-screen interface switch. 17. The system of claim 14, wherein the actuator comprises an actuator plunger and a solenoid for driving the actuator plunger to control the interface of the control panel. 18. A method for remotely controlling an interface of a control panel of a fire alarm system, comprising:
mounting an interface actuator device to the control panel; using a mobile device to communicate an activation command to the interface actuator device; and the interface actuator device controlling the interface of the control panel. 19. The method of claim 18, further comprising a camera capturing images of the interface and using the mobile device to view the images from the camera. 20. The method of claim 19, further comprising using the mobile device to confirm that the interface actuator device controlled the interface based on the images from the camera. | 2,400 |
8,350 | 8,350 | 14,621,875 | 2,454 | Techniques for intelligent messaging for message syncing are described. An apparatus may comprise a recipient inbound messaging component, a recipient queue management component, a recipient update customization component, and a recipient outbound messaging component. The recipient inbound messaging component may be operative to receive an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update. The recipient queue management component may be operative to add the incoming update to the recipient update queue and determine a recipient messaging endpoint to receive the incoming update. The recipient update customization component may be operative to retrieve one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint and generate a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters. The recipient outbound messaging component may be operative to transmit the customized incoming update to the recipient messaging endpoint. Other embodiments are described and claimed. | 1. A computer-implemented method, comprising:
receiving an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update; adding the incoming update to the recipient update queue; determining a recipient messaging endpoint to receive the incoming update; retrieving one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint; generating a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters; and transmitting the customized incoming update to the recipient messaging endpoint. 2. The method of claim 1, the incoming update comprising a form text in a first language, the one or more recipient messaging endpoint parameters indicating a second language associated with the recipient messaging endpoint, wherein the customized incoming update comprises a replacement of the form text with a translated form text in the second language. 3. The method of claim 1, the incoming update comprising a form text identifier, the one or more recipient messaging endpoint parameters indicating a language associated with the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of form text in the language associated with the recipient messaging endpoint in place of the form text identifier. 4. The method of claim 1, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a location of the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of a content distribution network uniform resource locator for retrieval of the media element, further comprising:
selecting the content distribution network uniform resource locator from a plurality of content distribution network uniform resource locators based on the location of the recipient messaging endpoint. 5. The method of claim 4, comprising:
receiving a notification of an opening of a network connection with the recipient messaging endpoint; receiving a status update from the recipient messaging endpoint across the network connection, the status update including the location of the recipient messaging endpoint; and updating the one or more recipient messaging endpoint parameters to include the location of the recipient messaging endpoint. 6. The method of claim 1, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a media quality preference, wherein the customized incoming update comprises an insertion of a retrieval uniform resource locator for retrieval of the media element, further comprising:
selecting the retrieval uniform resource locator from a plurality of retrieval uniform resource locators based on the media quality preference. 7. The method of claim 6, comprising:
receiving a notification of an opening of a network connection with the recipient messaging endpoint; receiving a status update from the recipient messaging endpoint across the network connection, the status update including a type of network used for the network connection; and updating the one or more recipient messaging endpoint parameters to include the type of network used for the network connection. 8. The method of claim 7, the type of network comprising a cellular network, wherein the retrieval uniform resource locator corresponding to a reduced-bandwidth version of the media element. 9. The method of claim 6, the media quality preference indicating a screen resolution of the recipient messaging endpoint, the retrieval uniform resource locator selected based on the screen resolution of the recipient messaging endpoint. 10. An apparatus, comprising:
a processor circuit on a device; a recipient inbound messaging component operative on the processor circuit to receive an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update; a recipient queue management component operative on the processor circuit to add the incoming update to the recipient update queue and determine a recipient messaging endpoint to receive the incoming update; a recipient update customization component operative on the processor circuit to retrieve one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint and generate a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters; and a recipient outbound messaging component operative on the processor circuit to transmit the customized incoming update to the recipient messaging endpoint. 11. The apparatus of claim 10, the one or more recipient messaging endpoint parameters indicating a language associated with the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of form text in the language associated with the recipient messaging endpoint. 12. The apparatus of claim 10, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a location of the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of a content distribution network uniform resource locator for retrieval of the media element, the recipient update customization component operative to select the content distribution network uniform resource locator from a plurality of content distribution network uniform resource locators based on the location of the recipient messaging endpoint. 13. The apparatus of claim 10, the recipient update customization component operative to receive a notification of an opening of a network connection with the recipient messaging endpoint, receive a status update from the recipient messaging endpoint across the network connection, the status update including the location of the recipient messaging endpoint, and update the one or more recipient messaging endpoint parameters to include the location of the recipient messaging endpoint. 14. The apparatus of claim 10, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a media quality preference, wherein the customized incoming update comprises an insertion of a retrieval uniform resource locator for retrieval of the media element, the recipient update customization component operative to select the retrieval uniform resource locator from a plurality of retrieval uniform resource locators based on the media quality preference. 15. The apparatus of claim 10, the recipient update customization component operative to receive a notification of an opening of a network connection with the recipient messaging endpoint, receive a status update from the recipient messaging endpoint across the network connection, the status update including a type of network used for the network connection, and update the one or more recipient messaging endpoint parameters to include the of network used for the network connection. 16. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to:
receive an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update; add the incoming update to the recipient update queue; determine a recipient messaging endpoint to receive the incoming update; retrieve one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint; generate a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters; and transmit the customized incoming update to the recipient messaging endpoint. 17. The computer-readable storage medium of claim 16, the one or more recipient messaging endpoint parameters indicating a language associated with the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of form text in the language associated with the recipient messaging endpoint. 18. The computer-readable storage medium of claim 16, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a location of the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of a content distribution network uniform resource locator for retrieval of the media element, comprising further instructions that, when executed, cause a system to:
select the content distribution network uniform resource locator from a plurality of content distribution network uniform resource locators based on the location of the recipient messaging endpoint 19. The computer-readable storage medium of claim 16, comprising further instructions that, when executed, cause a system to:
receive a notification of an opening of a network connection with the recipient messaging endpoint; receive a status update from the recipient messaging endpoint across the network connection, the status update including the location of the recipient messaging endpoint; and update the one or more recipient messaging endpoint parameters to include the location of the recipient messaging endpoint. 20. The computer-readable storage medium of claim 16, comprising further instructions that, when executed, cause a system to:
receive a notification of an opening of a network connection with the recipient messaging endpoint; receive a status update from the recipient messaging endpoint across the network connection, the status update including a type of network used for the network connection; and update the one or more recipient messaging endpoint parameters to include the of type of network used for the network connection. | Techniques for intelligent messaging for message syncing are described. An apparatus may comprise a recipient inbound messaging component, a recipient queue management component, a recipient update customization component, and a recipient outbound messaging component. The recipient inbound messaging component may be operative to receive an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update. The recipient queue management component may be operative to add the incoming update to the recipient update queue and determine a recipient messaging endpoint to receive the incoming update. The recipient update customization component may be operative to retrieve one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint and generate a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters. The recipient outbound messaging component may be operative to transmit the customized incoming update to the recipient messaging endpoint. Other embodiments are described and claimed.1. A computer-implemented method, comprising:
receiving an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update; adding the incoming update to the recipient update queue; determining a recipient messaging endpoint to receive the incoming update; retrieving one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint; generating a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters; and transmitting the customized incoming update to the recipient messaging endpoint. 2. The method of claim 1, the incoming update comprising a form text in a first language, the one or more recipient messaging endpoint parameters indicating a second language associated with the recipient messaging endpoint, wherein the customized incoming update comprises a replacement of the form text with a translated form text in the second language. 3. The method of claim 1, the incoming update comprising a form text identifier, the one or more recipient messaging endpoint parameters indicating a language associated with the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of form text in the language associated with the recipient messaging endpoint in place of the form text identifier. 4. The method of claim 1, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a location of the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of a content distribution network uniform resource locator for retrieval of the media element, further comprising:
selecting the content distribution network uniform resource locator from a plurality of content distribution network uniform resource locators based on the location of the recipient messaging endpoint. 5. The method of claim 4, comprising:
receiving a notification of an opening of a network connection with the recipient messaging endpoint; receiving a status update from the recipient messaging endpoint across the network connection, the status update including the location of the recipient messaging endpoint; and updating the one or more recipient messaging endpoint parameters to include the location of the recipient messaging endpoint. 6. The method of claim 1, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a media quality preference, wherein the customized incoming update comprises an insertion of a retrieval uniform resource locator for retrieval of the media element, further comprising:
selecting the retrieval uniform resource locator from a plurality of retrieval uniform resource locators based on the media quality preference. 7. The method of claim 6, comprising:
receiving a notification of an opening of a network connection with the recipient messaging endpoint; receiving a status update from the recipient messaging endpoint across the network connection, the status update including a type of network used for the network connection; and updating the one or more recipient messaging endpoint parameters to include the type of network used for the network connection. 8. The method of claim 7, the type of network comprising a cellular network, wherein the retrieval uniform resource locator corresponding to a reduced-bandwidth version of the media element. 9. The method of claim 6, the media quality preference indicating a screen resolution of the recipient messaging endpoint, the retrieval uniform resource locator selected based on the screen resolution of the recipient messaging endpoint. 10. An apparatus, comprising:
a processor circuit on a device; a recipient inbound messaging component operative on the processor circuit to receive an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update; a recipient queue management component operative on the processor circuit to add the incoming update to the recipient update queue and determine a recipient messaging endpoint to receive the incoming update; a recipient update customization component operative on the processor circuit to retrieve one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint and generate a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters; and a recipient outbound messaging component operative on the processor circuit to transmit the customized incoming update to the recipient messaging endpoint. 11. The apparatus of claim 10, the one or more recipient messaging endpoint parameters indicating a language associated with the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of form text in the language associated with the recipient messaging endpoint. 12. The apparatus of claim 10, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a location of the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of a content distribution network uniform resource locator for retrieval of the media element, the recipient update customization component operative to select the content distribution network uniform resource locator from a plurality of content distribution network uniform resource locators based on the location of the recipient messaging endpoint. 13. The apparatus of claim 10, the recipient update customization component operative to receive a notification of an opening of a network connection with the recipient messaging endpoint, receive a status update from the recipient messaging endpoint across the network connection, the status update including the location of the recipient messaging endpoint, and update the one or more recipient messaging endpoint parameters to include the location of the recipient messaging endpoint. 14. The apparatus of claim 10, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a media quality preference, wherein the customized incoming update comprises an insertion of a retrieval uniform resource locator for retrieval of the media element, the recipient update customization component operative to select the retrieval uniform resource locator from a plurality of retrieval uniform resource locators based on the media quality preference. 15. The apparatus of claim 10, the recipient update customization component operative to receive a notification of an opening of a network connection with the recipient messaging endpoint, receive a status update from the recipient messaging endpoint across the network connection, the status update including a type of network used for the network connection, and update the one or more recipient messaging endpoint parameters to include the of network used for the network connection. 16. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to:
receive an incoming update at a recipient update queue, the recipient update queue associated with a recipient of the incoming update; add the incoming update to the recipient update queue; determine a recipient messaging endpoint to receive the incoming update; retrieve one or more recipient messaging endpoint parameters associated with the recipient messaging endpoint; generate a customized incoming update from the incoming update according to the one or more recipient messaging endpoint parameters; and transmit the customized incoming update to the recipient messaging endpoint. 17. The computer-readable storage medium of claim 16, the one or more recipient messaging endpoint parameters indicating a language associated with the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of form text in the language associated with the recipient messaging endpoint. 18. The computer-readable storage medium of claim 16, the incoming update comprising a media element, the one or more recipient messaging endpoint parameters indicating a location of the recipient messaging endpoint, wherein the customized incoming update comprises an insertion of a content distribution network uniform resource locator for retrieval of the media element, comprising further instructions that, when executed, cause a system to:
select the content distribution network uniform resource locator from a plurality of content distribution network uniform resource locators based on the location of the recipient messaging endpoint 19. The computer-readable storage medium of claim 16, comprising further instructions that, when executed, cause a system to:
receive a notification of an opening of a network connection with the recipient messaging endpoint; receive a status update from the recipient messaging endpoint across the network connection, the status update including the location of the recipient messaging endpoint; and update the one or more recipient messaging endpoint parameters to include the location of the recipient messaging endpoint. 20. The computer-readable storage medium of claim 16, comprising further instructions that, when executed, cause a system to:
receive a notification of an opening of a network connection with the recipient messaging endpoint; receive a status update from the recipient messaging endpoint across the network connection, the status update including a type of network used for the network connection; and update the one or more recipient messaging endpoint parameters to include the of type of network used for the network connection. | 2,400 |
8,351 | 8,351 | 14,061,151 | 2,491 | An authentication device authenticates a user based on a user's operation. The authentication device comprises a display control unit, an operation input unit, and an authentication unit. The display control unit is a processor-based logic that displays a three-dimensional model on a display device. The operation input unit is a hardware unit that inputs a user's operation on the displayed three-dimensional model. The authentication unit is a processor-based logic that authenticates the user based on the user's operation, wherein the user's operation comprises a change operation of at least one of a position and posture of the three-dimensional model having been input from the user. | 1. An authentication device for authenticating a user based on a user's operation on a displayed three-dimensional model, the authentication device comprising:
a display control unit, wherein the display control unit is a processor-based logic that displays a three-dimensional model on a display device; an operation input unit, wherein the operation input unit is a hardware unit that inputs a user's operation on the displayed three-dimensional model; and an authentication unit, wherein the authentication unit is a processor-based logic that authenticates the user based on the user's operation, wherein the user's operation comprises a change operation of at least one of a position and posture of the three-dimensional model having been input by the user. 2. The authentication device according to claim 1, further comprising:
a change processing unit, wherein the change processing unit changes at least one of the position and posture of the three-dimensional model on a display screen in response to an input of a change operation of at least one of the position and posture of the three-dimensional model from the user. 3. The authentication device according to claim 2, wherein:
the operation input unit inputs a specification operation for specifying at least one of a point and a region on the three-dimensional model from the user; and the authentication unit includes:
a detection unit, wherein the detection unit detects a similarity between at least one of the point and region on the three-dimensional model specified by the user and at least one of a preset point and region for authentication; and
an authentication processing unit, wherein the authentication processing unit confirms a successful authentication of the user in response to the similarity being equal to or greater than a reference value. 4. The authentication device according to claim 3, wherein the display control unit displays the three-dimensional model by using different initial values of at least one of the position and posture of the three-dimensional model before the input of the specification operation from the user in authentication processing which is performed at least more than once. 5. The authentication device according to claim 1, wherein:
the operation input unit inputs a specification operation of specifying at least one of the point and region on the three-dimensional model from the user with respect to a plurality of places on the three-dimensional model; and the authentication processing unit determines whether an authentication of the user is successful based on the plurality of similarities detected with respect to the plurality of places on the three-dimensional model. 6. The authentication device according to claim 5, wherein the authentication processing unit makes the authentication of the user successful on further condition that at least the respective points or the regions in the plurality of places on the three-dimensional model have been specified in a correct order. 7. The authentication device according to claim 5, wherein the authentication processing unit makes the authentication of the user successful on further condition that the similarity detected with respect to all of the plurality of places on the three-dimensional model is equal to or greater than a reference value. 8. The authentication device according to claim 5, wherein the authentication processing unit makes the authentication of the user successful on further condition that a total of the similarities in the plurality of places on the three-dimensional model is equal to or greater than a reference value. 9. The authentication device according to claim 2, wherein:
the change processing unit changes at least one of the position and posture of the three-dimensional model on the display screen in response to the input of the change operation of at least one of the position and posture of the three-dimensional model from the user during a registration process of registering at least one of the point and region for authentication; the operation input unit inputs a specification operation of specifying at least one of the point and region on the three-dimensional model from the user during the registration process; and the authentication device further comprises a registration unit, wherein the registration unit registers at least one of the point and region on the three-dimensional model specified by the user during the registration process as at least one of the point and region for authentication. 10. The authentication device according to claim 9, wherein the change processing unit changes at least one of the position and posture of the three-dimensional model on the display screen in response to the input of the change operation of at least one of the position and posture of the three-dimensional model from the user after the registration process and makes the user confirm at least one of the point and region for authentication on the three-dimensional model. 11. The authentication device according to claim 9, wherein:
the operation input unit inputs the specification operation of specifying at least one of the point and region on the three-dimensional model from the user during the registration process for registering at least one of the point and region for authentication with respect to a plurality of places on the three-dimensional model; and the registration unit warns the user of low authentication strength in a case where the specification of at least one of the point and region with respect to each of the plurality of places on the three-dimensional model specified by the user during the registration process is possible in the same position and posture of the three-dimensional model. 12. The authentication device according to claim 2, further comprising:
a password generation unit, wherein the password generation unit generates a password for authentication, wherein the password has been predetermined to be appropriate to an operation for authentication for the three-dimensional model, and wherein the password generation unit causes the display device to present the password for authentication to the user, wherein:
the operation input unit inputs the password from the user when the user specifies the authentication with the password on the display screen on which the user's operation is input for the three-dimensional model; and
the authentication unit authenticates the user in a case where the password input from the user matches the password for authentication. 13. The authentication device according to claim 1, wherein:
the display control unit displays a plurality of three-dimensional models on the display device; and the authentication unit authenticates the user further on condition that a three-dimensional model selected by the user from the plurality of three-dimensional models is a three-dimensional model intended for authentication. 14. The authentication device according to claim 1, wherein:
the display control unit displays a plurality of three-dimensional models on the display device; and the authentication unit authenticates the user based on an operation including the change operation of at least one of the position and posture, which has been input from the user with respect to each of the plurality of three-dimensional models. 15. The authentication device according to claim 1, wherein:
the operation input unit inputs specification operations for a plurality of times in a case where the similarity corresponding to the user's specification operation is less than a reference value; and the authentication processing unit makes the authentication successful on condition that the similarity is equal to or greater than the reference value if at least the plurality of points or regions for authentication are selected out of at least the plurality of points or regions specified by the specification operations for the plurality of times, respectively, even if the plurality of similarities corresponding to the specification operations for the plurality of times are less than the reference value. 16. A method for authenticating a user based on a user's operation, the method comprising:
displaying a three-dimensional model on a display device; receiving, by one or more processors, an input of a user's operation on the displayed three-dimensional model; and authenticating, by one or more processors, the user based on an operation, wherein the operation comprises a change operation of at least one of the position and posture of the three-dimensional model having been input by the user. 17. The method of claim 16, further comprising:
changing, by one or more processors, at least one of the position and posture of the three-dimensional model on a display screen in response to an input of a change operation of at least one of the position and posture of the three-dimensional model from the user. 18. The method of claim 17, further comprising:
specifying, by one or more processors, at least one of a point and a region on the three-dimensional model from the user; detecting, by one or more processors, a similarity between at least one of the point and region on the three-dimensional model specified by the user and at least one of a preset point and region for authentication; and confirming, by one or more processors, a successful authentication of the user in response to the similarity being equal to or greater than a reference value. 19. A computer program product for authenticating a user based on a user's operation, the computer program product comprising a tangible computer readable storage medium having program code embodied therewith, the program code readable and executable by a processor to perform a method comprising:
displaying a three-dimensional model on a display device; receiving an input of a user's operation on the displayed three-dimensional model; and authenticating the user based on an operation, wherein the operation comprises a change operation of at least one of the position and posture of the three-dimensional model having been input by the user. 20. The computer program product of claim 19, wherein the method further comprises:
changing at least one of the position and posture of the three-dimensional model on a display screen in response to an input of a change operation of at least one of the position and posture of the three-dimensional model from the user; specifying at least one of a point and a region on the three-dimensional model from the user; detecting a similarity between at least one of the point and region on the three-dimensional model specified by the user and at least one of a preset point and region for authentication; and confirming a successful authentication of the user in response to the similarity being equal to or greater than a reference value. | An authentication device authenticates a user based on a user's operation. The authentication device comprises a display control unit, an operation input unit, and an authentication unit. The display control unit is a processor-based logic that displays a three-dimensional model on a display device. The operation input unit is a hardware unit that inputs a user's operation on the displayed three-dimensional model. The authentication unit is a processor-based logic that authenticates the user based on the user's operation, wherein the user's operation comprises a change operation of at least one of a position and posture of the three-dimensional model having been input from the user.1. An authentication device for authenticating a user based on a user's operation on a displayed three-dimensional model, the authentication device comprising:
a display control unit, wherein the display control unit is a processor-based logic that displays a three-dimensional model on a display device; an operation input unit, wherein the operation input unit is a hardware unit that inputs a user's operation on the displayed three-dimensional model; and an authentication unit, wherein the authentication unit is a processor-based logic that authenticates the user based on the user's operation, wherein the user's operation comprises a change operation of at least one of a position and posture of the three-dimensional model having been input by the user. 2. The authentication device according to claim 1, further comprising:
a change processing unit, wherein the change processing unit changes at least one of the position and posture of the three-dimensional model on a display screen in response to an input of a change operation of at least one of the position and posture of the three-dimensional model from the user. 3. The authentication device according to claim 2, wherein:
the operation input unit inputs a specification operation for specifying at least one of a point and a region on the three-dimensional model from the user; and the authentication unit includes:
a detection unit, wherein the detection unit detects a similarity between at least one of the point and region on the three-dimensional model specified by the user and at least one of a preset point and region for authentication; and
an authentication processing unit, wherein the authentication processing unit confirms a successful authentication of the user in response to the similarity being equal to or greater than a reference value. 4. The authentication device according to claim 3, wherein the display control unit displays the three-dimensional model by using different initial values of at least one of the position and posture of the three-dimensional model before the input of the specification operation from the user in authentication processing which is performed at least more than once. 5. The authentication device according to claim 1, wherein:
the operation input unit inputs a specification operation of specifying at least one of the point and region on the three-dimensional model from the user with respect to a plurality of places on the three-dimensional model; and the authentication processing unit determines whether an authentication of the user is successful based on the plurality of similarities detected with respect to the plurality of places on the three-dimensional model. 6. The authentication device according to claim 5, wherein the authentication processing unit makes the authentication of the user successful on further condition that at least the respective points or the regions in the plurality of places on the three-dimensional model have been specified in a correct order. 7. The authentication device according to claim 5, wherein the authentication processing unit makes the authentication of the user successful on further condition that the similarity detected with respect to all of the plurality of places on the three-dimensional model is equal to or greater than a reference value. 8. The authentication device according to claim 5, wherein the authentication processing unit makes the authentication of the user successful on further condition that a total of the similarities in the plurality of places on the three-dimensional model is equal to or greater than a reference value. 9. The authentication device according to claim 2, wherein:
the change processing unit changes at least one of the position and posture of the three-dimensional model on the display screen in response to the input of the change operation of at least one of the position and posture of the three-dimensional model from the user during a registration process of registering at least one of the point and region for authentication; the operation input unit inputs a specification operation of specifying at least one of the point and region on the three-dimensional model from the user during the registration process; and the authentication device further comprises a registration unit, wherein the registration unit registers at least one of the point and region on the three-dimensional model specified by the user during the registration process as at least one of the point and region for authentication. 10. The authentication device according to claim 9, wherein the change processing unit changes at least one of the position and posture of the three-dimensional model on the display screen in response to the input of the change operation of at least one of the position and posture of the three-dimensional model from the user after the registration process and makes the user confirm at least one of the point and region for authentication on the three-dimensional model. 11. The authentication device according to claim 9, wherein:
the operation input unit inputs the specification operation of specifying at least one of the point and region on the three-dimensional model from the user during the registration process for registering at least one of the point and region for authentication with respect to a plurality of places on the three-dimensional model; and the registration unit warns the user of low authentication strength in a case where the specification of at least one of the point and region with respect to each of the plurality of places on the three-dimensional model specified by the user during the registration process is possible in the same position and posture of the three-dimensional model. 12. The authentication device according to claim 2, further comprising:
a password generation unit, wherein the password generation unit generates a password for authentication, wherein the password has been predetermined to be appropriate to an operation for authentication for the three-dimensional model, and wherein the password generation unit causes the display device to present the password for authentication to the user, wherein:
the operation input unit inputs the password from the user when the user specifies the authentication with the password on the display screen on which the user's operation is input for the three-dimensional model; and
the authentication unit authenticates the user in a case where the password input from the user matches the password for authentication. 13. The authentication device according to claim 1, wherein:
the display control unit displays a plurality of three-dimensional models on the display device; and the authentication unit authenticates the user further on condition that a three-dimensional model selected by the user from the plurality of three-dimensional models is a three-dimensional model intended for authentication. 14. The authentication device according to claim 1, wherein:
the display control unit displays a plurality of three-dimensional models on the display device; and the authentication unit authenticates the user based on an operation including the change operation of at least one of the position and posture, which has been input from the user with respect to each of the plurality of three-dimensional models. 15. The authentication device according to claim 1, wherein:
the operation input unit inputs specification operations for a plurality of times in a case where the similarity corresponding to the user's specification operation is less than a reference value; and the authentication processing unit makes the authentication successful on condition that the similarity is equal to or greater than the reference value if at least the plurality of points or regions for authentication are selected out of at least the plurality of points or regions specified by the specification operations for the plurality of times, respectively, even if the plurality of similarities corresponding to the specification operations for the plurality of times are less than the reference value. 16. A method for authenticating a user based on a user's operation, the method comprising:
displaying a three-dimensional model on a display device; receiving, by one or more processors, an input of a user's operation on the displayed three-dimensional model; and authenticating, by one or more processors, the user based on an operation, wherein the operation comprises a change operation of at least one of the position and posture of the three-dimensional model having been input by the user. 17. The method of claim 16, further comprising:
changing, by one or more processors, at least one of the position and posture of the three-dimensional model on a display screen in response to an input of a change operation of at least one of the position and posture of the three-dimensional model from the user. 18. The method of claim 17, further comprising:
specifying, by one or more processors, at least one of a point and a region on the three-dimensional model from the user; detecting, by one or more processors, a similarity between at least one of the point and region on the three-dimensional model specified by the user and at least one of a preset point and region for authentication; and confirming, by one or more processors, a successful authentication of the user in response to the similarity being equal to or greater than a reference value. 19. A computer program product for authenticating a user based on a user's operation, the computer program product comprising a tangible computer readable storage medium having program code embodied therewith, the program code readable and executable by a processor to perform a method comprising:
displaying a three-dimensional model on a display device; receiving an input of a user's operation on the displayed three-dimensional model; and authenticating the user based on an operation, wherein the operation comprises a change operation of at least one of the position and posture of the three-dimensional model having been input by the user. 20. The computer program product of claim 19, wherein the method further comprises:
changing at least one of the position and posture of the three-dimensional model on a display screen in response to an input of a change operation of at least one of the position and posture of the three-dimensional model from the user; specifying at least one of a point and a region on the three-dimensional model from the user; detecting a similarity between at least one of the point and region on the three-dimensional model specified by the user and at least one of a preset point and region for authentication; and confirming a successful authentication of the user in response to the similarity being equal to or greater than a reference value. | 2,400 |
8,352 | 8,352 | 15,450,974 | 2,422 | A method, non-transitory computer readable medium and apparatus for performing a person re-identification using an overhead view image are disclosed. For example, the method includes receiving a plurality of overhead view images, detecting a target person in one or more of the plurality of overhead view images, creating a probe image of the target person, receiving a selection of the probe image containing the target person, selecting one or more of the plurality of processed images that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image and performing the person-re-identification of the target person using the one or more of the plurality of processed images that are selected. | 1. A method for performing a person re-identification using an overhead view image, comprising:
receiving, by a processor, a plurality of overhead view images; detecting, by the processor, a target person in one or more of the plurality of overhead view images; creating, by the processor, a probe image of the target person; receiving, by the processor, a selection of the probe image containing the target person; selecting, by the processor, one or more of a plurality of processed images in an image gallery that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image; and performing, by the processor, the person-re-identification of the target person in the probe image using the one or more of the plurality of processed images that are selected. 2. The method of claim 1, wherein the plurality of overhead view images comprise images that are captured along a viewing axis that is substantially perpendicular to a ground. 3. The method of claim 1, the plurality of overhead view images are captured by a fisheye camera. 4. The method of claim 1, wherein the creating the plurality of processed images comprises:
detecting, by the processor, one or more persons in one or more of the plurality of overhead view images; creating, by the processor, one or more additional images of each one of the one or more persons that are detected; and normalizing, by the processor, the one or more additional images to create the plurality of processed images. 5. The method of claim 4, wherein the one or more additional images are sub-images of a respective overhead view image of the plurality of overhead view images. 6. The method of claim 4, wherein the normalizing comprises:
adjusting, by the processor, an orientation of a person in each one of the one or more additional images. 7. The method of claim 1, wherein the plurality of processed images include different persons, wherein each one of the different persons is contained in a plurality of different processed images. 8. The method of claim 7, wherein the selecting comprises:
selecting, by the processor, only a single one of the plurality of different processed images for the each one of the different persons. 9. The method of claim 7, wherein the plurality of different processed images comprise different views. 10. The method of claim 9, wherein the different views of the each one of the different persons are captured at different orientations at different radial distances from a center of a respective overhead view image of the plurality of overhead view images. 11. The method of claim 1, wherein a person in each one of the one or more of the plurality of processed images that are selected is in a same orientation as the target person in the probe image. 12. A non-transitory computer-readable medium storing a plurality of instructions, which when executed by a processor, cause the processor to perform operations for performing a person re-identification using an overhead view image, the operations comprising:
receiving a plurality of overhead view images; detecting a target person in one or more of the plurality of overhead view images; creating a probe image of the target person; receiving a selection of the probe image containing the target person; selecting one or more of a plurality of processed images in an image gallery that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image; and performing the person-re-identification of the target person in the probe image using the one or more of the plurality of processed images that are selected. 13. The non-transitory computer readable medium of claim 12, wherein the plurality of overhead view images comprise images that are captured along a viewing axis that is substantially perpendicular to a ground. 14. The non-transitory computer readable medium of claim 12, wherein the creating the plurality of processed images comprises:
detecting one or more persons in one or more of the plurality of overhead view images; creating one or more additional images of each one of the one or more persons that are detected; and normalizing the one or more additional images to create the plurality of processed images. 15. The non-transitory computer readable medium of claim 14, wherein the one or more additional images are sub-images of a respective overhead view image of the plurality of overhead view images. 16. The non-transitory computer readable medium of claim 14, wherein the normalizing comprises:
adjusting an orientation of a person in each one of the one or more additional images. 17. The non-transitory computer readable medium of claim 12, wherein the plurality of processed images include different persons, wherein each one of the different persons is contained in a plurality of different processed images. 18. The non-transitory computer readable medium of claim 17, wherein the selecting comprises:
selecting only a single one of the plurality of different processed images for the each one of the different persons. 19. The non-transitory computer readable medium of claim 17, wherein the plurality of different processed images comprise different views, wherein the different views of the each one of the different persons are captured at different orientations at different radial distances from a center of a respective overhead view image of the plurality of overhead view images. 20. A method for performing a person re-identification using an overhead view image, comprising:
receiving, by a processor, a plurality of overhead view images; detecting, by the processor, one or more persons in one or more of the plurality overhead view images; creating, by the processor, a plurality of processed images of the one or more persons from the plurality of overhead view images, wherein the plurality of processed images are stored in a gallery of images; detecting, by the processor, a target person in a second one or more of the plurality of overhead view images; creating, by the processor, a probe image of the target person; receiving, by the processor, a selection of the probe image containing the target person; selecting, by the processor, one or more of the plurality of processed images that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image; and performing, by the processor, the person-re-identification of the target person in the probe image using the one or more of the plurality of processed images that are selected. | A method, non-transitory computer readable medium and apparatus for performing a person re-identification using an overhead view image are disclosed. For example, the method includes receiving a plurality of overhead view images, detecting a target person in one or more of the plurality of overhead view images, creating a probe image of the target person, receiving a selection of the probe image containing the target person, selecting one or more of the plurality of processed images that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image and performing the person-re-identification of the target person using the one or more of the plurality of processed images that are selected.1. A method for performing a person re-identification using an overhead view image, comprising:
receiving, by a processor, a plurality of overhead view images; detecting, by the processor, a target person in one or more of the plurality of overhead view images; creating, by the processor, a probe image of the target person; receiving, by the processor, a selection of the probe image containing the target person; selecting, by the processor, one or more of a plurality of processed images in an image gallery that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image; and performing, by the processor, the person-re-identification of the target person in the probe image using the one or more of the plurality of processed images that are selected. 2. The method of claim 1, wherein the plurality of overhead view images comprise images that are captured along a viewing axis that is substantially perpendicular to a ground. 3. The method of claim 1, the plurality of overhead view images are captured by a fisheye camera. 4. The method of claim 1, wherein the creating the plurality of processed images comprises:
detecting, by the processor, one or more persons in one or more of the plurality of overhead view images; creating, by the processor, one or more additional images of each one of the one or more persons that are detected; and normalizing, by the processor, the one or more additional images to create the plurality of processed images. 5. The method of claim 4, wherein the one or more additional images are sub-images of a respective overhead view image of the plurality of overhead view images. 6. The method of claim 4, wherein the normalizing comprises:
adjusting, by the processor, an orientation of a person in each one of the one or more additional images. 7. The method of claim 1, wherein the plurality of processed images include different persons, wherein each one of the different persons is contained in a plurality of different processed images. 8. The method of claim 7, wherein the selecting comprises:
selecting, by the processor, only a single one of the plurality of different processed images for the each one of the different persons. 9. The method of claim 7, wherein the plurality of different processed images comprise different views. 10. The method of claim 9, wherein the different views of the each one of the different persons are captured at different orientations at different radial distances from a center of a respective overhead view image of the plurality of overhead view images. 11. The method of claim 1, wherein a person in each one of the one or more of the plurality of processed images that are selected is in a same orientation as the target person in the probe image. 12. A non-transitory computer-readable medium storing a plurality of instructions, which when executed by a processor, cause the processor to perform operations for performing a person re-identification using an overhead view image, the operations comprising:
receiving a plurality of overhead view images; detecting a target person in one or more of the plurality of overhead view images; creating a probe image of the target person; receiving a selection of the probe image containing the target person; selecting one or more of a plurality of processed images in an image gallery that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image; and performing the person-re-identification of the target person in the probe image using the one or more of the plurality of processed images that are selected. 13. The non-transitory computer readable medium of claim 12, wherein the plurality of overhead view images comprise images that are captured along a viewing axis that is substantially perpendicular to a ground. 14. The non-transitory computer readable medium of claim 12, wherein the creating the plurality of processed images comprises:
detecting one or more persons in one or more of the plurality of overhead view images; creating one or more additional images of each one of the one or more persons that are detected; and normalizing the one or more additional images to create the plurality of processed images. 15. The non-transitory computer readable medium of claim 14, wherein the one or more additional images are sub-images of a respective overhead view image of the plurality of overhead view images. 16. The non-transitory computer readable medium of claim 14, wherein the normalizing comprises:
adjusting an orientation of a person in each one of the one or more additional images. 17. The non-transitory computer readable medium of claim 12, wherein the plurality of processed images include different persons, wherein each one of the different persons is contained in a plurality of different processed images. 18. The non-transitory computer readable medium of claim 17, wherein the selecting comprises:
selecting only a single one of the plurality of different processed images for the each one of the different persons. 19. The non-transitory computer readable medium of claim 17, wherein the plurality of different processed images comprise different views, wherein the different views of the each one of the different persons are captured at different orientations at different radial distances from a center of a respective overhead view image of the plurality of overhead view images. 20. A method for performing a person re-identification using an overhead view image, comprising:
receiving, by a processor, a plurality of overhead view images; detecting, by the processor, one or more persons in one or more of the plurality overhead view images; creating, by the processor, a plurality of processed images of the one or more persons from the plurality of overhead view images, wherein the plurality of processed images are stored in a gallery of images; detecting, by the processor, a target person in a second one or more of the plurality of overhead view images; creating, by the processor, a probe image of the target person; receiving, by the processor, a selection of the probe image containing the target person; selecting, by the processor, one or more of the plurality of processed images that has a similar distortion profile as a distortion profile of the probe image based on a radial distance of the target person from a center of a respective overhead view image of the plurality overhead view images used to generate the probe image; and performing, by the processor, the person-re-identification of the target person in the probe image using the one or more of the plurality of processed images that are selected. | 2,400 |
8,353 | 8,353 | 15,023,781 | 2,466 | One embodiment of the present disclosure relates to a method for random access in a base station supporting communication with at least one CE-MTC UE. The method comprises: receiving from a user equipment, repetition transmissions of a first message including a random access preamble; repeatedly transmitting to the user equipment a second message including a random access response, RAR, wherein the second message has a characteristic dependent upon a first repetition level. Another embodiment of the present invention also relates to corresponding method for random access in a user equipment. According to an aspect of the present disclosure, there are provided corresponding devices. | 1. A method for random access in a base station, comprising:
receiving from a user equipment repetition transmissions of a first message including a random access preamble; repeatedly transmitting to the user equipment a second message including a random access response, RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; receiving from the user equipment repetition transmissions of a third message; and repeatedly transmitting to the user equipment a fourth message including a contention resolution. 2. The method according to any of claim 1, wherein the fourth message is configured to have a characteristic dependent upon a second repetition level. 3. The method according to claim 1, wherein a random access radio network temperate identity, RA-RNTI, in the RAR is computed at least based on the first repetition level. 4. The method according to claim 3, wherein the RA-RNTI is computed based on an index of a subframe where the preamble repetition starts, an index of frequency on which the repetition transmissions are performed, and a repetition level index of the first repetition level. 5. The method according to claim 1, wherein the second message is scrambled by a scrambling code dependent upon the first repetition level. 6. The method according to claim 1, wherein the second message has a specific field to indicate the first repetition level. 7. The method according to claim 2, wherein the fourth message is scrambled by a scrambling code dependent upon the second repetition level. 8. The method according to claim 2, wherein the fourth message has a specific field to indicate the second repetition level. 9. The method according to claim 1, wherein the first repetition level is indicative of at least one of:
a repetition level which is used by the base station in repeatedly transmitting the second message; a repetition level which is to be used by the user equipment in repeatedly transmitting the third message; or a repetition level which is to be used by the base station in repeatedly transmitting the fourth message. 10. The method according to claim 1, wherein the second repetition level is indicative of the uplink repetition level and the downlink repetition level which are to be used in performing repetition transmissions between the base station and the user equipment after the random access procedure. 11. The method according to claim 1, wherein the user equipment is a coverage enhanced machine type communication user equipment. 12. A base station, comprising:
a receiving unit configured to receive from a user equipment, repetition transmissions of a first message including a random access preamble; a transmitting unit configured to repeatedly transmit to the user equipment a second message including a random access response, RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; the receiving unit further configured to receive from the user equipment repetition transmissions of a third message; the transmitting unit further configured to repeatedly transmit to the user equipment a fourth message including a contention resolution. 13. The base station according to any of claim 12, wherein
the fourth message is configured to have a characteristic dependent upon a second repetition level. 14. The base station according to claim 12, wherein a random access radio network temperate identity, RA-RNTI, in the RAR is computed at least based on the first repetition level. 15. The base station according to claim 14, wherein the RA-RNTI is computed based on an index of a subframe where the preamble repetition starts, an index of frequency on which the repetition transmissions are performed, and a repetition level index of the first repetition level. 16. The base station according to claim 12, wherein the second message is scrambled by a scrambling code dependent upon the first repetition level. 17. The base station according to claim 12, wherein the second message has a specific field to indicate the first repetition level. 18. The base station according to claim 13, wherein the fourth message is scrambled by a scrambling code dependent upon the second repetition level. 19. The base station according to claim 13, wherein the fourth message has a specific field to indicate the second repetition level. 20. The base station according to claim 12, wherein the first repetition level is indicative of at least one of:
a repetition level which is used by the base station in repeatedly transmitting the second message; a repetition level which is to be used by the user equipment in repeatedly transmitting the third message; or a repetition level which is to be used by the base station in repeatedly transmitting the fourth message. 21. The base station according to claim 13, wherein the second repetition level is indicative of the uplink repetition level and the downlink repetition level which are to be used in performing repetition transmissions between the base station and the user equipment after the random access procedure. 22. The base station according to claim 21, wherein the user equipment is a coverage enhanced machine type communication user equipment. 23. A method for random access in a user equipment, comprising:
repeatedly transmitting to a base station a first message including a random access preamble; receiving from the base station repetition transmissions of a second message including a RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; repeatedly transmitting to the base station a third message; receiving from the base station repetition transmission of a fourth message including a contention resolution. 24. The method according to claim 23, wherein the fourth message is configured to have a characteristic dependent upon a second repetition level. 25. The method according to claim 23, wherein the user equipment is a coverage enhanced machine type communication user equipment. 26. A user equipment, comprising:
a transmitting unit configured to repeatedly transmit to a base station a first message including a random access preamble; a receiving unit configured to receive from the base station repetition transmissions of a second message including a RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; the transmitting unit further configured to repeatedly transmit to the base station a third message; the receiving unit further configured to receive from the base station repetition transmission of a fourth message including a contention resolution. 27. The user equipment according to claim 26, wherein the fourth message is configured to have a characteristic dependent upon a second repetition level. 28. The user equipment according to claim 26, wherein the user equipment is a coverage enhanced machine type communication user equipment. | One embodiment of the present disclosure relates to a method for random access in a base station supporting communication with at least one CE-MTC UE. The method comprises: receiving from a user equipment, repetition transmissions of a first message including a random access preamble; repeatedly transmitting to the user equipment a second message including a random access response, RAR, wherein the second message has a characteristic dependent upon a first repetition level. Another embodiment of the present invention also relates to corresponding method for random access in a user equipment. According to an aspect of the present disclosure, there are provided corresponding devices.1. A method for random access in a base station, comprising:
receiving from a user equipment repetition transmissions of a first message including a random access preamble; repeatedly transmitting to the user equipment a second message including a random access response, RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; receiving from the user equipment repetition transmissions of a third message; and repeatedly transmitting to the user equipment a fourth message including a contention resolution. 2. The method according to any of claim 1, wherein the fourth message is configured to have a characteristic dependent upon a second repetition level. 3. The method according to claim 1, wherein a random access radio network temperate identity, RA-RNTI, in the RAR is computed at least based on the first repetition level. 4. The method according to claim 3, wherein the RA-RNTI is computed based on an index of a subframe where the preamble repetition starts, an index of frequency on which the repetition transmissions are performed, and a repetition level index of the first repetition level. 5. The method according to claim 1, wherein the second message is scrambled by a scrambling code dependent upon the first repetition level. 6. The method according to claim 1, wherein the second message has a specific field to indicate the first repetition level. 7. The method according to claim 2, wherein the fourth message is scrambled by a scrambling code dependent upon the second repetition level. 8. The method according to claim 2, wherein the fourth message has a specific field to indicate the second repetition level. 9. The method according to claim 1, wherein the first repetition level is indicative of at least one of:
a repetition level which is used by the base station in repeatedly transmitting the second message; a repetition level which is to be used by the user equipment in repeatedly transmitting the third message; or a repetition level which is to be used by the base station in repeatedly transmitting the fourth message. 10. The method according to claim 1, wherein the second repetition level is indicative of the uplink repetition level and the downlink repetition level which are to be used in performing repetition transmissions between the base station and the user equipment after the random access procedure. 11. The method according to claim 1, wherein the user equipment is a coverage enhanced machine type communication user equipment. 12. A base station, comprising:
a receiving unit configured to receive from a user equipment, repetition transmissions of a first message including a random access preamble; a transmitting unit configured to repeatedly transmit to the user equipment a second message including a random access response, RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; the receiving unit further configured to receive from the user equipment repetition transmissions of a third message; the transmitting unit further configured to repeatedly transmit to the user equipment a fourth message including a contention resolution. 13. The base station according to any of claim 12, wherein
the fourth message is configured to have a characteristic dependent upon a second repetition level. 14. The base station according to claim 12, wherein a random access radio network temperate identity, RA-RNTI, in the RAR is computed at least based on the first repetition level. 15. The base station according to claim 14, wherein the RA-RNTI is computed based on an index of a subframe where the preamble repetition starts, an index of frequency on which the repetition transmissions are performed, and a repetition level index of the first repetition level. 16. The base station according to claim 12, wherein the second message is scrambled by a scrambling code dependent upon the first repetition level. 17. The base station according to claim 12, wherein the second message has a specific field to indicate the first repetition level. 18. The base station according to claim 13, wherein the fourth message is scrambled by a scrambling code dependent upon the second repetition level. 19. The base station according to claim 13, wherein the fourth message has a specific field to indicate the second repetition level. 20. The base station according to claim 12, wherein the first repetition level is indicative of at least one of:
a repetition level which is used by the base station in repeatedly transmitting the second message; a repetition level which is to be used by the user equipment in repeatedly transmitting the third message; or a repetition level which is to be used by the base station in repeatedly transmitting the fourth message. 21. The base station according to claim 13, wherein the second repetition level is indicative of the uplink repetition level and the downlink repetition level which are to be used in performing repetition transmissions between the base station and the user equipment after the random access procedure. 22. The base station according to claim 21, wherein the user equipment is a coverage enhanced machine type communication user equipment. 23. A method for random access in a user equipment, comprising:
repeatedly transmitting to a base station a first message including a random access preamble; receiving from the base station repetition transmissions of a second message including a RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; repeatedly transmitting to the base station a third message; receiving from the base station repetition transmission of a fourth message including a contention resolution. 24. The method according to claim 23, wherein the fourth message is configured to have a characteristic dependent upon a second repetition level. 25. The method according to claim 23, wherein the user equipment is a coverage enhanced machine type communication user equipment. 26. A user equipment, comprising:
a transmitting unit configured to repeatedly transmit to a base station a first message including a random access preamble; a receiving unit configured to receive from the base station repetition transmissions of a second message including a RAR, wherein the second message is configured to have a characteristic dependent upon a first repetition level; the transmitting unit further configured to repeatedly transmit to the base station a third message; the receiving unit further configured to receive from the base station repetition transmission of a fourth message including a contention resolution. 27. The user equipment according to claim 26, wherein the fourth message is configured to have a characteristic dependent upon a second repetition level. 28. The user equipment according to claim 26, wherein the user equipment is a coverage enhanced machine type communication user equipment. | 2,400 |
8,354 | 8,354 | 14,635,563 | 2,422 | The present disclosure generally relates to a projection system with increased spatial resolution. The projection system includes one or more light sources, a spatial light modulator configured to reflect light received from the one or more light sources to generate a plurality of sub-images of a composite image, and an optical system configured to reflect each of the plurality of sub-images the sub-images at a different portion of a projection surface. By projecting the single composite image using a plurality of sub-images projected at different times and/or locations from one another, the composite full image has a higher resolution as compared to the resolution defined by the hardware of the spatial light modulator and light sources. | 1. A projection system for projecting one or more images onto a projection surface comprising
a light source that when activated generates a beam of light; an image forming device in optical communication with the light source, wherein the image forming device sequentially converts the beam of light into a first sub-image forming a first part of a projection image and a second sub-image forming a second part of the projection image; and an optical system in optical communication with the image forming device, wherein the optical system directs the first sub-image toward a first sub-image region of a projection surface and directs the second sub-image toward the second sub-image region, adjacent to the first sub-image region of the projection surface. 2. The projection system of claim 1, wherein the first sub-image and the second sub-image are directed to the projection surface at different times. 3. The projection system of claim 2, wherein the first sub-image and the second sub-image are projected fast enough to avoid flickering effects. 4. The projection system of claim 2, wherein the first sub-image and the second sub-image are directed by the optical system to the projection surface sequentially. 5. The projection system of claim 1, wherein
the projection system has a hardware spatial resolution based on hardware constraints of the light source, the image forming device, and the optical system; a first sub-image spatial resolution of the first sub-image is substantially the same as the hardware spatial resolution; a second sub-image spatial resolution of the second sub-image is substantially the same as the hardware spatial resolution; and a projection image resolution of the projection image is greater than the hardware spatial resolution. 6. The projection system of claim 1, wherein the optical system comprises a fixed mirror array. 7. The projection system of claim 1, wherein the image forming device is a digital micro-mirror device. 8. The projection system of claim 1, wherein the optical system comprises a mirror galvanometer. 9. The projection system of claim 8, wherein the optical system further comprises a lens. 10. The projection system of claim 1, wherein the first sub-image and the second sub-image at least partially overlap. 11. The projector system of claim 10, wherein the first sub-image and the second sub-image overlap by up to one percent of a spatial resolution of the image forming device. 12. A projection system comprising
one or more light sources; a spatial light modulator for modulating light received from the plurality of light sources to generate a plurality of sub-images of a composite image; and a plurality fixed mirrors for reflecting each of the plurality of sub-images at a portion of a projection surface. 13. The projection system of claim 12, further comprising a mirror galvanometer for directing light modulated by the spatial light modulator toward one of the plurality of fixed mirrors. 14. The projection system of claim 13, further comprising a lens positioned between the spatial light modulator and the mirror galvanometer. 15. The projection system of claim 12, further comprising a prism positioned in an optical path between the plurality of light sources and the spatial light modulator, and configured to combine light generated by the one or more light sources into a single beam. 16. The projection system of claim 15, wherein the prism comprises at least one of a dichroic prism, a cross-dichroic prism, and a Philips prism. 17. The projection system of claim 12, wherein the one or more light sources comprises at least one laser diode. 18. The projection system of claim 17, further comprising a laser driver circuit for selectively activating a deactivating the one or more light sources. 19. A projection system comprising
an image forming device for generating sub-images of a composite image; a plurality of laser arrays, each laser array having a set of lasers stored therein and directed toward the image forming device; and a plurality of fixed mirrors, wherein each of the fixed mirrors in the plurality of fixed mirrors is configured to direct light from one laser array in the plurality of laser arrays toward a sub-image region in a projection surface. 20. The projection system of claim 19, wherein each set of lasers comprises at least three lasers. 21. The projection system of claim 20, wherein each of the at least three lasers has an output frequency different from other lasers in the laser array. 22. The projection system of claim 19, further comprising a laser driver for individually activating each laser in the plurality of laser arrays. 23. A projection system comprising
a plurality of light sources that when activated generate a first beam of light and a second beam of light; an image forming device in optical communication with the light source, wherein the image forming device sequentially modulates the first beam of light to form a first sub-image forming a first part of a projection image and modulates the second beam of light to form a second sub-image forming a second part of the projection image; and a focusing array in optical communication with the image forming device, wherein the focusing array focuses the first sub-image and the second sub-image. 24. The projection system of claim 23, further comprising a converging lens in optical communication with the image forming device and the focusing array. 25. The projection system of claim 23, wherein each light source of the plurality of light sources comprises one or more light emitting devices. 26. The projection system of claim 23, wherein the focusing array directs the first beam of light and the second beam of light such that the first sub-image and the second sub-image are adjacent to one another. 27. A method for projecting an image comprising
configuring a spatial light modulator to selectively modulate a first portion of a complete image; activating a light source to emit a first light beam; selectively modulating the first light beam off of the spatial light modulator; projecting the first portion of the complete image on a projection surface; configuring the spatial light modulator to selectively modulate a second portion of the complete image; activating a the light source to emit a second light beam; selectively modulating the second light beam off of the spatial light modulator; and projecting the second portion of the complete image on the projection surface. 28. The method of claim 27, wherein the first and second portions of the complete image are projected adjacent to and partially overlapping. 29. The method of claim 28, further comprising, blending the first and second portions of the complete image at a point where the first and second portions overlap. 30. The method of claim 27, wherein projecting the first portion comprises reflecting the first light beam off of a first fixed mirror toward the projection surface, and projecting the second portion comprises reflecting the second light beam off of a second fixed mirror toward the projection surface. 31. The method of claim 27, further comprising reflecting the first and second portions of the complete image off of a mirror galvanometer. 32. The method of claim 27, wherein a spatial resolution of the first portion of the complete image is equal to a spatial resolution of the spatial light modulator. 33. The method of claim 32, wherein the spatial resolution of the spatial light modulator is a maximum spatial resolution of the spatial light modulator. | The present disclosure generally relates to a projection system with increased spatial resolution. The projection system includes one or more light sources, a spatial light modulator configured to reflect light received from the one or more light sources to generate a plurality of sub-images of a composite image, and an optical system configured to reflect each of the plurality of sub-images the sub-images at a different portion of a projection surface. By projecting the single composite image using a plurality of sub-images projected at different times and/or locations from one another, the composite full image has a higher resolution as compared to the resolution defined by the hardware of the spatial light modulator and light sources.1. A projection system for projecting one or more images onto a projection surface comprising
a light source that when activated generates a beam of light; an image forming device in optical communication with the light source, wherein the image forming device sequentially converts the beam of light into a first sub-image forming a first part of a projection image and a second sub-image forming a second part of the projection image; and an optical system in optical communication with the image forming device, wherein the optical system directs the first sub-image toward a first sub-image region of a projection surface and directs the second sub-image toward the second sub-image region, adjacent to the first sub-image region of the projection surface. 2. The projection system of claim 1, wherein the first sub-image and the second sub-image are directed to the projection surface at different times. 3. The projection system of claim 2, wherein the first sub-image and the second sub-image are projected fast enough to avoid flickering effects. 4. The projection system of claim 2, wherein the first sub-image and the second sub-image are directed by the optical system to the projection surface sequentially. 5. The projection system of claim 1, wherein
the projection system has a hardware spatial resolution based on hardware constraints of the light source, the image forming device, and the optical system; a first sub-image spatial resolution of the first sub-image is substantially the same as the hardware spatial resolution; a second sub-image spatial resolution of the second sub-image is substantially the same as the hardware spatial resolution; and a projection image resolution of the projection image is greater than the hardware spatial resolution. 6. The projection system of claim 1, wherein the optical system comprises a fixed mirror array. 7. The projection system of claim 1, wherein the image forming device is a digital micro-mirror device. 8. The projection system of claim 1, wherein the optical system comprises a mirror galvanometer. 9. The projection system of claim 8, wherein the optical system further comprises a lens. 10. The projection system of claim 1, wherein the first sub-image and the second sub-image at least partially overlap. 11. The projector system of claim 10, wherein the first sub-image and the second sub-image overlap by up to one percent of a spatial resolution of the image forming device. 12. A projection system comprising
one or more light sources; a spatial light modulator for modulating light received from the plurality of light sources to generate a plurality of sub-images of a composite image; and a plurality fixed mirrors for reflecting each of the plurality of sub-images at a portion of a projection surface. 13. The projection system of claim 12, further comprising a mirror galvanometer for directing light modulated by the spatial light modulator toward one of the plurality of fixed mirrors. 14. The projection system of claim 13, further comprising a lens positioned between the spatial light modulator and the mirror galvanometer. 15. The projection system of claim 12, further comprising a prism positioned in an optical path between the plurality of light sources and the spatial light modulator, and configured to combine light generated by the one or more light sources into a single beam. 16. The projection system of claim 15, wherein the prism comprises at least one of a dichroic prism, a cross-dichroic prism, and a Philips prism. 17. The projection system of claim 12, wherein the one or more light sources comprises at least one laser diode. 18. The projection system of claim 17, further comprising a laser driver circuit for selectively activating a deactivating the one or more light sources. 19. A projection system comprising
an image forming device for generating sub-images of a composite image; a plurality of laser arrays, each laser array having a set of lasers stored therein and directed toward the image forming device; and a plurality of fixed mirrors, wherein each of the fixed mirrors in the plurality of fixed mirrors is configured to direct light from one laser array in the plurality of laser arrays toward a sub-image region in a projection surface. 20. The projection system of claim 19, wherein each set of lasers comprises at least three lasers. 21. The projection system of claim 20, wherein each of the at least three lasers has an output frequency different from other lasers in the laser array. 22. The projection system of claim 19, further comprising a laser driver for individually activating each laser in the plurality of laser arrays. 23. A projection system comprising
a plurality of light sources that when activated generate a first beam of light and a second beam of light; an image forming device in optical communication with the light source, wherein the image forming device sequentially modulates the first beam of light to form a first sub-image forming a first part of a projection image and modulates the second beam of light to form a second sub-image forming a second part of the projection image; and a focusing array in optical communication with the image forming device, wherein the focusing array focuses the first sub-image and the second sub-image. 24. The projection system of claim 23, further comprising a converging lens in optical communication with the image forming device and the focusing array. 25. The projection system of claim 23, wherein each light source of the plurality of light sources comprises one or more light emitting devices. 26. The projection system of claim 23, wherein the focusing array directs the first beam of light and the second beam of light such that the first sub-image and the second sub-image are adjacent to one another. 27. A method for projecting an image comprising
configuring a spatial light modulator to selectively modulate a first portion of a complete image; activating a light source to emit a first light beam; selectively modulating the first light beam off of the spatial light modulator; projecting the first portion of the complete image on a projection surface; configuring the spatial light modulator to selectively modulate a second portion of the complete image; activating a the light source to emit a second light beam; selectively modulating the second light beam off of the spatial light modulator; and projecting the second portion of the complete image on the projection surface. 28. The method of claim 27, wherein the first and second portions of the complete image are projected adjacent to and partially overlapping. 29. The method of claim 28, further comprising, blending the first and second portions of the complete image at a point where the first and second portions overlap. 30. The method of claim 27, wherein projecting the first portion comprises reflecting the first light beam off of a first fixed mirror toward the projection surface, and projecting the second portion comprises reflecting the second light beam off of a second fixed mirror toward the projection surface. 31. The method of claim 27, further comprising reflecting the first and second portions of the complete image off of a mirror galvanometer. 32. The method of claim 27, wherein a spatial resolution of the first portion of the complete image is equal to a spatial resolution of the spatial light modulator. 33. The method of claim 32, wherein the spatial resolution of the spatial light modulator is a maximum spatial resolution of the spatial light modulator. | 2,400 |
8,355 | 8,355 | 15,135,239 | 2,439 | Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner. | 1. A method, comprising:
receiving, at an edge router, network traffic addressed a first anycast address assigned to a plurality of anycasted servers, the plurality of anycasted servers comprising one or more anycasted servers; forwarding, from the edge router, the traffic to a second anycast address assigned to each of one or more data scrubbing appliances in at least one data scrubbing appliance network; receiving, with at least one data scrubbing appliance, the network traffic from the edge router; filtering, with the at least one data scrubbing appliance, undesirable traffic from the network traffic; transmitting the filtered network traffic from the at least one data scrubbing appliance to the plurality of anycasted servers; and load balancing the filtered network traffic to the plurality of anycasted servers. 2. A method of data scrubbing network traffic, the method comprising:
assigning a first anycast Internet Protocol (“IP”) address to each of a plurality of servers; assigning a second anycast IP address to each of one or more data scrubbing appliances in at least one data scrubbing appliance network’ establishing, in a routing table at one or more network elements, a first route directing traffic that is addressed to the first anycast IP address to the at least one data scrubbing appliance network; receiving, at one or more data scrubbing appliances of the at least one data scrubbing appliance network, network traffic addressed to the first anycast IP address; filtering, with the one or more data scrubbing appliances, the network traffic to block undesirable network traffic; transmitting the filtered network traffic to one or more servers of the plurality of servers; and load balancing the filtered network traffic to the one or more servers. 3. The method of claim 2, further comprising overriding the first route of the routing table with a second route that routes traffic directly to the servers at the first anycast IP address. 4. The method of claim 3, wherein overriding the first route comprises assigning a lower preference value to the first route than the second route at the routing table. 5. The method of claim 4, wherein overriding the first route comprises configuring the second route as a more specific route than the first route. 6. The method of claim 2, further comprising establishing static routes between each of a plurality of routers in communication with the one or more data scrubber appliances and the plurality of servers, wherein transmitting the filtered network traffic comprises transmitting the filtered traffic on the static routes. 7. The method of claim 2, wherein transmitting the filtered network traffic comprises transmitting the filtered network traffic through one or more network tunnels. 8. The method of claim 7, further comprising:
configuring a first network tunnel between a first router in communication with at least one of the one or more data scrubbing appliances and a second router in communication with at least one of the plurality of servers; wherein transmitting the filtered network traffic comprises injecting at least a portion of the filtered network traffic from the one or more data scrubber appliances to the first router. 9. The method of claim 8, further comprising:
configuring a plurality of network tunnels, the plurality of network tunnels comprising the first network tunnel, each of the plurality of network tunnels traversing between one of a first plurality of routers collectively in communication with the one or more data scrubbing appliances and one of a second plurality of routers collectively in communication with the plurality of servers, the first plurality of routers comprising the first router and the second plurality of routers comprising the second router; wherein transmitting the filtered network traffic comprises injecting the filtered network traffic from the one or more data scrubber appliances to at least some of the first plurality of routers. 10. The method of claim 9, further comprising:
routing the traffic from the second plurality of routers to the first anycast IP address assigned to each of the plurality of servers, such that traffic from each of the second plurality of routers will be routed to a server of the plurality of servers logically closest to that router. 11. The method of claim 9, further comprising:
establishing a static route between each of the second plurality of routers and one or more of the plurality of servers to which the first anycast IP address is assigned. 12. The method of claim 11, wherein each static route routes traffic to a unicast IP address assigned to one of the servers. 13. The method of claim 9, wherein the plurality of network tunnels comprises one or more multiprotocol label switching (“MPLS”) network tunnels. 14. The method of claim 9, wherein the plurality of network tunnels comprises one or more generic routing encapsulation (“GRE”) network tunnels. 15. The method of claim 2, wherein the plurality of servers comprises a plurality of web servers. 16. The method of claim 2, wherein the plurality of servers comprises a plurality of domain name service (“DNS”) servers. 17. The method of claim 2, further comprising:
assigning a third anycast IP address to a subset of the plurality of servers, wherein load balancing load balancing the filtered network traffic to the one or more servers comprises routing at least some of the filtered network to the third anycast IP address. 18. A system for data scrubbing network traffic, the system comprising:
a plurality of servers, each comprising one or more processors, each of the plurality of servers having assigned thereto a first anycast Internet Protocol (“IP”) address; a plurality of data scrubbing appliances in at least one data scrubbing appliance network, each comprising one or more processors and each having assigned thereto a second anycast IP address; one or more network elements having stored thereon a routing table, the routing table comprising a first route directing network traffic that is addressed to the first anycast IP address to the second anycast IP address of the one or more of the plurality of data scrubbing appliances in the at least one data scrubbing appliance network; wherein the plurality of data scrubbing appliances are configured to:
receive network traffic addressed to the first anycast IP address and directed to the second anycast IP address;
filter the network traffic to block undesirable network traffic;
transmit the filtered network traffic, via one or more network tunnels, to one or more of the plurality of servers; and
load balancing the filtered network traffic to the plurality of servers. 19. The system of claim 18, further comprising:
a first router in communication with one or more data scrubbing appliances of the plurality of data scrubbing appliances; and a second router in communication with one or more servers of the plurality of servers and further in communication, via a network tunnel, with the first router; wherein the one or more data scrubbing appliances are configured to transmit at least a portion of the filtered network traffic by injecting the at least a portion of the filtered network traffic to the first router. 20. The system of claim 19, further comprising:
a first plurality of routers, comprising the first router, collectively in communication with the plurality of data scrubbing appliances; a second plurality of routers, comprising the second router, each of the second plurality of routers in communication with one of the first plurality of routers via a network tunnel, the second plurality of routers collectively being in communication with the plurality of servers; wherein transmitting the filtered network traffic comprises injecting the filtered network traffic from the plurality of data scrubber appliances to at least some of the first plurality of routers. | Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.1. A method, comprising:
receiving, at an edge router, network traffic addressed a first anycast address assigned to a plurality of anycasted servers, the plurality of anycasted servers comprising one or more anycasted servers; forwarding, from the edge router, the traffic to a second anycast address assigned to each of one or more data scrubbing appliances in at least one data scrubbing appliance network; receiving, with at least one data scrubbing appliance, the network traffic from the edge router; filtering, with the at least one data scrubbing appliance, undesirable traffic from the network traffic; transmitting the filtered network traffic from the at least one data scrubbing appliance to the plurality of anycasted servers; and load balancing the filtered network traffic to the plurality of anycasted servers. 2. A method of data scrubbing network traffic, the method comprising:
assigning a first anycast Internet Protocol (“IP”) address to each of a plurality of servers; assigning a second anycast IP address to each of one or more data scrubbing appliances in at least one data scrubbing appliance network’ establishing, in a routing table at one or more network elements, a first route directing traffic that is addressed to the first anycast IP address to the at least one data scrubbing appliance network; receiving, at one or more data scrubbing appliances of the at least one data scrubbing appliance network, network traffic addressed to the first anycast IP address; filtering, with the one or more data scrubbing appliances, the network traffic to block undesirable network traffic; transmitting the filtered network traffic to one or more servers of the plurality of servers; and load balancing the filtered network traffic to the one or more servers. 3. The method of claim 2, further comprising overriding the first route of the routing table with a second route that routes traffic directly to the servers at the first anycast IP address. 4. The method of claim 3, wherein overriding the first route comprises assigning a lower preference value to the first route than the second route at the routing table. 5. The method of claim 4, wherein overriding the first route comprises configuring the second route as a more specific route than the first route. 6. The method of claim 2, further comprising establishing static routes between each of a plurality of routers in communication with the one or more data scrubber appliances and the plurality of servers, wherein transmitting the filtered network traffic comprises transmitting the filtered traffic on the static routes. 7. The method of claim 2, wherein transmitting the filtered network traffic comprises transmitting the filtered network traffic through one or more network tunnels. 8. The method of claim 7, further comprising:
configuring a first network tunnel between a first router in communication with at least one of the one or more data scrubbing appliances and a second router in communication with at least one of the plurality of servers; wherein transmitting the filtered network traffic comprises injecting at least a portion of the filtered network traffic from the one or more data scrubber appliances to the first router. 9. The method of claim 8, further comprising:
configuring a plurality of network tunnels, the plurality of network tunnels comprising the first network tunnel, each of the plurality of network tunnels traversing between one of a first plurality of routers collectively in communication with the one or more data scrubbing appliances and one of a second plurality of routers collectively in communication with the plurality of servers, the first plurality of routers comprising the first router and the second plurality of routers comprising the second router; wherein transmitting the filtered network traffic comprises injecting the filtered network traffic from the one or more data scrubber appliances to at least some of the first plurality of routers. 10. The method of claim 9, further comprising:
routing the traffic from the second plurality of routers to the first anycast IP address assigned to each of the plurality of servers, such that traffic from each of the second plurality of routers will be routed to a server of the plurality of servers logically closest to that router. 11. The method of claim 9, further comprising:
establishing a static route between each of the second plurality of routers and one or more of the plurality of servers to which the first anycast IP address is assigned. 12. The method of claim 11, wherein each static route routes traffic to a unicast IP address assigned to one of the servers. 13. The method of claim 9, wherein the plurality of network tunnels comprises one or more multiprotocol label switching (“MPLS”) network tunnels. 14. The method of claim 9, wherein the plurality of network tunnels comprises one or more generic routing encapsulation (“GRE”) network tunnels. 15. The method of claim 2, wherein the plurality of servers comprises a plurality of web servers. 16. The method of claim 2, wherein the plurality of servers comprises a plurality of domain name service (“DNS”) servers. 17. The method of claim 2, further comprising:
assigning a third anycast IP address to a subset of the plurality of servers, wherein load balancing load balancing the filtered network traffic to the one or more servers comprises routing at least some of the filtered network to the third anycast IP address. 18. A system for data scrubbing network traffic, the system comprising:
a plurality of servers, each comprising one or more processors, each of the plurality of servers having assigned thereto a first anycast Internet Protocol (“IP”) address; a plurality of data scrubbing appliances in at least one data scrubbing appliance network, each comprising one or more processors and each having assigned thereto a second anycast IP address; one or more network elements having stored thereon a routing table, the routing table comprising a first route directing network traffic that is addressed to the first anycast IP address to the second anycast IP address of the one or more of the plurality of data scrubbing appliances in the at least one data scrubbing appliance network; wherein the plurality of data scrubbing appliances are configured to:
receive network traffic addressed to the first anycast IP address and directed to the second anycast IP address;
filter the network traffic to block undesirable network traffic;
transmit the filtered network traffic, via one or more network tunnels, to one or more of the plurality of servers; and
load balancing the filtered network traffic to the plurality of servers. 19. The system of claim 18, further comprising:
a first router in communication with one or more data scrubbing appliances of the plurality of data scrubbing appliances; and a second router in communication with one or more servers of the plurality of servers and further in communication, via a network tunnel, with the first router; wherein the one or more data scrubbing appliances are configured to transmit at least a portion of the filtered network traffic by injecting the at least a portion of the filtered network traffic to the first router. 20. The system of claim 19, further comprising:
a first plurality of routers, comprising the first router, collectively in communication with the plurality of data scrubbing appliances; a second plurality of routers, comprising the second router, each of the second plurality of routers in communication with one of the first plurality of routers via a network tunnel, the second plurality of routers collectively being in communication with the plurality of servers; wherein transmitting the filtered network traffic comprises injecting the filtered network traffic from the plurality of data scrubber appliances to at least some of the first plurality of routers. | 2,400 |
8,356 | 8,356 | 14,630,001 | 2,498 | A system and method whereby permission is accessed that is to be revoked for an application. The permission involves access to private data of a user via an API of an OS. It is determined, in the application, program point(s) involving access to the private data of the user via the API. For each selected one of the program point(s), code in the application is rewritten to replace a source statement, at the selected program point, that accesses the private data with another statement that allocates a mock object or value based on a type of an actual value returned by the source statement. The mock object or value does not expose the private data of the user. The application with the rewritten code is packaged as an output application able to be subsequently executed by the user, and is output for use by the user. | 1. A method, comprising:
accessing a permission that is to be revoked for an application, wherein the permission involves access to private data of a user via an application programming interface of an operating system; determining, in the application, one or more program points involving access to the private data of the user via the application programming interface; for each selected one of the one or more program points, rewriting code in the application to replace a source statement, at the selected program point, that accesses the private data with another statement that allocates a mock object or value based on a type of an actual value returned by the source statement, wherein the mock object or value does not expose the private data of the user; packaging the application with the rewritten code as an output application able to be subsequently executed by the user; and outputting the application with the rewritten code for use by the user. 2. The method of claim 1, wherein the permission is to a protected part of the application programming interface and the source statements that are rewritten access methods of the application programming interface, wherein the methods require the permission to access the private data of the user. 3. The method of claim 1, wherein determining one or more program points involving access to the private data of the user via the application programming interface further comprises performing constraint inference of the code in the application to determine a plurality of constraints on paths through the code, wherein the constraints prevent the application from transitioning into program locations that are considered to be bad locations. 4. The method of claim 3, wherein performing constraint inference of the code in the application further comprises determining mock objects or values meeting the plurality of constraints and causing flow through the paths that maximizes functionality of the application in absence of an actual value for the private data of the user. 5. The method of claim 4, wherein determining mock objects or values further comprises determining that two paths are both good, wherein a good path does not contain a bad location, and determining that a first path of the two paths makes more use of a first value causing the selected path to be traversed, than does a second path of the two paths make of a different second value causing the second path to be traversed, and setting a mock object or value to the first value. 6. The method of claim 4, further comprising performing constraint solving to satisfy as many as possible of good constraints, which capture conditions that force execution along a good path, while simultaneously refraining from violating any bad constraints, which ensure that execution along bad paths are avoided, wherein each bad path contains at least one bad location and each good path does not contain a bad location. 7. The method of claim 6, wherein a bad location comprises a program point where (i) an exception is thrown or (ii) an error-handling method is invoked. 8. The method of claim 6, wherein constraint solving comprises assigning a good constraint a first weight and assigning a bad constraint a different, second weight, and partitioning the constraints into clusters according to a conflict relation. 9.-18. (canceled) | A system and method whereby permission is accessed that is to be revoked for an application. The permission involves access to private data of a user via an API of an OS. It is determined, in the application, program point(s) involving access to the private data of the user via the API. For each selected one of the program point(s), code in the application is rewritten to replace a source statement, at the selected program point, that accesses the private data with another statement that allocates a mock object or value based on a type of an actual value returned by the source statement. The mock object or value does not expose the private data of the user. The application with the rewritten code is packaged as an output application able to be subsequently executed by the user, and is output for use by the user.1. A method, comprising:
accessing a permission that is to be revoked for an application, wherein the permission involves access to private data of a user via an application programming interface of an operating system; determining, in the application, one or more program points involving access to the private data of the user via the application programming interface; for each selected one of the one or more program points, rewriting code in the application to replace a source statement, at the selected program point, that accesses the private data with another statement that allocates a mock object or value based on a type of an actual value returned by the source statement, wherein the mock object or value does not expose the private data of the user; packaging the application with the rewritten code as an output application able to be subsequently executed by the user; and outputting the application with the rewritten code for use by the user. 2. The method of claim 1, wherein the permission is to a protected part of the application programming interface and the source statements that are rewritten access methods of the application programming interface, wherein the methods require the permission to access the private data of the user. 3. The method of claim 1, wherein determining one or more program points involving access to the private data of the user via the application programming interface further comprises performing constraint inference of the code in the application to determine a plurality of constraints on paths through the code, wherein the constraints prevent the application from transitioning into program locations that are considered to be bad locations. 4. The method of claim 3, wherein performing constraint inference of the code in the application further comprises determining mock objects or values meeting the plurality of constraints and causing flow through the paths that maximizes functionality of the application in absence of an actual value for the private data of the user. 5. The method of claim 4, wherein determining mock objects or values further comprises determining that two paths are both good, wherein a good path does not contain a bad location, and determining that a first path of the two paths makes more use of a first value causing the selected path to be traversed, than does a second path of the two paths make of a different second value causing the second path to be traversed, and setting a mock object or value to the first value. 6. The method of claim 4, further comprising performing constraint solving to satisfy as many as possible of good constraints, which capture conditions that force execution along a good path, while simultaneously refraining from violating any bad constraints, which ensure that execution along bad paths are avoided, wherein each bad path contains at least one bad location and each good path does not contain a bad location. 7. The method of claim 6, wherein a bad location comprises a program point where (i) an exception is thrown or (ii) an error-handling method is invoked. 8. The method of claim 6, wherein constraint solving comprises assigning a good constraint a first weight and assigning a bad constraint a different, second weight, and partitioning the constraints into clusters according to a conflict relation. 9.-18. (canceled) | 2,400 |
8,357 | 8,357 | 15,606,955 | 2,426 | Total advertising inventory of a broadcast station can be dynamically allocated between local, or station-sold, inventory and general, or network, inventory. The portion of total inventory allocated to local inventory or network inventory can be adjusted based on feedback from an advertising service, and a broadcast log can be generated based on the adjusted allocation. The broadcast log can be delivered to a media automation system associated with a media station which plays out local inventory in accordance with the broadcast log. When the broadcast log indicates that general/network inventory is to be broadcast, the media automation system stops playing-out local inventory, and allows the advertisement system to broadcast network inventory for a period of time indicated by the broadcast log. Broadcast of local inventory can be resumed early, before the time period indicated in the broadcast log has expired. | 1. A system comprising:
a media automation system including a processing device programmed to play-out media items for broadcast in accordance with a broadcast log; a traffic system coupled to the media automation system, the traffic system including at least one processor programmed to:
generate a first broadcast log to schedule local inventory for broadcast according to a first allocation of total inventory, the first allocation designating:
a first portion of the total inventory for broadcast of the local inventory;
a second portion of the total inventory for use by an external advertisement system;
a third portion of the total inventory as a buffer;
receive inventory allocation information from the external advertisement system;
generate an adjusted allocation based on the inventory allocation information;
generate an adjusted broadcast log based on the adjusted allocation; and
transmit the adjusted broadcast log to the media automation system. 2. The system of claim 1, wherein:
the broadcast log includes:
local entries specifying local inventory to be played out in particular spot-blocks corresponding to the first portion;
placeholder entries corresponding to external inventory to be played out by the external advertisement system;
the media automation system is coupled to the external advertisement system; and the processing device is further programmed to transmit a trigger message to the external advertisement system in conjunction with the placeholder entries, the trigger message indicating that the external advertisement system is to begin playing out external inventory, while the media automation system temporarily stops play-out local inventory. 3. The system of claim 2, wherein stopping playout of local inventory includes playing out silence. 4. The system of claim 2, wherein:
the placeholder entries indicates an allotted time assigned to the external advertisement system for play-out of the external inventory; the processing device included in the media automation system is further programmed to:
receive an indication that the external advertisement system will not use all of the allotted time; and
in response to the indication, resume play-out of local inventory before the allotted time has expired. 5. The system of claim 4, wherein the indication includes receiving an early-return message from the external advertisement system. 6. The system of claim 4, wherein the indication includes failing to receive an expected message from the external advertisement system. 7. The system of claim 1, wherein
the traffic system schedules local inventory for a plurality of media stations; and the traffic system generates a plurality of adjusted allocations on a station-by-station basis. 8. A method comprising:
generating a first broadcast log scheduling local inventory for broadcast according to a first allocation of total inventory, the first allocation designating:
a first portion of the total inventory for broadcast of the local inventory;
a second portion of the total inventory for use by an external advertisement system;
a third portion of the total inventory as a buffer;
receiving inventory allocation information from the external advertisement system; generating an adjusted allocation based on the inventory allocation information; generating an adjusted broadcast log based on the adjusted allocation; transmitting the adjusted broadcast log to a media automation system; and playing-out local inventory for broadcast in accordance with the adjusted broadcast log. 9. The method of claim 8, wherein:
the broadcast log includes:
local entries relating to the first portion, the local entries specifying first times local inventory is to be played out;
placeholder entries relating to the second portion, the placeholder entries specifying second times external inventory is to be played out;
the method further including: temporarily suspending play-out of local inventory during second times; and transmitting trigger messages to the external advertisement system based on the placeholder entries, the trigger messages notifying the external advertisement system to begin playing out the external inventory. 10. The method of claim 9, wherein:
the placeholder entries correspond to dead rolls; and temporarily suspending play-out of local inventory includes playing-out at least one of the dead rolls. 11. The method of claim 9, wherein:
individual placeholder entries indicate an allotted time assigned to the external advertisement system for play-out of the external inventory; the method further including:
receiving, at a media automation system, an indication that the external advertisement system will not use all of the allotted time; and
in response to the indication, resuming play-out of local inventory prior-to expiration of the allotted time. 12. The method of claim 11, wherein the indication includes receiving an early-return message from the external advertisement system. 13. The method of claim 11, wherein the indication includes failing to receive an expected message from the external advertisement system. 14. The method of claim 8, further comprising:
determining the first allocation of total inventory using a backend traffic system instance supporting a plurality of media stations; and determining the adjusted allocation at traffic system instance supporting less than all of the plurality of media stations. 15. A system comprising:
a traffic and billing system including a backend subsystem and a local subsystem; the backend subsystem configured to:
determine a first allocation of total inventory, the first allocation designating:
a first portion of the total inventory to be used for broadcast of local inventory by local media automation systems;
a second portion of the total inventory to be used for broadcast of network inventory by an advertisement system;
transmit the first allocation to the local portion of the local subsystem;
the local subsystem coupled to backend subsystem and the advertisement system via a communications network, the local subsystem configured to:
receive network inventory allocation information, associated with the network inventory, from the advertisement system;
generate an adjusted allocation based on the network inventory allocation information;
generate a broadcast log based on the adjusted allocation; and
transmit the adjusted broadcast log to a station automation server for broadcast. 16. The system of claim 15, further comprising:
wherein the broadcast log includes:
local entries specifying local inventory to be played out in particular spot-blocks;
network entries corresponding to network inventory to be played out by the advertisement system;
a station automation server coupled to an advertisement system appliance, and configured to broadcast inventory in accordance with the broadcast log; and the station automation server configured to: transmit a trigger message to the advertisement system appliance in conjunction with the network entries, the trigger message indicating that the advertisement system appliance is play-out network inventory; and temporarily stop playing-out local inventory during play-out of the network inventory. 17. The system of claim 15, wherein the station automation server is configured to temporarily stop playing-out local inventory by playing-out a dead roll. 18. The system of claim 15, wherein:
individual network entries indicate an allotted time assigned to the advertisement system for play-out of the network inventory; the station automation server is further configured to:
receive an indication from the advertisement system appliance that the advertisement system does not have sufficient network inventory to fill the allotted time; and
in response to the indication, resume play-out of local inventory before the allotted time has expired. 19. The system of claim 18, wherein the indication includes receiving an early-return message from the external advertisement system. 20. The system of claim 18, wherein the indication includes failing to receive an expected message from the external advertisement system. | Total advertising inventory of a broadcast station can be dynamically allocated between local, or station-sold, inventory and general, or network, inventory. The portion of total inventory allocated to local inventory or network inventory can be adjusted based on feedback from an advertising service, and a broadcast log can be generated based on the adjusted allocation. The broadcast log can be delivered to a media automation system associated with a media station which plays out local inventory in accordance with the broadcast log. When the broadcast log indicates that general/network inventory is to be broadcast, the media automation system stops playing-out local inventory, and allows the advertisement system to broadcast network inventory for a period of time indicated by the broadcast log. Broadcast of local inventory can be resumed early, before the time period indicated in the broadcast log has expired.1. A system comprising:
a media automation system including a processing device programmed to play-out media items for broadcast in accordance with a broadcast log; a traffic system coupled to the media automation system, the traffic system including at least one processor programmed to:
generate a first broadcast log to schedule local inventory for broadcast according to a first allocation of total inventory, the first allocation designating:
a first portion of the total inventory for broadcast of the local inventory;
a second portion of the total inventory for use by an external advertisement system;
a third portion of the total inventory as a buffer;
receive inventory allocation information from the external advertisement system;
generate an adjusted allocation based on the inventory allocation information;
generate an adjusted broadcast log based on the adjusted allocation; and
transmit the adjusted broadcast log to the media automation system. 2. The system of claim 1, wherein:
the broadcast log includes:
local entries specifying local inventory to be played out in particular spot-blocks corresponding to the first portion;
placeholder entries corresponding to external inventory to be played out by the external advertisement system;
the media automation system is coupled to the external advertisement system; and the processing device is further programmed to transmit a trigger message to the external advertisement system in conjunction with the placeholder entries, the trigger message indicating that the external advertisement system is to begin playing out external inventory, while the media automation system temporarily stops play-out local inventory. 3. The system of claim 2, wherein stopping playout of local inventory includes playing out silence. 4. The system of claim 2, wherein:
the placeholder entries indicates an allotted time assigned to the external advertisement system for play-out of the external inventory; the processing device included in the media automation system is further programmed to:
receive an indication that the external advertisement system will not use all of the allotted time; and
in response to the indication, resume play-out of local inventory before the allotted time has expired. 5. The system of claim 4, wherein the indication includes receiving an early-return message from the external advertisement system. 6. The system of claim 4, wherein the indication includes failing to receive an expected message from the external advertisement system. 7. The system of claim 1, wherein
the traffic system schedules local inventory for a plurality of media stations; and the traffic system generates a plurality of adjusted allocations on a station-by-station basis. 8. A method comprising:
generating a first broadcast log scheduling local inventory for broadcast according to a first allocation of total inventory, the first allocation designating:
a first portion of the total inventory for broadcast of the local inventory;
a second portion of the total inventory for use by an external advertisement system;
a third portion of the total inventory as a buffer;
receiving inventory allocation information from the external advertisement system; generating an adjusted allocation based on the inventory allocation information; generating an adjusted broadcast log based on the adjusted allocation; transmitting the adjusted broadcast log to a media automation system; and playing-out local inventory for broadcast in accordance with the adjusted broadcast log. 9. The method of claim 8, wherein:
the broadcast log includes:
local entries relating to the first portion, the local entries specifying first times local inventory is to be played out;
placeholder entries relating to the second portion, the placeholder entries specifying second times external inventory is to be played out;
the method further including: temporarily suspending play-out of local inventory during second times; and transmitting trigger messages to the external advertisement system based on the placeholder entries, the trigger messages notifying the external advertisement system to begin playing out the external inventory. 10. The method of claim 9, wherein:
the placeholder entries correspond to dead rolls; and temporarily suspending play-out of local inventory includes playing-out at least one of the dead rolls. 11. The method of claim 9, wherein:
individual placeholder entries indicate an allotted time assigned to the external advertisement system for play-out of the external inventory; the method further including:
receiving, at a media automation system, an indication that the external advertisement system will not use all of the allotted time; and
in response to the indication, resuming play-out of local inventory prior-to expiration of the allotted time. 12. The method of claim 11, wherein the indication includes receiving an early-return message from the external advertisement system. 13. The method of claim 11, wherein the indication includes failing to receive an expected message from the external advertisement system. 14. The method of claim 8, further comprising:
determining the first allocation of total inventory using a backend traffic system instance supporting a plurality of media stations; and determining the adjusted allocation at traffic system instance supporting less than all of the plurality of media stations. 15. A system comprising:
a traffic and billing system including a backend subsystem and a local subsystem; the backend subsystem configured to:
determine a first allocation of total inventory, the first allocation designating:
a first portion of the total inventory to be used for broadcast of local inventory by local media automation systems;
a second portion of the total inventory to be used for broadcast of network inventory by an advertisement system;
transmit the first allocation to the local portion of the local subsystem;
the local subsystem coupled to backend subsystem and the advertisement system via a communications network, the local subsystem configured to:
receive network inventory allocation information, associated with the network inventory, from the advertisement system;
generate an adjusted allocation based on the network inventory allocation information;
generate a broadcast log based on the adjusted allocation; and
transmit the adjusted broadcast log to a station automation server for broadcast. 16. The system of claim 15, further comprising:
wherein the broadcast log includes:
local entries specifying local inventory to be played out in particular spot-blocks;
network entries corresponding to network inventory to be played out by the advertisement system;
a station automation server coupled to an advertisement system appliance, and configured to broadcast inventory in accordance with the broadcast log; and the station automation server configured to: transmit a trigger message to the advertisement system appliance in conjunction with the network entries, the trigger message indicating that the advertisement system appliance is play-out network inventory; and temporarily stop playing-out local inventory during play-out of the network inventory. 17. The system of claim 15, wherein the station automation server is configured to temporarily stop playing-out local inventory by playing-out a dead roll. 18. The system of claim 15, wherein:
individual network entries indicate an allotted time assigned to the advertisement system for play-out of the network inventory; the station automation server is further configured to:
receive an indication from the advertisement system appliance that the advertisement system does not have sufficient network inventory to fill the allotted time; and
in response to the indication, resume play-out of local inventory before the allotted time has expired. 19. The system of claim 18, wherein the indication includes receiving an early-return message from the external advertisement system. 20. The system of claim 18, wherein the indication includes failing to receive an expected message from the external advertisement system. | 2,400 |
8,358 | 8,358 | 14,915,635 | 2,467 | A wireless device configured to port a plurality of WiFi settings to a device that is paired to it provided. The wireless device can gain access to a wireless router, and then send over the settings (i.e., password, SSID) associated with the WiFi connection to a paired so that the paired device can access the same wireless router automatically without user input or intervention. | 1. A first wireless device, the first wireless device comprising:
a first transceiver configured for connecting and communicating with a wireless access point; a second transceiver configured for communicating with a second wireless device; and a processor capable of:
storing information associated with connecting to the wireless access point;
determining if the first wireless device is connected to the second wireless device; and
transmitting the stored information to the second wireless device if it is determined that the first wireless device is connected to the second wireless device. 2. The first wireless device of claim 1, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 3. The first wireless device of claim 1, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 4. The first wireless device of claim 1, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 5. A method of configuring a transceiver used to communicate with a wireless access point to transmit information associated with connecting to the wireless access point to a wireless device, the method comprising:
connecting with a wireless access point; storing information associated with connecting to the wireless access point; determining if a connection with the wireless device is present; and transmitting the stored information to the wireless device if the connection to the wireless device is present. 6. The method of claim 5, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 7. The method of claim 5, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 8. The method of claim 5, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 9. A non-transitory computer readable storage medium having stored thereon a set of instructions for configuring a transceiver of a first wireless device used to communicate with a wireless access point, that when executed by a processor causes the processor to:
connect with a wireless access point; store information associated with connecting to the wireless access point; determine if the device is connected to a second wireless device; and transmit the stored information to the second wireless device if it is determined that the device is connected to the second wireless device. 10. The non-transitory computer readable storage medium of claim 9, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 11. The non-transitory computer readable storage medium of claim 9, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 12. The non-transitory computer readable storage medium of claim 9, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 13. A first wireless device, the first wireless device comprising:
a first transceiver configured for communicating with a wireless access point; a second transceiver configured for communicating with a second wireless device; and a processor capable of:
connecting the first wireless device to the second wireless device via the second transceiver;
receiving a plurality of information from the second wireless device via the second transceiver, the plurality of information associated with the second wireless device's connection to the wireless access point; and
connecting with the wireless access point using the plurality of information provided by the second wireless device. 14. The first wireless device of claim 13, wherein the plurality of information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 15. The first wireless device of claim 13, wherein the plurality of information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 16. The first wireless device of claim 13, wherein the plurality of information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 17. A method of configuring a transceiver of a first wireless device used to communicate with a wireless access point, the method comprising:
connecting the first wireless device to a second wireless device, such that the first wireless device and the second wireless device can communicate with one another; receiving information from the second wireless device, the information associated with the second wireless device's connection to the wireless access point; and connecting with the wireless access point using the information provided by the second wireless device. 18. The method of claim 17, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 19. The method of claim 17, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 20. The method of claim 17, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 21. A non-transitory computer readable storage medium having stored thereon a set of instructions for configuring a transceiver of a first wireless device used to communicate with a wireless access point, that when executed by a processor causes the processor to:
connect the first wireless device to a second wireless device, such that the first wireless device and the second wireless device can communicate with one another; receive information from the second wireless device, the information associated with the second wireless device's connection to the wireless access point; and connect with the wireless access point using the information provided by the second wireless device. 22. The non-transitory computer readable storage medium of claim 21, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 23. The non-transitory computer readable storage medium of claim 21, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 24. The non-transitory computer readable storage medium of claim 21, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. | A wireless device configured to port a plurality of WiFi settings to a device that is paired to it provided. The wireless device can gain access to a wireless router, and then send over the settings (i.e., password, SSID) associated with the WiFi connection to a paired so that the paired device can access the same wireless router automatically without user input or intervention.1. A first wireless device, the first wireless device comprising:
a first transceiver configured for connecting and communicating with a wireless access point; a second transceiver configured for communicating with a second wireless device; and a processor capable of:
storing information associated with connecting to the wireless access point;
determining if the first wireless device is connected to the second wireless device; and
transmitting the stored information to the second wireless device if it is determined that the first wireless device is connected to the second wireless device. 2. The first wireless device of claim 1, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 3. The first wireless device of claim 1, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 4. The first wireless device of claim 1, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 5. A method of configuring a transceiver used to communicate with a wireless access point to transmit information associated with connecting to the wireless access point to a wireless device, the method comprising:
connecting with a wireless access point; storing information associated with connecting to the wireless access point; determining if a connection with the wireless device is present; and transmitting the stored information to the wireless device if the connection to the wireless device is present. 6. The method of claim 5, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 7. The method of claim 5, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 8. The method of claim 5, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 9. A non-transitory computer readable storage medium having stored thereon a set of instructions for configuring a transceiver of a first wireless device used to communicate with a wireless access point, that when executed by a processor causes the processor to:
connect with a wireless access point; store information associated with connecting to the wireless access point; determine if the device is connected to a second wireless device; and transmit the stored information to the second wireless device if it is determined that the device is connected to the second wireless device. 10. The non-transitory computer readable storage medium of claim 9, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 11. The non-transitory computer readable storage medium of claim 9, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 12. The non-transitory computer readable storage medium of claim 9, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 13. A first wireless device, the first wireless device comprising:
a first transceiver configured for communicating with a wireless access point; a second transceiver configured for communicating with a second wireless device; and a processor capable of:
connecting the first wireless device to the second wireless device via the second transceiver;
receiving a plurality of information from the second wireless device via the second transceiver, the plurality of information associated with the second wireless device's connection to the wireless access point; and
connecting with the wireless access point using the plurality of information provided by the second wireless device. 14. The first wireless device of claim 13, wherein the plurality of information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 15. The first wireless device of claim 13, wherein the plurality of information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 16. The first wireless device of claim 13, wherein the plurality of information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 17. A method of configuring a transceiver of a first wireless device used to communicate with a wireless access point, the method comprising:
connecting the first wireless device to a second wireless device, such that the first wireless device and the second wireless device can communicate with one another; receiving information from the second wireless device, the information associated with the second wireless device's connection to the wireless access point; and connecting with the wireless access point using the information provided by the second wireless device. 18. The method of claim 17, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 19. The method of claim 17, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 20. The method of claim 17, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. 21. A non-transitory computer readable storage medium having stored thereon a set of instructions for configuring a transceiver of a first wireless device used to communicate with a wireless access point, that when executed by a processor causes the processor to:
connect the first wireless device to a second wireless device, such that the first wireless device and the second wireless device can communicate with one another; receive information from the second wireless device, the information associated with the second wireless device's connection to the wireless access point; and connect with the wireless access point using the information provided by the second wireless device. 22. The non-transitory computer readable storage medium of claim 21, wherein the information associated with connecting to the wireless access point includes a password associated with obtaining access to the wireless access point. 23. The non-transitory computer readable storage medium of claim 21, wherein the information associated with connecting to the wireless access point includes a type of security protocol used by the wireless access point. 24. The non-transitory computer readable storage medium of claim 21, wherein the information associated with connecting to the wireless access point includes a type of WiFi connection used by the wireless access point. | 2,400 |
8,359 | 8,359 | 15,243,115 | 2,494 | Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations. | 1-25. (canceled) 26. A computer-implemented method, comprising:
identifying, for the computer software application, a set of security-sensitive data flows using a data propagation graph; encoding each transition that participates in one or more of the set of security-sensitive data flows as a unique propositional variable; encoding, for ease respective security-sensitive data flow, the respective security-sensitive data flow as a disjunctive propositional clause that includes all propositional variables corresponding to transitions that participate in the respective data flow; conjoining the clauses to form a conjunctive normal formula; processing, using a satisfiability solver, the formula; and determining whether the formula is satisfiable. 27. The method of claim 26, wherein
the set of security-sensitive data flows are identified by a static security analysis of the computer software application. 28. The method of claim 26, wherein
variables corresponding to transitions whose elimination are indicated by a downgrader specification are eliminated. 29. The method of claim 28, wherein
upon a determination that the formula is satisfiable, the downgrader specification is indicated as providing full coverage of the set of security-sensitive data flows. 30. The method of claim 28, wherein
upon a determination that the formula is not satisfiable, that the downgrader specification is indicated as not providing full coverage of the set of security-sensitive data flows. 31. The method of claim 30, wherein
security-sensitive data flows within the set of security-sensitive data flows that are not covered by the downgrader specification are indicated. 32. A computer hardware system, comprising:
a hardware processor configured to initiate the following executable operations:
identifying, for the computer software application, a set of security-sensitive data flows using a data propagation graph;
encoding each transition that participates in one or more of the set of security-sensitive data flows as a unique propositional variable;
encoding, for ease respective security-sensitive data flow, the respective security-sensitive data flow as a disjunctive propositional clause that includes all propositional variables corresponding to transitions that participate in the respective data flow;
conjoining the clauses to form a conjunctive normal formula;
processing, using a satisfiability solver, the formula; and
determining whether the formula is satisfiable. 33. The system of claim 26, wherein
the set of security-sensitive data flows are identified by a static security analysis of the computer software application. 34. The system of claim 26, wherein
variables corresponding to transitions whose elimination are indicated by a downgrader specification are eliminated. 35. The system of claim 34, wherein
upon a determination that the formula is satisfiable, the downgrader specification is indicated as providing full coverage of the set of security-sensitive data flows. 36. The system of claim 34, wherein
upon a determination that the formula is not satisfiable, that the downgrader specification is indicated as not providing full coverage of the set of security-sensitive data flows. 37. The system of claim 36, wherein
security-sensitive data flows within the set of security-sensitive data flows that are not covered by the downgrader specification are indicated. 38. A computer program product, comprising:
a storage hardware device having stored therein computer-readable program code, the computer-readable program code, which when executed by a computer hardware system, causes the computer hardware system to perform:
identifying, for the computer software application, a set of security-sensitive data flows using a data propagation graph;
encoding each transition that participates in one or more of the set of security-sensitive data flows as a unique propositional variable;
encoding, for ease respective security-sensitive data flow, the respective security-sensitive data flow as a disjunctive propositional clause that includes all propositional variables corresponding to transitions that participate in the respective data flow;
conjoining the clauses to form a conjunctive normal formula;
processing, using a satisfiability solver, the formula; and
determining whether the formula is satisfiable. 39. The computer program product of claim 32, wherein
the set of security-sensitive data flows are identified by a static security analysis of the computer software application. 40. The computer program product of claim 32, wherein
variables corresponding to transitions whose elimination are indicated by a downgrader specification are eliminated. 41. The computer program product of claim 40, wherein
upon a determination that the formula is satisfiable, the downgrader specification is indicated as providing full coverage of the set of security-sensitive data flows. 42. The computer program product of claim 40, wherein
upon a determination that the formula is not satisfiable, that the downgrader specification is indicated as not providing full coverage of the set of security-sensitive data flows. 43. The computer program product of claim 42, wherein
security-sensitive data flows within the set of security-sensitive data flows that are not covered by the downgrader specification are indicated. | Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations.1-25. (canceled) 26. A computer-implemented method, comprising:
identifying, for the computer software application, a set of security-sensitive data flows using a data propagation graph; encoding each transition that participates in one or more of the set of security-sensitive data flows as a unique propositional variable; encoding, for ease respective security-sensitive data flow, the respective security-sensitive data flow as a disjunctive propositional clause that includes all propositional variables corresponding to transitions that participate in the respective data flow; conjoining the clauses to form a conjunctive normal formula; processing, using a satisfiability solver, the formula; and determining whether the formula is satisfiable. 27. The method of claim 26, wherein
the set of security-sensitive data flows are identified by a static security analysis of the computer software application. 28. The method of claim 26, wherein
variables corresponding to transitions whose elimination are indicated by a downgrader specification are eliminated. 29. The method of claim 28, wherein
upon a determination that the formula is satisfiable, the downgrader specification is indicated as providing full coverage of the set of security-sensitive data flows. 30. The method of claim 28, wherein
upon a determination that the formula is not satisfiable, that the downgrader specification is indicated as not providing full coverage of the set of security-sensitive data flows. 31. The method of claim 30, wherein
security-sensitive data flows within the set of security-sensitive data flows that are not covered by the downgrader specification are indicated. 32. A computer hardware system, comprising:
a hardware processor configured to initiate the following executable operations:
identifying, for the computer software application, a set of security-sensitive data flows using a data propagation graph;
encoding each transition that participates in one or more of the set of security-sensitive data flows as a unique propositional variable;
encoding, for ease respective security-sensitive data flow, the respective security-sensitive data flow as a disjunctive propositional clause that includes all propositional variables corresponding to transitions that participate in the respective data flow;
conjoining the clauses to form a conjunctive normal formula;
processing, using a satisfiability solver, the formula; and
determining whether the formula is satisfiable. 33. The system of claim 26, wherein
the set of security-sensitive data flows are identified by a static security analysis of the computer software application. 34. The system of claim 26, wherein
variables corresponding to transitions whose elimination are indicated by a downgrader specification are eliminated. 35. The system of claim 34, wherein
upon a determination that the formula is satisfiable, the downgrader specification is indicated as providing full coverage of the set of security-sensitive data flows. 36. The system of claim 34, wherein
upon a determination that the formula is not satisfiable, that the downgrader specification is indicated as not providing full coverage of the set of security-sensitive data flows. 37. The system of claim 36, wherein
security-sensitive data flows within the set of security-sensitive data flows that are not covered by the downgrader specification are indicated. 38. A computer program product, comprising:
a storage hardware device having stored therein computer-readable program code, the computer-readable program code, which when executed by a computer hardware system, causes the computer hardware system to perform:
identifying, for the computer software application, a set of security-sensitive data flows using a data propagation graph;
encoding each transition that participates in one or more of the set of security-sensitive data flows as a unique propositional variable;
encoding, for ease respective security-sensitive data flow, the respective security-sensitive data flow as a disjunctive propositional clause that includes all propositional variables corresponding to transitions that participate in the respective data flow;
conjoining the clauses to form a conjunctive normal formula;
processing, using a satisfiability solver, the formula; and
determining whether the formula is satisfiable. 39. The computer program product of claim 32, wherein
the set of security-sensitive data flows are identified by a static security analysis of the computer software application. 40. The computer program product of claim 32, wherein
variables corresponding to transitions whose elimination are indicated by a downgrader specification are eliminated. 41. The computer program product of claim 40, wherein
upon a determination that the formula is satisfiable, the downgrader specification is indicated as providing full coverage of the set of security-sensitive data flows. 42. The computer program product of claim 40, wherein
upon a determination that the formula is not satisfiable, that the downgrader specification is indicated as not providing full coverage of the set of security-sensitive data flows. 43. The computer program product of claim 42, wherein
security-sensitive data flows within the set of security-sensitive data flows that are not covered by the downgrader specification are indicated. | 2,400 |
8,360 | 8,360 | 15,572,338 | 2,463 | There is provided a base station which can prevent transmission of a Time Synchronisation Info IE (Information Element) from causing a procedure which the base station cannot execute. When the base station ( 10 - 1 ) according to the present invention receives Muting Pattern Information which does not contain a Muting Pattern Offset, the base station ( 10 - 1 ) decides that the Muting Pattern Offset requested in a former request has been accepted. | 1. A base station, wherein, when the base station receives Pattern Information that does not contain a Muting Pattern Offset, the base station decides that the Muting Pattern Offset requested in a former request has been accepted. 2. A base station, wherein, when the base station transmits a message for requesting Active Muting and then receives Muting Pattern Information that does not contain a Muting Pattern Offset, the base station decides that the Muting Pattern Offset requested in a former request has been accepted. 3. The base station according to claim 2, wherein the message contains a Source Stratum Level IE. 4. The base station according to claim 2, wherein the message contains a Muting Pattern Period and the Muting Pattern Offset. 5. The base station according to claim 2, wherein the Muting Pattern Information is transmitted as a response to the message. 6. The base station according to claim 1, wherein the Muting Pattern Information is an information element that is transmitted by another base station and transferred by a MME. 7. The base station according to claim 1, wherein a value of a Muting Pattern Period contained in the Muting Pattern Information is not zero. 8. The base station according to claim 1, wherein the former request contains a Muting Pattern Period and the Muting Pattern Offset. 9. The base station according to claim 1, wherein the former request is a message for requesting Active Muting. 10. A base station, wherein, when the base station receives a message that does not contain an information element related to muting, the base station decides that the information element related to previously requested muting has been accepted. | There is provided a base station which can prevent transmission of a Time Synchronisation Info IE (Information Element) from causing a procedure which the base station cannot execute. When the base station ( 10 - 1 ) according to the present invention receives Muting Pattern Information which does not contain a Muting Pattern Offset, the base station ( 10 - 1 ) decides that the Muting Pattern Offset requested in a former request has been accepted.1. A base station, wherein, when the base station receives Pattern Information that does not contain a Muting Pattern Offset, the base station decides that the Muting Pattern Offset requested in a former request has been accepted. 2. A base station, wherein, when the base station transmits a message for requesting Active Muting and then receives Muting Pattern Information that does not contain a Muting Pattern Offset, the base station decides that the Muting Pattern Offset requested in a former request has been accepted. 3. The base station according to claim 2, wherein the message contains a Source Stratum Level IE. 4. The base station according to claim 2, wherein the message contains a Muting Pattern Period and the Muting Pattern Offset. 5. The base station according to claim 2, wherein the Muting Pattern Information is transmitted as a response to the message. 6. The base station according to claim 1, wherein the Muting Pattern Information is an information element that is transmitted by another base station and transferred by a MME. 7. The base station according to claim 1, wherein a value of a Muting Pattern Period contained in the Muting Pattern Information is not zero. 8. The base station according to claim 1, wherein the former request contains a Muting Pattern Period and the Muting Pattern Offset. 9. The base station according to claim 1, wherein the former request is a message for requesting Active Muting. 10. A base station, wherein, when the base station receives a message that does not contain an information element related to muting, the base station decides that the information element related to previously requested muting has been accepted. | 2,400 |
8,361 | 8,361 | 14,115,884 | 2,416 | Methods and apparatuses for carrier aggregation with discontinuous reception is disclosed. At least two different time division duplexing configurations can be communicated from serving cells to a device, the subframes of the at least two different configurations being counted for purposes of operating at least one timer function according to a predefined rule of counting. Discontinuous communications by the serving cells with the device are controlled based on the predefined rule of counting such that at least one timer function associated with discontinuous reception from the serving cells is operated based on the counting. | 1. A method for a device capable of carrier aggregation, comprising:
receiving at least two different time division duplexing configurations for different serving cells, and operating at least one timer function associated with discontinuous reception from the serving cells based on counting of subframes of the received at least two different configurations according to a predefined rule of counting. 2. A method for controlling communications by a device capable of carrier aggregation, comprising:
sending from serving cells to the device at least two different time division duplexing configurations, wherein the subframes of the at least two different configurations are counted for purposes of operating at least one timer function according to a predefined rule of counting, and controlling discontinuous communications by the serving cells with the device based on the predefined rule of counting. 3. A method as claimed in claim 1, comprising using time division duplexing configuration of a primary cell of the serving cells as the basis for counting of subframes. 4. A method as claimed in claim 1, comprising determining a serving cell with most downlink subframes in its configuration, and using the configuration of the determined serving cell as the basis for counting of subframes. 5. A method as claimed in claim 1, comprising counting an instance of a downlink subframe in configuration from any serving cell as a subframe for timing purposes. 6. A method as claimed in claim 1, comprising counting only a subframe where a downlink subframe is present in all received configurations as a subframe for timing purposes. 7. A method as claimed in claim 1, wherein a downlink subframe by a secondary cell that is cross scheduled by another cell in not counted as a subframe for timing purposes. 8. A method as claimed in claim 1, comprising controlling discontinuous reception active time of the device based on the counting. 9. A method as claimed in claim 1, comprising counting downlink sub-frames and subframes including downlink pilot subframes for the timing purposes. 10. A method as claimed in claim 1, wherein the timer function comprises at least one of an inactivity timer, retransmission timer, and on-duration timer. 11. An apparatus for controlling carrier aggregation, the apparatus comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to
facilitate receiving of at least two different time division duplexing configurations for different serving cells, and operate at least one timer function associated with discontinuous reception from the serving cells based on counting of subframes of the received at least two different configurations according to a predefined rule of counting. 12. An apparatus for controlling carrier aggregation, the apparatus comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to
cause sending to the device by serving cells at least two different time division duplexing configurations, wherein the subframes of the at least two different configurations are counted for purposes of operating at least one timer function according to a predefined rule of counting, and control discontinuous communications by the serving cells with the device based on the predefined rule of counting. 13. An apparatus as claimed in claim 11, configured to use the time division duplexing configuration of a primary cell of the serving cells as the basis for counting of sub-frames. 14. An apparatus as claimed in claim 11, configured to determine a serving cell with most downlink subframes in its configuration and to use the configuration of the determined serving cell as the basis for counting of subframes. 15. An apparatus as claimed in claim 11, configured to count an instance of a downlink subframe in configuration from any serving cell as a subframe for timing purposes. 16. An apparatus as claimed in claim 11, configured to count only a subframe where a downlink subframe is present in all received configurations as a subframe for timing purposes. 17. An apparatus as claimed in claim 11, configured to ignore a downlink subframe by a secondary cell that is cross scheduled by another cell as a subframe for timing purposes. 18. An apparatus as claimed in claim 11, configured to control discontinuous reception active time of the device based on the counting. 19. An apparatus as claimed in claim 11, configured to count pilot sub-frames and downlink subframes for the timing purposes. 20. An apparatus as claimed in claim 11, wherein the timer function comprises at least one of an inactivity timer, retransmission timer, and on-duration timer. 21. A controller for an access node comprising an apparatus in accordance with claim 12. 22. A communication device comprising an apparatus in accordance with claim 11. 23. A communication system comprising an apparatus or a device in accordance with claim 11. 24. A computer program comprising program code means adapted to perform the steps of claim 1 when the program is run on a data processing apparatus. | Methods and apparatuses for carrier aggregation with discontinuous reception is disclosed. At least two different time division duplexing configurations can be communicated from serving cells to a device, the subframes of the at least two different configurations being counted for purposes of operating at least one timer function according to a predefined rule of counting. Discontinuous communications by the serving cells with the device are controlled based on the predefined rule of counting such that at least one timer function associated with discontinuous reception from the serving cells is operated based on the counting.1. A method for a device capable of carrier aggregation, comprising:
receiving at least two different time division duplexing configurations for different serving cells, and operating at least one timer function associated with discontinuous reception from the serving cells based on counting of subframes of the received at least two different configurations according to a predefined rule of counting. 2. A method for controlling communications by a device capable of carrier aggregation, comprising:
sending from serving cells to the device at least two different time division duplexing configurations, wherein the subframes of the at least two different configurations are counted for purposes of operating at least one timer function according to a predefined rule of counting, and controlling discontinuous communications by the serving cells with the device based on the predefined rule of counting. 3. A method as claimed in claim 1, comprising using time division duplexing configuration of a primary cell of the serving cells as the basis for counting of subframes. 4. A method as claimed in claim 1, comprising determining a serving cell with most downlink subframes in its configuration, and using the configuration of the determined serving cell as the basis for counting of subframes. 5. A method as claimed in claim 1, comprising counting an instance of a downlink subframe in configuration from any serving cell as a subframe for timing purposes. 6. A method as claimed in claim 1, comprising counting only a subframe where a downlink subframe is present in all received configurations as a subframe for timing purposes. 7. A method as claimed in claim 1, wherein a downlink subframe by a secondary cell that is cross scheduled by another cell in not counted as a subframe for timing purposes. 8. A method as claimed in claim 1, comprising controlling discontinuous reception active time of the device based on the counting. 9. A method as claimed in claim 1, comprising counting downlink sub-frames and subframes including downlink pilot subframes for the timing purposes. 10. A method as claimed in claim 1, wherein the timer function comprises at least one of an inactivity timer, retransmission timer, and on-duration timer. 11. An apparatus for controlling carrier aggregation, the apparatus comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to
facilitate receiving of at least two different time division duplexing configurations for different serving cells, and operate at least one timer function associated with discontinuous reception from the serving cells based on counting of subframes of the received at least two different configurations according to a predefined rule of counting. 12. An apparatus for controlling carrier aggregation, the apparatus comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to
cause sending to the device by serving cells at least two different time division duplexing configurations, wherein the subframes of the at least two different configurations are counted for purposes of operating at least one timer function according to a predefined rule of counting, and control discontinuous communications by the serving cells with the device based on the predefined rule of counting. 13. An apparatus as claimed in claim 11, configured to use the time division duplexing configuration of a primary cell of the serving cells as the basis for counting of sub-frames. 14. An apparatus as claimed in claim 11, configured to determine a serving cell with most downlink subframes in its configuration and to use the configuration of the determined serving cell as the basis for counting of subframes. 15. An apparatus as claimed in claim 11, configured to count an instance of a downlink subframe in configuration from any serving cell as a subframe for timing purposes. 16. An apparatus as claimed in claim 11, configured to count only a subframe where a downlink subframe is present in all received configurations as a subframe for timing purposes. 17. An apparatus as claimed in claim 11, configured to ignore a downlink subframe by a secondary cell that is cross scheduled by another cell as a subframe for timing purposes. 18. An apparatus as claimed in claim 11, configured to control discontinuous reception active time of the device based on the counting. 19. An apparatus as claimed in claim 11, configured to count pilot sub-frames and downlink subframes for the timing purposes. 20. An apparatus as claimed in claim 11, wherein the timer function comprises at least one of an inactivity timer, retransmission timer, and on-duration timer. 21. A controller for an access node comprising an apparatus in accordance with claim 12. 22. A communication device comprising an apparatus in accordance with claim 11. 23. A communication system comprising an apparatus or a device in accordance with claim 11. 24. A computer program comprising program code means adapted to perform the steps of claim 1 when the program is run on a data processing apparatus. | 2,400 |
8,362 | 8,362 | 14,575,405 | 2,438 | A route monitoring system disclosed herein includes a computing system executing a route monitoring service coupled to a communication network. The route monitoring service receives a route redirection message from one or more network elements in a communication network, and compares the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms. The route redirection message includes route update information defining a change to a route through the communication network. When the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack, the service generates one or more remedial actions to mitigate the redirection attack. | 1. A route monitoring system for a communication network, the system comprising:
a communication service provider computing system comprising at least one memory for storing a route monitoring service that is executed by at least one processor to:
receive a route redirection message from a network element in the communication network, the route redirection message including route update information defining a change to a routing rule through the communication network between a customer communication device and a recipient device;
compare the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms; and
generate one or more remedial actions when the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack. 2. The route monitoring system of claim 1, wherein the one or more normalcy rules comprise a plurality of normalcy rules, the route monitoring service applying a weighting factor to each normalcy rule, and comparing the route update information with the weighted values of each normalcy rule to identify the route redirection attack. 3. The route monitoring system of claim 1, wherein one of the normalcy rules comprises information associated with known bad IP spaces. 4. The route monitoring system of claim 1, wherein one of the normalcy rules comprises information associated with at least one of a specific frequency or a time of occurrence of the route redirection message. 5. The route monitoring system of claim 1, wherein one of the normalcy rules comprises information associated with a list of known good autonomous system numbers (ASNs). 6. The route monitoring system of claim 1, wherein the service is further executed to convert a protocol of the route redirection message to at least one of a common event format (CEF), a Java script object notation (JSON) format, or an extensible markup language (XML) format. 7. The route monitoring system of claim 1, wherein the remedial actions comprise at least one of generating an alarm, directing the route to a null route, implementing a tracking procedure to determine the source of the malicious route redirection attack, and notifying users of the route. 8. A route monitoring method for a communication network, the method comprising:
receiving, using instructions stored on at least one computer-readable medium and executed by at least one processor, a route redirection message at a communication service provider computing system from a network element in the communication network, the route redirection message including route update information defining a change to a routing rule through the communication network between a customer communication device and a recipient device; comparing, using the at least one processor, the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms; and generating, using the at least one processor, one or more remedial actions when the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack. 9. The route monitoring method of claim 8, further comprising:
applying a weighting factor to each of a plurality of normalcy rules; and comparing the route update information with the weighted values of each normalcy rule to identify the route redirection attack. 10. The route monitoring method of claim 8, further comprising comparing the route update information against at least one normalcy rule comprising information associated with known bad IP spaces. 11. The route monitoring method of claim 8, further comprising comparing the route update information against at least one normalcy rule comprising information associated with at least one of a specific frequency or a time of occurrence of the route redirection message. 12. The route monitoring method of claim 8, further comprising comparing the route update information against at least one normalcy rule comprising information associated with a list of known good autonomous system numbers (ASNs). 13. The route monitoring method of claim 8, further comprising converting a protocol of the route redirection message to at least one of a common event format (CEF), a Java script object notation (JSON) format, or an extensible markup language (XML) format. 14. The route monitoring method of claim 8, further comprising performing one or more remedial actions comprising at least one of generating an alarm, directing the routing rule to a null route, implementing a tracking procedure to determine the source of the malicious route redirection attack, and notifying users of the routing rule. 15. A non-transitory computer-readable medium encoded with a route monitoring service comprising instructions executable by a processor to:
receive a route redirection message from a network element in a communication network at a communication service provider computing system, the route redirection message including route update information defining a change to a routing rule through the communication network between a customer communication device and a recipient device; compare the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms; and generate one or more remedial actions when the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack. 16. The non-transitory computer-readable medium of claim 15, further executed to:
apply a weighting factor to each of a plurality of normalcy rules; and compare the route update information with the weighted values of each normalcy rule to identify the route redirection attack. 17. The non-transitory computer-readable medium of claim 15, further executed to compare the route update information against at least one normalcy rule comprising information associated with known bad IP spaces. 18. The non-transitory computer-readable medium of claim 15, further executed to compare the route update information against at least one normalcy rule comprising information associated with at least one of a specific frequency or a time of occurrence of the route redirection message. 19. The non-transitory computer-readable medium of claim 15, further executed to compare the route update information against at least one normalcy rule comprising information associated with a list of known good autonomous system numbers (ASNs). 20. The non-transitory computer-readable medium of claim 15, further executed to perform one or more remedial actions comprising at least one of generating an alarm, directing the routing rule to a null route, implementing a tracking procedure to determine the source of the malicious route redirection attack, and notifying users of the routing rule. | A route monitoring system disclosed herein includes a computing system executing a route monitoring service coupled to a communication network. The route monitoring service receives a route redirection message from one or more network elements in a communication network, and compares the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms. The route redirection message includes route update information defining a change to a route through the communication network. When the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack, the service generates one or more remedial actions to mitigate the redirection attack.1. A route monitoring system for a communication network, the system comprising:
a communication service provider computing system comprising at least one memory for storing a route monitoring service that is executed by at least one processor to:
receive a route redirection message from a network element in the communication network, the route redirection message including route update information defining a change to a routing rule through the communication network between a customer communication device and a recipient device;
compare the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms; and
generate one or more remedial actions when the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack. 2. The route monitoring system of claim 1, wherein the one or more normalcy rules comprise a plurality of normalcy rules, the route monitoring service applying a weighting factor to each normalcy rule, and comparing the route update information with the weighted values of each normalcy rule to identify the route redirection attack. 3. The route monitoring system of claim 1, wherein one of the normalcy rules comprises information associated with known bad IP spaces. 4. The route monitoring system of claim 1, wherein one of the normalcy rules comprises information associated with at least one of a specific frequency or a time of occurrence of the route redirection message. 5. The route monitoring system of claim 1, wherein one of the normalcy rules comprises information associated with a list of known good autonomous system numbers (ASNs). 6. The route monitoring system of claim 1, wherein the service is further executed to convert a protocol of the route redirection message to at least one of a common event format (CEF), a Java script object notation (JSON) format, or an extensible markup language (XML) format. 7. The route monitoring system of claim 1, wherein the remedial actions comprise at least one of generating an alarm, directing the route to a null route, implementing a tracking procedure to determine the source of the malicious route redirection attack, and notifying users of the route. 8. A route monitoring method for a communication network, the method comprising:
receiving, using instructions stored on at least one computer-readable medium and executed by at least one processor, a route redirection message at a communication service provider computing system from a network element in the communication network, the route redirection message including route update information defining a change to a routing rule through the communication network between a customer communication device and a recipient device; comparing, using the at least one processor, the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms; and generating, using the at least one processor, one or more remedial actions when the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack. 9. The route monitoring method of claim 8, further comprising:
applying a weighting factor to each of a plurality of normalcy rules; and comparing the route update information with the weighted values of each normalcy rule to identify the route redirection attack. 10. The route monitoring method of claim 8, further comprising comparing the route update information against at least one normalcy rule comprising information associated with known bad IP spaces. 11. The route monitoring method of claim 8, further comprising comparing the route update information against at least one normalcy rule comprising information associated with at least one of a specific frequency or a time of occurrence of the route redirection message. 12. The route monitoring method of claim 8, further comprising comparing the route update information against at least one normalcy rule comprising information associated with a list of known good autonomous system numbers (ASNs). 13. The route monitoring method of claim 8, further comprising converting a protocol of the route redirection message to at least one of a common event format (CEF), a Java script object notation (JSON) format, or an extensible markup language (XML) format. 14. The route monitoring method of claim 8, further comprising performing one or more remedial actions comprising at least one of generating an alarm, directing the routing rule to a null route, implementing a tracking procedure to determine the source of the malicious route redirection attack, and notifying users of the routing rule. 15. A non-transitory computer-readable medium encoded with a route monitoring service comprising instructions executable by a processor to:
receive a route redirection message from a network element in a communication network at a communication service provider computing system, the route redirection message including route update information defining a change to a routing rule through the communication network between a customer communication device and a recipient device; compare the route update information against one or more normalcy rules associated with potential malicious route redirecting mechanisms; and generate one or more remedial actions when the comparison of the route update information to the one or more normalcy rules identifies a malicious route redirection attack. 16. The non-transitory computer-readable medium of claim 15, further executed to:
apply a weighting factor to each of a plurality of normalcy rules; and compare the route update information with the weighted values of each normalcy rule to identify the route redirection attack. 17. The non-transitory computer-readable medium of claim 15, further executed to compare the route update information against at least one normalcy rule comprising information associated with known bad IP spaces. 18. The non-transitory computer-readable medium of claim 15, further executed to compare the route update information against at least one normalcy rule comprising information associated with at least one of a specific frequency or a time of occurrence of the route redirection message. 19. The non-transitory computer-readable medium of claim 15, further executed to compare the route update information against at least one normalcy rule comprising information associated with a list of known good autonomous system numbers (ASNs). 20. The non-transitory computer-readable medium of claim 15, further executed to perform one or more remedial actions comprising at least one of generating an alarm, directing the routing rule to a null route, implementing a tracking procedure to determine the source of the malicious route redirection attack, and notifying users of the routing rule. | 2,400 |
8,363 | 8,363 | 15,368,282 | 2,416 | In some examples, a computing device comprises a first service function instance to apply a service function and a service function forwarder to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receive a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and send, to the second service function instance and based at least on determining a service function item of the one or more service function items indicates the second service function instance, a packet classified to the service function chain. | 1. A method comprising:
receiving, by a computing device, a first layer 3 routing protocol route advertisement that includes service function instance data for a service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receiving, by the computing device, a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and sending, by the computing device to the service function instance and based at least on determining a service function item of the one or more service function items indicates the service function instance, a packet classified to the service function chain. 2. The method of claim 1, wherein determining a service function item of the one or more service function items indicates the service function instance comprises:
determining, by the computing device, the service function item of the one or more service function items indicates the service function type and the service identifier. 3. The method of claim 1,
wherein the service function item of the one or more service function items indicates the service function type and the service identifier, and wherein the service identifier indicates any service function instance of a plurality of service function instances that applies the service function indicated by the service function type is a suitable service function instance. 4. The method of claim 1, wherein each service function item of the one or more service function items includes a service index that indicates a location for the service function item in an order of the service function chain, the method further comprising:
receiving, by the computing device, the packet encapsulated with a network service header that includes a service path identifier and a service index, wherein determining the service function item of the one or more service function items indicates the service function instance comprises, by the computing device, matching the service path identifier of the network service header and the service path identifier of the service function chain data and matching the service index of the network service header and the service index of the service function item. 5. The method of claim 1,
wherein the service function instance comprises a first service function instance, wherein the service function instance data comprises first service function instance data, the method further comprising: outputting, by the computing device, a third layer 3 routing protocol route advertisement protocol route advertisement that includes second service function instance data for a second service function instance hosted by the computing device to apply a service function, the second service function instance data indicating a service function type and a service identifier for the second service function instance. 6. The method of claim 5, wherein a second service function item of the one or more service function items indicates the second service function instance hosted by the computing device, the method further comprising:
applying, by the computing device, the service function to the packet. 7. The method of claim 1, wherein the first layer 3 routing protocol route advertisement protocol route advertisement comprises a Border Gateway Protocol UPDATE message that includes a service function chaining Network Layer Reachability Information that indicates the service function type and the service identifier. 8. The method of claim 7, wherein the service identifier comprises a Route Distinguisher. 9. The method of claim 7, wherein the Border Gateway Protocol UPDATE message comprises an encapsulation attribute that includes a network address for a computing device that hosts the service function instance, the method further comprising:
encapsulating, by the computing device based on the encapsulation attribute, the packet with a tunnel encapsulation header that includes the network address for the computing device to generate a tunnel packet; and sending, by the computing device to the computing device that hosts the service function instance, the tunnel packet. 10. The method of claim 1, wherein the second layer 3 routing protocol route advertisement comprises a Border Gateway Protocol UPDATE message that includes a service function chaining Network Layer Reachability Information that includes the service function chain data. 11. The method of claim 10, wherein the Border Gateway Protocol UPDATE message comprises a service function chain BGP Path attribute that includes the one or more service function items. 12. The method of claim 1, wherein the service function chain data includes a correlator that indicates the service function chain and another service function chain are to process a packet flow and a reverse packet flow for the packet flow, respectively. 13. The method of claim 1, wherein the sending comprises:
encapsulating, by the computing device, the packet with a network service header that includes the service index and the service path identifier; and sending the packet with the network service header. 14. The method of claim 1, wherein the first layer 3 routing protocol route advertisement and second layer 3 routing protocol route advertisement are each associated with a route target, the method further comprising:
importing, by the computing device in response to determining the computing device is configured to import the route target, the service function instance data and the service function chain data. 15. The method of claim 1, wherein the packet comprises a first packet, the method further comprising:
receiving, by the computing device, a second packet encapsulated with a network service header that includes the service path identifier and a service index for the service chain; branching, by the computing device, the second packet to a new service function chain by encapsulating the packet with a new network service header that indicates a service path identifier for the new service function chain. 16. The method of claim 1,
wherein the packet comprises a first packet, wherein the service function instance comprises a first service function instance, the method further comprising: receiving, by the computing device, a second packet encapsulated with a network service header that includes the service path identifier and a service index for the service chain; looping or jumping, by the computing device, the second packet to a second service function instance by selecting a new service index for the packet that is other than a next service index after the service index in the service function chain. 17. A computing device comprising:
one or more processors operably coupled to a memory; a first service function instance configured for execution by the one or more processors to apply a service function; a service function forwarder configured for execution by the one or more processors to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receive a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and send, to the second service function instance and based at least on determining a service function item of the one or more service function items indicates the second service function instance, a packet classified to the service function chain. 18. A controller comprising:
one or more processors operably coupled to a memory, wherein the one or more processors are configured to output a first layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items. 19. The controller of claim 18, wherein the one or more processors are configured to:
receive one or more layer 3 routing protocol route advertisements that include respective service function instance data for respective service function instances; and generate the one or more service function items from the respective service function instance data from the one or more layer 3 routing protocol route advertisements. | In some examples, a computing device comprises a first service function instance to apply a service function and a service function forwarder to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receive a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and send, to the second service function instance and based at least on determining a service function item of the one or more service function items indicates the second service function instance, a packet classified to the service function chain.1. A method comprising:
receiving, by a computing device, a first layer 3 routing protocol route advertisement that includes service function instance data for a service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receiving, by the computing device, a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and sending, by the computing device to the service function instance and based at least on determining a service function item of the one or more service function items indicates the service function instance, a packet classified to the service function chain. 2. The method of claim 1, wherein determining a service function item of the one or more service function items indicates the service function instance comprises:
determining, by the computing device, the service function item of the one or more service function items indicates the service function type and the service identifier. 3. The method of claim 1,
wherein the service function item of the one or more service function items indicates the service function type and the service identifier, and wherein the service identifier indicates any service function instance of a plurality of service function instances that applies the service function indicated by the service function type is a suitable service function instance. 4. The method of claim 1, wherein each service function item of the one or more service function items includes a service index that indicates a location for the service function item in an order of the service function chain, the method further comprising:
receiving, by the computing device, the packet encapsulated with a network service header that includes a service path identifier and a service index, wherein determining the service function item of the one or more service function items indicates the service function instance comprises, by the computing device, matching the service path identifier of the network service header and the service path identifier of the service function chain data and matching the service index of the network service header and the service index of the service function item. 5. The method of claim 1,
wherein the service function instance comprises a first service function instance, wherein the service function instance data comprises first service function instance data, the method further comprising: outputting, by the computing device, a third layer 3 routing protocol route advertisement protocol route advertisement that includes second service function instance data for a second service function instance hosted by the computing device to apply a service function, the second service function instance data indicating a service function type and a service identifier for the second service function instance. 6. The method of claim 5, wherein a second service function item of the one or more service function items indicates the second service function instance hosted by the computing device, the method further comprising:
applying, by the computing device, the service function to the packet. 7. The method of claim 1, wherein the first layer 3 routing protocol route advertisement protocol route advertisement comprises a Border Gateway Protocol UPDATE message that includes a service function chaining Network Layer Reachability Information that indicates the service function type and the service identifier. 8. The method of claim 7, wherein the service identifier comprises a Route Distinguisher. 9. The method of claim 7, wherein the Border Gateway Protocol UPDATE message comprises an encapsulation attribute that includes a network address for a computing device that hosts the service function instance, the method further comprising:
encapsulating, by the computing device based on the encapsulation attribute, the packet with a tunnel encapsulation header that includes the network address for the computing device to generate a tunnel packet; and sending, by the computing device to the computing device that hosts the service function instance, the tunnel packet. 10. The method of claim 1, wherein the second layer 3 routing protocol route advertisement comprises a Border Gateway Protocol UPDATE message that includes a service function chaining Network Layer Reachability Information that includes the service function chain data. 11. The method of claim 10, wherein the Border Gateway Protocol UPDATE message comprises a service function chain BGP Path attribute that includes the one or more service function items. 12. The method of claim 1, wherein the service function chain data includes a correlator that indicates the service function chain and another service function chain are to process a packet flow and a reverse packet flow for the packet flow, respectively. 13. The method of claim 1, wherein the sending comprises:
encapsulating, by the computing device, the packet with a network service header that includes the service index and the service path identifier; and sending the packet with the network service header. 14. The method of claim 1, wherein the first layer 3 routing protocol route advertisement and second layer 3 routing protocol route advertisement are each associated with a route target, the method further comprising:
importing, by the computing device in response to determining the computing device is configured to import the route target, the service function instance data and the service function chain data. 15. The method of claim 1, wherein the packet comprises a first packet, the method further comprising:
receiving, by the computing device, a second packet encapsulated with a network service header that includes the service path identifier and a service index for the service chain; branching, by the computing device, the second packet to a new service function chain by encapsulating the packet with a new network service header that indicates a service path identifier for the new service function chain. 16. The method of claim 1,
wherein the packet comprises a first packet, wherein the service function instance comprises a first service function instance, the method further comprising: receiving, by the computing device, a second packet encapsulated with a network service header that includes the service path identifier and a service index for the service chain; looping or jumping, by the computing device, the second packet to a second service function instance by selecting a new service index for the packet that is other than a next service index after the service index in the service function chain. 17. A computing device comprising:
one or more processors operably coupled to a memory; a first service function instance configured for execution by the one or more processors to apply a service function; a service function forwarder configured for execution by the one or more processors to: receive a first layer 3 routing protocol route advertisement that includes service function instance data for a second service function instance, the service function instance data indicating a service function type and a service identifier for the service function instance; receive a second layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items; and send, to the second service function instance and based at least on determining a service function item of the one or more service function items indicates the second service function instance, a packet classified to the service function chain. 18. A controller comprising:
one or more processors operably coupled to a memory, wherein the one or more processors are configured to output a first layer 3 routing protocol route advertisement that includes service function chain data for a service function chain, the service function chain data indicating a service path identifier and one or more service function items. 19. The controller of claim 18, wherein the one or more processors are configured to:
receive one or more layer 3 routing protocol route advertisements that include respective service function instance data for respective service function instances; and generate the one or more service function items from the respective service function instance data from the one or more layer 3 routing protocol route advertisements. | 2,400 |
8,364 | 8,364 | 15,516,269 | 2,463 | A radio device ( 100 ) receives a radio transmission on a carrier frequency. While receiving the radio transmission, the radio device ( 100 ) transmits an indication that the carrier frequency is in use by the radio transmission to the radio device ( 100 ). This indication may then be used by a further radio device ( 10, 11 ) for controlling a radio transmission to the radio device ( 100 ), e.g., by deciding whether, when, or how to use the carrier frequency for this radio transmission. | 1. A method of controlling radio transmission in a wireless communication network, the method comprising:
a radio device receiving a radio transmission on a carrier frequency; and while receiving the radio transmission, the radio device transmitting an indication that the carrier frequency is in use by the radio transmission to the radio device. 2. The method according to claim 1, wherein the indication further indicates at least one of the following:
radio resources which are available for a radio transmission to the radio device; an identity of the radio device; the carrier frequency. 3. (canceled) 4. (canceled) 5. The method according to claim 1,
wherein the radio device transmits the indication in a radio transmission on the carrier frequency or in a broadcast radio transmission. 6. (canceled) 7. The method according to claim 1, comprising:
while not receiving any radio transmission on the carrier frequency, the radio device transmitting a further indication that the carrier frequency is not used by a radio transmission to the radio device. 8. The method according to claim 7,
wherein the radio device transmits the further indication in a broadcast radio transmission. 9. The method according to claim 1,
wherein the radio device is an access node of the wireless communication network. 10. A method of controlling radio transmission in a wireless communication network, the method comprising:
a radio device detecting a need to use a carrier frequency for performing a radio transmission to a further radio device; and the radio device receiving, from the further radio device, an indication whether the carrier frequency is in use by another radio transmission to the further radio device; and depending on the indication, the radio device controlling the radio transmission to the further radio device. 11. The method according to claim 10, comprising:
in response to the indication indicating that the carrier frequency is in use by another radio transmission to the further radio device, the radio device executes at least one of the following steps: deferring the radio transmission to the further radio device performing the radio transmission to the further radio device on another carrier frequency; performing the radio transmission to the further radio device on the carrier frequency, using a transmit parameter configuration adapted to avoid interference with the other radio transmission to the further radio device. 12. (canceled) 13. (canceled) 14. The method according to claim 10, comprising:
in response to the indication indicating that the carrier frequency is not used by another radio transmission to the further radio device, the radio device sensing the carrier frequency to assess whether the carrier frequency is in use by another radio transmission. 15. The method according to claim 14, comprising:
in response to the sensing of the carrier frequency indicating that the carrier frequency is in use by another radio transmission, the radio device executes at least one of the following steps: deferring the radio transmission to the further radio device; performing the radio transmission to the further radio device on another carrier frequency; performing the radio transmission to the further radio device on the carrier frequency, using a transmit parameter configuration adapted to avoid interference with the other radio transmission. 16. (canceled) 17. (canceled) 18. The method according to claim 14, comprising:
in response to the sensing of the carrier frequency indicating that the carrier frequency is not in use by another radio transmission, the radio device performing the radio transmission to the further radio device on the carrier frequency. 19. The method according to claim 10,
wherein the indication further indicates at least one of the following: radio resources which are available for a radio transmission to the further radio device
an identity of the further radio device;
the carrier frequency. 20. (canceled) 21. (canceled) 22. The method according to claim 10,
wherein the radio device receives the indication in a radio transmission on the carrier frequency or in a broadcast radio transmission. 23. (canceled) 24. The method according to claim 10 wherein the further radio device is an access node of the wireless communication network. 25. A radio device comprising one or more processors and a memory, said memory containing instructions executable by said one or more processors whereby said the radio device being configured to:
receive a radio transmission on a carrier frequency; and while receiving the radio transmission, transmit an indication that the carrier frequency is in use by a radio transmission to the radio device. 26. The radio device according to claim 25,
wherein the indication further indicates at least one of the following:
radio resources which are available for a radio transmission to the radio device;
an identity of the radio device;
the carrier frequency. 27.-35. (canceled) 36. A radio device comprising one or more processors and a memory, said memory containing instructions executable by said one or more processors whereby said, the radio device being configured to:
detect a need to use a carrier frequency to perform a radio transmission to a further radio device; and receive, from the further radio device, an indication whether the carrier frequency is in use by another radio transmission to the further radio device; and depending on the indication, controlling the radio transmission to the further radio device. 37. The radio device according to claim 36,
wherein the radio device is further configured to, while not receiving any radio transmission on the carrier frequency, transmit a further indication that the carrier frequency is not used by a radio transmission to the radio device; and wherein the radio devise is further configured to transmit the further indication in a broadcast radio transmission. 38.-52. (canceled) 53. A system, comprising:
a first radio device and at least one second radio device, the first radio device being configured to:
receive a radio transmission on a carrier frequency; and
while receiving the radio transmission, transmit an indication that the carrier frequency is in use by the radio transmission to the radio device,
the at least one second radio device being configured to:
receive the indication from the first radio device; and
control performing of a radio transmission to the further radio device depending on the received indication. 54. A computer program comprising program code to be executed by at least one processor of a radio device, wherein execution of the program code causes the radio device to perform the steps of a method according claim 1. 55. A computer program product comprising program code to be executed by at least one processor of a radio device, wherein execution of the program code causes the radio device to perform the steps of a method according to claim 1. | A radio device ( 100 ) receives a radio transmission on a carrier frequency. While receiving the radio transmission, the radio device ( 100 ) transmits an indication that the carrier frequency is in use by the radio transmission to the radio device ( 100 ). This indication may then be used by a further radio device ( 10, 11 ) for controlling a radio transmission to the radio device ( 100 ), e.g., by deciding whether, when, or how to use the carrier frequency for this radio transmission.1. A method of controlling radio transmission in a wireless communication network, the method comprising:
a radio device receiving a radio transmission on a carrier frequency; and while receiving the radio transmission, the radio device transmitting an indication that the carrier frequency is in use by the radio transmission to the radio device. 2. The method according to claim 1, wherein the indication further indicates at least one of the following:
radio resources which are available for a radio transmission to the radio device; an identity of the radio device; the carrier frequency. 3. (canceled) 4. (canceled) 5. The method according to claim 1,
wherein the radio device transmits the indication in a radio transmission on the carrier frequency or in a broadcast radio transmission. 6. (canceled) 7. The method according to claim 1, comprising:
while not receiving any radio transmission on the carrier frequency, the radio device transmitting a further indication that the carrier frequency is not used by a radio transmission to the radio device. 8. The method according to claim 7,
wherein the radio device transmits the further indication in a broadcast radio transmission. 9. The method according to claim 1,
wherein the radio device is an access node of the wireless communication network. 10. A method of controlling radio transmission in a wireless communication network, the method comprising:
a radio device detecting a need to use a carrier frequency for performing a radio transmission to a further radio device; and the radio device receiving, from the further radio device, an indication whether the carrier frequency is in use by another radio transmission to the further radio device; and depending on the indication, the radio device controlling the radio transmission to the further radio device. 11. The method according to claim 10, comprising:
in response to the indication indicating that the carrier frequency is in use by another radio transmission to the further radio device, the radio device executes at least one of the following steps: deferring the radio transmission to the further radio device performing the radio transmission to the further radio device on another carrier frequency; performing the radio transmission to the further radio device on the carrier frequency, using a transmit parameter configuration adapted to avoid interference with the other radio transmission to the further radio device. 12. (canceled) 13. (canceled) 14. The method according to claim 10, comprising:
in response to the indication indicating that the carrier frequency is not used by another radio transmission to the further radio device, the radio device sensing the carrier frequency to assess whether the carrier frequency is in use by another radio transmission. 15. The method according to claim 14, comprising:
in response to the sensing of the carrier frequency indicating that the carrier frequency is in use by another radio transmission, the radio device executes at least one of the following steps: deferring the radio transmission to the further radio device; performing the radio transmission to the further radio device on another carrier frequency; performing the radio transmission to the further radio device on the carrier frequency, using a transmit parameter configuration adapted to avoid interference with the other radio transmission. 16. (canceled) 17. (canceled) 18. The method according to claim 14, comprising:
in response to the sensing of the carrier frequency indicating that the carrier frequency is not in use by another radio transmission, the radio device performing the radio transmission to the further radio device on the carrier frequency. 19. The method according to claim 10,
wherein the indication further indicates at least one of the following: radio resources which are available for a radio transmission to the further radio device
an identity of the further radio device;
the carrier frequency. 20. (canceled) 21. (canceled) 22. The method according to claim 10,
wherein the radio device receives the indication in a radio transmission on the carrier frequency or in a broadcast radio transmission. 23. (canceled) 24. The method according to claim 10 wherein the further radio device is an access node of the wireless communication network. 25. A radio device comprising one or more processors and a memory, said memory containing instructions executable by said one or more processors whereby said the radio device being configured to:
receive a radio transmission on a carrier frequency; and while receiving the radio transmission, transmit an indication that the carrier frequency is in use by a radio transmission to the radio device. 26. The radio device according to claim 25,
wherein the indication further indicates at least one of the following:
radio resources which are available for a radio transmission to the radio device;
an identity of the radio device;
the carrier frequency. 27.-35. (canceled) 36. A radio device comprising one or more processors and a memory, said memory containing instructions executable by said one or more processors whereby said, the radio device being configured to:
detect a need to use a carrier frequency to perform a radio transmission to a further radio device; and receive, from the further radio device, an indication whether the carrier frequency is in use by another radio transmission to the further radio device; and depending on the indication, controlling the radio transmission to the further radio device. 37. The radio device according to claim 36,
wherein the radio device is further configured to, while not receiving any radio transmission on the carrier frequency, transmit a further indication that the carrier frequency is not used by a radio transmission to the radio device; and wherein the radio devise is further configured to transmit the further indication in a broadcast radio transmission. 38.-52. (canceled) 53. A system, comprising:
a first radio device and at least one second radio device, the first radio device being configured to:
receive a radio transmission on a carrier frequency; and
while receiving the radio transmission, transmit an indication that the carrier frequency is in use by the radio transmission to the radio device,
the at least one second radio device being configured to:
receive the indication from the first radio device; and
control performing of a radio transmission to the further radio device depending on the received indication. 54. A computer program comprising program code to be executed by at least one processor of a radio device, wherein execution of the program code causes the radio device to perform the steps of a method according claim 1. 55. A computer program product comprising program code to be executed by at least one processor of a radio device, wherein execution of the program code causes the radio device to perform the steps of a method according to claim 1. | 2,400 |
8,365 | 8,365 | 14,996,888 | 2,482 | Disclosed are methods and systems for displaying content. In an aspect, a plurality of content items can be displayed on one user device according to user preference. An example method can comprise positioning a first set of pixels associated with a user device so that first content displayed via the first set of pixels can be viewable in a first viewing location. A second set of pixels associated with the user device can be positioned so that second content displayed via the second set of pixels can be viewable in a second viewing location. The second content can be different from the first content. | 1. A method, comprising:
positioning a first set of pixels associated with a user device so that first content displayed via the first set of pixels is viewable in a first viewing location; and positioning a second set of pixels associated with the user device so that second content displayed via the second set of pixels is viewable in a second viewing location, wherein the second content is different from the first content. 2. The method of claim 1, further comprising positioning a third set of pixels associated with the user device so that third content displayed on the third set of pixels is viewable in a third viewing location, wherein the third content is different from the second content, and wherein the third content is different from the first content. 3. The method of claim 1, wherein at least a portion of the first viewing location and at least a portion of the second viewing location are exclusive of each other. 4. The method of claim 1, wherein the first set of pixels comprises a first set of columns of pixels, wherein the second set of pixels comprises a second set of columns of pixels, and wherein columns of pixels of the user device alternate between a column from the first set of columns of pixels and a column from the second set of columns of pixels. 5. The method of claim 4, wherein each of the first set of columns of pixels are positioned at a same angle relative to a front of the user device. 6. The method of claim 4, wherein at least one of the first set of columns of pixels is positioned at an angle relative to a front of the user device that is different from an angle of at least one other of the first set of columns of pixels relative to the front of the user device. 7. The method of claim 1, wherein the first set of pixels comprises a first set of rows of pixels, wherein the second set of pixels comprises a second set of rows of pixels, and wherein rows of pixels of the user device alternate between a row from the first set of rows of pixels and a row from the second set of rows of pixels. 8. The method of claim 1, wherein audio associated with the first content is related to audio associated with the second content. 9. The method of claim 1, wherein the positioning the first set of pixels and the positioning the first set of pixels comprises configuring a mechanical angle of one or more pixels of the first set of pixels and the second set of pixels. 10. A method, comprising:
receiving a first content item, wherein the first content item is displayed on a first set of pixels associated with a user device so that the first content item displayed on the first set of pixels is viewable in a first viewing location; and receiving a second content item, wherein the second content item is displayed on a second set of pixels associated with the user device so that the second content item displayed on the second set of pixels is viewable in a second viewing location, and wherein the first viewing location is different from the second viewing location. 11. The method of claim 10, further comprising receiving a third content item, wherein the third content item is displayed on a third set of pixels associated with the user device so that the third content item displayed on the third set of pixels is viewable in a third viewing location, wherein the third viewing location is different from the second viewing location, and wherein the third viewing location is different from the first viewing location. 12. The method of claim 11, wherein at least a portion of each of the first viewing location, the second viewing location, and the third viewing location are exclusive of each other. 13. The method of claim 10, wherein the first set of pixels comprises a first set of columns of pixels, wherein the second set of pixels comprises a second set of columns of pixels, and wherein columns of pixels of the user device alternate between a column from the first set of columns of pixels and a column from the second set of columns of pixels. 14. The method of claim 13, wherein each of the first set of columns of pixels are positioned at a same angle relative to a front of the user device. 15. The method of claim 13, wherein at least one of the first set of columns of pixels is positioned at an angle relative to a front of the user device that is different from an angle of at least one other of the first set of columns of pixels relative to the front of the user device. 16. The method of claim 10, wherein the first set of pixels comprises a first set of rows of pixels, wherein the second set of pixels comprises a second set of rows of pixels, and wherein rows of pixels of the user device alternate between a row from the first set of rows of pixels and a row from the second set of rows of pixels. 17. A method, comprising:
determining a location of a user; and positioning a set of pixels associated with a user device so that an angle of the set of pixels changes relative to a front plane of the user device, wherein the determined location is within a viewing area of the set of pixels. 18. The method of claim 17, wherein determining the location of the user further comprises:
determining a left side of the user; and determining a right side of the user. 19. The method of claim 18, wherein positioning the set of pixels associated with the user device further comprises:
positioning a first portion of the set of pixels to direct light to the left side the user; and positioning a second portion of the set of pixels to direct light to the right side of the user. 20. The method of claim 19, wherein light waves emitted from the set of pixels form a three dimensional effect. | Disclosed are methods and systems for displaying content. In an aspect, a plurality of content items can be displayed on one user device according to user preference. An example method can comprise positioning a first set of pixels associated with a user device so that first content displayed via the first set of pixels can be viewable in a first viewing location. A second set of pixels associated with the user device can be positioned so that second content displayed via the second set of pixels can be viewable in a second viewing location. The second content can be different from the first content.1. A method, comprising:
positioning a first set of pixels associated with a user device so that first content displayed via the first set of pixels is viewable in a first viewing location; and positioning a second set of pixels associated with the user device so that second content displayed via the second set of pixels is viewable in a second viewing location, wherein the second content is different from the first content. 2. The method of claim 1, further comprising positioning a third set of pixels associated with the user device so that third content displayed on the third set of pixels is viewable in a third viewing location, wherein the third content is different from the second content, and wherein the third content is different from the first content. 3. The method of claim 1, wherein at least a portion of the first viewing location and at least a portion of the second viewing location are exclusive of each other. 4. The method of claim 1, wherein the first set of pixels comprises a first set of columns of pixels, wherein the second set of pixels comprises a second set of columns of pixels, and wherein columns of pixels of the user device alternate between a column from the first set of columns of pixels and a column from the second set of columns of pixels. 5. The method of claim 4, wherein each of the first set of columns of pixels are positioned at a same angle relative to a front of the user device. 6. The method of claim 4, wherein at least one of the first set of columns of pixels is positioned at an angle relative to a front of the user device that is different from an angle of at least one other of the first set of columns of pixels relative to the front of the user device. 7. The method of claim 1, wherein the first set of pixels comprises a first set of rows of pixels, wherein the second set of pixels comprises a second set of rows of pixels, and wherein rows of pixels of the user device alternate between a row from the first set of rows of pixels and a row from the second set of rows of pixels. 8. The method of claim 1, wherein audio associated with the first content is related to audio associated with the second content. 9. The method of claim 1, wherein the positioning the first set of pixels and the positioning the first set of pixels comprises configuring a mechanical angle of one or more pixels of the first set of pixels and the second set of pixels. 10. A method, comprising:
receiving a first content item, wherein the first content item is displayed on a first set of pixels associated with a user device so that the first content item displayed on the first set of pixels is viewable in a first viewing location; and receiving a second content item, wherein the second content item is displayed on a second set of pixels associated with the user device so that the second content item displayed on the second set of pixels is viewable in a second viewing location, and wherein the first viewing location is different from the second viewing location. 11. The method of claim 10, further comprising receiving a third content item, wherein the third content item is displayed on a third set of pixels associated with the user device so that the third content item displayed on the third set of pixels is viewable in a third viewing location, wherein the third viewing location is different from the second viewing location, and wherein the third viewing location is different from the first viewing location. 12. The method of claim 11, wherein at least a portion of each of the first viewing location, the second viewing location, and the third viewing location are exclusive of each other. 13. The method of claim 10, wherein the first set of pixels comprises a first set of columns of pixels, wherein the second set of pixels comprises a second set of columns of pixels, and wherein columns of pixels of the user device alternate between a column from the first set of columns of pixels and a column from the second set of columns of pixels. 14. The method of claim 13, wherein each of the first set of columns of pixels are positioned at a same angle relative to a front of the user device. 15. The method of claim 13, wherein at least one of the first set of columns of pixels is positioned at an angle relative to a front of the user device that is different from an angle of at least one other of the first set of columns of pixels relative to the front of the user device. 16. The method of claim 10, wherein the first set of pixels comprises a first set of rows of pixels, wherein the second set of pixels comprises a second set of rows of pixels, and wherein rows of pixels of the user device alternate between a row from the first set of rows of pixels and a row from the second set of rows of pixels. 17. A method, comprising:
determining a location of a user; and positioning a set of pixels associated with a user device so that an angle of the set of pixels changes relative to a front plane of the user device, wherein the determined location is within a viewing area of the set of pixels. 18. The method of claim 17, wherein determining the location of the user further comprises:
determining a left side of the user; and determining a right side of the user. 19. The method of claim 18, wherein positioning the set of pixels associated with the user device further comprises:
positioning a first portion of the set of pixels to direct light to the left side the user; and positioning a second portion of the set of pixels to direct light to the right side of the user. 20. The method of claim 19, wherein light waves emitted from the set of pixels form a three dimensional effect. | 2,400 |
8,366 | 8,366 | 14,752,281 | 2,447 | A hub for managing networked household appliances is provided. The hub may include a network communication interface for wirelessly connecting to a wireless access point of a wireless local area network (WLAN), and a wireless repeater for receiving and rebroadcasting signals from the wireless access point. The hub may include an appliance communication interface for wirelessly connecting the hub to a plurality of household appliances and establish a wireless local appliance network over which the hub and the plurality of household appliances are configured to communicate with one another. The hub may also include a control module coupled to the appliance communication interface and configured to provide a user interface to enable a user to interact with the plurality of household appliances from the hub over the wireless local appliance network, and view status information associated with the household appliance. | 1. A hub for managing networked household appliances, the hub comprising:
a network communication interface configured to connect the hub to a wireless access point of a wireless local area network (WLAN); a wireless repeater configured to receive and rebroadcast signals from the wireless access point; an appliance communication interface configured to wirelessly connect the hub to a plurality of household appliances and thereby establish a wireless local appliance network over which the hub and the plurality of household appliances are configured to communicate with one another; and a control module coupled to the appliance communication interface and configured to provide a user interface to enable a user to interact with the plurality of household appliances from the hub over the wireless local appliance network, and for each household appliance of the plurality of household appliances, view status information associated with the household appliance. 2. The hub of claim 1, wherein the wireless repeater is configured to establish a second WLAN by the rebroadcast of signals from the wireless access point, one or more stations separate and distinct from the plurality of household appliances being wirelessly connectable to the wireless repeater for communication over the second WLAN. 3. The hub of claim 1, wherein the control module is further coupled to the network communication interface to further enable the plurality of household appliances to wirelessly connect to the wireless access point via the hub. 4. The hub of claim 1, wherein the control module being configured to provide the user interface includes for a household appliance of the plurality of household appliances, the control module being configured to receive user input to request and correspondingly interact with the household appliance to effect an operation or update a setting of the household appliance. 5. The hub of claim 1, wherein the control module being configured to provide the user interface includes for a household appliance of the plurality of household appliances, the control module being configured to receive user input to request and correspondingly interact with the household appliance to update a setting of the household appliance whereby the update is synchronized with at least one other household appliance of the plurality of household appliances. 6. The hub of claim 1, wherein the control module being configured to provide the user interface to enable the user to view status information includes being configured to produce a graph of the status information associated with the household appliance, the graph being an energy usage graph, appliance temperature graph, or graphical cycle progression chart. 7. The hub of claim 1 wherein the control module is further configured to monitor a status of each household appliance of the plurality of household appliances, and
wherein the control module is configured to diagnose an error associated with a household appliance of the plurality of household appliances based at least in part on the status of the household appliance, and automatically alert the user of the error via the user interface. 8. The hub of claim 1 wherein the control module is further configured to perform at least one operation that corresponds to an operation of a household appliance of the plurality of household appliances, the at least one operation including a clock function, radio function, weather information service, thermostat function, measurement function, or timer function. 9. The hub of claim 1 further comprising a display configured to present the user interface. 10. The hub of claim 1 integrated into a stand-alone household appliance separate and distinct from the plurality of household appliances, the appliance communication interface being configured to wirelessly connect the stand-alone household appliance to the plurality of household appliances and thereby establish the wireless local appliance network over which the stand-alone household appliance and the plurality of household appliances are configured to communicate with one another. 11. A method for managing a plurality of household appliances via a hub, the method comprising at the hub:
connecting the hub to a wireless access point of a wireless local area network (WLAN); receiving and rebroadcasting signals from the wireless access point via a wireless repeater of the hub; wirelessly connecting the hub to the plurality of household appliances and thereby establishing a wireless local appliance network over which the hub and the plurality of household appliances communicate with one another; and providing a user interface to enable a user to interact with the plurality of household appliances from the hub over the wireless local appliance network, and for each household appliance of the plurality of household appliances, view status information associated with the household appliance. 12. The method of claim 11 further comprising establishing a second WLAN by the rebroadcast of signals from the wireless access point, one or more stations separate and distinct from the plurality of household appliances being wirelessly connectable to the wireless repeater for communication over the second WLAN. 13. The method of claim 11 further comprising wirelessly connecting the plurality of household appliances to the wireless access point via the hub. 14. The method of claim 11, wherein providing the user interface includes, for a household appliance of the plurality of household appliances, receiving user input to request and correspondingly interact with the household appliance to effect an operation or update a setting of the household appliance. 15. The method of claim 11, wherein providing the user interface includes, for a household appliance of the plurality of household appliances, receiving user input to request and correspondingly interacting with the household appliance to update a setting of the household appliance whereby the update is synchronized with at least one other household appliance of the plurality of household appliances. 16. The method of claim 11, wherein providing the user interface to enable the user to view status information includes producing a graph of the status information associated with the household appliance, the graph being an energy usage graph, appliance temperature graph, or graphical cycle progression chart. 17. The method of claim 11 further comprising at the hub:
monitoring a status of each household appliance of the plurality of household appliances;
diagnosing an error associated with a household appliance of the plurality of household appliances based at least in part on the status of the household appliance; and
automatically alerting the user of the error via the user interface. 18. The method of claim 11 further comprising at the hub, performing at least one operation that corresponds to an operation of a household appliance of the plurality of household appliances, the at least one operation including a clock function, radio function, weather information service, thermostat function, measurement function, or timer function. 19. The method of claim 11 further comprising at the hub, presenting the user interface. 20. The method of claim 11, wherein the hub is integrated into a stand-alone household appliance separate and distinct from the plurality of household appliances, and
wherein the method further comprises wirelessly connecting the stand-alone household appliance to the plurality of household appliances and thereby establish the wireless local appliance network over which the stand-alone household appliance and the plurality of household appliances communicate with one another. | A hub for managing networked household appliances is provided. The hub may include a network communication interface for wirelessly connecting to a wireless access point of a wireless local area network (WLAN), and a wireless repeater for receiving and rebroadcasting signals from the wireless access point. The hub may include an appliance communication interface for wirelessly connecting the hub to a plurality of household appliances and establish a wireless local appliance network over which the hub and the plurality of household appliances are configured to communicate with one another. The hub may also include a control module coupled to the appliance communication interface and configured to provide a user interface to enable a user to interact with the plurality of household appliances from the hub over the wireless local appliance network, and view status information associated with the household appliance.1. A hub for managing networked household appliances, the hub comprising:
a network communication interface configured to connect the hub to a wireless access point of a wireless local area network (WLAN); a wireless repeater configured to receive and rebroadcast signals from the wireless access point; an appliance communication interface configured to wirelessly connect the hub to a plurality of household appliances and thereby establish a wireless local appliance network over which the hub and the plurality of household appliances are configured to communicate with one another; and a control module coupled to the appliance communication interface and configured to provide a user interface to enable a user to interact with the plurality of household appliances from the hub over the wireless local appliance network, and for each household appliance of the plurality of household appliances, view status information associated with the household appliance. 2. The hub of claim 1, wherein the wireless repeater is configured to establish a second WLAN by the rebroadcast of signals from the wireless access point, one or more stations separate and distinct from the plurality of household appliances being wirelessly connectable to the wireless repeater for communication over the second WLAN. 3. The hub of claim 1, wherein the control module is further coupled to the network communication interface to further enable the plurality of household appliances to wirelessly connect to the wireless access point via the hub. 4. The hub of claim 1, wherein the control module being configured to provide the user interface includes for a household appliance of the plurality of household appliances, the control module being configured to receive user input to request and correspondingly interact with the household appliance to effect an operation or update a setting of the household appliance. 5. The hub of claim 1, wherein the control module being configured to provide the user interface includes for a household appliance of the plurality of household appliances, the control module being configured to receive user input to request and correspondingly interact with the household appliance to update a setting of the household appliance whereby the update is synchronized with at least one other household appliance of the plurality of household appliances. 6. The hub of claim 1, wherein the control module being configured to provide the user interface to enable the user to view status information includes being configured to produce a graph of the status information associated with the household appliance, the graph being an energy usage graph, appliance temperature graph, or graphical cycle progression chart. 7. The hub of claim 1 wherein the control module is further configured to monitor a status of each household appliance of the plurality of household appliances, and
wherein the control module is configured to diagnose an error associated with a household appliance of the plurality of household appliances based at least in part on the status of the household appliance, and automatically alert the user of the error via the user interface. 8. The hub of claim 1 wherein the control module is further configured to perform at least one operation that corresponds to an operation of a household appliance of the plurality of household appliances, the at least one operation including a clock function, radio function, weather information service, thermostat function, measurement function, or timer function. 9. The hub of claim 1 further comprising a display configured to present the user interface. 10. The hub of claim 1 integrated into a stand-alone household appliance separate and distinct from the plurality of household appliances, the appliance communication interface being configured to wirelessly connect the stand-alone household appliance to the plurality of household appliances and thereby establish the wireless local appliance network over which the stand-alone household appliance and the plurality of household appliances are configured to communicate with one another. 11. A method for managing a plurality of household appliances via a hub, the method comprising at the hub:
connecting the hub to a wireless access point of a wireless local area network (WLAN); receiving and rebroadcasting signals from the wireless access point via a wireless repeater of the hub; wirelessly connecting the hub to the plurality of household appliances and thereby establishing a wireless local appliance network over which the hub and the plurality of household appliances communicate with one another; and providing a user interface to enable a user to interact with the plurality of household appliances from the hub over the wireless local appliance network, and for each household appliance of the plurality of household appliances, view status information associated with the household appliance. 12. The method of claim 11 further comprising establishing a second WLAN by the rebroadcast of signals from the wireless access point, one or more stations separate and distinct from the plurality of household appliances being wirelessly connectable to the wireless repeater for communication over the second WLAN. 13. The method of claim 11 further comprising wirelessly connecting the plurality of household appliances to the wireless access point via the hub. 14. The method of claim 11, wherein providing the user interface includes, for a household appliance of the plurality of household appliances, receiving user input to request and correspondingly interact with the household appliance to effect an operation or update a setting of the household appliance. 15. The method of claim 11, wherein providing the user interface includes, for a household appliance of the plurality of household appliances, receiving user input to request and correspondingly interacting with the household appliance to update a setting of the household appliance whereby the update is synchronized with at least one other household appliance of the plurality of household appliances. 16. The method of claim 11, wherein providing the user interface to enable the user to view status information includes producing a graph of the status information associated with the household appliance, the graph being an energy usage graph, appliance temperature graph, or graphical cycle progression chart. 17. The method of claim 11 further comprising at the hub:
monitoring a status of each household appliance of the plurality of household appliances;
diagnosing an error associated with a household appliance of the plurality of household appliances based at least in part on the status of the household appliance; and
automatically alerting the user of the error via the user interface. 18. The method of claim 11 further comprising at the hub, performing at least one operation that corresponds to an operation of a household appliance of the plurality of household appliances, the at least one operation including a clock function, radio function, weather information service, thermostat function, measurement function, or timer function. 19. The method of claim 11 further comprising at the hub, presenting the user interface. 20. The method of claim 11, wherein the hub is integrated into a stand-alone household appliance separate and distinct from the plurality of household appliances, and
wherein the method further comprises wirelessly connecting the stand-alone household appliance to the plurality of household appliances and thereby establish the wireless local appliance network over which the stand-alone household appliance and the plurality of household appliances communicate with one another. | 2,400 |
8,367 | 8,367 | 14,815,799 | 2,454 | Technologies are described herein for changelog transformation and correlation in a multi-tenant cloud service. Components within the multi-tenant cloud service generate changelogs that describe changes made to hardware or software components within the multi-tenant cloud service. The changelogs are received and transformed from different schemas into a common schema. A central change management service (“CCMS”) exposes a network service application programming interface (“API”), or other type of interface, through which other network services can obtain the changelogs that have been transformed into the common schema. For example, services can obtain changelogs in order to correlate changes to anomalies or other events taking place in the multi-tenant cloud service, to identify upstream or downstream components that might be impacted by a change, to provide a user interface for viewing the changelogs, the correlation, or the potential impact of a change, and/or to perform other types of functions. | 1. A computer-implemented method for central management of changelogs corresponding to changes to components in a multi-tenant cloud service, the method comprising:
obtaining changelogs from a plurality of services executing in the multi-tenant cloud service, the changelogs describing changes to the components in the multi-tenant cloud service and being expressed using a plurality of schemas; transforming the changelogs expressed using the plurality of schemas to changelogs expressed using a common schema; and exposing a network service application programming interface through which one or more other services executing in the multi-tenant cloud service can obtain the plurality of changelogs expressed using the common schema for a single tenant of the multi-tenant cloud service. 2. The computer-implemented method of claim 1, wherein the changelogs expressed using the common schema comprise one or more fields storing
data identifying a time a change started, a time a change ended, an identifier (ID) for a changed component, and one or more properties of a change. 3. The computer-implemented method of claim 1, further comprising assigning a unique identifier (ID) to each of the plurality of changelogs expressed using the common schema. 4. The computer-implemented method of claim 1, further comprising:
receiving a request for a user interface (UI) presenting one or more of the changelogs expressed using the common schema; in response to the request, calling the network service API to obtain the one or more of the changelogs expressed using the common schema; performing one or more processing operations on the one or more of the changelogs expressed using the common schema; and causing the UI to be presented, the UI comprising the one or more of the changelogs expressed using the common schema. 5. The computer-implemented method of claim 4, further comprising:
correlating the one or more of the changelogs expressed using the common schema with one or more anomalies detected in the multi-tenant cloud service; and presenting data in the UI showing the correlation between the one or more of the changelogs expressed using the common schema and the one or more anomalies in the multi-tenant cloud service. 6. The computer-implemented method of claim 4, further comprising:
obtaining mapping data that describes relationships between the components in the multi-tenant cloud service; utilizing the mapping data to identify one or more of the components in the multi-tenant cloud service that can be impacted by a change associated with one of the changelogs expressed using the common schema; and presenting data in the UI showing the identified one or more of the components in the multi-tenant cloud service that can be impacted by the change. 7. The computer-implemented method of claim 4, further comprising:
obtaining mapping data that describes relationships between the components in the multi-tenant cloud service; utilizing the mapping data to identify a change associated with one of the changelogs expressed using the common schema that might have impacted one or more of the components in the multi-tenant cloud service; and presenting data in the UI showing the identified change. 8. The computer-implemented method of claim 4, wherein the one or more of the changelogs expressed using the common schema presented in the UI comprise changelogs corresponding to the single tenant of the multi-tenant cloud service. 9. A computer storage medium having computer executable instructions stored thereon which, when executed by a computer, cause the computer to:
obtain changelogs from a plurality of services executing in a multi-tenant cloud service, the changelogs describing changes to components operating in the multi-tenant cloud service and being expressed using a plurality of schemas; transform the changelogs expressed using the plurality of schemas to changelogs expressed using a common schema; and expose a network service application programming interface through which one or more other services can obtain the plurality of changelogs expressed using the common schema. 10. The computer storage medium of claim 9, having further computer executable instructions stored thereon to:
receive a request for a user interface (UI) presenting one or more of the changelogs expressed using the common schema; call the network service API to obtain the one or more of the changelogs expressed using the common schema; perform one or more processing operations on the one or more of the changelogs expressed using the common schema; and cause the UI to be presented, the UI comprising the one or more of the changelogs expressed using the common schema. 11. The computer storage medium of claim 10, having further computer executable instructions stored thereon to:
correlate the one or more changelogs expressed using the common schema with one or more anomalies detected in the multi-tenant cloud service; and cause data to be presented in the UI showing the correlation between the one or more changelogs expressed using the common schema and the one or more anomalies in the multi-tenant cloud service. 12. The computer storage medium of claim 10, having further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify one or more of the components in the multi-tenant cloud service that can be impacted by a change associated with one of the changelogs expressed using the common schema; and cause data to be presented in the UI showing the identified one or more of the components in the multi-tenant cloud service that can be impacted by the change. 13. The computer storage medium of claim 10, having further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify a change associated with one of the changelogs expressed using the common schema that might have impacted one or more of the components in the multi-tenant cloud service; and cause data to be presented in the UI showing the identified change. 14. The computer storage medium of claim 10, wherein the one or more of the changelogs expressed using the common schema presented in the UI comprise changelogs corresponding to a single tenant of the multi-tenant cloud service. 15. An apparatus, comprising:
one or more processors; and at least one computer storage medium having computer executable instructions stored thereon which, when executed by the one or more processors, cause the apparatus to
obtain changelogs from a plurality of services executing in a multi-tenant cloud service, the changelogs describing changes to components operating in the multi-tenant cloud service and being expressed using a plurality of schemas,
transform the changelogs expressed using the plurality of schemas to changelogs expressed using a common schema, and
expose a network service application programming interface through which one or more other services can obtain the plurality of changelogs expressed using the common schema. 16. The apparatus of claim 15, wherein the computer storage medium has further computer executable instructions stored thereon to:
receive a request for a user interface (UI) presenting one or more of the changelogs expressed using the common schema; call the network service API to obtain the one or more of the changelogs expressed using the common schema; perform one or more processing operations on the one or more of the changelogs expressed using the common schema; and cause the UI to be presented, the UI comprising the one or more of the changelogs expressed using the common schema. 17. The apparatus of claim 16, wherein the computer storage medium has further computer executable instructions stored thereon to:
correlate the one or more changelogs expressed using the common schema with one or more anomalies detected in the multi-tenant cloud service; and cause data to be presented in the UI showing the correlation between the one or more changelogs expressed using the common schema and the one or more anomalies in the multi-tenant cloud service. 18. The apparatus of claim 16, wherein the computer storage medium has further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify one or more of the components in the multi-tenant cloud service that can be impacted by a change associated with one of the changelogs expressed using the common schema; and cause data to be presented in the UI showing the identified one or more of the components in the multi-tenant cloud service that can be impacted by the change. 19. The apparatus of claim 16, wherein the computer storage medium has further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify a change associated with one of the changelogs expressed using the common schema that might have impacted one or more of the components in the multi-tenant cloud service; and cause data to be presented in the UI showing the identified change. 20. The apparatus of claim 16, wherein the one or more of the changelogs expressed using the common schema presented in the UI comprise changelogs corresponding to a single tenant of the multi-tenant cloud service. | Technologies are described herein for changelog transformation and correlation in a multi-tenant cloud service. Components within the multi-tenant cloud service generate changelogs that describe changes made to hardware or software components within the multi-tenant cloud service. The changelogs are received and transformed from different schemas into a common schema. A central change management service (“CCMS”) exposes a network service application programming interface (“API”), or other type of interface, through which other network services can obtain the changelogs that have been transformed into the common schema. For example, services can obtain changelogs in order to correlate changes to anomalies or other events taking place in the multi-tenant cloud service, to identify upstream or downstream components that might be impacted by a change, to provide a user interface for viewing the changelogs, the correlation, or the potential impact of a change, and/or to perform other types of functions.1. A computer-implemented method for central management of changelogs corresponding to changes to components in a multi-tenant cloud service, the method comprising:
obtaining changelogs from a plurality of services executing in the multi-tenant cloud service, the changelogs describing changes to the components in the multi-tenant cloud service and being expressed using a plurality of schemas; transforming the changelogs expressed using the plurality of schemas to changelogs expressed using a common schema; and exposing a network service application programming interface through which one or more other services executing in the multi-tenant cloud service can obtain the plurality of changelogs expressed using the common schema for a single tenant of the multi-tenant cloud service. 2. The computer-implemented method of claim 1, wherein the changelogs expressed using the common schema comprise one or more fields storing
data identifying a time a change started, a time a change ended, an identifier (ID) for a changed component, and one or more properties of a change. 3. The computer-implemented method of claim 1, further comprising assigning a unique identifier (ID) to each of the plurality of changelogs expressed using the common schema. 4. The computer-implemented method of claim 1, further comprising:
receiving a request for a user interface (UI) presenting one or more of the changelogs expressed using the common schema; in response to the request, calling the network service API to obtain the one or more of the changelogs expressed using the common schema; performing one or more processing operations on the one or more of the changelogs expressed using the common schema; and causing the UI to be presented, the UI comprising the one or more of the changelogs expressed using the common schema. 5. The computer-implemented method of claim 4, further comprising:
correlating the one or more of the changelogs expressed using the common schema with one or more anomalies detected in the multi-tenant cloud service; and presenting data in the UI showing the correlation between the one or more of the changelogs expressed using the common schema and the one or more anomalies in the multi-tenant cloud service. 6. The computer-implemented method of claim 4, further comprising:
obtaining mapping data that describes relationships between the components in the multi-tenant cloud service; utilizing the mapping data to identify one or more of the components in the multi-tenant cloud service that can be impacted by a change associated with one of the changelogs expressed using the common schema; and presenting data in the UI showing the identified one or more of the components in the multi-tenant cloud service that can be impacted by the change. 7. The computer-implemented method of claim 4, further comprising:
obtaining mapping data that describes relationships between the components in the multi-tenant cloud service; utilizing the mapping data to identify a change associated with one of the changelogs expressed using the common schema that might have impacted one or more of the components in the multi-tenant cloud service; and presenting data in the UI showing the identified change. 8. The computer-implemented method of claim 4, wherein the one or more of the changelogs expressed using the common schema presented in the UI comprise changelogs corresponding to the single tenant of the multi-tenant cloud service. 9. A computer storage medium having computer executable instructions stored thereon which, when executed by a computer, cause the computer to:
obtain changelogs from a plurality of services executing in a multi-tenant cloud service, the changelogs describing changes to components operating in the multi-tenant cloud service and being expressed using a plurality of schemas; transform the changelogs expressed using the plurality of schemas to changelogs expressed using a common schema; and expose a network service application programming interface through which one or more other services can obtain the plurality of changelogs expressed using the common schema. 10. The computer storage medium of claim 9, having further computer executable instructions stored thereon to:
receive a request for a user interface (UI) presenting one or more of the changelogs expressed using the common schema; call the network service API to obtain the one or more of the changelogs expressed using the common schema; perform one or more processing operations on the one or more of the changelogs expressed using the common schema; and cause the UI to be presented, the UI comprising the one or more of the changelogs expressed using the common schema. 11. The computer storage medium of claim 10, having further computer executable instructions stored thereon to:
correlate the one or more changelogs expressed using the common schema with one or more anomalies detected in the multi-tenant cloud service; and cause data to be presented in the UI showing the correlation between the one or more changelogs expressed using the common schema and the one or more anomalies in the multi-tenant cloud service. 12. The computer storage medium of claim 10, having further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify one or more of the components in the multi-tenant cloud service that can be impacted by a change associated with one of the changelogs expressed using the common schema; and cause data to be presented in the UI showing the identified one or more of the components in the multi-tenant cloud service that can be impacted by the change. 13. The computer storage medium of claim 10, having further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify a change associated with one of the changelogs expressed using the common schema that might have impacted one or more of the components in the multi-tenant cloud service; and cause data to be presented in the UI showing the identified change. 14. The computer storage medium of claim 10, wherein the one or more of the changelogs expressed using the common schema presented in the UI comprise changelogs corresponding to a single tenant of the multi-tenant cloud service. 15. An apparatus, comprising:
one or more processors; and at least one computer storage medium having computer executable instructions stored thereon which, when executed by the one or more processors, cause the apparatus to
obtain changelogs from a plurality of services executing in a multi-tenant cloud service, the changelogs describing changes to components operating in the multi-tenant cloud service and being expressed using a plurality of schemas,
transform the changelogs expressed using the plurality of schemas to changelogs expressed using a common schema, and
expose a network service application programming interface through which one or more other services can obtain the plurality of changelogs expressed using the common schema. 16. The apparatus of claim 15, wherein the computer storage medium has further computer executable instructions stored thereon to:
receive a request for a user interface (UI) presenting one or more of the changelogs expressed using the common schema; call the network service API to obtain the one or more of the changelogs expressed using the common schema; perform one or more processing operations on the one or more of the changelogs expressed using the common schema; and cause the UI to be presented, the UI comprising the one or more of the changelogs expressed using the common schema. 17. The apparatus of claim 16, wherein the computer storage medium has further computer executable instructions stored thereon to:
correlate the one or more changelogs expressed using the common schema with one or more anomalies detected in the multi-tenant cloud service; and cause data to be presented in the UI showing the correlation between the one or more changelogs expressed using the common schema and the one or more anomalies in the multi-tenant cloud service. 18. The apparatus of claim 16, wherein the computer storage medium has further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify one or more of the components in the multi-tenant cloud service that can be impacted by a change associated with one of the changelogs expressed using the common schema; and cause data to be presented in the UI showing the identified one or more of the components in the multi-tenant cloud service that can be impacted by the change. 19. The apparatus of claim 16, wherein the computer storage medium has further computer executable instructions stored thereon to:
obtain mapping data that describes relationships between the components in the multi-tenant cloud service; utilize the mapping data to identify a change associated with one of the changelogs expressed using the common schema that might have impacted one or more of the components in the multi-tenant cloud service; and cause data to be presented in the UI showing the identified change. 20. The apparatus of claim 16, wherein the one or more of the changelogs expressed using the common schema presented in the UI comprise changelogs corresponding to a single tenant of the multi-tenant cloud service. | 2,400 |
8,368 | 8,368 | 14,583,660 | 2,434 | Technologies for ensuring data integrity for multi-packet operations include a computing device and a remote computing device communicatively coupled via a network. The computing device is configured to perform a segmentation offload operation on an original network packet, compute a hash value on the payload of each segmented payload of the original network packet, and store the hash value and an indication into the segmented network packet that indicates the hash value is stored in the segmented network packet. The remote computing device is configured to extract the indication and the hash value from a received network packet in response to determining the indication indicates the hash value is stored in the segmented network packet, compute a hash value on the payload of received network packet, and determine an integrity of the payload based on a comparison of the extracted hash value and the computed hash value. | 1. A computing device to store a data integrity check into network communication transmissions, the computing device comprising:
a hash generator module to compute a hash value of a payload of a network packet, wherein the payload of the network packet is a result of a segmentation operation; a data integrity preparation module to store the hash value in the network packet and store an indication in the network packet to indicate to a recipient of the network packet that the hash value is stored in the network packet; and a network communication module to transmit the network packet to a remote computing device. 2. The computing device of claim 1, wherein to compute the hash value of the payload comprises to compute a cryptographic hash value of the payload based on a cryptographic hash function. 3. The computing device of claim 1, wherein to store the hash value in the network packet comprises to store the hash value in a field of a header of the network packet. 4. The computing device of claim 3, wherein to store the hash value in the field of the header of the network packet comprises to store the hash value in an options field of a TCP header of the network packet. 5. The computing device of claim 1, wherein to store the indication to indicate to the recipient of the network packet that the hash value is stored in the network packet comprises to store the indication in a field of a header of the network packet. 6. The computing device of claim 5, wherein to store the indication in the field of the header of the network packet comprises to set a bit in a reserved field of a TCP header of the network packet that corresponds to the indication. 7. The computing device of claim 1, further comprising a data integrity module, wherein the data integrity module comprises the hash generator module and the data integrity preparation module. 8. A computing device to perform a data integrity check of received network communications, the computing device comprising:
a data integrity verification module to determine whether a first hash value is stored in a network packet received from a remote computing device and extract the first hash value from the network packet in response to a determination that the first hash value is stored in the network packet, wherein the network packet received from the remote computing device is a segmented network packet that resulted from a segmentation operation; a hash generator module to compute a second hash value of a payload of a received network packet; and a hash comparator module to compare the first hash value and the second hash value. 9. The computing device of claim 8, wherein to compute the second hash value of the payload of the network packet comprises to compute a cryptographic hash value of the payload based on a cryptographic hash function. 10. The computing device of claim 8, wherein to extract the first hash value in the network packet comprises to extract the first hash value from an options field of a TCP header of the network packet. 11. The computing device of claim 8, wherein determine whether the first hash value is stored in the network packet comprises to extract a bit from a reserved field of a TCP header of the network packet that corresponds to the indication. 12. The computing device of claim 8, wherein the hash comparator module is further to provide an indication to the remote computing device that the received network packet is corrupt in response to a determination that the first hash value and the second hash value do not match. 13. The computing device of claim 8, further comprising a data integrity module, wherein the data integrity module comprises the data integrity verification module, the hash generator module, and the hash comparator module. 14. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a computing device to:
perform a segmentation offload operation on an original payload of an unsegmented network packet; compute a hash value of a payload of a network packet, wherein the payload of the network packet is a result of the segmentation offload operation; store the hash value in the network packet; store an indication in the network packet to indicate to the remote computing device that the hash value is stored in the network packet; and transmit the network packet to the remote computing device. 15. The one or more computer-readable storage media of claim 14, wherein to compute the hash value of the payload comprises to compute the hash value of the payload using a cryptographic hash function. 16. The one or more computer-readable storage media of claim 14, wherein to compute the hash value of the payload comprises to compute the hash value of the payload subsequent to the segmentation offload operation and prior to other processing of the network packet by the computing device. 17. The one or more computer-readable storage media of claim 14, wherein to store the hash value in the network packet comprises to store the hash value in a field of a header of the network packet. 18. The one or more computer-readable storage media of claim 17, wherein to store the hash value in the field of the header of the network packet comprises to store the hash value in an options field of a TCP header of the network packet. 19. The one or more computer-readable storage media of claim 14, wherein to store the indication comprises to store the indication in a field of a header of the network packet. 20. The one or more computer-readable storage media of claim 19, wherein to store the indication in the field of the header of the network packet comprises to set a bit in a reserved field of a TCP header of the network packet that corresponds to the indication. 21. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a computing device to:
determine whether a first hash value is stored in a network packet received from a remote computing device; extract the first hash value from the network packet in response to a determination that the first hash value is stored in the network packet, wherein the network packet received from the remote computing device is a segmented network packet that resulted from a segmentation operation; compute a second hash value of a payload of the network packet received from the remote computing device; and compare the first hash value and the second hash value. 22. The one or more computer-readable storage media of claim 21, wherein to compute the second hash value of the payload of the network packet comprises to compute a cryptographic hash value of the payload of the network packet based on a cryptographic hash function. 23. The one or more computer-readable storage media of claim 21, wherein to extract the first hash value in the network packet comprises to extract the first hash value from an options field of a TCP header of the network packet. 24. The one or more computer-readable storage media of claim 21, wherein to determine whether the first hash value is stored in the network packet comprises to extract a bit from a reserved field of a TCP header of the network packet that corresponds to the indication. 25. The one or more computer-readable storage media of claim 21, further comprising a plurality of instructions that in response to being executed cause the computing device to:
provide an indication to the remote computing device that the network packet received from the remote computing device is corrupt in response to a determination that the first hash value and the second hash value do not match. | Technologies for ensuring data integrity for multi-packet operations include a computing device and a remote computing device communicatively coupled via a network. The computing device is configured to perform a segmentation offload operation on an original network packet, compute a hash value on the payload of each segmented payload of the original network packet, and store the hash value and an indication into the segmented network packet that indicates the hash value is stored in the segmented network packet. The remote computing device is configured to extract the indication and the hash value from a received network packet in response to determining the indication indicates the hash value is stored in the segmented network packet, compute a hash value on the payload of received network packet, and determine an integrity of the payload based on a comparison of the extracted hash value and the computed hash value.1. A computing device to store a data integrity check into network communication transmissions, the computing device comprising:
a hash generator module to compute a hash value of a payload of a network packet, wherein the payload of the network packet is a result of a segmentation operation; a data integrity preparation module to store the hash value in the network packet and store an indication in the network packet to indicate to a recipient of the network packet that the hash value is stored in the network packet; and a network communication module to transmit the network packet to a remote computing device. 2. The computing device of claim 1, wherein to compute the hash value of the payload comprises to compute a cryptographic hash value of the payload based on a cryptographic hash function. 3. The computing device of claim 1, wherein to store the hash value in the network packet comprises to store the hash value in a field of a header of the network packet. 4. The computing device of claim 3, wherein to store the hash value in the field of the header of the network packet comprises to store the hash value in an options field of a TCP header of the network packet. 5. The computing device of claim 1, wherein to store the indication to indicate to the recipient of the network packet that the hash value is stored in the network packet comprises to store the indication in a field of a header of the network packet. 6. The computing device of claim 5, wherein to store the indication in the field of the header of the network packet comprises to set a bit in a reserved field of a TCP header of the network packet that corresponds to the indication. 7. The computing device of claim 1, further comprising a data integrity module, wherein the data integrity module comprises the hash generator module and the data integrity preparation module. 8. A computing device to perform a data integrity check of received network communications, the computing device comprising:
a data integrity verification module to determine whether a first hash value is stored in a network packet received from a remote computing device and extract the first hash value from the network packet in response to a determination that the first hash value is stored in the network packet, wherein the network packet received from the remote computing device is a segmented network packet that resulted from a segmentation operation; a hash generator module to compute a second hash value of a payload of a received network packet; and a hash comparator module to compare the first hash value and the second hash value. 9. The computing device of claim 8, wherein to compute the second hash value of the payload of the network packet comprises to compute a cryptographic hash value of the payload based on a cryptographic hash function. 10. The computing device of claim 8, wherein to extract the first hash value in the network packet comprises to extract the first hash value from an options field of a TCP header of the network packet. 11. The computing device of claim 8, wherein determine whether the first hash value is stored in the network packet comprises to extract a bit from a reserved field of a TCP header of the network packet that corresponds to the indication. 12. The computing device of claim 8, wherein the hash comparator module is further to provide an indication to the remote computing device that the received network packet is corrupt in response to a determination that the first hash value and the second hash value do not match. 13. The computing device of claim 8, further comprising a data integrity module, wherein the data integrity module comprises the data integrity verification module, the hash generator module, and the hash comparator module. 14. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a computing device to:
perform a segmentation offload operation on an original payload of an unsegmented network packet; compute a hash value of a payload of a network packet, wherein the payload of the network packet is a result of the segmentation offload operation; store the hash value in the network packet; store an indication in the network packet to indicate to the remote computing device that the hash value is stored in the network packet; and transmit the network packet to the remote computing device. 15. The one or more computer-readable storage media of claim 14, wherein to compute the hash value of the payload comprises to compute the hash value of the payload using a cryptographic hash function. 16. The one or more computer-readable storage media of claim 14, wherein to compute the hash value of the payload comprises to compute the hash value of the payload subsequent to the segmentation offload operation and prior to other processing of the network packet by the computing device. 17. The one or more computer-readable storage media of claim 14, wherein to store the hash value in the network packet comprises to store the hash value in a field of a header of the network packet. 18. The one or more computer-readable storage media of claim 17, wherein to store the hash value in the field of the header of the network packet comprises to store the hash value in an options field of a TCP header of the network packet. 19. The one or more computer-readable storage media of claim 14, wherein to store the indication comprises to store the indication in a field of a header of the network packet. 20. The one or more computer-readable storage media of claim 19, wherein to store the indication in the field of the header of the network packet comprises to set a bit in a reserved field of a TCP header of the network packet that corresponds to the indication. 21. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a computing device to:
determine whether a first hash value is stored in a network packet received from a remote computing device; extract the first hash value from the network packet in response to a determination that the first hash value is stored in the network packet, wherein the network packet received from the remote computing device is a segmented network packet that resulted from a segmentation operation; compute a second hash value of a payload of the network packet received from the remote computing device; and compare the first hash value and the second hash value. 22. The one or more computer-readable storage media of claim 21, wherein to compute the second hash value of the payload of the network packet comprises to compute a cryptographic hash value of the payload of the network packet based on a cryptographic hash function. 23. The one or more computer-readable storage media of claim 21, wherein to extract the first hash value in the network packet comprises to extract the first hash value from an options field of a TCP header of the network packet. 24. The one or more computer-readable storage media of claim 21, wherein to determine whether the first hash value is stored in the network packet comprises to extract a bit from a reserved field of a TCP header of the network packet that corresponds to the indication. 25. The one or more computer-readable storage media of claim 21, further comprising a plurality of instructions that in response to being executed cause the computing device to:
provide an indication to the remote computing device that the network packet received from the remote computing device is corrupt in response to a determination that the first hash value and the second hash value do not match. | 2,400 |
8,369 | 8,369 | 15,181,685 | 2,461 | A control system including several controllers for managing several switching elements. A first controller registers a second controller for receiving a notification when a data tuple changes in a network information base (NIB) storage of the first controller that stores data for managing a set of switching elements. The first controller changes the data tuple in the NIB. The first controller sends the notification to the second controller of the change to the data tuple in the NIB. The first and second controllers operate on two different computing devices. Each controller receives logical control plane data for specifying logical datapath sets and converts the logical control plane data to physical control plane data for enabling the switching elements to implement the logical datapath sets. | 1. For a control system comprising a plurality of controllers for managing a plurality of switching elements, a non-transitory machine readable medium storing a program for managing a set of switching elements, the program comprising sets of instructions for:
at a first controller, registering a second controller for receiving a notification when a data tuple changes in a network information base (NIB) storage of the first controller that stores data for managing a set of switching elements; changing the data tuple in the NIB; and sending the notification to the second controller of the change to the data tuple in the NIB. 2. The non-transitory machine readable medium of claim 1, wherein the first and second controllers operate on two different computing devices. 3. The non-transitory machine readable medium of claim 1, wherein each controller (i) receives logical control plane data for specifying logical datapath sets and (ii) converts the logical control plane data to physical control plane data for enabling the switching elements to implement the logical datapath sets. 4. The non-transitory machine readable medium of claim 3, wherein the data tuple includes physical control plane data. 5. The non-transitory machine readable medium of claim 4, wherein the changed data tuple is for propagating to a switching element that converts the data tuple to physical forwarding plane data. 6. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for propagating changes in the data tuple to a switching element. 7. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for detecting when the data tuple in the NIB changes. 8. The non-transitory machine readable medium of claim 1,
wherein the first and second controllers each comprises a secondary storage, wherein the program further comprises a set of instructions for recording the change in the data tuple in the secondary storage of the first controller. 9. The non-transitory machine readable medium of claim 8,
wherein the set of instructions for sending the notification to the second controller comprises a set of instructions for sending the notification to the secondary storage of the second controller, wherein the second controller's secondary storage directs the first controller's secondary storage to record the change in the data tuple. 10. The non-transitory machine readable medium of claim 8, wherein the set of instructions for sending the notification to the second controller comprises a set of instructions for sending the notification to the secondary storage of the second controller after recording the change in the first controller's secondary storage. 11. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for receiving a request from the second controller to register for notification of a change in the data tuple. 12. For a control system comprising a plurality of controllers for managing a plurality of switching elements, a method of managing a set of switching elements, the method comprising:
at a first controller, changing a set of data stored in a network information base (NIB) storage of the first controller that stores data for managing a set of switching elements; and from the first controller, sending a notification to a second controller of the change to the set of data in the NIB. 13. The method of claim 12, wherein changing the set of data comprises from a third controller, receiving a request to modify the set of data stored in the first controller's network information base (NIB) storage. 14. The method of claim 12,
wherein changing the set of data comprises receiving a request to modify the set of data stored in the first controller's network information base (NIB) storage, wherein the request to modify the set of data is generated at the first controller. 15. The method of claim 12,
wherein the set of data includes physical control plane data that the first controller generates from logical datapath set data, wherein the generated physical control plane data is for propagating to a switching element that converts the physical control plane data to physical forwarding plane data. 16. The method of claim 12, wherein in response to the notification, the second controller changes the set of data in second controller's NIB storage, in order to have the NIB storages of the first and second controllers contain the same data. 17. The method of claim 12 further comprising propagating changes in the data set to a switching element. 18. A distributed network control system comprising:
first and second controllers for managing a plurality of switching elements; and each controller comprising a network information base (NIB) storage for storing data regarding at least a plurality of switching elements and for serving as a communication medium with at least one other controller. 19. The distributed network control system of claim 18, wherein the NIB storage of each controller is at least partially replicated with the NIB storage of another controller, and this replication allows the NIB storage to serve as the communication medium between the controller and the other controller. 20. The distributed network control system of claim 19,
wherein the first and second controllers each comprises a secondary storage, wherein the secondary storage of each controller further serves as a communication medium with at least one other controller by serving as an intermediary storage when the controller's NIB storage is being replicated with the other controller's NIB storage. 21. The distributed network control system of claim 20, wherein the secondary storage of a controller includes a persistent transactional database. 22. The distributed network control system of claim 20, wherein the secondary storage of a controller includes a distributed hash table (DHT) instance. 23. The distributed network control system of claim 18, wherein each controller's NIB storage is further for receiving requests to modify stored data from at least one other controller. 24. The distributed network control system of claim 18, wherein each controller's NIB storage is further for receiving from at least one other controller requests for notification when a data tuple stored in the NIB storage changes. 25. The distributed network control system of claim 18, wherein each controller further comprises a secondary storage that serves as a medium for communication with the other controllers. 26. The distributed network control system of claim 25, wherein each controller's NIB storage data is at least partially replicated in the secondary storage of the controller. 27. The distributed network control system of claim 18,
wherein the first controller is further for generating data for managing at least a first switching element, wherein the second controller is further for generating data for managing at least a second switching element, wherein the first controller is further for propagating generated data to at least a first set of switching elements, wherein the second controller is further for propagating generated data to at least a second set of switching elements different from the first set of switching elements. | A control system including several controllers for managing several switching elements. A first controller registers a second controller for receiving a notification when a data tuple changes in a network information base (NIB) storage of the first controller that stores data for managing a set of switching elements. The first controller changes the data tuple in the NIB. The first controller sends the notification to the second controller of the change to the data tuple in the NIB. The first and second controllers operate on two different computing devices. Each controller receives logical control plane data for specifying logical datapath sets and converts the logical control plane data to physical control plane data for enabling the switching elements to implement the logical datapath sets.1. For a control system comprising a plurality of controllers for managing a plurality of switching elements, a non-transitory machine readable medium storing a program for managing a set of switching elements, the program comprising sets of instructions for:
at a first controller, registering a second controller for receiving a notification when a data tuple changes in a network information base (NIB) storage of the first controller that stores data for managing a set of switching elements; changing the data tuple in the NIB; and sending the notification to the second controller of the change to the data tuple in the NIB. 2. The non-transitory machine readable medium of claim 1, wherein the first and second controllers operate on two different computing devices. 3. The non-transitory machine readable medium of claim 1, wherein each controller (i) receives logical control plane data for specifying logical datapath sets and (ii) converts the logical control plane data to physical control plane data for enabling the switching elements to implement the logical datapath sets. 4. The non-transitory machine readable medium of claim 3, wherein the data tuple includes physical control plane data. 5. The non-transitory machine readable medium of claim 4, wherein the changed data tuple is for propagating to a switching element that converts the data tuple to physical forwarding plane data. 6. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for propagating changes in the data tuple to a switching element. 7. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for detecting when the data tuple in the NIB changes. 8. The non-transitory machine readable medium of claim 1,
wherein the first and second controllers each comprises a secondary storage, wherein the program further comprises a set of instructions for recording the change in the data tuple in the secondary storage of the first controller. 9. The non-transitory machine readable medium of claim 8,
wherein the set of instructions for sending the notification to the second controller comprises a set of instructions for sending the notification to the secondary storage of the second controller, wherein the second controller's secondary storage directs the first controller's secondary storage to record the change in the data tuple. 10. The non-transitory machine readable medium of claim 8, wherein the set of instructions for sending the notification to the second controller comprises a set of instructions for sending the notification to the secondary storage of the second controller after recording the change in the first controller's secondary storage. 11. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for receiving a request from the second controller to register for notification of a change in the data tuple. 12. For a control system comprising a plurality of controllers for managing a plurality of switching elements, a method of managing a set of switching elements, the method comprising:
at a first controller, changing a set of data stored in a network information base (NIB) storage of the first controller that stores data for managing a set of switching elements; and from the first controller, sending a notification to a second controller of the change to the set of data in the NIB. 13. The method of claim 12, wherein changing the set of data comprises from a third controller, receiving a request to modify the set of data stored in the first controller's network information base (NIB) storage. 14. The method of claim 12,
wherein changing the set of data comprises receiving a request to modify the set of data stored in the first controller's network information base (NIB) storage, wherein the request to modify the set of data is generated at the first controller. 15. The method of claim 12,
wherein the set of data includes physical control plane data that the first controller generates from logical datapath set data, wherein the generated physical control plane data is for propagating to a switching element that converts the physical control plane data to physical forwarding plane data. 16. The method of claim 12, wherein in response to the notification, the second controller changes the set of data in second controller's NIB storage, in order to have the NIB storages of the first and second controllers contain the same data. 17. The method of claim 12 further comprising propagating changes in the data set to a switching element. 18. A distributed network control system comprising:
first and second controllers for managing a plurality of switching elements; and each controller comprising a network information base (NIB) storage for storing data regarding at least a plurality of switching elements and for serving as a communication medium with at least one other controller. 19. The distributed network control system of claim 18, wherein the NIB storage of each controller is at least partially replicated with the NIB storage of another controller, and this replication allows the NIB storage to serve as the communication medium between the controller and the other controller. 20. The distributed network control system of claim 19,
wherein the first and second controllers each comprises a secondary storage, wherein the secondary storage of each controller further serves as a communication medium with at least one other controller by serving as an intermediary storage when the controller's NIB storage is being replicated with the other controller's NIB storage. 21. The distributed network control system of claim 20, wherein the secondary storage of a controller includes a persistent transactional database. 22. The distributed network control system of claim 20, wherein the secondary storage of a controller includes a distributed hash table (DHT) instance. 23. The distributed network control system of claim 18, wherein each controller's NIB storage is further for receiving requests to modify stored data from at least one other controller. 24. The distributed network control system of claim 18, wherein each controller's NIB storage is further for receiving from at least one other controller requests for notification when a data tuple stored in the NIB storage changes. 25. The distributed network control system of claim 18, wherein each controller further comprises a secondary storage that serves as a medium for communication with the other controllers. 26. The distributed network control system of claim 25, wherein each controller's NIB storage data is at least partially replicated in the secondary storage of the controller. 27. The distributed network control system of claim 18,
wherein the first controller is further for generating data for managing at least a first switching element, wherein the second controller is further for generating data for managing at least a second switching element, wherein the first controller is further for propagating generated data to at least a first set of switching elements, wherein the second controller is further for propagating generated data to at least a second set of switching elements different from the first set of switching elements. | 2,400 |
8,370 | 8,370 | 15,437,230 | 2,437 | A technique includes determining relations among a plurality of entities that are associated with a computer system; and selectively grouping behavior anomalies that are exhibited by the plurality of entities into collections based at least in part on the determined relations among the entities. The technique includes selectively reporting the collections to a security operations center. | 1. A method comprising:
determining relations among a plurality of entities associated with a computer system; selectively grouping behavior anomalies exhibited by the plurality of entities into collections based at least in part on the determined relations among the entities; and selectively reporting the collections to a security operations center. 2. The method of claim 1, wherein at least one of the behavior anomalies comprises a deviation in a behavior associated with a given entity of the plurality of entities based on an observed history of the given entity or an observed history of a peer of the entity. 3. The method of claim 1, wherein determining relations among the entities comprises determining at least one of whether a subset of entities of the plurality of entities are associated in common with a data center or whether the subset of entities are associated in common with a project. 4. The method of claim 1, wherein:
the entities comprise a plurality of users and a plurality of computers; and determining the relations comprises determining whether a given user of the plurality of users is connected to a given computer of the plurality of computers based at least in part on whether the user has logged into the given computer. 5. The method of claim 1, wherein:
the entities comprise a plurality of internet protocol (IP) addresses and a plurality of computers; and determining the relations comprises determining whether a given IP address of the plurality of IP addresses is connected to a given computer of the plurality of computers based at least in part on whether the IP address has been assigned to the given computer. 6. The method of claim 1, further comprising:
selectively grouping the anomalies into a collection associated with a given entity of the plurality of entities based at least on a predetermined time span. 7. The method of claim 1, wherein selectively reporting the collections comprises:
determining scores associated with the collections; and selectively reporting the collections based at least in part on the scores. 8. The method of claim 7, wherein selectively reporting the collections further comprises:
reporting a given collection of the plurality of collections in response to the score associated with the given collections exceeding a threshold. 9. The method of claim 8, further comprising associating a confidence score and a risk score with each anomaly of the identified behavior anomalies, wherein determining the scores associated with the collections comprises for a given collection, determining the associated score for the given collection based at least in part on the confidence scores and the risk scores of the anomalies of the given collection. 10. An apparatus comprising:
a processor; and a memory to store instructions that when executed by the processor, cause the processor to:
receive data identifying behavior anomalies associated with a plurality of entities associated with a computer system;
selectively aggregate the entities into associated groups based at least in part on communications of the entities with a predetermined set of threat actors; and
for a given group, selectively designate the behavior anomalies associated with the entities of the given group for investigation based at least in part on a characteristic of the behavior anomalies associated with the entities of the given group. 11. The apparatus of claim 10, wherein the instructions when executed by the processor, cause the processor to selectively designate the behavior anomalies based at least in part on a ratio of a number of the behavior anomalies to a number of the entities of the given group. 12. The apparatus of claim 10, wherein the instructions when executed by the processor, cause the processor to selectively designate the behavior anomalies based at least in part on behavior anomalies shared in common by the entities of the given group. 13. An article comprising a non-transitory computer readable storage medium to store instructions that when executed by a computer cause the computer to:
receive data identifying a plurality of security threat indicators exhibited by behaviors of a plurality of entities associated with a computer system, wherein a given security threat indicator indicates an activity by an entity of the plurality of entities and is associated with at least one of a confidence score representing a measure of confidence that the activity is associated with a security threat or a risk score representing an impact of the security threat; selectively group the identified security threat indicators into collections based at least in part on relations among the entities; and selectively report the collections to a security analyst. 14. The article of claim 13, wherein the plurality of entities comprises at least one of users, electronic devices, internet protocol (IP) addresses, domain names or uniform resource locators (URLs). 15. The article of claim 13, wherein:
each security threat indicator indicates an activity by an entity of the plurality of entities; each security threat indicator is associated with a confidence score representing a measure of confidence that the activity is associated a security threat and a risk score representing an impact of the security threat; and the computer readable storage medium to store instructions that when executed by the computer cause the computer to, for a given collection of the plurality of collections:
determine an aggregate score for the given collections based at least in part on the risk scores and confidence scores associated with the security threat indicators of the collection; and
selectively report the given collection to the analyst based at least in part on the aggregate score. | A technique includes determining relations among a plurality of entities that are associated with a computer system; and selectively grouping behavior anomalies that are exhibited by the plurality of entities into collections based at least in part on the determined relations among the entities. The technique includes selectively reporting the collections to a security operations center.1. A method comprising:
determining relations among a plurality of entities associated with a computer system; selectively grouping behavior anomalies exhibited by the plurality of entities into collections based at least in part on the determined relations among the entities; and selectively reporting the collections to a security operations center. 2. The method of claim 1, wherein at least one of the behavior anomalies comprises a deviation in a behavior associated with a given entity of the plurality of entities based on an observed history of the given entity or an observed history of a peer of the entity. 3. The method of claim 1, wherein determining relations among the entities comprises determining at least one of whether a subset of entities of the plurality of entities are associated in common with a data center or whether the subset of entities are associated in common with a project. 4. The method of claim 1, wherein:
the entities comprise a plurality of users and a plurality of computers; and determining the relations comprises determining whether a given user of the plurality of users is connected to a given computer of the plurality of computers based at least in part on whether the user has logged into the given computer. 5. The method of claim 1, wherein:
the entities comprise a plurality of internet protocol (IP) addresses and a plurality of computers; and determining the relations comprises determining whether a given IP address of the plurality of IP addresses is connected to a given computer of the plurality of computers based at least in part on whether the IP address has been assigned to the given computer. 6. The method of claim 1, further comprising:
selectively grouping the anomalies into a collection associated with a given entity of the plurality of entities based at least on a predetermined time span. 7. The method of claim 1, wherein selectively reporting the collections comprises:
determining scores associated with the collections; and selectively reporting the collections based at least in part on the scores. 8. The method of claim 7, wherein selectively reporting the collections further comprises:
reporting a given collection of the plurality of collections in response to the score associated with the given collections exceeding a threshold. 9. The method of claim 8, further comprising associating a confidence score and a risk score with each anomaly of the identified behavior anomalies, wherein determining the scores associated with the collections comprises for a given collection, determining the associated score for the given collection based at least in part on the confidence scores and the risk scores of the anomalies of the given collection. 10. An apparatus comprising:
a processor; and a memory to store instructions that when executed by the processor, cause the processor to:
receive data identifying behavior anomalies associated with a plurality of entities associated with a computer system;
selectively aggregate the entities into associated groups based at least in part on communications of the entities with a predetermined set of threat actors; and
for a given group, selectively designate the behavior anomalies associated with the entities of the given group for investigation based at least in part on a characteristic of the behavior anomalies associated with the entities of the given group. 11. The apparatus of claim 10, wherein the instructions when executed by the processor, cause the processor to selectively designate the behavior anomalies based at least in part on a ratio of a number of the behavior anomalies to a number of the entities of the given group. 12. The apparatus of claim 10, wherein the instructions when executed by the processor, cause the processor to selectively designate the behavior anomalies based at least in part on behavior anomalies shared in common by the entities of the given group. 13. An article comprising a non-transitory computer readable storage medium to store instructions that when executed by a computer cause the computer to:
receive data identifying a plurality of security threat indicators exhibited by behaviors of a plurality of entities associated with a computer system, wherein a given security threat indicator indicates an activity by an entity of the plurality of entities and is associated with at least one of a confidence score representing a measure of confidence that the activity is associated with a security threat or a risk score representing an impact of the security threat; selectively group the identified security threat indicators into collections based at least in part on relations among the entities; and selectively report the collections to a security analyst. 14. The article of claim 13, wherein the plurality of entities comprises at least one of users, electronic devices, internet protocol (IP) addresses, domain names or uniform resource locators (URLs). 15. The article of claim 13, wherein:
each security threat indicator indicates an activity by an entity of the plurality of entities; each security threat indicator is associated with a confidence score representing a measure of confidence that the activity is associated a security threat and a risk score representing an impact of the security threat; and the computer readable storage medium to store instructions that when executed by the computer cause the computer to, for a given collection of the plurality of collections:
determine an aggregate score for the given collections based at least in part on the risk scores and confidence scores associated with the security threat indicators of the collection; and
selectively report the given collection to the analyst based at least in part on the aggregate score. | 2,400 |
8,371 | 8,371 | 15,385,563 | 2,463 | Some embodiments provide a method for presenting packets captured in a network. The method identifies a first set of packets from a first packet group of multiple captured packet groups. The method identifies a second set of packets, that corresponds to the first set of packets, from a second packet group of the multiple captured packet groups. The method displays representations of the multiple captured packet groups. At least one of the first set of packets and the second set of packets are presented with a different appearance from other packets of their respective packet group. | 1. A method for presenting packets captured in a network, the method comprising:
identifying a first set of packets from a first packet group of a plurality of captured packet groups; identifying a second set of packets, that corresponds to the first set of packets, from a second packet group of the plurality of captured packet groups; and displaying representations of the plurality of captured packet groups, wherein at least one of the first set of packets and the second set of packets are presented with a different appearance from other packets of their respective packet group. 2. The method of claim 1, wherein the second set of packets comprises encapsulated versions of the first set of packets. 3. The method of claim 1, wherein the second set of packets comprises fragmented packets that result from the fragmentation of the particular set of packets. 4. The method of claim 1 further comprising:
generating a first identifier for each packet in a plurality of packet groups; and
generating a second identifier for each packet in the plurality of packet groups, wherein the first identifier for a first packet of a first packet group corresponds with the second identifier for a second packet of a second packet group. 5. The method of claim 4, wherein generating the first identifier comprises generating a hash value for a first portion of each packet and generating the second identifier comprises generating a hash value for a different second portion of each packet. 6. The method of claim 4, wherein each of the first and second portions uniquely identify each packet within each packet group. 7. The method of claim 4, wherein the first identifier for a particular packet is generated for an outer encapsulating header of the particular packet and the second identifier is generated for an inner encapsulated header of the particular packet. 8. The method of claim 4, wherein generating the second identifier comprises:
reassembling fragmented packets to create a reassembled packet; and generating the second identifier for the fragmented packets based on the reassembled packet. 9. The method of claim 4, wherein identifying the second set of packets comprises correlating the first identifier for the first set of packets with the second identifier for the second set of packets in the second packet group. 10. The method of claim 1 further comprising identifying a third set of packets, that also corresponds to the first set of packets, from a third packet group in the plurality of captured packet groups. 11. The method of claim 1, wherein each different packet group comprises one or more packets captured from a different node in the network. 12. A method for analyzing packets of a plurality of packet groups in a network, the method comprising:
comparing a first plurality of packets of a first packet group with a second plurality of packets of a second packet group; based on the comparison, identifying a set of packets as having a set of issues; and displaying representations of the plurality of packet groups in order to flag the packets with the identified issues. 13. The method of claim 12, wherein identifying the set of packets comprises determining that the set of packets are in the first plurality of packets but do not have corresponding packets in the second plurality of packets, wherein displaying the representations of the plurality of packet groups comprises highlighting the set of packets in the first plurality of packets. 14. The method of claim 12 further comprising:
prior to comparing, determining whether values in a header of each packet are valid; and
when the values in the header of a particular packet are not valid, flagging the particular packet as being corrupted. 15. The method of claim 12, wherein the first plurality of packets in the first packet group are captured prior to the second plurality of packets in the second packet group, wherein identifying the set of packets comprises identifying that the set of packets are in the second packet group and do not have corresponding packets in the first packet group. 16. The method of claim 12, wherein the first plurality of packets in the first packet group are captured prior to the second plurality of packets in the second packet group, wherein identifying the set of packets comprises identifying that the set of packets have a high latency when a difference between a capture time for the set of packets in the first packet group and a second capture time for the set of packets in the second packet group is greater than a threshold value. 17. The method of claim 12, wherein identifying the set of packets comprises:
identifying fragmented packets in the second packet group; reassembling a packet from the fragmented packets; correlating the reassembled packet with a packet in the first packet group; and flagging the packet in the first group and the fragmented packets of the second group as being fragmented. 18. The method of claim 12 further comprising:
generating a first identifier for each packet in a plurality of packet groups; and
generating a second identifier for each packet in the plurality of packet groups, wherein the first identifier for a particular packet of the first packet group corresponds with the second identifier for a corresponding set of packets of the second packet group. 19. A non-transitory machine readable medium storing a program which when executed by at least one processing unit presents packets captured in a network, the program comprising sets of instructions for:
identifying a first set of packets from a first packet group of a plurality of captured packet groups; identifying a second set of packets, that corresponds to the first set of packets, from a second packet group of the plurality of captured packet groups; and displaying representations of the plurality of captured packet groups, wherein at least one of the first set of packets and the second set of packets are presented with a different appearance from other packets of their respective packet group. 20. The non-transitory machine readable medium of claim 19, wherein the second set of packets comprises encapsulated versions of the first set of packets. 21. The non-transitory machine readable medium of claim 19, wherein the second set of packets comprises fragmented packets that result from the fragmentation of the particular set of packets. 22. The non-transitory machine readable medium of claim 19, wherein the program further comprises sets of instructions for:
generating a first identifier for each packet in a plurality of packet groups; and generating a second identifier for each packet in the plurality of packet groups, wherein the first identifier for a first packet of a first packet group corresponds with the second identifier for a second packet of a second packet group. | Some embodiments provide a method for presenting packets captured in a network. The method identifies a first set of packets from a first packet group of multiple captured packet groups. The method identifies a second set of packets, that corresponds to the first set of packets, from a second packet group of the multiple captured packet groups. The method displays representations of the multiple captured packet groups. At least one of the first set of packets and the second set of packets are presented with a different appearance from other packets of their respective packet group.1. A method for presenting packets captured in a network, the method comprising:
identifying a first set of packets from a first packet group of a plurality of captured packet groups; identifying a second set of packets, that corresponds to the first set of packets, from a second packet group of the plurality of captured packet groups; and displaying representations of the plurality of captured packet groups, wherein at least one of the first set of packets and the second set of packets are presented with a different appearance from other packets of their respective packet group. 2. The method of claim 1, wherein the second set of packets comprises encapsulated versions of the first set of packets. 3. The method of claim 1, wherein the second set of packets comprises fragmented packets that result from the fragmentation of the particular set of packets. 4. The method of claim 1 further comprising:
generating a first identifier for each packet in a plurality of packet groups; and
generating a second identifier for each packet in the plurality of packet groups, wherein the first identifier for a first packet of a first packet group corresponds with the second identifier for a second packet of a second packet group. 5. The method of claim 4, wherein generating the first identifier comprises generating a hash value for a first portion of each packet and generating the second identifier comprises generating a hash value for a different second portion of each packet. 6. The method of claim 4, wherein each of the first and second portions uniquely identify each packet within each packet group. 7. The method of claim 4, wherein the first identifier for a particular packet is generated for an outer encapsulating header of the particular packet and the second identifier is generated for an inner encapsulated header of the particular packet. 8. The method of claim 4, wherein generating the second identifier comprises:
reassembling fragmented packets to create a reassembled packet; and generating the second identifier for the fragmented packets based on the reassembled packet. 9. The method of claim 4, wherein identifying the second set of packets comprises correlating the first identifier for the first set of packets with the second identifier for the second set of packets in the second packet group. 10. The method of claim 1 further comprising identifying a third set of packets, that also corresponds to the first set of packets, from a third packet group in the plurality of captured packet groups. 11. The method of claim 1, wherein each different packet group comprises one or more packets captured from a different node in the network. 12. A method for analyzing packets of a plurality of packet groups in a network, the method comprising:
comparing a first plurality of packets of a first packet group with a second plurality of packets of a second packet group; based on the comparison, identifying a set of packets as having a set of issues; and displaying representations of the plurality of packet groups in order to flag the packets with the identified issues. 13. The method of claim 12, wherein identifying the set of packets comprises determining that the set of packets are in the first plurality of packets but do not have corresponding packets in the second plurality of packets, wherein displaying the representations of the plurality of packet groups comprises highlighting the set of packets in the first plurality of packets. 14. The method of claim 12 further comprising:
prior to comparing, determining whether values in a header of each packet are valid; and
when the values in the header of a particular packet are not valid, flagging the particular packet as being corrupted. 15. The method of claim 12, wherein the first plurality of packets in the first packet group are captured prior to the second plurality of packets in the second packet group, wherein identifying the set of packets comprises identifying that the set of packets are in the second packet group and do not have corresponding packets in the first packet group. 16. The method of claim 12, wherein the first plurality of packets in the first packet group are captured prior to the second plurality of packets in the second packet group, wherein identifying the set of packets comprises identifying that the set of packets have a high latency when a difference between a capture time for the set of packets in the first packet group and a second capture time for the set of packets in the second packet group is greater than a threshold value. 17. The method of claim 12, wherein identifying the set of packets comprises:
identifying fragmented packets in the second packet group; reassembling a packet from the fragmented packets; correlating the reassembled packet with a packet in the first packet group; and flagging the packet in the first group and the fragmented packets of the second group as being fragmented. 18. The method of claim 12 further comprising:
generating a first identifier for each packet in a plurality of packet groups; and
generating a second identifier for each packet in the plurality of packet groups, wherein the first identifier for a particular packet of the first packet group corresponds with the second identifier for a corresponding set of packets of the second packet group. 19. A non-transitory machine readable medium storing a program which when executed by at least one processing unit presents packets captured in a network, the program comprising sets of instructions for:
identifying a first set of packets from a first packet group of a plurality of captured packet groups; identifying a second set of packets, that corresponds to the first set of packets, from a second packet group of the plurality of captured packet groups; and displaying representations of the plurality of captured packet groups, wherein at least one of the first set of packets and the second set of packets are presented with a different appearance from other packets of their respective packet group. 20. The non-transitory machine readable medium of claim 19, wherein the second set of packets comprises encapsulated versions of the first set of packets. 21. The non-transitory machine readable medium of claim 19, wherein the second set of packets comprises fragmented packets that result from the fragmentation of the particular set of packets. 22. The non-transitory machine readable medium of claim 19, wherein the program further comprises sets of instructions for:
generating a first identifier for each packet in a plurality of packet groups; and generating a second identifier for each packet in the plurality of packet groups, wherein the first identifier for a first packet of a first packet group corresponds with the second identifier for a second packet of a second packet group. | 2,400 |
8,372 | 8,372 | 15,188,823 | 2,461 | Disclosed are systems, devices and methods for transmission of messages between wireless transceiver devices including fields representing values such as, for example, a range between devices, time of transmission of a message or time of receipt of a previous message. In particular embodiments, message may also comprise fields to express a maximum error in values representing range, time of transmission of a message or time of receipt of a previous message. | 1. A method, at a first wireless station (STA), comprising:
transmitting a fine timing measurement (FTM) message comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 2. The method of claim 1, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 3. The method of claim 1, wherein the at least one other field expresses the maximum TOD error as an exponent. 4. The method of claim 1, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 5. The method of claim 4, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 6. The method of claim 1, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. 7. A first wireless station (STA), comprising:
a wireless transceiver to transmit messages to and receive messages from a wireless communication network; and one or more processors coupled to the wireless transmitter, the one or more processors being configured to: initiate transmission of a fine timing measurement (FTM) message through the wireless transceiver comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 8. The first STA of claim 7, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 9. The first STA of claim 7, wherein the at least one other field expresses the maximum TOD error as an exponent. 10. The first STA of claim 7, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 11. The first STA of claim 10, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 12. The first STA of claim 7, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. 13. A first wireless station (STA), comprising:
means for receiving a fine timing measurement (FTM) request message; and means for transmitting an FTM message in response to the FTM request message comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 14. The first STA of claim 13, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 15. The first STA of claim 13, wherein the at least one other field expresses the maximum TOD error as an exponent. 16. The first STA of claim 13, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 17. The first STA of claim 16, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 18. The first STA of claim 13, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. 19. A non-transitory storage medium having computer-readable instructions stored thereon which are executable by a process of a first wireless station (STA) to:
initiate transmission of a fine timing measurement (FTM) message through a wireless transmitter comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 20. The non-transitory storage medium of claim 19, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 21. The non-transitory storage medium of claim 19, wherein the at least one other field expresses the maximum TOD error as an exponent. 22. The non-transitory storage medium of claim 19, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 23. The non-transitory storage medium of claim 22, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 24. The non-transitory storage medium of claim 19, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. | Disclosed are systems, devices and methods for transmission of messages between wireless transceiver devices including fields representing values such as, for example, a range between devices, time of transmission of a message or time of receipt of a previous message. In particular embodiments, message may also comprise fields to express a maximum error in values representing range, time of transmission of a message or time of receipt of a previous message.1. A method, at a first wireless station (STA), comprising:
transmitting a fine timing measurement (FTM) message comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 2. The method of claim 1, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 3. The method of claim 1, wherein the at least one other field expresses the maximum TOD error as an exponent. 4. The method of claim 1, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 5. The method of claim 4, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 6. The method of claim 1, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. 7. A first wireless station (STA), comprising:
a wireless transceiver to transmit messages to and receive messages from a wireless communication network; and one or more processors coupled to the wireless transmitter, the one or more processors being configured to: initiate transmission of a fine timing measurement (FTM) message through the wireless transceiver comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 8. The first STA of claim 7, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 9. The first STA of claim 7, wherein the at least one other field expresses the maximum TOD error as an exponent. 10. The first STA of claim 7, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 11. The first STA of claim 10, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 12. The first STA of claim 7, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. 13. A first wireless station (STA), comprising:
means for receiving a fine timing measurement (FTM) request message; and means for transmitting an FTM message in response to the FTM request message comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 14. The first STA of claim 13, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 15. The first STA of claim 13, wherein the at least one other field expresses the maximum TOD error as an exponent. 16. The first STA of claim 13, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 17. The first STA of claim 16, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 18. The first STA of claim 13, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. 19. A non-transitory storage medium having computer-readable instructions stored thereon which are executable by a process of a first wireless station (STA) to:
initiate transmission of a fine timing measurement (FTM) message through a wireless transmitter comprising at least a time of departure (TOD) field and at least one other field, the at least one other field expressing a maximum TOD error in five bits or less, the at least one other field being capable of expressing the maximum TOD error as large as 1.0 msec. 20. The non-transitory storage medium of claim 19, wherein the FTM message is transmitted in response to receipt of a FTM request message transmitted by a second STA. 21. The non-transitory storage medium of claim 19, wherein the at least one other field expresses the maximum TOD error as an exponent. 22. The non-transitory storage medium of claim 19, wherein the FTM message further comprises a time of arrival (TOA) field and at least one other field expressing a maximum TOA error in five bits or less, the at least one other field being capable of expressing the maximum TOA error as large as 1.0 msec. 23. The non-transitory storage medium of claim 22, wherein the at least one other field being capable of expressing the maximum TOA error as small as 1.0 psec. 24. The non-transitory storage medium of claim 19, wherein the at least one other field is further capable of expressing the maximum TOD error as small as 1.0 psec. | 2,400 |
8,373 | 8,373 | 15,620,532 | 2,486 | A method and apparatus for synchronizing image frame capture timing for a plurality of fixed-frame rate image sensors having the same frame rate is disclosed. An example includes a processing system connected to image sensors in a venue for capturing image frames and determining a capture offset for each image sensor, against a common, independent time base. The processing system determines when the capture offset of any of the image sensors is above a threshold offset value and, in response, a restart signal is sent to the image sensor to restart the image sensor for capturing images within the venue at another capture offset. The process will continue for that image sensor until the image sensor has a capture offset within below an acceptable threshold value. | 1. A method of synchronizing image frame capture timing for a plurality of fixed-frame rate image sensors having a same frame rate, the method comprising:
determining, at a logic circuit, a capture offset for each of the plurality of fixed-frame rate image sensors, the capture offset being based on a common time base that is independent from the plurality of fixed-frame rate image sensors; when the capture offset for a first one of the image sensors is greater than a first threshold value, sending, from the logic circuit, a restart signal to the first one of the image sensors to restart the first one of the image sensors and awaiting a restart period before receiving subsequent image data from the first one of the image sensors; and when the capture offset for the first one of the image sensors is less than a second threshold offset value, determining that the first one of the image sensors is synchronized to the common time base and continuing to receive subsequent image data from the first one of the image sensors. 2. The method of claim 1, further comprising:
receiving, at the logic circuit, the common time base from an external system clock source. 3. The method of claim 1, further comprising:
receiving, at the logic circuit, the common time base from an external dedicated clock signal. 4. The method of claim 1, further comprising:
determining, at the logic circuit, the common time base from the frame rate of one of the plurality of fixed-frame rate image sensors. 5. The method of claim 1, wherein the first threshold offset value and the second threshold offset value are the same. 6. The method of claim 1, wherein determining the capture offset for each of the plurality of fixed-frame rate image sensors comprises:
for each image sensor:
identifying, at the logic circuit, image frames over a sampling period;
calculating an image frame offset for each of the image frames compared to the common time base, using a modulo operation; and
averaging the image frame offset over the sampling period greater than an inverse of the frame rate to determine the capture offset for the respective image sensor. 7. The method of claim 6, wherein the sampling period is a same value for each of the image sensors. 8. The method of claim 6, wherein the sampling period is different for at least two of the image sensors. 9. The method of claim 1, wherein sending the restart signal to the first one of the image sensors to restart the first one of the image sensors comprises:
sending a power interrupt signal, a hardware reset signal, or a software reset signal to the first one of the image sensors. 10. A tangible machine-readable medium comprising instructions that, when executed, cause a machine to:
determine a capture offset for each of a plurality of fixed-frame rate image sensors, the capture offset being based on a common time base for a logic circuit communicatively coupled to the plurality of image sensors, where the common time base is independent from the plurality of image sensors; compare the capture offset for a first one of images sensors to a threshold capture offset; when the capture offset for the first one of the image sensors is greater than threshold capture offset, send a restart signal to the first one of the image sensors to restart the first one of the image sensors and await a restart period before receiving subsequent image data from the first one of the image sensors; and when the capture offset for the first one of the image sensors is less than a second threshold capture offset, determine that the first one of the image sensors is synchronized to the common time base and continue to receive subsequent image data from the image sensor. 11. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
receive the common time base from an external synchronized system clock source. 12. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
receive the common time base from an external dedicated clock signal. 13. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
determine the common time base from the frame rate of one of the plurality of fixed-frame rate image sensors. 14. A tangible machine-readable medium as defined in claim 10, wherein the first threshold offset value and the second threshold offset value are the same. 15. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to, for each image sensor,
identify image frames over a sampling period; calculate an image frame capture offset for each of the image frames compared to the common time base, using a modulo operation; and average the image frame capture offset over a sampling period greater than an inverse of the frame rate to determine the capture offset for the respective image sensor. 16. A tangible machine-readable medium as defined in claim 15, wherein the sampling period is a same value for each of the image sensors. 17. A tangible machine-readable medium as defined in claim 15, wherein the sampling period is different for at least two of the image sensors. 18. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
send a power interrupt signal, a hardware reset signal, or a software reset signal to the first one of the image sensors. 19. An apparatus comprising:
a capture offset manager to:
determine a capture offset for each of a plurality of fixed-frame rate image sensors, the capture offset being based on a common time base for the capture offset manager coupled to the plurality of image sensors, where the common time base is independent from the plurality of image sensors; and
compare the capture offset for a first one of images sensors to a threshold capture offset; and
an image sensor controller to:
when the capture offset manager determines that the capture offset for the first one of the image sensors is greater than threshold capture offset, send a restart signal to the first one of the image sensors to restart the first one of the image sensors and await a restart period before receiving subsequent image data from the first one of the image sensors; and
when the capture offset manager determines that the capture offset for the first one of the image sensors is less than a second threshold capture offset, the capture offset manager determines that the first one of the image sensors is synchronized to the common time base, to continue to receive subsequent image data from the image sensor, wherein at least one of the capture offset manager and the image sensor controller is implemented by a logic circuit. 20. The apparatus of claim 19, wherein the capture offset manager is to:
determine the common time base from the frame rate of one of the plurality of fixed-frame rate image sensors. 21. The apparatus of claim 19, wherein the first threshold offset value and the second threshold offset value are the same. 22. The apparatus of claim 19, wherein the capture offset manager is to:
identify image frames over a sampling period; calculate an image frame capture offset for each of the image frames compared to the common time base, using a modulo operation; and average the image frame capture offset over a sampling period greater than an inverse of the frame rate to determine the capture offset for the respective image sensor. 23. The apparatus of claim 24, wherein the sampling period is different for at least two of the image sensors. | A method and apparatus for synchronizing image frame capture timing for a plurality of fixed-frame rate image sensors having the same frame rate is disclosed. An example includes a processing system connected to image sensors in a venue for capturing image frames and determining a capture offset for each image sensor, against a common, independent time base. The processing system determines when the capture offset of any of the image sensors is above a threshold offset value and, in response, a restart signal is sent to the image sensor to restart the image sensor for capturing images within the venue at another capture offset. The process will continue for that image sensor until the image sensor has a capture offset within below an acceptable threshold value.1. A method of synchronizing image frame capture timing for a plurality of fixed-frame rate image sensors having a same frame rate, the method comprising:
determining, at a logic circuit, a capture offset for each of the plurality of fixed-frame rate image sensors, the capture offset being based on a common time base that is independent from the plurality of fixed-frame rate image sensors; when the capture offset for a first one of the image sensors is greater than a first threshold value, sending, from the logic circuit, a restart signal to the first one of the image sensors to restart the first one of the image sensors and awaiting a restart period before receiving subsequent image data from the first one of the image sensors; and when the capture offset for the first one of the image sensors is less than a second threshold offset value, determining that the first one of the image sensors is synchronized to the common time base and continuing to receive subsequent image data from the first one of the image sensors. 2. The method of claim 1, further comprising:
receiving, at the logic circuit, the common time base from an external system clock source. 3. The method of claim 1, further comprising:
receiving, at the logic circuit, the common time base from an external dedicated clock signal. 4. The method of claim 1, further comprising:
determining, at the logic circuit, the common time base from the frame rate of one of the plurality of fixed-frame rate image sensors. 5. The method of claim 1, wherein the first threshold offset value and the second threshold offset value are the same. 6. The method of claim 1, wherein determining the capture offset for each of the plurality of fixed-frame rate image sensors comprises:
for each image sensor:
identifying, at the logic circuit, image frames over a sampling period;
calculating an image frame offset for each of the image frames compared to the common time base, using a modulo operation; and
averaging the image frame offset over the sampling period greater than an inverse of the frame rate to determine the capture offset for the respective image sensor. 7. The method of claim 6, wherein the sampling period is a same value for each of the image sensors. 8. The method of claim 6, wherein the sampling period is different for at least two of the image sensors. 9. The method of claim 1, wherein sending the restart signal to the first one of the image sensors to restart the first one of the image sensors comprises:
sending a power interrupt signal, a hardware reset signal, or a software reset signal to the first one of the image sensors. 10. A tangible machine-readable medium comprising instructions that, when executed, cause a machine to:
determine a capture offset for each of a plurality of fixed-frame rate image sensors, the capture offset being based on a common time base for a logic circuit communicatively coupled to the plurality of image sensors, where the common time base is independent from the plurality of image sensors; compare the capture offset for a first one of images sensors to a threshold capture offset; when the capture offset for the first one of the image sensors is greater than threshold capture offset, send a restart signal to the first one of the image sensors to restart the first one of the image sensors and await a restart period before receiving subsequent image data from the first one of the image sensors; and when the capture offset for the first one of the image sensors is less than a second threshold capture offset, determine that the first one of the image sensors is synchronized to the common time base and continue to receive subsequent image data from the image sensor. 11. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
receive the common time base from an external synchronized system clock source. 12. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
receive the common time base from an external dedicated clock signal. 13. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
determine the common time base from the frame rate of one of the plurality of fixed-frame rate image sensors. 14. A tangible machine-readable medium as defined in claim 10, wherein the first threshold offset value and the second threshold offset value are the same. 15. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to, for each image sensor,
identify image frames over a sampling period; calculate an image frame capture offset for each of the image frames compared to the common time base, using a modulo operation; and average the image frame capture offset over a sampling period greater than an inverse of the frame rate to determine the capture offset for the respective image sensor. 16. A tangible machine-readable medium as defined in claim 15, wherein the sampling period is a same value for each of the image sensors. 17. A tangible machine-readable medium as defined in claim 15, wherein the sampling period is different for at least two of the image sensors. 18. A tangible machine-readable medium as defined in claim 10, wherein the instructions, when executed, cause the machine to:
send a power interrupt signal, a hardware reset signal, or a software reset signal to the first one of the image sensors. 19. An apparatus comprising:
a capture offset manager to:
determine a capture offset for each of a plurality of fixed-frame rate image sensors, the capture offset being based on a common time base for the capture offset manager coupled to the plurality of image sensors, where the common time base is independent from the plurality of image sensors; and
compare the capture offset for a first one of images sensors to a threshold capture offset; and
an image sensor controller to:
when the capture offset manager determines that the capture offset for the first one of the image sensors is greater than threshold capture offset, send a restart signal to the first one of the image sensors to restart the first one of the image sensors and await a restart period before receiving subsequent image data from the first one of the image sensors; and
when the capture offset manager determines that the capture offset for the first one of the image sensors is less than a second threshold capture offset, the capture offset manager determines that the first one of the image sensors is synchronized to the common time base, to continue to receive subsequent image data from the image sensor, wherein at least one of the capture offset manager and the image sensor controller is implemented by a logic circuit. 20. The apparatus of claim 19, wherein the capture offset manager is to:
determine the common time base from the frame rate of one of the plurality of fixed-frame rate image sensors. 21. The apparatus of claim 19, wherein the first threshold offset value and the second threshold offset value are the same. 22. The apparatus of claim 19, wherein the capture offset manager is to:
identify image frames over a sampling period; calculate an image frame capture offset for each of the image frames compared to the common time base, using a modulo operation; and average the image frame capture offset over a sampling period greater than an inverse of the frame rate to determine the capture offset for the respective image sensor. 23. The apparatus of claim 24, wherein the sampling period is different for at least two of the image sensors. | 2,400 |
8,374 | 8,374 | 15,246,814 | 2,487 | An integrated camera mesh is disclosed, wherein the system includes a mesh camera for capturing a video segment, wherein the mesh camera is one of a plurality of mesh cameras. To follow movements of subjects, each mesh camera tilts and swivels autonomously in response to proximity sensor information. The mesh camera is strategically positioned within a flooring inset, which includes a transparent cover, such that the flooring surface remains planner. Video segments from mesh cameras and transmitted to a content server, which processes the received video segments to create a video sequence for transmission to broadcast viewers. | 1. An integrated camera mesh system comprising:
a mesh camera for capturing a video segment, wherein the mesh camera is one of a plurality of mesh cameras; a content server configured to process the video segment to create a video sequence; and an access server configured to transmit the video sequence to a content provider, wherein the content provider broadcasts the video sequence. 2. The system of claim 1, wherein the mesh camera is positioned within a floor inset. 3. The system of claim 1, wherein the processing includes at least one of: modifying attributes, storing the video segment in a database, and digitally splicing the video segment with a prior video segment to create the video sequence. 4. The system of claim 1, wherein the content server receives an instruction from a director interface. 5. The system of claim 4, wherein the instruction is transmitted by way of at least one of: a wireless network and a wireline network. 6. The system of claim 4, wherein the instruction is processed by a mesh camera microcontroller. 7. The system of claim 4, wherein the instruction activates a mesh camera stepper motor. 8. The system of claim 1, wherein the mesh camera includes an integrated sensor for deriving positional and proximal information relative to a target. 9. The system of claim 8, wherein the integrated sensor is a proximity sensor is based on at least one of: infrared, laser, visible light, and sound. 10. The system of claim 1, wherein a lens of the mesh camera is configured for vertical and horizontal movement. 11. The system of claim 10, wherein the vertical and horizontal movement is by way of an electric motor. 12. The system of claim 11, wherein the electric motor is activated and deactivated by way of a signal from a microcontroller. 13. The system of claim 1, further comprising, receiving sensor data from an external sensor, wherein the sensor data comprises positional and proximal information relative to an event. 14. The system of claim 13, wherein the external sensor is a proximity sensor is based on at least one of: infrared, laser, visible light, and sound. | An integrated camera mesh is disclosed, wherein the system includes a mesh camera for capturing a video segment, wherein the mesh camera is one of a plurality of mesh cameras. To follow movements of subjects, each mesh camera tilts and swivels autonomously in response to proximity sensor information. The mesh camera is strategically positioned within a flooring inset, which includes a transparent cover, such that the flooring surface remains planner. Video segments from mesh cameras and transmitted to a content server, which processes the received video segments to create a video sequence for transmission to broadcast viewers.1. An integrated camera mesh system comprising:
a mesh camera for capturing a video segment, wherein the mesh camera is one of a plurality of mesh cameras; a content server configured to process the video segment to create a video sequence; and an access server configured to transmit the video sequence to a content provider, wherein the content provider broadcasts the video sequence. 2. The system of claim 1, wherein the mesh camera is positioned within a floor inset. 3. The system of claim 1, wherein the processing includes at least one of: modifying attributes, storing the video segment in a database, and digitally splicing the video segment with a prior video segment to create the video sequence. 4. The system of claim 1, wherein the content server receives an instruction from a director interface. 5. The system of claim 4, wherein the instruction is transmitted by way of at least one of: a wireless network and a wireline network. 6. The system of claim 4, wherein the instruction is processed by a mesh camera microcontroller. 7. The system of claim 4, wherein the instruction activates a mesh camera stepper motor. 8. The system of claim 1, wherein the mesh camera includes an integrated sensor for deriving positional and proximal information relative to a target. 9. The system of claim 8, wherein the integrated sensor is a proximity sensor is based on at least one of: infrared, laser, visible light, and sound. 10. The system of claim 1, wherein a lens of the mesh camera is configured for vertical and horizontal movement. 11. The system of claim 10, wherein the vertical and horizontal movement is by way of an electric motor. 12. The system of claim 11, wherein the electric motor is activated and deactivated by way of a signal from a microcontroller. 13. The system of claim 1, further comprising, receiving sensor data from an external sensor, wherein the sensor data comprises positional and proximal information relative to an event. 14. The system of claim 13, wherein the external sensor is a proximity sensor is based on at least one of: infrared, laser, visible light, and sound. | 2,400 |
8,375 | 8,375 | 14,548,021 | 2,422 | A navigation system includes a monocentric lens and one or more curved image sensor arrays disposed parallel and spaced apart from the lens to capture respective portions, not all, of the field of view of the lens. | 1. A navigation system comprising:
a monocentric objective lens; and a first curved image sensor array disposed parallel to, and spaced apart from, the lens. 2. A navigation system according to claim 1, wherein:
the lens has a focal length; and the first curved image sensor array is spaced apart from the lens by about the focal length. 3. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than about 80% of the field of view. 4. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than about 25% of the field of view. 5. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens. 6. A navigation system according to claim 1, further comprising a controller communicatively coupled to the first curved image sensor array and configured to use image data from the first curved image sensor array to automatically determine a location of the navigation system. 7. A navigation system according to claim 6, wherein:
the first curved image sensor array is configured to send the image data in a compressed form; and the controller is configured to use the image data in the compressed form to determine the location of the navigation system, without decompressing the image data. 8. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a second curved image sensor array:
disposed parallel to, and spaced apart from, the lens; and
sized and positioned to receive light from a second portion, spatially discontiguous with the first portion, of the field of view. 9. A navigation system according to claim 8, wherein a sum of the first portion of the field of view and the second portion of the field of view is less than all of the field of view. 10. A navigation system according to claim 8, further comprising:
a first plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens; and a second plurality of optical fibers optically coupling the second curved image sensor array to the monocentric objective lens. 11. A navigation system according to claim 8, further comprising a controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to use image data from the first and second curved image sensor arrays to automatically determine a location of the navigation system. 12. A navigation system according to claim 11, wherein:
the first curved image sensor array is configured to send the image data from the first curved image sensor array in a compressed form; the second curved image sensor array is configured to send the image data from the second curved image sensor array in a compressed form; and the controller is configured to use the image data from the first and second curved image sensor arrays in the compressed form to determine the location of the navigation system, without decompressing the image data. 13. A navigation system according to claim 8, further comprising an image-based guidance controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to:
use image data from the first curved image sensor array to provide course guidance information during a first phase of a mission; and use image data from the second curved image sensor array to provide course guidance information during a second phase of the mission. 14. A navigation system according to claim 13, wherein:
the first curved image sensor array is configured such that the first portion of the field of view provides a downward-looking view, relative to the lens; the first phase of the mission comprises a mid-course portion of the mission; the second curved image sensor array is configured such that the second portion of the field of view provides a forward-looking view, relative to the lens; and the second phase of the mission comprises a terminal portion of the mission. 15. A weapon system, comprising:
an image-based guided round comprising:
a monocentric objective lens;
a first curved image sensor array disposed parallel to, and spaced apart from, the lens; and
a guidance system communicatively coupled to the first curved image sensor array and configured to guide the round based at least in part on image data from the first curved image sensor array and an image of a target;
an unmanned aerial vehicle comprising a digital camera and a transmitter configured to wirelessly transmit ground images captured by the digital camera; and a ground station comprising:
a receiver configured to receive the ground images from the unmanned aerial vehicle; and
a targeting module communicatively coupled to the receiver and configured to upload the image of the target to the round based on the received ground images. 16. A weapon system according to claim 15, further comprising:
a round launcher; and wherein: the targeting module is further configured to:
calculate a firing direction based at least in part on the received ground images; and
provide the firing direction to the round launcher. 17. A navigation system, comprising:
a monocentric objective lens having a field of view; a first plurality of optical fibers; a first image sensor array optically coupled to the lens via the first plurality of optical fibers and configured to receive light from a first portion, less than all, of the field of view; a second plurality of optical fibers; and a second image sensor array optically coupled to the lens via the second plurality of optical fibers and configured to receive light from a second portion, spatially discontiguous with the first portion, of the field of view. | A navigation system includes a monocentric lens and one or more curved image sensor arrays disposed parallel and spaced apart from the lens to capture respective portions, not all, of the field of view of the lens.1. A navigation system comprising:
a monocentric objective lens; and a first curved image sensor array disposed parallel to, and spaced apart from, the lens. 2. A navigation system according to claim 1, wherein:
the lens has a focal length; and the first curved image sensor array is spaced apart from the lens by about the focal length. 3. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than about 80% of the field of view. 4. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than about 25% of the field of view. 5. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens. 6. A navigation system according to claim 1, further comprising a controller communicatively coupled to the first curved image sensor array and configured to use image data from the first curved image sensor array to automatically determine a location of the navigation system. 7. A navigation system according to claim 6, wherein:
the first curved image sensor array is configured to send the image data in a compressed form; and the controller is configured to use the image data in the compressed form to determine the location of the navigation system, without decompressing the image data. 8. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a second curved image sensor array:
disposed parallel to, and spaced apart from, the lens; and
sized and positioned to receive light from a second portion, spatially discontiguous with the first portion, of the field of view. 9. A navigation system according to claim 8, wherein a sum of the first portion of the field of view and the second portion of the field of view is less than all of the field of view. 10. A navigation system according to claim 8, further comprising:
a first plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens; and a second plurality of optical fibers optically coupling the second curved image sensor array to the monocentric objective lens. 11. A navigation system according to claim 8, further comprising a controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to use image data from the first and second curved image sensor arrays to automatically determine a location of the navigation system. 12. A navigation system according to claim 11, wherein:
the first curved image sensor array is configured to send the image data from the first curved image sensor array in a compressed form; the second curved image sensor array is configured to send the image data from the second curved image sensor array in a compressed form; and the controller is configured to use the image data from the first and second curved image sensor arrays in the compressed form to determine the location of the navigation system, without decompressing the image data. 13. A navigation system according to claim 8, further comprising an image-based guidance controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to:
use image data from the first curved image sensor array to provide course guidance information during a first phase of a mission; and use image data from the second curved image sensor array to provide course guidance information during a second phase of the mission. 14. A navigation system according to claim 13, wherein:
the first curved image sensor array is configured such that the first portion of the field of view provides a downward-looking view, relative to the lens; the first phase of the mission comprises a mid-course portion of the mission; the second curved image sensor array is configured such that the second portion of the field of view provides a forward-looking view, relative to the lens; and the second phase of the mission comprises a terminal portion of the mission. 15. A weapon system, comprising:
an image-based guided round comprising:
a monocentric objective lens;
a first curved image sensor array disposed parallel to, and spaced apart from, the lens; and
a guidance system communicatively coupled to the first curved image sensor array and configured to guide the round based at least in part on image data from the first curved image sensor array and an image of a target;
an unmanned aerial vehicle comprising a digital camera and a transmitter configured to wirelessly transmit ground images captured by the digital camera; and a ground station comprising:
a receiver configured to receive the ground images from the unmanned aerial vehicle; and
a targeting module communicatively coupled to the receiver and configured to upload the image of the target to the round based on the received ground images. 16. A weapon system according to claim 15, further comprising:
a round launcher; and wherein: the targeting module is further configured to:
calculate a firing direction based at least in part on the received ground images; and
provide the firing direction to the round launcher. 17. A navigation system, comprising:
a monocentric objective lens having a field of view; a first plurality of optical fibers; a first image sensor array optically coupled to the lens via the first plurality of optical fibers and configured to receive light from a first portion, less than all, of the field of view; a second plurality of optical fibers; and a second image sensor array optically coupled to the lens via the second plurality of optical fibers and configured to receive light from a second portion, spatially discontiguous with the first portion, of the field of view. | 2,400 |
8,376 | 8,376 | 14,725,648 | 2,487 | A vehicle system for providing indirect view around a commercial vehicle. The system has a first image capture unit oriented such that an angle of view of the first image capture unit is directed in a first directional component opposite the main driving direction of the vehicle. A second image capture unit is provided having at least one sensor device oriented such that the angle of view of the second image capture unit is directed in a second directional component in the main driving direction of the vehicle. A calculating unit receives image data from at least the second image capture unit and provides information extracted from the received image data to at least one of a vehicle assistance device, an autonomous vehicle guidance device and a display device within the driver's view. | 1. A vehicle system for providing indirect view around a commercial vehicle, the system comprising:
a first image capture unit, wherein the first image capture unit is oriented such that an angle of view of the first image capture unit is directed in a first direction comprising a directional component opposite to the main driving direction of the vehicle; a second image capture unit, wherein the second image capture unit comprises at least one sensor device and is oriented such that the angle of view of the second image capture unit is directed in a second direction comprising a directional component in the main driving direction of the vehicle; and a calculating unit receiving image data from at least the second image capture unit and providing information extracted from the received image data to a vehicle assistance device and/or an autonomous vehicle guidance device and/or providing image data to a display device within a view of a driver of the vehicle. 2. The system according to claim 1, wherein the second image capture unit comprises at least one of a camera device and an image sensor as the at least one sensor device and the optical axis of the camera device or image sensor is directed in the second direction. 3. The system according to claim 2, wherein the first image capture unit comprises at least one of a camera device and an image sensor, wherein the optical axis of the camera device or image sensor is directed in the first direction. 4. The system according to claim 3, wherein the calculating unit receives image data from the first image capture unit and provides information extracted from the image data of the first and second image capture unit data to the vehicle assistance device and/or the autonomous vehicle guidance device and/or provides image data to the display device. 5. The system according to claim 2, wherein the first image capture unit comprises a mirror. 6. The system according to claim 2, wherein the second direction comprises a directional component in a direction perpendicular to the main driving direction of the vehicle and parallel to the ground plane. 7. The system according to claim 6, wherein the second direction comprises a directional component in a direction perpendicular to the main driving direction of the vehicle and perpendicular to the ground plane. 8. The system according to claim 2, wherein the image data captured by the second image capture device comprises a vehicle reference. 9. The system according to claim 7, wherein the optical axis of the second image capture unit is arranged such that it crosses the ground plane in one of a region next to a front wheel of the vehicle, a region next to a front fender of the vehicle and a region next to a front bumper of the vehicle. 10. The system according to claim 9, wherein the optical axis of the second image capture unit is asymmetric. 11. The system according to claim 2, wherein the second image capture unit is disposed at a distance L with respect to a vehicle side surface. 12. The system according to claim 1, wherein the calculating unit provides image data for display on a display device within the driver's view and is adapted to overlay virtual vehicle reference data on the image data received from the second image capture unit or first and second image capture units for display on the display device. 13. The system according to claim 1, further comprising at least one sensor for detecting the vehicle condition, wherein the calculating unit provides image data for display on a display device within the driver's view and is adapted to switch the display of image data depending on the detected vehicle condition. 14. The system according to claim 1, further comprising at least one additional sensor comprising one of a radar sensor, infrared sensor, and ultrasound sensor, and wherein the calculating unit receives data from the additional sensor and provides information extracted from the image data to the vehicle assistance device and/or the autonomous vehicle guidance device and/or provides image data to the display device depending on the input from the at least one additional sensor. 15. The system according to claim 1, wherein the first image capture unit and the second image capture unit are disposed in a common housing and/or immediately adjacent each other. 16. A vehicle system for providing indirect view around a commercial vehicle, the system comprising:
a first image capture unit with a camera device or an image sensor, wherein the first image capture unit is oriented such that the optical axis of the first image capture unit is directed in a first direction comprising a directional component opposite to the main driving direction; a second image capture unit, wherein the second image capture unit comprises a camera device or an image sensor as the at least one sensor device and is oriented such that the optical axis of the second image capture unit is directed in a second direction comprising a directional component in the main driving direction; and a calculating unit receiving image data from at least the second image capture unit and providing information extracted from the image data to a vehicle assistance device and/or an autonomous vehicle guidance device and/or providing image data to a display device within a view of a driver of the vehicle. 17. A vehicle system for providing indirect view around a commercial vehicle, the system comprising:
a first image capture unit formed by a mirror device, wherein the first image capture unit is oriented such that the optical axis of the first image capture unit is directed in a first direction comprising a directional component opposite to the main driving direction; a second image capture unit, wherein the second image capture unit comprises a camera device or an image sensor as the at least one sensor device and is oriented such that the optical axis of the second image capture unit is directed in a second direction comprising a directional component in the main driving direction; and a calculating unit receiving image data from at least the second image capture unit and providing information extracted from the image data to a vehicle assistance device and/or an autonomous vehicle guidance device and/or providing image data to a display device within a view of a driver of the vehicle. | A vehicle system for providing indirect view around a commercial vehicle. The system has a first image capture unit oriented such that an angle of view of the first image capture unit is directed in a first directional component opposite the main driving direction of the vehicle. A second image capture unit is provided having at least one sensor device oriented such that the angle of view of the second image capture unit is directed in a second directional component in the main driving direction of the vehicle. A calculating unit receives image data from at least the second image capture unit and provides information extracted from the received image data to at least one of a vehicle assistance device, an autonomous vehicle guidance device and a display device within the driver's view.1. A vehicle system for providing indirect view around a commercial vehicle, the system comprising:
a first image capture unit, wherein the first image capture unit is oriented such that an angle of view of the first image capture unit is directed in a first direction comprising a directional component opposite to the main driving direction of the vehicle; a second image capture unit, wherein the second image capture unit comprises at least one sensor device and is oriented such that the angle of view of the second image capture unit is directed in a second direction comprising a directional component in the main driving direction of the vehicle; and a calculating unit receiving image data from at least the second image capture unit and providing information extracted from the received image data to a vehicle assistance device and/or an autonomous vehicle guidance device and/or providing image data to a display device within a view of a driver of the vehicle. 2. The system according to claim 1, wherein the second image capture unit comprises at least one of a camera device and an image sensor as the at least one sensor device and the optical axis of the camera device or image sensor is directed in the second direction. 3. The system according to claim 2, wherein the first image capture unit comprises at least one of a camera device and an image sensor, wherein the optical axis of the camera device or image sensor is directed in the first direction. 4. The system according to claim 3, wherein the calculating unit receives image data from the first image capture unit and provides information extracted from the image data of the first and second image capture unit data to the vehicle assistance device and/or the autonomous vehicle guidance device and/or provides image data to the display device. 5. The system according to claim 2, wherein the first image capture unit comprises a mirror. 6. The system according to claim 2, wherein the second direction comprises a directional component in a direction perpendicular to the main driving direction of the vehicle and parallel to the ground plane. 7. The system according to claim 6, wherein the second direction comprises a directional component in a direction perpendicular to the main driving direction of the vehicle and perpendicular to the ground plane. 8. The system according to claim 2, wherein the image data captured by the second image capture device comprises a vehicle reference. 9. The system according to claim 7, wherein the optical axis of the second image capture unit is arranged such that it crosses the ground plane in one of a region next to a front wheel of the vehicle, a region next to a front fender of the vehicle and a region next to a front bumper of the vehicle. 10. The system according to claim 9, wherein the optical axis of the second image capture unit is asymmetric. 11. The system according to claim 2, wherein the second image capture unit is disposed at a distance L with respect to a vehicle side surface. 12. The system according to claim 1, wherein the calculating unit provides image data for display on a display device within the driver's view and is adapted to overlay virtual vehicle reference data on the image data received from the second image capture unit or first and second image capture units for display on the display device. 13. The system according to claim 1, further comprising at least one sensor for detecting the vehicle condition, wherein the calculating unit provides image data for display on a display device within the driver's view and is adapted to switch the display of image data depending on the detected vehicle condition. 14. The system according to claim 1, further comprising at least one additional sensor comprising one of a radar sensor, infrared sensor, and ultrasound sensor, and wherein the calculating unit receives data from the additional sensor and provides information extracted from the image data to the vehicle assistance device and/or the autonomous vehicle guidance device and/or provides image data to the display device depending on the input from the at least one additional sensor. 15. The system according to claim 1, wherein the first image capture unit and the second image capture unit are disposed in a common housing and/or immediately adjacent each other. 16. A vehicle system for providing indirect view around a commercial vehicle, the system comprising:
a first image capture unit with a camera device or an image sensor, wherein the first image capture unit is oriented such that the optical axis of the first image capture unit is directed in a first direction comprising a directional component opposite to the main driving direction; a second image capture unit, wherein the second image capture unit comprises a camera device or an image sensor as the at least one sensor device and is oriented such that the optical axis of the second image capture unit is directed in a second direction comprising a directional component in the main driving direction; and a calculating unit receiving image data from at least the second image capture unit and providing information extracted from the image data to a vehicle assistance device and/or an autonomous vehicle guidance device and/or providing image data to a display device within a view of a driver of the vehicle. 17. A vehicle system for providing indirect view around a commercial vehicle, the system comprising:
a first image capture unit formed by a mirror device, wherein the first image capture unit is oriented such that the optical axis of the first image capture unit is directed in a first direction comprising a directional component opposite to the main driving direction; a second image capture unit, wherein the second image capture unit comprises a camera device or an image sensor as the at least one sensor device and is oriented such that the optical axis of the second image capture unit is directed in a second direction comprising a directional component in the main driving direction; and a calculating unit receiving image data from at least the second image capture unit and providing information extracted from the image data to a vehicle assistance device and/or an autonomous vehicle guidance device and/or providing image data to a display device within a view of a driver of the vehicle. | 2,400 |
8,377 | 8,377 | 15,509,001 | 2,461 | A radio access node serves the communication terminal in at least one of a first cell on a carrier of a licensed or unlicensed spectrum, and/or a second cell on a carrier of an unlicensed spectrum. The radio access node determines whether a Listen Before Talk, LBT, process is to be performed or not in the second cell. The radio access node schedules, based on whether the LBT process is to be performed in a subframe on the second cell or not, a control channel and/or a data channel with a start position in the subframe out of at least two start positions. The radio access node transmits control information on the control channel and/or data on the data channel as scheduled to the communication terminal. | 1. A method performed by a radio access node for scheduling a control channel and/or a data channel to a communication terminal in a wireless communication network (1); wherein the radio access node (12,13) serves the communication terminal (10) in at least one of a first cell on a carrier of a licensed or unlicensed spectrum, and/or a second cell on a carrier of an unlicensed spectrum, comprising:
determining (702) whether a Listen Before Talk, LBT, process is to be performed or not in the second cell (14); scheduling (703), based on whether the LBT process is to be performed in a subframe on the second cell or not, a control channel and/or a data channel with a start position in the subframe out of at least two start positions; and transmitting (704) control information on the control channel and/or data on the data channel as scheduled to the communication terminal (10). 2. A method according to claim 1, further comprising
configuring (701) the communication terminal (10) with a configuration, which configuration defines that the communication terminal (10) is to monitor at least two start positions for the control channel intended for the communication terminal (10). 3. A method according to claim 2, wherein the configuring (701) the communication terminal (10) with at least two different sets of Physical Downlink Shared Channel Resource Element Mapping and Quasi Co-Located Indicator, PQI, values. 4. A method according to claim 3, wherein the transmitting (704) the control information comprising an indication indicating the start position for the data channel based on one of the at least two sets of PQI values. 5. A method according to any of the claims 1-4, wherein the scheduling (703) the control channel and/or data channel intended for the communication terminal (10) comprises scheduling transmission of data on the data channel on the second cell in a cross carrier manner from the first cell. 6. A method according to any of the claims 1-5, wherein the scheduling (703) the start position in the subframe out of at least two start positions comprises scheduling the data channel at an earlier start position than the control channel. 7. A method according to any of the claims 1-6, wherein the control channel is one out of at least two control channels, and wherein the at least two start positions correspond to the at least two control channels such that one of the at least two control channels corresponds to a start position later in the subframe to be scheduled when the LBT process is to be performed and another one of the at least two control channels corresponds to a start position earlier in the subframe to be scheduled when no LBT process is to be performed. 8. A method according to claim 7, wherein the control channel is of an enhanced Physical Downlink Control Channel set that contains a common search space, and uses a start position that allows for LBT. 9. A method according to any of claims 7-8, wherein each control channel out of the at least two control channels is associated with one of a configured Physical Downlink Shared Channel Resource Element Mapping and Quasi Co-Located Indicator state which each include a parameter, pdsch-Start-r11, giving the start position of the control channel. 10. A method performed by a communication terminal (10) for handling communication in a wireless communication network (1), wherein the communication terminal (10) is configured to communicate with a radio access node (13) in a first cell (11) on a carrier of a licensed or unlicensed spectrum and/or a second cell on a carrier of an unlicensed spectrum, comprising
receiving (711) a configuration from the radio access node, which configuration defines that the communication terminal (10) is to monitor at least two start positions for a control channel intended for the communication terminal (10), and monitoring (713) the at least two start positions for reception of the control channel. 11. A method according to claim 10, wherein the receiving the configuration comprises receiving configuration with at least two different sets of Physical Downlink Shared Channel Resource Element Mapping and Quasi Co-Located Indicator, PQI, values. 12. A method according to claim 11, further comprising
receiving (712) from the radio access node, an indication indicating which set of PQI values to use for determining a start position of a data channel; and monitoring (714) the start position for reception of the data channel in a subframe. 13. The method according to claim 12, further comprising
detecting and decoding (715) the data channel. 14. The method according to any of the claims 10-13, further comprising
detecting and decoding (716) the control channel. 15. A radio access node (12,13) for scheduling a control channel and/or a data channel to a communication terminal (10) in a wireless communication network (1); wherein the radio access node (12,13) is configured to serve the communication terminal (10) in at least one of a first cell on a carrier of a licensed or unlicensed spectrum, and/or a second cell on a carrier of an unlicensed spectrum, the radio access node being configured to:
determine whether a Listen Before Talk, LBT, process is to be performed or not in the second cell (14); schedule, based on whether the LBT process is to be performed in a subframe on the second cell or not, a control channel and/or a data channel with a start position in the subframe out of at least two start positions; and to transmit control information on the control channel and/or data on the data channel as scheduled to the communication terminal (10). 16. A communication terminal (10) for handling communication in a wireless communication network (1), wherein the communication terminal (10) is configured to communicate with a radio access node (13) in a first cell (11) on a carrier of a licensed or unlicensed spectrum and/or a second cell on a carrier of an unlicensed spectrum, the communication terminal (10) being configured to
receive a configuration from the radio access node, which configuration defines that the communication terminal (10) is to monitor at least two start positions for a control channel intended for the communication terminal (10), and to monitor the at least two start positions for reception of the control channel. | A radio access node serves the communication terminal in at least one of a first cell on a carrier of a licensed or unlicensed spectrum, and/or a second cell on a carrier of an unlicensed spectrum. The radio access node determines whether a Listen Before Talk, LBT, process is to be performed or not in the second cell. The radio access node schedules, based on whether the LBT process is to be performed in a subframe on the second cell or not, a control channel and/or a data channel with a start position in the subframe out of at least two start positions. The radio access node transmits control information on the control channel and/or data on the data channel as scheduled to the communication terminal.1. A method performed by a radio access node for scheduling a control channel and/or a data channel to a communication terminal in a wireless communication network (1); wherein the radio access node (12,13) serves the communication terminal (10) in at least one of a first cell on a carrier of a licensed or unlicensed spectrum, and/or a second cell on a carrier of an unlicensed spectrum, comprising:
determining (702) whether a Listen Before Talk, LBT, process is to be performed or not in the second cell (14); scheduling (703), based on whether the LBT process is to be performed in a subframe on the second cell or not, a control channel and/or a data channel with a start position in the subframe out of at least two start positions; and transmitting (704) control information on the control channel and/or data on the data channel as scheduled to the communication terminal (10). 2. A method according to claim 1, further comprising
configuring (701) the communication terminal (10) with a configuration, which configuration defines that the communication terminal (10) is to monitor at least two start positions for the control channel intended for the communication terminal (10). 3. A method according to claim 2, wherein the configuring (701) the communication terminal (10) with at least two different sets of Physical Downlink Shared Channel Resource Element Mapping and Quasi Co-Located Indicator, PQI, values. 4. A method according to claim 3, wherein the transmitting (704) the control information comprising an indication indicating the start position for the data channel based on one of the at least two sets of PQI values. 5. A method according to any of the claims 1-4, wherein the scheduling (703) the control channel and/or data channel intended for the communication terminal (10) comprises scheduling transmission of data on the data channel on the second cell in a cross carrier manner from the first cell. 6. A method according to any of the claims 1-5, wherein the scheduling (703) the start position in the subframe out of at least two start positions comprises scheduling the data channel at an earlier start position than the control channel. 7. A method according to any of the claims 1-6, wherein the control channel is one out of at least two control channels, and wherein the at least two start positions correspond to the at least two control channels such that one of the at least two control channels corresponds to a start position later in the subframe to be scheduled when the LBT process is to be performed and another one of the at least two control channels corresponds to a start position earlier in the subframe to be scheduled when no LBT process is to be performed. 8. A method according to claim 7, wherein the control channel is of an enhanced Physical Downlink Control Channel set that contains a common search space, and uses a start position that allows for LBT. 9. A method according to any of claims 7-8, wherein each control channel out of the at least two control channels is associated with one of a configured Physical Downlink Shared Channel Resource Element Mapping and Quasi Co-Located Indicator state which each include a parameter, pdsch-Start-r11, giving the start position of the control channel. 10. A method performed by a communication terminal (10) for handling communication in a wireless communication network (1), wherein the communication terminal (10) is configured to communicate with a radio access node (13) in a first cell (11) on a carrier of a licensed or unlicensed spectrum and/or a second cell on a carrier of an unlicensed spectrum, comprising
receiving (711) a configuration from the radio access node, which configuration defines that the communication terminal (10) is to monitor at least two start positions for a control channel intended for the communication terminal (10), and monitoring (713) the at least two start positions for reception of the control channel. 11. A method according to claim 10, wherein the receiving the configuration comprises receiving configuration with at least two different sets of Physical Downlink Shared Channel Resource Element Mapping and Quasi Co-Located Indicator, PQI, values. 12. A method according to claim 11, further comprising
receiving (712) from the radio access node, an indication indicating which set of PQI values to use for determining a start position of a data channel; and monitoring (714) the start position for reception of the data channel in a subframe. 13. The method according to claim 12, further comprising
detecting and decoding (715) the data channel. 14. The method according to any of the claims 10-13, further comprising
detecting and decoding (716) the control channel. 15. A radio access node (12,13) for scheduling a control channel and/or a data channel to a communication terminal (10) in a wireless communication network (1); wherein the radio access node (12,13) is configured to serve the communication terminal (10) in at least one of a first cell on a carrier of a licensed or unlicensed spectrum, and/or a second cell on a carrier of an unlicensed spectrum, the radio access node being configured to:
determine whether a Listen Before Talk, LBT, process is to be performed or not in the second cell (14); schedule, based on whether the LBT process is to be performed in a subframe on the second cell or not, a control channel and/or a data channel with a start position in the subframe out of at least two start positions; and to transmit control information on the control channel and/or data on the data channel as scheduled to the communication terminal (10). 16. A communication terminal (10) for handling communication in a wireless communication network (1), wherein the communication terminal (10) is configured to communicate with a radio access node (13) in a first cell (11) on a carrier of a licensed or unlicensed spectrum and/or a second cell on a carrier of an unlicensed spectrum, the communication terminal (10) being configured to
receive a configuration from the radio access node, which configuration defines that the communication terminal (10) is to monitor at least two start positions for a control channel intended for the communication terminal (10), and to monitor the at least two start positions for reception of the control channel. | 2,400 |
8,378 | 8,378 | 15,626,854 | 2,483 | Modular shelving systems and display shelves for modular shelving systems are disclosed. In one embodiment, a modular shelving system includes a shelf support frame comprising a back plane portion and a base portion. At least one display shelf module is removably coupled to the back plane portion of the shelf support frame such that the display shelf module is vertically and horizontally positionable on the back plane portion of the shelf support frame. The display shelf module may include a top and bottom panels, and side panels that define an interior volume. A display panel may be affixed to a front of the display shelf module. A projector may be disposed in the interior volume of the display shelf module. The projector projects an optical signal onto a rear surface of the display panel such that image data is visible on a front surface of the display panel. | 1. A display shelf module comprising:
a display panel positioned at a front of the display shelf module; a projector disposed within the display shelf module; a front mirror positioned proximate the front of the display shelf module; a rear mirror positioned proximate a posterior end of the display shelf module, wherein:
the projector is arranged to project an optical signal onto the front mirror;
the front mirror is arranged to redirect the optical signal from the projector onto the rear mirror; and
the rear mirror is arranged to redirect the optical signal from the front mirror onto a rear surface of the display panel such that image data is visible on a front surface of the display panel. 2. The display shelf module of claim 1, further comprising an image divider positioned in a first optical path between the projector and the front mirror such that the optical signal from the projector is incident on the image divider, the image divider dividing the optical signal from the projector into a plurality of discrete optical signals and directing the plurality of discrete optical signals onto the front mirror. 3. The display shelf module of claim 2, further comprising a condenser lens positioned in a second optical path between the projector and the image divider such that the optical signal projected from the projector passes through the condenser lens before reaching the image divider, the condenser lens concentrating the optical signal projected from the projector. 4. The display shelf module of claim 2, further comprising a plurality of focusing lenses, wherein each of the plurality of focusing lenses is positioned in respective optical paths of the plurality of discrete optical signals such that each of the plurality of discrete optical signals passes through a corresponding focusing lens prior to reaching the front mirror, the plurality of focusing lenses focusing the plurality of discrete optical signals onto the front mirror. 5. The display shelf module of claim 1, further comprising:
a mounting clip positioned at the posterior end of the display shelf module. 6. The display shelf module of claim 1, wherein the display panel is affixed to the front of the display shelf module and extends in a width direction of the front of the display shelf module. 7. The display shelf module of claim 1, further comprising:
a top panel; a bottom panel; a rear panel; side panels; and an interior volume defined by the top panel, the bottom panel, the rear panel and the side panels, wherein the projector is disposed in the interior volume of the display shelf module. 8. The display shelf module of claim 7, wherein an optical path of the optical signal from the projector to the front mirror to the rear mirror to the rear surface of the display panel is contained within an interior volume of the display shelf module. 9. The display shelf module of claim 7, further comprising a floating frame positioned within the interior volume of the display shelf module and affixed to the rear panel of the display shelf module, the floating frame comprising a base spaced apart from the top panel and the bottom panel, wherein the projector is positioned on the base of the floating frame such that the projector is spaced apart from the top panel and the bottom panel of the display shelf module. 10. The display shelf module of claim 9, wherein the floating frame comprises a cantilevered support arm attached to the base. 11. The display shelf module of claim 7, further comprising a floating stanchion position in the interior volume of the display shelf module such that the floating stanchion extends between the top panel and the bottom panel, the floating stanchion transmitting deflections of the top panel or the bottom panel to an opposing panel to prevent misalignment of the projector. 12. The display shelf module of claim 1, further comprising a photo detector communicatively coupled to a control circuit of the projector and positioned such that at least a portion of the optical signal from the projector is incident on the photo detector, wherein the photo detector transmits an intensity signal indicative of an intensity of the optical signal to the control circuit. 13. The display shelf module of claim 12, further comprising a warning indicator, wherein the warning indicator is activated when the intensity signal indicates that the intensity of the optical signal is below a threshold level. 14. The display shelf module of claim 13, further comprising:
an infrared back light arranged to illuminate the rear surface of the display panel; and a detector and oriented to capture an image of the rear surface of the display panel. 15. A modular shelving system comprising:
a shelf support frame comprising a back plane portion and a base portion, wherein the back plane portion comprises a mounting aperture; and a display shelf module comprising:
a display panel positioned at a front of the display shelf module;
a projector disposed within the display shelf module;
a front mirror positioned proximate the front of the display shelf module;
a rear mirror positioned proximate a posterior end of the display shelf module; and
a mounting clip positioned at the posterior end of the display shelf module, wherein:
the projector is arranged to project an optical signal onto the front mirror;
the front mirror is arranged to redirect the optical signal from the projector onto the rear mirror;
the rear mirror is arranged to redirect the optical signal from the front mirror onto a rear surface of the display panel such that image data is visible on a front surface of the display panel; and
the mounting clip of the display shelf module engages the mounting aperture of the back plane portion when the display shelf module is coupled to the back plane portion. 16. The modular shelving system of claim 15, the display shelf module further comprising an image divider positioned in a first optical path between the projector and the front mirror such that the optical signal from the projector is incident on the image divider, the image divider dividing the optical signal from the projector into a plurality of discrete optical signals and directing the plurality of discrete optical signals onto the front mirror. 17. The modular shelving system of claim 16, the display shelf module further comprising a condenser lens positioned in a second optical path between the projector and the image divider such that the optical signal projected from the projector passes through the condenser lens before reaching the image divider, the condenser lens concentrating the optical signal projected from the projector. 18. The modular shelving system of claim 16, the display shelf module further comprising a plurality of focusing lenses, wherein each of the plurality of focusing lenses is positioned in respective optical paths of the plurality of discrete optical signals such that each of the plurality of discrete optical signals passes through a corresponding focusing lens prior to reaching the front mirror, the plurality of focusing lenses focusing the plurality of discrete optical signals onto the front mirror. 19. The modular shelving system of claim 15, the display shelf module further comprising:
a top panel; a bottom panel; a rear panel; side panels; and an interior volume defined by the top panel, the bottom panel, the rear panel and the side panels, wherein the projector is disposed in the interior volume of the display shelf module. 20. The modular shelving system of claim 19, the display shelf module further comprising a floating frame positioned within the interior volume of the display shelf module and affixed to the rear panel of the display shelf module, the floating frame comprising a base spaced apart from the top panel and the bottom panel, wherein the projector is positioned on the base of the floating frame such that the projector is spaced apart from the top panel and the bottom panel of the display shelf module. | Modular shelving systems and display shelves for modular shelving systems are disclosed. In one embodiment, a modular shelving system includes a shelf support frame comprising a back plane portion and a base portion. At least one display shelf module is removably coupled to the back plane portion of the shelf support frame such that the display shelf module is vertically and horizontally positionable on the back plane portion of the shelf support frame. The display shelf module may include a top and bottom panels, and side panels that define an interior volume. A display panel may be affixed to a front of the display shelf module. A projector may be disposed in the interior volume of the display shelf module. The projector projects an optical signal onto a rear surface of the display panel such that image data is visible on a front surface of the display panel.1. A display shelf module comprising:
a display panel positioned at a front of the display shelf module; a projector disposed within the display shelf module; a front mirror positioned proximate the front of the display shelf module; a rear mirror positioned proximate a posterior end of the display shelf module, wherein:
the projector is arranged to project an optical signal onto the front mirror;
the front mirror is arranged to redirect the optical signal from the projector onto the rear mirror; and
the rear mirror is arranged to redirect the optical signal from the front mirror onto a rear surface of the display panel such that image data is visible on a front surface of the display panel. 2. The display shelf module of claim 1, further comprising an image divider positioned in a first optical path between the projector and the front mirror such that the optical signal from the projector is incident on the image divider, the image divider dividing the optical signal from the projector into a plurality of discrete optical signals and directing the plurality of discrete optical signals onto the front mirror. 3. The display shelf module of claim 2, further comprising a condenser lens positioned in a second optical path between the projector and the image divider such that the optical signal projected from the projector passes through the condenser lens before reaching the image divider, the condenser lens concentrating the optical signal projected from the projector. 4. The display shelf module of claim 2, further comprising a plurality of focusing lenses, wherein each of the plurality of focusing lenses is positioned in respective optical paths of the plurality of discrete optical signals such that each of the plurality of discrete optical signals passes through a corresponding focusing lens prior to reaching the front mirror, the plurality of focusing lenses focusing the plurality of discrete optical signals onto the front mirror. 5. The display shelf module of claim 1, further comprising:
a mounting clip positioned at the posterior end of the display shelf module. 6. The display shelf module of claim 1, wherein the display panel is affixed to the front of the display shelf module and extends in a width direction of the front of the display shelf module. 7. The display shelf module of claim 1, further comprising:
a top panel; a bottom panel; a rear panel; side panels; and an interior volume defined by the top panel, the bottom panel, the rear panel and the side panels, wherein the projector is disposed in the interior volume of the display shelf module. 8. The display shelf module of claim 7, wherein an optical path of the optical signal from the projector to the front mirror to the rear mirror to the rear surface of the display panel is contained within an interior volume of the display shelf module. 9. The display shelf module of claim 7, further comprising a floating frame positioned within the interior volume of the display shelf module and affixed to the rear panel of the display shelf module, the floating frame comprising a base spaced apart from the top panel and the bottom panel, wherein the projector is positioned on the base of the floating frame such that the projector is spaced apart from the top panel and the bottom panel of the display shelf module. 10. The display shelf module of claim 9, wherein the floating frame comprises a cantilevered support arm attached to the base. 11. The display shelf module of claim 7, further comprising a floating stanchion position in the interior volume of the display shelf module such that the floating stanchion extends between the top panel and the bottom panel, the floating stanchion transmitting deflections of the top panel or the bottom panel to an opposing panel to prevent misalignment of the projector. 12. The display shelf module of claim 1, further comprising a photo detector communicatively coupled to a control circuit of the projector and positioned such that at least a portion of the optical signal from the projector is incident on the photo detector, wherein the photo detector transmits an intensity signal indicative of an intensity of the optical signal to the control circuit. 13. The display shelf module of claim 12, further comprising a warning indicator, wherein the warning indicator is activated when the intensity signal indicates that the intensity of the optical signal is below a threshold level. 14. The display shelf module of claim 13, further comprising:
an infrared back light arranged to illuminate the rear surface of the display panel; and a detector and oriented to capture an image of the rear surface of the display panel. 15. A modular shelving system comprising:
a shelf support frame comprising a back plane portion and a base portion, wherein the back plane portion comprises a mounting aperture; and a display shelf module comprising:
a display panel positioned at a front of the display shelf module;
a projector disposed within the display shelf module;
a front mirror positioned proximate the front of the display shelf module;
a rear mirror positioned proximate a posterior end of the display shelf module; and
a mounting clip positioned at the posterior end of the display shelf module, wherein:
the projector is arranged to project an optical signal onto the front mirror;
the front mirror is arranged to redirect the optical signal from the projector onto the rear mirror;
the rear mirror is arranged to redirect the optical signal from the front mirror onto a rear surface of the display panel such that image data is visible on a front surface of the display panel; and
the mounting clip of the display shelf module engages the mounting aperture of the back plane portion when the display shelf module is coupled to the back plane portion. 16. The modular shelving system of claim 15, the display shelf module further comprising an image divider positioned in a first optical path between the projector and the front mirror such that the optical signal from the projector is incident on the image divider, the image divider dividing the optical signal from the projector into a plurality of discrete optical signals and directing the plurality of discrete optical signals onto the front mirror. 17. The modular shelving system of claim 16, the display shelf module further comprising a condenser lens positioned in a second optical path between the projector and the image divider such that the optical signal projected from the projector passes through the condenser lens before reaching the image divider, the condenser lens concentrating the optical signal projected from the projector. 18. The modular shelving system of claim 16, the display shelf module further comprising a plurality of focusing lenses, wherein each of the plurality of focusing lenses is positioned in respective optical paths of the plurality of discrete optical signals such that each of the plurality of discrete optical signals passes through a corresponding focusing lens prior to reaching the front mirror, the plurality of focusing lenses focusing the plurality of discrete optical signals onto the front mirror. 19. The modular shelving system of claim 15, the display shelf module further comprising:
a top panel; a bottom panel; a rear panel; side panels; and an interior volume defined by the top panel, the bottom panel, the rear panel and the side panels, wherein the projector is disposed in the interior volume of the display shelf module. 20. The modular shelving system of claim 19, the display shelf module further comprising a floating frame positioned within the interior volume of the display shelf module and affixed to the rear panel of the display shelf module, the floating frame comprising a base spaced apart from the top panel and the bottom panel, wherein the projector is positioned on the base of the floating frame such that the projector is spaced apart from the top panel and the bottom panel of the display shelf module. | 2,400 |
8,379 | 8,379 | 14,271,753 | 2,462 | Power headroom reporting and report handling are discussed in the context of a Physical Uplink Shared Channel (PUSCH), on which a user equipment (UE) has no valid uplink grant, and a Physical Uplink Control Channel (PUCCH) on which a UE has no transmission. Under these circumstances, it is not possible to directly calculate one or more parameters which are used to calculate power headroom. Accordingly, exemplary embodiments provide for predetermined, known values to be used by the UE to calculate the power headroom, and by the eNodeB to understand the meaning of a received power headroom report. | 1. A method for power headroom reporting in a radiocommunication system for a component carrier on which a user equipment (UE) has no current transmission on the Physical Uplink Control Channel (PUCCH), the method comprising:
calculating, by said UE, a power headroom for said component carrier on which said UE has no transmission on the PUCCH, using at least one known value for at least one parameter associated with said PUCCH to calculate said power headroom since a value cannot be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and an eNodeB to which said UE is connected, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of control information bits that are transmitted on said PUCCH on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH format 1a and said PUCCH on said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said PUCCH on said component carrier when the UE has a transmission on the PUCCH; and
transmitting, by said UE, a power headroom report based on said calculated power headroom. 2. The method of claim 1, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc (i−km). 3. The method of claim 2, wherein said first predetermined value is zero dB. 4. The method of claim 2, wherein said second predetermined value is zero dB. 5. The method of claim 2, wherein said third predetermined value is zero dB. 6. The method of claim 1, further comprising:
receiving, by said UE, a reference format associated with said at least one parameter in a signal from said eNodeB. 7. The method of claim 1, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 8. The method of claim 1, wherein said value associated with at least one parameter is that parameter's value. 9. The method of claim 1, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. 10. A user equipment (UE) comprising:
a processor configured to perform power headroom reporting for a component carrier on which a user equipment (UE) has no current Physical Uplink Control Channel (PUCCH) transmission by calculating a power headroom for said component carrier on which said UE has no PUCCH transmission, using at least one known value for at least one parameter associated with said PUCCH to calculate said power headroom since a value cannot be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and an eNodeB to which said UE is connected, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of bits that are transmitted on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH 1a and said at least one known value for the at least one parameter of said PUCCH associated with said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said component carrier when the UE has a transmission on the PUCCH; and
a transceiver configured to transmit a power headroom report based on said calculated power headroom. 11. The UE of claim 10, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc (i−km). 12. The UE of claim 11, wherein said first predetermined value is zero dB. 13. The UE of claim 10, wherein said second predetermined value is zero dB. 14. The UE of claim 10, wherein said third predetermined value is zero dB. 15. The UE of claim 10, wherein said transceiver is further configured to receive a reference format associated with said at least one parameter in a signal from said eNodeB. 16. The UE of claim 10, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 17. The UE of claim 10, wherein said value associated with at least one parameter is that parameter's value. 18. The UE of claim 10, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. 19. A method for power headroom report handling in a radiocommunication system for a component carrier on which a user equipment (UE) has no current transmission on the Physical Uplink Control Channel (PUCCH), the method comprising:
receiving, by an eNodeB, a power headroom report for said component carrier on which said UE has no transmission on the PUCCH, wherein said power headroom report was calculated using at least one known value for at least one parameter associated with said PUCCH since a value cannot be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and said eNodeB, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of control information bits that are transmitted on said PUCCH on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH format 1a and said PUCCH on said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said PUCCH on said component carrier when the UE has a transmission on the PUCCH. 20. The method of claim 19, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc(i−km). 21. The method of claim 20, wherein said first predetermined value is zero dB. 22. The method of claim 20, wherein said second predetermined value is zero dB. 23. The method of claim 20, wherein said third predetermined value is zero dB. 24. The method of claim 19, further comprising:
transmitting, by said eNodeB, a reference format associated with said at least one parameter in a signal toward said UE. 25. The method of claim 19, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 26. The method of claim 19, wherein said value associated with at least one parameter is that parameter's value. 27. The method of claim 19, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. 28. An eNode B comprising:
a processor configured to receive a power headroom report for a component carrier on which a user equipment (UE) has no current Physical Uplink Control Channel (PUCCH) transmission, wherein said power headroom report was calculated using at least one known value for at least one parameter associated with said PUCCH since a value could not be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and said eNodeB, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of bits that are transmitted on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH 1a and said reference format of said PUCCH associated with said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said component carrier when the UE has a transmission on the PUCCH; and
a transceiver configured to transmit an uplink power control command based on said power headroom report. 29. The eNodeB of claim 28, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc(i−km). 30. The eNodeB of claim 29, wherein said first predetermined value is zero dB. 31. The eNodeB of claim 30, wherein said second predetermined value is zero dB. 32. The eNodeB of claim 30, wherein said third predetermined value is zero dB. 33. The eNodeB of claim 28, wherein said transceiver is further configured to transmit a reference format associated with said at least one parameter toward said UE. 34. The eNodeB of claim 28, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 35. The eNodeB of claim 28, wherein said value associated with at least one parameter is that parameter's value. 36. The eNodeB of claim 28, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. | Power headroom reporting and report handling are discussed in the context of a Physical Uplink Shared Channel (PUSCH), on which a user equipment (UE) has no valid uplink grant, and a Physical Uplink Control Channel (PUCCH) on which a UE has no transmission. Under these circumstances, it is not possible to directly calculate one or more parameters which are used to calculate power headroom. Accordingly, exemplary embodiments provide for predetermined, known values to be used by the UE to calculate the power headroom, and by the eNodeB to understand the meaning of a received power headroom report.1. A method for power headroom reporting in a radiocommunication system for a component carrier on which a user equipment (UE) has no current transmission on the Physical Uplink Control Channel (PUCCH), the method comprising:
calculating, by said UE, a power headroom for said component carrier on which said UE has no transmission on the PUCCH, using at least one known value for at least one parameter associated with said PUCCH to calculate said power headroom since a value cannot be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and an eNodeB to which said UE is connected, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of control information bits that are transmitted on said PUCCH on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH format 1a and said PUCCH on said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said PUCCH on said component carrier when the UE has a transmission on the PUCCH; and
transmitting, by said UE, a power headroom report based on said calculated power headroom. 2. The method of claim 1, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc (i−km). 3. The method of claim 2, wherein said first predetermined value is zero dB. 4. The method of claim 2, wherein said second predetermined value is zero dB. 5. The method of claim 2, wherein said third predetermined value is zero dB. 6. The method of claim 1, further comprising:
receiving, by said UE, a reference format associated with said at least one parameter in a signal from said eNodeB. 7. The method of claim 1, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 8. The method of claim 1, wherein said value associated with at least one parameter is that parameter's value. 9. The method of claim 1, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. 10. A user equipment (UE) comprising:
a processor configured to perform power headroom reporting for a component carrier on which a user equipment (UE) has no current Physical Uplink Control Channel (PUCCH) transmission by calculating a power headroom for said component carrier on which said UE has no PUCCH transmission, using at least one known value for at least one parameter associated with said PUCCH to calculate said power headroom since a value cannot be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and an eNodeB to which said UE is connected, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of bits that are transmitted on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH 1a and said at least one known value for the at least one parameter of said PUCCH associated with said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said component carrier when the UE has a transmission on the PUCCH; and
a transceiver configured to transmit a power headroom report based on said calculated power headroom. 11. The UE of claim 10, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc (i−km). 12. The UE of claim 11, wherein said first predetermined value is zero dB. 13. The UE of claim 10, wherein said second predetermined value is zero dB. 14. The UE of claim 10, wherein said third predetermined value is zero dB. 15. The UE of claim 10, wherein said transceiver is further configured to receive a reference format associated with said at least one parameter in a signal from said eNodeB. 16. The UE of claim 10, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 17. The UE of claim 10, wherein said value associated with at least one parameter is that parameter's value. 18. The UE of claim 10, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. 19. A method for power headroom report handling in a radiocommunication system for a component carrier on which a user equipment (UE) has no current transmission on the Physical Uplink Control Channel (PUCCH), the method comprising:
receiving, by an eNodeB, a power headroom report for said component carrier on which said UE has no transmission on the PUCCH, wherein said power headroom report was calculated using at least one known value for at least one parameter associated with said PUCCH since a value cannot be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and said eNodeB, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of control information bits that are transmitted on said PUCCH on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH format 1a and said PUCCH on said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said PUCCH on said component carrier when the UE has a transmission on the PUCCH. 20. The method of claim 19, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc(i−km). 21. The method of claim 20, wherein said first predetermined value is zero dB. 22. The method of claim 20, wherein said second predetermined value is zero dB. 23. The method of claim 20, wherein said third predetermined value is zero dB. 24. The method of claim 19, further comprising:
transmitting, by said eNodeB, a reference format associated with said at least one parameter in a signal toward said UE. 25. The method of claim 19, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 26. The method of claim 19, wherein said value associated with at least one parameter is that parameter's value. 27. The method of claim 19, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. 28. An eNode B comprising:
a processor configured to receive a power headroom report for a component carrier on which a user equipment (UE) has no current Physical Uplink Control Channel (PUCCH) transmission, wherein said power headroom report was calculated using at least one known value for at least one parameter associated with said PUCCH since a value could not be obtained for said at least one parameter; wherein said at least one known value is a value known by both said UE and said eNodeB, wherein said at least one parameter includes at least one of:
(a) hc(nCQI,nHARQ), which represents an amount by which power is adapted to the number of bits that are transmitted on said component carrier when the UE has a transmission on the PUCCH,
(b) ΔF — PUCCHc(F), which represents a relative performance difference between PUCCH 1a and said reference format of said PUCCH associated with said component carrier when the UE has a transmission on the PUCCH, and
(c) δPUCCHc(i−km), which represents a transmit power control command associated with said component carrier when the UE has a transmission on the PUCCH; and
a transceiver configured to transmit an uplink power control command based on said power headroom report. 29. The eNodeB of claim 28, wherein said at least one known value includes a plurality of values known to both said UE and said eNodeB including a first predetermined value for hc(nCQI,nHARQ), a second predetermined value for ΔF — PUCCHc(F) and a third predetermined value for δPUCCHc(i−km). 30. The eNodeB of claim 29, wherein said first predetermined value is zero dB. 31. The eNodeB of claim 30, wherein said second predetermined value is zero dB. 32. The eNodeB of claim 30, wherein said third predetermined value is zero dB. 33. The eNodeB of claim 28, wherein said transceiver is further configured to transmit a reference format associated with said at least one parameter toward said UE. 34. The eNodeB of claim 28, wherein said power headroom report includes information indicating how much transmission power said UE has left for a subframe. 35. The eNodeB of claim 28, wherein said value associated with at least one parameter is that parameter's value. 36. The eNodeB of claim 28, wherein said value associated with at least one parameter is a value from which that parameter's value can be calculated. | 2,400 |
8,380 | 8,380 | 15,033,144 | 2,492 | In one example implementation, a log analysis system can comprise an activity engine to monitor user activity of a computer system, a baseline engine to generate an expected baseline of a log, and an abnormality engine to compare the log to the expected baseline to identify an abnormality, compare the abnormality to a user activity volume based on a correlation between the user activity volume and the log activity, and classify the log. | 1. A log analysis system comprising:
an activity engine to monitor user activity of a computer system; a baseline engine to generate an expected baseline of a log based on historical log activity; and an abnormality engine to:
compare the log to the expected baseline to identify an abnormality;
compare the abnormality to a user activity volume based on a correlation between the user activity volume and the log activity; and
classify the log based on the abnormality, the correlation, and the user activity volume. 2. The log analysis system of claim 1, wherein the baseline engine is to:
adjust the expected baseline based on the user activity volume. 3. The log analysis system of claim 1, comprising a template engine to identify a log template based on a log entry of the log, wherein the expected baseline is based on a seasonal effect of the log and the log template. 4. The log analysis system of claim 3, wherein the abnormality engine is to:
create a graph based on the log template, the graph to represent a number of log entries associated with the log template; and compare the graph to the expected baseline, the abnormality being the difference between the graph and the expected baseline. 5. The log analysis system of claim 1, comprising:
a display engine to cause a display of the abnormality and a classification of the log. 6. A computer readable storage medium comprising a set of instructions executable by a processor resource to:
generate a first graph, the first graph to represent an expected baseline of log activity of a computer system based on a log template of the log activity and a seasonal effect of the log activity; generate a second graph, the second graph to represent a user activity volume of the computer system; compare the first graph to the second graph to identify a correlation between the expected baseline and the user activity volume; and score the log activity based on the expected baseline, the correlation, and the user activity volume. 7. The medium of claim 6, wherein the expected baseline comprises:
a degree of relatedness among log activity based on a text template; and wherein the seasonal effect is based on a time-dependent pattern of the log template. 8. The medium of claim 6, wherein the set of instructions executable to generate a second graph comprise instructions executable by the processor to:
monitor the user activity volume of the computer system; and
wherein the set of instructions executable to generate a first graph comprise instructions executable by the processor to:
normalize the seasonal effect of the expected baseline based on the user activity volume; and
wherein the set of instructions to compare the first graph to the second graph includes using data provided by a real user monitor to determine the correlation between the user activity. 9. The medium of claim 6, wherein the set of instructions is executable by the processor to:
cause a display of the log activity with an identifier associated with an abnormality of the log activity and the score of the log activity; wherein the set of instructions executable to compare the first graph and the second graph comprise instructions executable by the processor to: identify the abnormality based on the correlation and the difference between the first graph and the log activity. 10. The medium of claim 9, wherein the identifier indicates the degree of abnormality based on a context of the log and a severity of the abnormality, the context of the log to include the correlation of the log based on a degree of user activity volume on the log. 11. A method for analyzing a log comprising:
identifying a log template based on a set of entries of the log; generating a baseline graph associated with expected log activity based on the log template; generating a user activity graph associated with a volume of user activity; comparing the user activity graph to the baseline graph to identify a correlation between the log template and the volume of user activity: comparing a potential abnormality of the log to the volume of user activity associated with the log, the potential abnormality being a difference between the log and the baseline; and visually indicating a log status based on the correlation between the potential abnormality and the volume of user activity. 12. The method of claim 11, comprising:
clustering a set of entries of the log based on a text template to identify the log template; identifying a seasonal effect of the log activity; and identifying a number of the set of entries associated with the log template. 13. The method of claim 12, comprising:
mapping a log template count of the log to a log graph based on a number of the set of entries associated with the log template; comparing the log graph to the baseline to identify the potential abnormality; and causing to present the log as a node in a map, the map to contain nodes having a color based on the abnormality associated with the log template and the correlation. 14. The method of claim 11, comprising at least one of:
identifying the log is impacted by the volume of user activity; and identifying the user activity to impact the log. 15. The method of claim 11, comprising:
estimating the volume of log activity based on a degree of granularity; and providing a degree of abnormality of the log based on the volume of user activity. | In one example implementation, a log analysis system can comprise an activity engine to monitor user activity of a computer system, a baseline engine to generate an expected baseline of a log, and an abnormality engine to compare the log to the expected baseline to identify an abnormality, compare the abnormality to a user activity volume based on a correlation between the user activity volume and the log activity, and classify the log.1. A log analysis system comprising:
an activity engine to monitor user activity of a computer system; a baseline engine to generate an expected baseline of a log based on historical log activity; and an abnormality engine to:
compare the log to the expected baseline to identify an abnormality;
compare the abnormality to a user activity volume based on a correlation between the user activity volume and the log activity; and
classify the log based on the abnormality, the correlation, and the user activity volume. 2. The log analysis system of claim 1, wherein the baseline engine is to:
adjust the expected baseline based on the user activity volume. 3. The log analysis system of claim 1, comprising a template engine to identify a log template based on a log entry of the log, wherein the expected baseline is based on a seasonal effect of the log and the log template. 4. The log analysis system of claim 3, wherein the abnormality engine is to:
create a graph based on the log template, the graph to represent a number of log entries associated with the log template; and compare the graph to the expected baseline, the abnormality being the difference between the graph and the expected baseline. 5. The log analysis system of claim 1, comprising:
a display engine to cause a display of the abnormality and a classification of the log. 6. A computer readable storage medium comprising a set of instructions executable by a processor resource to:
generate a first graph, the first graph to represent an expected baseline of log activity of a computer system based on a log template of the log activity and a seasonal effect of the log activity; generate a second graph, the second graph to represent a user activity volume of the computer system; compare the first graph to the second graph to identify a correlation between the expected baseline and the user activity volume; and score the log activity based on the expected baseline, the correlation, and the user activity volume. 7. The medium of claim 6, wherein the expected baseline comprises:
a degree of relatedness among log activity based on a text template; and wherein the seasonal effect is based on a time-dependent pattern of the log template. 8. The medium of claim 6, wherein the set of instructions executable to generate a second graph comprise instructions executable by the processor to:
monitor the user activity volume of the computer system; and
wherein the set of instructions executable to generate a first graph comprise instructions executable by the processor to:
normalize the seasonal effect of the expected baseline based on the user activity volume; and
wherein the set of instructions to compare the first graph to the second graph includes using data provided by a real user monitor to determine the correlation between the user activity. 9. The medium of claim 6, wherein the set of instructions is executable by the processor to:
cause a display of the log activity with an identifier associated with an abnormality of the log activity and the score of the log activity; wherein the set of instructions executable to compare the first graph and the second graph comprise instructions executable by the processor to: identify the abnormality based on the correlation and the difference between the first graph and the log activity. 10. The medium of claim 9, wherein the identifier indicates the degree of abnormality based on a context of the log and a severity of the abnormality, the context of the log to include the correlation of the log based on a degree of user activity volume on the log. 11. A method for analyzing a log comprising:
identifying a log template based on a set of entries of the log; generating a baseline graph associated with expected log activity based on the log template; generating a user activity graph associated with a volume of user activity; comparing the user activity graph to the baseline graph to identify a correlation between the log template and the volume of user activity: comparing a potential abnormality of the log to the volume of user activity associated with the log, the potential abnormality being a difference between the log and the baseline; and visually indicating a log status based on the correlation between the potential abnormality and the volume of user activity. 12. The method of claim 11, comprising:
clustering a set of entries of the log based on a text template to identify the log template; identifying a seasonal effect of the log activity; and identifying a number of the set of entries associated with the log template. 13. The method of claim 12, comprising:
mapping a log template count of the log to a log graph based on a number of the set of entries associated with the log template; comparing the log graph to the baseline to identify the potential abnormality; and causing to present the log as a node in a map, the map to contain nodes having a color based on the abnormality associated with the log template and the correlation. 14. The method of claim 11, comprising at least one of:
identifying the log is impacted by the volume of user activity; and identifying the user activity to impact the log. 15. The method of claim 11, comprising:
estimating the volume of log activity based on a degree of granularity; and providing a degree of abnormality of the log based on the volume of user activity. | 2,400 |
8,381 | 8,381 | 15,642,182 | 2,483 | A device includes a housing defining a first major face having a first normal axis extending from the first major face in a first direction. A first convex lens protrudes from the first major face. A first bezel at least partially surrounds the first convex lens. At least one mechanical upright extends from the first bezel to a first height that is greater than a second height that the convex lens protrudes from the first major face. | 1. A device, comprising:
a housing defining a first major face having a first normal axis extending from the first major face in a first direction; a first convex lens protruding from the first major face; a first bezel at least partially surrounding the first convex lens; and at least one mechanical upright extending from the first bezel to a first height that is greater than a second height that the convex lens protrudes from the first major face. 2. The device of claim 1, wherein the at least one mechanical upright comprises a first mechanical upright and a second mechanical upright, wherein the first convex lens is disposed between the first mechanical upright and the second mechanical upright. 3. The device of claim 2, wherein the first mechanical upright is rotated 180 degrees out of phase around the first convex lens relative to the second mechanical upright. 4. The device of claim 3, wherein each mechanical upright defines a fin having a concave recess oriented toward the first convex lens and a convex surface oriented away from the first convex lens. 5. The device of claim 1, the housing further defining a second major face having a second normal axis extending from the second major face in a second direction, further comprising:
a second convex lens protruding from the second major face; a second bezel at least partially surrounding the second convex lens; and at least one other mechanical upright extending from the second bezel to a third height that is greater than a fourth height that the a second convex lens protrudes from the second major face. 6. The device of claim 5, wherein the first direction is opposite the second direction. 7. The device of claim 5, wherein:
the at least one mechanical upright comprises a first mechanical upright and a second mechanical upright; the at least one other mechanical upright comprises a third mechanical upright and a fourth mechanical upright. 8. The device of claim 7, wherein:
the first convex lens is disposed between the first mechanical upright and the second mechanical upright; and the second convex lens is disposed between the third mechanical upright and the fourth mechanical upright. 9. The device of claim 8, wherein:
the first mechanical upright and the second mechanical upright are at 12 o'clock and 6 o'clock positions relative to the first convex lens; and the third mechanical upright and the fourth mechanical upright are at 3 o'clock and 9 o'clock positions relative to the second convex lens. 10. A device, comprising:
a housing; and an attachment, extending distally from an edge of the housing, the attachment comprising:
a first major face facing outward from the attachment in a first direction; and
a second major face facing outward from the attachment in a second direction opposite the first direction;
the first major face comprising a first convex lens at least partially surrounded by a first bezel;
the second major face comprising a second convex lens at least partially surrounded by a second bezel;
a first mechanical upright extending distally from the first major face farther than the first convex lens; and
a second mechanical upright extending distally from the second major face farther than the second convex lens. 11. The device of claim 10, further comprising:
a third mechanical upright extending distally from the first major face farther than the first convex lens; and a fourth mechanical upright extending distally from the second major face farther than the second convex lens. 12. The device of claim 11, wherein:
the first mechanical upright and the third mechanical upright are at 12 o'clock and 6 o'clock positions relative to the first convex lens; and the second mechanical upright and the fourth mechanical upright at 3 o'clock and 9 o'clock positions relative to the second convex lens. 13. The device of claim 11, further comprising:
a first imager disposed within the attachment behind the first convex lens; a second imager disposed within the attachment behind the second convex lens; and one or more processors operable with the first imager and the second imager; wherein:
the first convex lens defines a first field of view for the first imager; and
the second convex lens defines a second field of view for the second imager;
each of the first field of view and the second field of view spanning more than 180 degrees. 14. The device of claim 13, the one or more processors causing the first imager and the second imager to capture a first image and a second image, respectively, and replacing a portion of the first image obstructed by the first mechanical upright with another portion taken from the second image. 15. The device of claim 13, the one or more processors causing the first imager and the second imager to capture a first image and a second image, respectively, and replacing portions of the second image obstructed by the second mechanical upright and the fourth mechanical upright with other portions taken from the first image. 16. A method, comprising:
capturing a first image with a first imager through a first convex lens protruding from a first major face of a device with at least one mechanical upright extending distally from the first major face farther than the first convex lens, wherein one or more portions of the first image are obstructed by the at least one mechanical upright; capturing a second image with a second imager through a second convex lens protruding from a second major face of the device with at least one other mechanical upright extending distally from the second major face farther than the second convex lens; and replacing, with one or more processors operable with the first imager and the second imager, the one or more portions of the first image with one or more other portions of the second image. 17. The method of claim 16, wherein the first image and the second image each have a field of view greater than 180 degrees. 18. The method of claim 17, wherein the one or more portions are at 3 o'clock and 9 o'clock positions of the first image. 19. The method of claim 18, wherein the one or more portions are at least at a 12 o'clock position of the first image. 20. The method of claim 16, further comprising replacing, with the one or more processors, a portion of the second image obstructed by the at least one other mechanical upright with another portion of the first image. | A device includes a housing defining a first major face having a first normal axis extending from the first major face in a first direction. A first convex lens protrudes from the first major face. A first bezel at least partially surrounds the first convex lens. At least one mechanical upright extends from the first bezel to a first height that is greater than a second height that the convex lens protrudes from the first major face.1. A device, comprising:
a housing defining a first major face having a first normal axis extending from the first major face in a first direction; a first convex lens protruding from the first major face; a first bezel at least partially surrounding the first convex lens; and at least one mechanical upright extending from the first bezel to a first height that is greater than a second height that the convex lens protrudes from the first major face. 2. The device of claim 1, wherein the at least one mechanical upright comprises a first mechanical upright and a second mechanical upright, wherein the first convex lens is disposed between the first mechanical upright and the second mechanical upright. 3. The device of claim 2, wherein the first mechanical upright is rotated 180 degrees out of phase around the first convex lens relative to the second mechanical upright. 4. The device of claim 3, wherein each mechanical upright defines a fin having a concave recess oriented toward the first convex lens and a convex surface oriented away from the first convex lens. 5. The device of claim 1, the housing further defining a second major face having a second normal axis extending from the second major face in a second direction, further comprising:
a second convex lens protruding from the second major face; a second bezel at least partially surrounding the second convex lens; and at least one other mechanical upright extending from the second bezel to a third height that is greater than a fourth height that the a second convex lens protrudes from the second major face. 6. The device of claim 5, wherein the first direction is opposite the second direction. 7. The device of claim 5, wherein:
the at least one mechanical upright comprises a first mechanical upright and a second mechanical upright; the at least one other mechanical upright comprises a third mechanical upright and a fourth mechanical upright. 8. The device of claim 7, wherein:
the first convex lens is disposed between the first mechanical upright and the second mechanical upright; and the second convex lens is disposed between the third mechanical upright and the fourth mechanical upright. 9. The device of claim 8, wherein:
the first mechanical upright and the second mechanical upright are at 12 o'clock and 6 o'clock positions relative to the first convex lens; and the third mechanical upright and the fourth mechanical upright are at 3 o'clock and 9 o'clock positions relative to the second convex lens. 10. A device, comprising:
a housing; and an attachment, extending distally from an edge of the housing, the attachment comprising:
a first major face facing outward from the attachment in a first direction; and
a second major face facing outward from the attachment in a second direction opposite the first direction;
the first major face comprising a first convex lens at least partially surrounded by a first bezel;
the second major face comprising a second convex lens at least partially surrounded by a second bezel;
a first mechanical upright extending distally from the first major face farther than the first convex lens; and
a second mechanical upright extending distally from the second major face farther than the second convex lens. 11. The device of claim 10, further comprising:
a third mechanical upright extending distally from the first major face farther than the first convex lens; and a fourth mechanical upright extending distally from the second major face farther than the second convex lens. 12. The device of claim 11, wherein:
the first mechanical upright and the third mechanical upright are at 12 o'clock and 6 o'clock positions relative to the first convex lens; and the second mechanical upright and the fourth mechanical upright at 3 o'clock and 9 o'clock positions relative to the second convex lens. 13. The device of claim 11, further comprising:
a first imager disposed within the attachment behind the first convex lens; a second imager disposed within the attachment behind the second convex lens; and one or more processors operable with the first imager and the second imager; wherein:
the first convex lens defines a first field of view for the first imager; and
the second convex lens defines a second field of view for the second imager;
each of the first field of view and the second field of view spanning more than 180 degrees. 14. The device of claim 13, the one or more processors causing the first imager and the second imager to capture a first image and a second image, respectively, and replacing a portion of the first image obstructed by the first mechanical upright with another portion taken from the second image. 15. The device of claim 13, the one or more processors causing the first imager and the second imager to capture a first image and a second image, respectively, and replacing portions of the second image obstructed by the second mechanical upright and the fourth mechanical upright with other portions taken from the first image. 16. A method, comprising:
capturing a first image with a first imager through a first convex lens protruding from a first major face of a device with at least one mechanical upright extending distally from the first major face farther than the first convex lens, wherein one or more portions of the first image are obstructed by the at least one mechanical upright; capturing a second image with a second imager through a second convex lens protruding from a second major face of the device with at least one other mechanical upright extending distally from the second major face farther than the second convex lens; and replacing, with one or more processors operable with the first imager and the second imager, the one or more portions of the first image with one or more other portions of the second image. 17. The method of claim 16, wherein the first image and the second image each have a field of view greater than 180 degrees. 18. The method of claim 17, wherein the one or more portions are at 3 o'clock and 9 o'clock positions of the first image. 19. The method of claim 18, wherein the one or more portions are at least at a 12 o'clock position of the first image. 20. The method of claim 16, further comprising replacing, with the one or more processors, a portion of the second image obstructed by the at least one other mechanical upright with another portion of the first image. | 2,400 |
8,382 | 8,382 | 16,027,023 | 2,425 | In accordance with some embodiments of the disclosed subject matter, mechanisms for providing media guidance with media content from alternate sources are provided. In some embodiments, a method for providing media guidance with a plurality of media sources is provided, the method comprising: storing a plurality of media content listings corresponding to a plurality of media content items, wherein each of the plurality of media content items is provided by a content source; determining a subset of the plurality of media content listings for presenting to a user; determining, for each media content listing in the subset of the plurality of media content listings, whether an alternate source for providing a media content item corresponding to a media content listing is available, wherein the alternate source is different from the content source; and causing a subset of the plurality of media content listings to be presented to the user, wherein a selectable alternate source indicator is presented within the corresponding media content listing in response to determining that the media content item is available from the alternate source. | 1. A method for providing media guidance with a plurality of media sources, the method comprising:
receiving, using a hardware processor, a plurality of media content listings for presenting to a user that are each associated with one of a plurality of media content sources; determining, without user intervention, for a media content listing of the plurality of media content listings, an availability of a media content item corresponding to the media content listing from one or more alternate sources of media content, wherein each of the one or more alternate sources is different than the plurality of media content sources; causing the plurality of media content listings to be presented to the user; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user within the media content listing in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the corresponding media content item to be presented in response to receiving a selection of the alternate source indicator. 2. The method of claim 1, wherein at least one of the plurality of media content sources is a broadcast television source and the one or more alternate sources is an over-the-top content source. 3. The method of claim 1, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 4. The method of claim 1, further comprising:
accessing a priority list having at least a first alternate source and a second alternate source; determining whether the media content item is available from the first alternate source; determining whether the media content item is available from the second alternate source in response to determining that the media content item is unavailable from the first alternate source; and causing the alternate source indicator to be presented in response to determining that the media content item is available from the second alternate source, wherein the second alternate source is associated with the media content item. 5. The method of claim 4, further comprising inhibiting additional alternate sources from being searched for the media content item in response to determining that the media content item is available from the second alternate source. 6. The method of claim 1, wherein the alternate source indicator indicates which of the one or more alternate sources of media content from which the media content item is available. 7. The method of claim 1, further comprising:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 8. A system for providing media guidance with a plurality of media sources, the system comprising:
a memory; and a hardware processor that, when executing computer executable instructions stored in the memory, is configured to:
receive a plurality of media content listings for presenting to a user that are each associated with one of a plurality of media content sources;
determine, without user intervention, for a media content listing of the plurality of media content listings, an availability of a media content item corresponding to the media content listing from one or more alternate sources of media content, wherein each of the one or more alternate sources is different than the plurality of media content sources;
cause the plurality of media content listings to be presented to the user;
concurrently with causing the plurality of media content listings to be presented, cause an alternate source indicator to be presented to the user within the media content listing in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and
cause the corresponding media content item to be presented in response to receiving a selection of the alternate source indicator. 9. The system of claim 8, wherein at least one of the plurality of media content sources is a broadcast television source and the one or more alternate sources is an over-the-top content source. 10. The system of claim 8, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 11. The system of claim 8, wherein the hardware processor is further configured to:
access a priority list having at least a first alternate source and a second alternate source; determine whether the media content item is available from the first alternate source; determine whether the media content item is available from the second alternate source in response to determining that the media content item is unavailable from the first alternate source; and cause the alternate source indicator to be presented in response to determining that the media content item is available from the second alternate source, wherein the second alternate source is associated with the media content item. 12. The system of claim 11, wherein the hardware processor is further configured to inhibit additional alternate sources from being searched for the media content item in response to determining that the media content item is available from the second alternate source. 13. The system of claim 8, wherein the alternate source indicator indicates which of the one or more alternate sources of media content from which the media content item is available. 14. The system of claim 8, wherein the hardware processor is further configured to:
store login information associated with the one or more alternate sources; and retrieve, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 15. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the process to perform a method for providing media guidance with a plurality of media sources, the method comprising:
receiving a plurality of media content listings for presenting to a user that are each associated with one of a plurality of media content sources; determining, without user intervention, for a media content listing of the plurality of media content listings, an availability of a media content item corresponding to the media content listing from one or more alternate sources of media content, wherein each of the one or more alternate sources is different than the plurality of media content sources; causing the plurality of media content listings to be presented to the user; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user within the media content listing in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the corresponding media content item to be presented in response to receiving a selection of the alternate source indicator. 16. The non-transitory computer-readable medium of claim 15, wherein at least one of the plurality of media content sources is a broadcast television source and the one or more alternate sources is an over-the-top content source. 17. The non-transitory computer-readable medium of claim 15, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 18. The non-transitory computer-readable medium of claim 15, further comprising:
accessing a priority list having at least a first alternate source and a second alternate source; determining whether the media content item is available from the first alternate source; determining whether the media content item is available from the second alternate source in response to determining that the media content item is unavailable from the first alternate source; causing the alternate source indicator to be presented in response to determining that the media content item is available from the second alternate source, wherein the second alternate source is associated with the media content item; and inhibiting additional alternate sources from being searched for the media content item in response to determining that the media content item is available from the second alternate source. 19. The non-transitory computer-readable medium of claim 15, wherein the alternate source indicator indicates which of the one or more alternate sources of media content from which the media content item is available. 20. The non-transitory computer-readable medium of claim 15, further comprising:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. | In accordance with some embodiments of the disclosed subject matter, mechanisms for providing media guidance with media content from alternate sources are provided. In some embodiments, a method for providing media guidance with a plurality of media sources is provided, the method comprising: storing a plurality of media content listings corresponding to a plurality of media content items, wherein each of the plurality of media content items is provided by a content source; determining a subset of the plurality of media content listings for presenting to a user; determining, for each media content listing in the subset of the plurality of media content listings, whether an alternate source for providing a media content item corresponding to a media content listing is available, wherein the alternate source is different from the content source; and causing a subset of the plurality of media content listings to be presented to the user, wherein a selectable alternate source indicator is presented within the corresponding media content listing in response to determining that the media content item is available from the alternate source.1. A method for providing media guidance with a plurality of media sources, the method comprising:
receiving, using a hardware processor, a plurality of media content listings for presenting to a user that are each associated with one of a plurality of media content sources; determining, without user intervention, for a media content listing of the plurality of media content listings, an availability of a media content item corresponding to the media content listing from one or more alternate sources of media content, wherein each of the one or more alternate sources is different than the plurality of media content sources; causing the plurality of media content listings to be presented to the user; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user within the media content listing in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the corresponding media content item to be presented in response to receiving a selection of the alternate source indicator. 2. The method of claim 1, wherein at least one of the plurality of media content sources is a broadcast television source and the one or more alternate sources is an over-the-top content source. 3. The method of claim 1, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 4. The method of claim 1, further comprising:
accessing a priority list having at least a first alternate source and a second alternate source; determining whether the media content item is available from the first alternate source; determining whether the media content item is available from the second alternate source in response to determining that the media content item is unavailable from the first alternate source; and causing the alternate source indicator to be presented in response to determining that the media content item is available from the second alternate source, wherein the second alternate source is associated with the media content item. 5. The method of claim 4, further comprising inhibiting additional alternate sources from being searched for the media content item in response to determining that the media content item is available from the second alternate source. 6. The method of claim 1, wherein the alternate source indicator indicates which of the one or more alternate sources of media content from which the media content item is available. 7. The method of claim 1, further comprising:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 8. A system for providing media guidance with a plurality of media sources, the system comprising:
a memory; and a hardware processor that, when executing computer executable instructions stored in the memory, is configured to:
receive a plurality of media content listings for presenting to a user that are each associated with one of a plurality of media content sources;
determine, without user intervention, for a media content listing of the plurality of media content listings, an availability of a media content item corresponding to the media content listing from one or more alternate sources of media content, wherein each of the one or more alternate sources is different than the plurality of media content sources;
cause the plurality of media content listings to be presented to the user;
concurrently with causing the plurality of media content listings to be presented, cause an alternate source indicator to be presented to the user within the media content listing in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and
cause the corresponding media content item to be presented in response to receiving a selection of the alternate source indicator. 9. The system of claim 8, wherein at least one of the plurality of media content sources is a broadcast television source and the one or more alternate sources is an over-the-top content source. 10. The system of claim 8, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 11. The system of claim 8, wherein the hardware processor is further configured to:
access a priority list having at least a first alternate source and a second alternate source; determine whether the media content item is available from the first alternate source; determine whether the media content item is available from the second alternate source in response to determining that the media content item is unavailable from the first alternate source; and cause the alternate source indicator to be presented in response to determining that the media content item is available from the second alternate source, wherein the second alternate source is associated with the media content item. 12. The system of claim 11, wherein the hardware processor is further configured to inhibit additional alternate sources from being searched for the media content item in response to determining that the media content item is available from the second alternate source. 13. The system of claim 8, wherein the alternate source indicator indicates which of the one or more alternate sources of media content from which the media content item is available. 14. The system of claim 8, wherein the hardware processor is further configured to:
store login information associated with the one or more alternate sources; and retrieve, without user intervention, the corresponding media content item from an available alternate source using the stored login information. 15. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the process to perform a method for providing media guidance with a plurality of media sources, the method comprising:
receiving a plurality of media content listings for presenting to a user that are each associated with one of a plurality of media content sources; determining, without user intervention, for a media content listing of the plurality of media content listings, an availability of a media content item corresponding to the media content listing from one or more alternate sources of media content, wherein each of the one or more alternate sources is different than the plurality of media content sources; causing the plurality of media content listings to be presented to the user; concurrently with causing the plurality of media content listings to be presented, causing an alternate source indicator to be presented to the user within the media content listing in response to determining that the corresponding media content item is available from the one or more alternate sources of media content; and causing the corresponding media content item to be presented in response to receiving a selection of the alternate source indicator. 16. The non-transitory computer-readable medium of claim 15, wherein at least one of the plurality of media content sources is a broadcast television source and the one or more alternate sources is an over-the-top content source. 17. The non-transitory computer-readable medium of claim 15, wherein the plurality of media content listings is presented to the user as a list of search results responsive to a search query from the user. 18. The non-transitory computer-readable medium of claim 15, further comprising:
accessing a priority list having at least a first alternate source and a second alternate source; determining whether the media content item is available from the first alternate source; determining whether the media content item is available from the second alternate source in response to determining that the media content item is unavailable from the first alternate source; causing the alternate source indicator to be presented in response to determining that the media content item is available from the second alternate source, wherein the second alternate source is associated with the media content item; and inhibiting additional alternate sources from being searched for the media content item in response to determining that the media content item is available from the second alternate source. 19. The non-transitory computer-readable medium of claim 15, wherein the alternate source indicator indicates which of the one or more alternate sources of media content from which the media content item is available. 20. The non-transitory computer-readable medium of claim 15, further comprising:
storing login information associated with the one or more alternate sources; and retrieving, without user intervention, the corresponding media content item from an available alternate source using the stored login information. | 2,400 |
8,383 | 8,383 | 15,488,113 | 2,468 | A method for accelerating TCP/UDP packet switching. The method involves determining whether exception processing is necessary; if not, the packet is forwarded to a special stack for expedited processing. Packets requiring exception processing are forwarded to the conventional stack. | 1. A digital processing system for processing data packets in at least one data network, comprising:
a first hardware module that includes a first stack for performing a first type of packet processing with a first number of processing steps on data packets received in the at least one network; a second hardware module that includes a second stack for performing a second type of packet processing that comprises a second number of processing steps on data packets received in the at least one network, wherein the second number of processing steps is less than the first number of processing steps, wherein the second module receives packets and determines whether the received packets correspond to the first or second types of packet processing, wherein the second module injects packets that correspond to the first type of packet processing into the first stack, and wherein the second module processes packets that correspond to the second type of packet processing according to the second stack. 2. The module of claim 1, wherein the second module determines whether the received packets correspond to the first or second types of packet processing based on Session IDs associated with the received packets. 3. The module of claim 1, wherein the second module determines whether the received packets correspond to the first or second types of packet processing based on TCP socket states associated with the received packets. 4. The module of claim 1, wherein the first and second modules exchange control messages to maintain state synchronization. 5. The module of claim 2, wherein the packets requiring exceptions processing are injected into the first stack. 6. A method for processing data packets, comprising:
receiving a data packet at a processing module that comprises a first stack for processing data packets according to a slow path and a second stack for processing data packets according to a fast path; determining whether the data packet is eligible for processing by the second stack; and routing the data packet to the second stack as a function of the packet being eligible for processing by the second stack or routing the data packet to the first stack as a function of the packet being ineligible for processing by the second stack. 7. The method of claim 6, wherein the determining comprises:
extracting a Session ID from the data packet; using the Session ID to look up socket and TCP control blocks corresponding to the data packet; and examining the socket and TCP control blocks, a TCP header, and an associated Fast-Path connection entry to determine whether the data packet is eligible for processing by the second stack. 8. The method of claim 6, wherein the determining comprises assessing whether the data packet will require exception processing based on at least one of:
an out of order sequence of the data packet in relation to other data packets; a TCP-atypical flag corresponding to the data packet; an option associated with the data packet; an incorrect timestamp associated with the data packet; data queued in a send buffer of a socket associated with the data packet; or a retransmission requirement. 9. The method of claim 6, wherein the determining comprises sending the data packet directly to an inter-processor communication module, wherein receiving an error code at a socket send routine indicates that the data packet is ineligible for processing by the second stack. | A method for accelerating TCP/UDP packet switching. The method involves determining whether exception processing is necessary; if not, the packet is forwarded to a special stack for expedited processing. Packets requiring exception processing are forwarded to the conventional stack.1. A digital processing system for processing data packets in at least one data network, comprising:
a first hardware module that includes a first stack for performing a first type of packet processing with a first number of processing steps on data packets received in the at least one network; a second hardware module that includes a second stack for performing a second type of packet processing that comprises a second number of processing steps on data packets received in the at least one network, wherein the second number of processing steps is less than the first number of processing steps, wherein the second module receives packets and determines whether the received packets correspond to the first or second types of packet processing, wherein the second module injects packets that correspond to the first type of packet processing into the first stack, and wherein the second module processes packets that correspond to the second type of packet processing according to the second stack. 2. The module of claim 1, wherein the second module determines whether the received packets correspond to the first or second types of packet processing based on Session IDs associated with the received packets. 3. The module of claim 1, wherein the second module determines whether the received packets correspond to the first or second types of packet processing based on TCP socket states associated with the received packets. 4. The module of claim 1, wherein the first and second modules exchange control messages to maintain state synchronization. 5. The module of claim 2, wherein the packets requiring exceptions processing are injected into the first stack. 6. A method for processing data packets, comprising:
receiving a data packet at a processing module that comprises a first stack for processing data packets according to a slow path and a second stack for processing data packets according to a fast path; determining whether the data packet is eligible for processing by the second stack; and routing the data packet to the second stack as a function of the packet being eligible for processing by the second stack or routing the data packet to the first stack as a function of the packet being ineligible for processing by the second stack. 7. The method of claim 6, wherein the determining comprises:
extracting a Session ID from the data packet; using the Session ID to look up socket and TCP control blocks corresponding to the data packet; and examining the socket and TCP control blocks, a TCP header, and an associated Fast-Path connection entry to determine whether the data packet is eligible for processing by the second stack. 8. The method of claim 6, wherein the determining comprises assessing whether the data packet will require exception processing based on at least one of:
an out of order sequence of the data packet in relation to other data packets; a TCP-atypical flag corresponding to the data packet; an option associated with the data packet; an incorrect timestamp associated with the data packet; data queued in a send buffer of a socket associated with the data packet; or a retransmission requirement. 9. The method of claim 6, wherein the determining comprises sending the data packet directly to an inter-processor communication module, wherein receiving an error code at a socket send routine indicates that the data packet is ineligible for processing by the second stack. | 2,400 |
8,384 | 8,384 | 15,437,651 | 2,436 | A method for communicating data from a sensor device to an Electronic Control Unit using a single-wire bi-directional communication protocol includes providing a first key of the Electronic Control Unit to the sensor device, encrypting sensor data of the sensor device using the first key to determine encrypted data, and transmitting the encrypted data from the sensor device to the Electronic Control Unit. | 1. A method for communicating data from a sensor device to an Electronic Control Unit using a single-wire bi-directional communication protocol, the method comprising:
providing a first key of the Electronic Control Unit to the sensor device; encrypting sensor data of the sensor device using the first key to determine encrypted data; and transmitting the encrypted data from the sensor device to the Electronic Control Unit. 2. The method of claim 1, further comprising:
transmitting the first key from the Electronic Control Unit to the sensor device. 3. The method of claim 1, further comprising:
transmitting a trigger pulse from the Electronic Control Unit to the sensor device, the trigger pulse indicating the start of a data frame; and transmitting the encrypted data in response to the trigger pulse. 4. The method of claim 3, wherein the first key is transmitted using the trigger pulse. 5. The method of claim 1, further comprising:
transmitting a second key from the sensor device to the Electronic Control Unit. 6. The method of claim 5, further comprising:
encrypting second data of the Electronic Control Unit with the second key to determine second encrypted data; and transmitting the second encrypted data from the Electronic Control Unit to the sensor device. 7. The method of claim 3, wherein the first key is transmitted before the trigger pulse. 8. The method of claim 3, wherein transmitting the first key from the Electronic Control Unit to the sensor device comprises:
transmitting a first portion of the first key before a first trigger pulse of a first data frame; and transmitting a second portion of the first key before a second trigger pulse of a subsequent second data frame. 9. The method of claim 5, wherein the second key is transmitted before a trigger pulse. 10. The method of claim 5, wherein transmitting the second key from the sensor device to the Electronic Control Unit comprises:
transmitting a first portion of the second key before a first trigger pulse of a first data frame; and transmitting a second portion of the second key before a second trigger pulse of a subsequent second data frame. 11. The method of claim 1, wherein the encrypted data is transmitted using the SPC protocol or using the PSI5 protocol. 12. A method for communicating data from a sensor device to an Electronic Control Unit:
transmitting a first key from the Electronic Control Unit to the sensor device; encrypting sensor data of the sensor device using the first key to determine encrypted data; and transmitting the encrypted data from the sensor device to the Electronic Control Unit. 13. A sensor device for communicating sensor data to an Electronic Control Unit, comprising:
a key interface configured to provide a first key of the Electronic Control Unit; an encryption module configured to encrypt the sensor data using the first key to determine encrypted data; an output interface configured to transmit the encrypted data to the Electronic Control Unit using a wired connection; and an input interface configured to receive data from the Electronic Control Unit. 14. The sensor device of claim 13, wherein the key interface is configured to receive the first key from the Electronic Control Unit via the input interface. 15. The sensor device of claim 13, wherein the input interface is configured to receive data from the Electronic Control Unit using the same wired connection as the output interface. 16. The sensor device of claim 13, further comprising:
a decryption module configured to decrypt a data transmission from the Electronic Control Unit using an internal key of the sensor device. 17. The sensor device of claim 16, wherein the output interface is further configured to transmit a second key to the Electronic Control Unit, the second key being a public key associated to the internal key. 18. The sensor device of claim 13, further comprising a sensor configured to determine the sensor data, the sensor data being indicative of a physical quantity. 19. The sensor device of claim 18, wherein the physical quantity is a magnetic field. 20. An Electronic Control Unit for receiving sensor data from a sensor device, comprising:
a key interface configured to provide an internal key of the Electronic Control Unit; an input interface configured to receive encrypted data from the sensor device using a wired connection; an output interface configured to transmit data to the sensor device; and a decryption module configured to decrypt the encrypted data using the internal key to determine the sensor data. 21. The Electronic Control Unit of claim 20, wherein the output interface is configured to transmit data to the sensor device using the same wired connection as the input interface. 22. The Electronic Control Unit of claim 20, wherein the output interface is configured to transmit a first key to the sensor device, the first key being a public key associated to the internal key. 23. The Electronic Control Unit of claim 20, further comprising:
an encryption module configured to encrypt data using a second key to determine encrypted data. 24. The Electronic Control Unit of claim 23, wherein the input interface is further configured to receive the second key from the sensor device. 25. The Electronic Control Unit of claim 20, wherein the Electronic Control Unit is configured to receive information from a sensor device of a vehicle. | A method for communicating data from a sensor device to an Electronic Control Unit using a single-wire bi-directional communication protocol includes providing a first key of the Electronic Control Unit to the sensor device, encrypting sensor data of the sensor device using the first key to determine encrypted data, and transmitting the encrypted data from the sensor device to the Electronic Control Unit.1. A method for communicating data from a sensor device to an Electronic Control Unit using a single-wire bi-directional communication protocol, the method comprising:
providing a first key of the Electronic Control Unit to the sensor device; encrypting sensor data of the sensor device using the first key to determine encrypted data; and transmitting the encrypted data from the sensor device to the Electronic Control Unit. 2. The method of claim 1, further comprising:
transmitting the first key from the Electronic Control Unit to the sensor device. 3. The method of claim 1, further comprising:
transmitting a trigger pulse from the Electronic Control Unit to the sensor device, the trigger pulse indicating the start of a data frame; and transmitting the encrypted data in response to the trigger pulse. 4. The method of claim 3, wherein the first key is transmitted using the trigger pulse. 5. The method of claim 1, further comprising:
transmitting a second key from the sensor device to the Electronic Control Unit. 6. The method of claim 5, further comprising:
encrypting second data of the Electronic Control Unit with the second key to determine second encrypted data; and transmitting the second encrypted data from the Electronic Control Unit to the sensor device. 7. The method of claim 3, wherein the first key is transmitted before the trigger pulse. 8. The method of claim 3, wherein transmitting the first key from the Electronic Control Unit to the sensor device comprises:
transmitting a first portion of the first key before a first trigger pulse of a first data frame; and transmitting a second portion of the first key before a second trigger pulse of a subsequent second data frame. 9. The method of claim 5, wherein the second key is transmitted before a trigger pulse. 10. The method of claim 5, wherein transmitting the second key from the sensor device to the Electronic Control Unit comprises:
transmitting a first portion of the second key before a first trigger pulse of a first data frame; and transmitting a second portion of the second key before a second trigger pulse of a subsequent second data frame. 11. The method of claim 1, wherein the encrypted data is transmitted using the SPC protocol or using the PSI5 protocol. 12. A method for communicating data from a sensor device to an Electronic Control Unit:
transmitting a first key from the Electronic Control Unit to the sensor device; encrypting sensor data of the sensor device using the first key to determine encrypted data; and transmitting the encrypted data from the sensor device to the Electronic Control Unit. 13. A sensor device for communicating sensor data to an Electronic Control Unit, comprising:
a key interface configured to provide a first key of the Electronic Control Unit; an encryption module configured to encrypt the sensor data using the first key to determine encrypted data; an output interface configured to transmit the encrypted data to the Electronic Control Unit using a wired connection; and an input interface configured to receive data from the Electronic Control Unit. 14. The sensor device of claim 13, wherein the key interface is configured to receive the first key from the Electronic Control Unit via the input interface. 15. The sensor device of claim 13, wherein the input interface is configured to receive data from the Electronic Control Unit using the same wired connection as the output interface. 16. The sensor device of claim 13, further comprising:
a decryption module configured to decrypt a data transmission from the Electronic Control Unit using an internal key of the sensor device. 17. The sensor device of claim 16, wherein the output interface is further configured to transmit a second key to the Electronic Control Unit, the second key being a public key associated to the internal key. 18. The sensor device of claim 13, further comprising a sensor configured to determine the sensor data, the sensor data being indicative of a physical quantity. 19. The sensor device of claim 18, wherein the physical quantity is a magnetic field. 20. An Electronic Control Unit for receiving sensor data from a sensor device, comprising:
a key interface configured to provide an internal key of the Electronic Control Unit; an input interface configured to receive encrypted data from the sensor device using a wired connection; an output interface configured to transmit data to the sensor device; and a decryption module configured to decrypt the encrypted data using the internal key to determine the sensor data. 21. The Electronic Control Unit of claim 20, wherein the output interface is configured to transmit data to the sensor device using the same wired connection as the input interface. 22. The Electronic Control Unit of claim 20, wherein the output interface is configured to transmit a first key to the sensor device, the first key being a public key associated to the internal key. 23. The Electronic Control Unit of claim 20, further comprising:
an encryption module configured to encrypt data using a second key to determine encrypted data. 24. The Electronic Control Unit of claim 23, wherein the input interface is further configured to receive the second key from the sensor device. 25. The Electronic Control Unit of claim 20, wherein the Electronic Control Unit is configured to receive information from a sensor device of a vehicle. | 2,400 |
8,385 | 8,385 | 14,971,192 | 2,438 | A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems within a security intelligence platform which accumulate events within the IT environment associate an event ingest time with the event. When the events are provided for analysis, the device time accumulation operation analyzes the ingest times as well as the emit time to take into account historical time data associated with the accumulated events. | 1. A computer-implemented method for processing device time information, comprising:
monitoring a security intelligence platform for a plurality of events, the plurality of events being generated by at least one data source of the security intelligence environment; storing the plurality of events for later processing, the storing comprising associating an event emit time with each of the plurality of events, the event emit time representing a time when the event was generated; forwarding the plurality of events to a security platform, the forwarding comprising an event ingest time with each of the plurality of events, the event ingest time representing a time when the event was forwarded to the security platform; processing the plurality of events, the processing considering the event ingest time and the event emit time of each of the plurality of events. 2. The method of claim 1, wherein:
the at least one data source comprises at least one of a security device and an information processing system. 3. The method of claim 1, wherein:
the plurality of events comprises at least one of information relating to network and virtual activity, information relating to data activity, information relating to application activity, configuration information, vulnerability and threat information and information relating to users and identities. 4. The method of claim 1, wherein:
the plurality of events are stored within an event accumulation module. 5. The method of claim 1, wherein:
the processing further comprises using a set of criteria to group events together based upon similar properties and recording events over time. 6. The method of claim 1, wherein:
the processing further comprises creating accumulations of the plurality of events, the accumulations being used for analytics or to populate time-series graphs for graphical representation of the data. 7-20. (canceled) | A method, system and computer-usable medium are disclosed for performing a device time accumulation operation. With a device time accumulation operation systems within a security intelligence platform which accumulate events within the IT environment associate an event ingest time with the event. When the events are provided for analysis, the device time accumulation operation analyzes the ingest times as well as the emit time to take into account historical time data associated with the accumulated events.1. A computer-implemented method for processing device time information, comprising:
monitoring a security intelligence platform for a plurality of events, the plurality of events being generated by at least one data source of the security intelligence environment; storing the plurality of events for later processing, the storing comprising associating an event emit time with each of the plurality of events, the event emit time representing a time when the event was generated; forwarding the plurality of events to a security platform, the forwarding comprising an event ingest time with each of the plurality of events, the event ingest time representing a time when the event was forwarded to the security platform; processing the plurality of events, the processing considering the event ingest time and the event emit time of each of the plurality of events. 2. The method of claim 1, wherein:
the at least one data source comprises at least one of a security device and an information processing system. 3. The method of claim 1, wherein:
the plurality of events comprises at least one of information relating to network and virtual activity, information relating to data activity, information relating to application activity, configuration information, vulnerability and threat information and information relating to users and identities. 4. The method of claim 1, wherein:
the plurality of events are stored within an event accumulation module. 5. The method of claim 1, wherein:
the processing further comprises using a set of criteria to group events together based upon similar properties and recording events over time. 6. The method of claim 1, wherein:
the processing further comprises creating accumulations of the plurality of events, the accumulations being used for analytics or to populate time-series graphs for graphical representation of the data. 7-20. (canceled) | 2,400 |
8,386 | 8,386 | 14,537,528 | 2,426 | A device uses received electronic program guide data to present an electronic program guide in a display of the device. The displayed electronic program guide includes at least one selectable user interface element corresponding to the at least one currently available media, e.g., a currently airing television program, and at least one user interface element corresponding to at least one yet-to-be available media, e.g., a future airing television program. When a user selects the at least one user interface element corresponding to the at least one currently available media the portable electronic device is caused to issue one or more commands to cause at least one controllable device to access the currently available media. When a user selects the at least one user interface element corresponding to the at least one yet-to be available media data related to the yet-to-be available media is transferred to a calendar application resident on the portable electronic device. | 1. A computer-readable media having instructions which, when executed by a processing device of a portable electronic device, perform steps comprising:
receiving into the portable electronic device electronic program guide data, the electronic program guide data including data related to at least one currently available media and data related to at least one yet-to-be available media; using the electronic program guide data to present an electronic program guide in a display of the portable electronic device, the displayed electronic program guide including at least one selectable user interface element corresponding to the at least one currently available media and at least one user interface element corresponding to the at least one yet-to-be available media; in response to a user selection of the at least one user interface element corresponding to the at least one currently available media, using at least a part of the data related to the at least one currently available media to cause the portable electronic device to issue one or more commands for causing at least one controllable device to access the currently available media; and in response to a user selection of the at least one user interface element corresponding to the at least one yet-to be available media, transferring to a calendar application resident on the portable electronic device at least a part of the data related to the at least one yet-to-be available media whereupon the calendar application will be provided with data for use in causing the portable electronic device to issue a reminder related to the yet-to-be available media. 2. The computer-readable media as recited in claim 1, wherein the data related to the at least one yet-to-be available media comprises at least a time at which the at least one yet-to be available media will become currently available and a description for the at least one yet-to-be available media. 3. The computer-readable media as recited in claim 2, wherein the portable electronic device is caused to issue one or more commands for the at least one controllable device via use of an infrared transmitter of the portable electronic device. 4. The computer-readable media as recited in claim 2, wherein the at least one user interface element corresponding to the at least one yet-to-be available media includes at least a textual description of the at least one yet-to-be available media. 5. The computer-readable media as recited in claim 4, wherein the at least one user interface element corresponding to the at least one yet-to-be available media further includes at least a textual indication of a time at which the at least one yet-to be available media will become currently available. 6. The computer-readable media as recited in claim 1, wherein the portable electronic device is caused to receive the electronic program guide data in response to a synchronization process initiated with a remote server device. 7. The computer-readable media as recited in claim 6, wherein the portable electronic device communicates with the remote server device via use of a wide area network. 8. The computer-readable media as recited in claim 1, wherein the instructions further receive into the portable electronic device data indicative of the at least one controllable device and the data indicative of the at least one controllable device is used to select at least one command code for use in issuing the one or more commands to cause the at least one controllable device to access the currently available media. 9. The computer-readable media as recited in claim 8, wherein the data indicative of the at least one controllable device comprises data indicative of a type and brand of the at least one controllable device. 10. The computer-readable media as recited in claim 1, wherein the least one selectable user interface element corresponding to the at least one currently available media displayed in the display corresponds to a user selected favorite media source. 11. The computer-readable media as recited in claim 1, wherein the instructions further receive into the portable electronic device information for use in selecting which program guide data is to be received into the portable electronic device. 12. The computer-readable media as recited in claim 11, wherein the information for use in selecting which program guide data is to be received into the portable electronic device comprises user preference data. 13. The computer-readable media as recited in claim 11, wherein the information for use in selecting which program guide data is to be received into the portable electronic device comprises programming service provider data. 14. The computer-readable media as recited in claim 1, wherein the at least one selectable user interface element corresponding to the at least one currently available media comprises an icon having a network logo. 15. The computer-readable media as recited in claim 1, wherein the portable electronic device comprises a smart device. 16. The computer-readable media as recited in claim 15, wherein the smart device comprises a web tablet. 17. The computer-readable media as recited in claim 1, wherein the at least one currently available media and the at least one yet-to-be available media each comprise television network programming. | A device uses received electronic program guide data to present an electronic program guide in a display of the device. The displayed electronic program guide includes at least one selectable user interface element corresponding to the at least one currently available media, e.g., a currently airing television program, and at least one user interface element corresponding to at least one yet-to-be available media, e.g., a future airing television program. When a user selects the at least one user interface element corresponding to the at least one currently available media the portable electronic device is caused to issue one or more commands to cause at least one controllable device to access the currently available media. When a user selects the at least one user interface element corresponding to the at least one yet-to be available media data related to the yet-to-be available media is transferred to a calendar application resident on the portable electronic device.1. A computer-readable media having instructions which, when executed by a processing device of a portable electronic device, perform steps comprising:
receiving into the portable electronic device electronic program guide data, the electronic program guide data including data related to at least one currently available media and data related to at least one yet-to-be available media; using the electronic program guide data to present an electronic program guide in a display of the portable electronic device, the displayed electronic program guide including at least one selectable user interface element corresponding to the at least one currently available media and at least one user interface element corresponding to the at least one yet-to-be available media; in response to a user selection of the at least one user interface element corresponding to the at least one currently available media, using at least a part of the data related to the at least one currently available media to cause the portable electronic device to issue one or more commands for causing at least one controllable device to access the currently available media; and in response to a user selection of the at least one user interface element corresponding to the at least one yet-to be available media, transferring to a calendar application resident on the portable electronic device at least a part of the data related to the at least one yet-to-be available media whereupon the calendar application will be provided with data for use in causing the portable electronic device to issue a reminder related to the yet-to-be available media. 2. The computer-readable media as recited in claim 1, wherein the data related to the at least one yet-to-be available media comprises at least a time at which the at least one yet-to be available media will become currently available and a description for the at least one yet-to-be available media. 3. The computer-readable media as recited in claim 2, wherein the portable electronic device is caused to issue one or more commands for the at least one controllable device via use of an infrared transmitter of the portable electronic device. 4. The computer-readable media as recited in claim 2, wherein the at least one user interface element corresponding to the at least one yet-to-be available media includes at least a textual description of the at least one yet-to-be available media. 5. The computer-readable media as recited in claim 4, wherein the at least one user interface element corresponding to the at least one yet-to-be available media further includes at least a textual indication of a time at which the at least one yet-to be available media will become currently available. 6. The computer-readable media as recited in claim 1, wherein the portable electronic device is caused to receive the electronic program guide data in response to a synchronization process initiated with a remote server device. 7. The computer-readable media as recited in claim 6, wherein the portable electronic device communicates with the remote server device via use of a wide area network. 8. The computer-readable media as recited in claim 1, wherein the instructions further receive into the portable electronic device data indicative of the at least one controllable device and the data indicative of the at least one controllable device is used to select at least one command code for use in issuing the one or more commands to cause the at least one controllable device to access the currently available media. 9. The computer-readable media as recited in claim 8, wherein the data indicative of the at least one controllable device comprises data indicative of a type and brand of the at least one controllable device. 10. The computer-readable media as recited in claim 1, wherein the least one selectable user interface element corresponding to the at least one currently available media displayed in the display corresponds to a user selected favorite media source. 11. The computer-readable media as recited in claim 1, wherein the instructions further receive into the portable electronic device information for use in selecting which program guide data is to be received into the portable electronic device. 12. The computer-readable media as recited in claim 11, wherein the information for use in selecting which program guide data is to be received into the portable electronic device comprises user preference data. 13. The computer-readable media as recited in claim 11, wherein the information for use in selecting which program guide data is to be received into the portable electronic device comprises programming service provider data. 14. The computer-readable media as recited in claim 1, wherein the at least one selectable user interface element corresponding to the at least one currently available media comprises an icon having a network logo. 15. The computer-readable media as recited in claim 1, wherein the portable electronic device comprises a smart device. 16. The computer-readable media as recited in claim 15, wherein the smart device comprises a web tablet. 17. The computer-readable media as recited in claim 1, wherein the at least one currently available media and the at least one yet-to-be available media each comprise television network programming. | 2,400 |
8,387 | 8,387 | 14,807,687 | 2,419 | Video data may comprise one or more blocks, each block being associated with a block palette comprising one or more palette entries specifying pixel values used in the block. A block is further divided into a plurality of sub-blocks. A sub-block scanning order for the block and pixel scanning orders for the sub-blocks are adaptively selected, based upon a distribution of pixel values within the block and sub-blocks. Sub-blocks may be associated with sub-block palettes, specifying pointers to palette entries of the block palette. Some sub-blocks may be encoded based upon pixel values of neighboring sub-blocks. | 1. A method of encoding video data, comprising:
receiving video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette; for a block of the one or more blocks:
dividing the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block;
selecting a sub-block scanning order for the sub-blocks of the block specifying an order that the plurality of sub-blocks are to be encoded, based at least in part upon a distribution of pixel values within the block;
for a first sub-block of the plurality of sub-blocks, selecting a pixel scanning order for the first sub-block specifying an order that the pixels of the first sub-block are to be encoded, based at least in part upon a distribution of pixel values within the first sub-block; and
encoding the block using the selected sub-block scanning order, wherein the first sub-block is encoded using its selected pixel scanning order, wherein at least a portion of the pixels of the first sub-block are encoded using index values corresponding to palette entries of the palette. 2. The method of claim 1, wherein pixel values comprise color component values. 3. The method of claim 1, wherein selecting a pixel scanning order for the first sub-block comprises:
identifying a plurality of potential pixel scanning orders; evaluating a cost for each of the plurality of potential pixel scanning orders, wherein a cost for a potential pixel scanning order of the plurality of potential pixel scanning orders indicates a bitstream length that would be associated with the first sub-block if the potential pixel scanning order is used for the first sub-block; and selecting a potential pixel scanning order having a lowest cost. 4. The method of claim 3, wherein the plurality of potential pixel scanning orders comprises at least one of: horizontal scanning order, vertical scanning order, horizontal traverse scanning order, and vertical traverse scanning order. 5. The method of claim 1, further comprising associating the first sub-block with a sub-block palette, the sub-block palette referencing a subset of the palette entries corresponding to pixel values used in the pixels of the first sub-block. 6. The method of claim 5, wherein the sub-block palette comprises a plurality of entries, each entry comprising a pointer to a corresponding entry of the palette. 7. The method of claim 5, wherein a pixel in the first sub-block is designated an escape pixel, indicating that the pixel of the first sub-block has a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the pixel value associated with the escape pixel is encoded after the pixels of the first sub-block that are not designated as escape pixels are encoded. 8. The method of claim 1, wherein the first sub-block is encoded using run-length coding, wherein a run-length value is truncated based at least in part upon a run-length upper bound corresponding to a number of pixels in the first sub-block. 9. The method of claim 1, further comprising, for a second sub-block of the plurality of sub-blocks, wherein the second sub-block neighbors the first sub-block, determining a pixel scanning order for the second sub-block based at least in part upon the pixel scanning order for the first sub-block. 10. A method of encoding video data, comprising:
receiving video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette; for a block of the one or more blocks:
dividing the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block; and
for a first sub-block of the plurality of sub-blocks: (i) determining a pixel value of a designated pixel in a neighboring sub-block, (ii) determining whether or not the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block, and (iii) signaling a flag indicating that the pixels of the first sub-block have the same pixel value was the designated pixel, in response to a determination that the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block;
wherein determining the pixel value of the designated pixel comprises determining an index value of the designated pixel, wherein the index value corresponds to a palette entry of the palette. 11. The method of claim 10, wherein the neighboring sub-block comprises a sub-block left of the first sub-block or a sub-block above the first sub-block, and wherein the designated pixel comprises a top pixel of a leftmost column of the neighboring sub-block or a leftmost pixel of a bottom row of the neighboring sub-block. 12. The method of claim 10, wherein if the flag is signaled, the pixel values of the pixels of the first sub-block are not encoded. 13. The method of claim 10, further comprising not signaling the flag in response to a determination that not all pixels of the first sub-block have the same pixel value as the designated pixel. 14. The method of claim 13, further comprising, if the flag is not signaled, associating the first sub-block with a sub-block palette, the sub-block palette indicating a subset of the palette entries corresponding to pixel values used in the pixels of the first sub-block. 15. The method of claim 14, wherein a pixel in the first sub-block is an escape pixel, wherein the escape pixel is a pixel of the sub-block having a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the pixel value associated with the escape pixel is encoded after the pixels of the first sub-block that are not designated as escape pixels are encoded. 16. A video encoder, comprising:
a memory configured to store video data; and a processor in communication with the memory and configured to:
receive video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette;
for a block of the one or more blocks:
divide the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block;
select a sub-block scanning order for the sub-blocks of the block specifying an order that the plurality of sub-blocks are to be encoded, based at least in part upon a distribution of pixel values within the block;
for a first sub-block of the plurality of sub-blocks, select a pixel scanning order for the first sub-block specifying an order that the pixels of the first sub-block are to be encoded, based at least in part upon a distribution of pixel values within the first sub-block; and
encode the block using the selected sub-block scanning order, wherein the first sub-block is encoded using its selected pixel scanning order, wherein at least a portion of the pixels of the first sub-block are encoded using index values corresponding to palette entries of the palette. 17. The video encoder of claim 16, wherein pixel values comprise color component values. 18. The video encoder of claim 16, wherein to select a pixel scanning order for the first sub-block, the processor is configured to:
identify a plurality of potential pixel scanning orders; evaluate a cost for each of the plurality of potential pixel scanning orders, wherein a cost for a potential pixel scanning order of the plurality of potential pixel scanning orders indicates a bitstream length that would be associated with the first sub-block if the potential pixel scanning order is used for the first sub-block; and select a potential pixel scanning order having a lowest cost. 19. The video encoder of claim 18, wherein the plurality of potential pixel scanning orders comprises at least one of: horizontal scanning order, vertical scanning order, horizontal traverse scanning order, and vertical traverse scanning order. 20. The video encoder of claim 16, wherein the processor is further configured to associate the first sub-block with a sub-block palette, the sub-block palette referencing a subset of the palette entries corresponding to pixel values used in the pixels of the first sub-block. 21. The video encoder of claim 20, wherein the sub-block palette comprises a plurality of entries, each entry comprising a pointer to a corresponding entry of the palette. 22. The video encoder of claim 20, wherein a pixel in the first sub-block is designated an escape pixel, indicating that the pixel of the first sub-block has a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the processor is configured to encode the pixel value associated with the escape pixel after the pixels of the first sub-block that are not designated as escape pixels are encoded. 23. The video encoder of claim 16, wherein the processor is configured to encode the first sub-block using run-length coding, wherein a run-length value is truncated based at least in part upon a run-length upper bound corresponding to a number of pixels in the first sub-block. 24. The video encoder of claim 16, wherein for a second sub-block of the plurality of sub-blocks, wherein the second sub-block neighbors the first sub-block, the processor is further configured to determine a pixel scanning order for the second sub-block based at least in part upon the pixel scanning order for the first sub-block. 25. A video encoder, comprising:
a memory configured to store video data; and a processor in communication with the memory and configured to:
receive video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette;
for a block of the one or more blocks:
divide the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block; and
for a first sub-block of the plurality of sub-blocks: (i) determine a pixel value of a designated pixel in a neighboring sub-block, (ii) determine whether or not the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block, and (iii) signal a flag indicating that the pixels of the first sub-block have the same pixel value was the designated pixel, in response to a determination that the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block;
wherein to determine the pixel value of the designated pixel the processor is configured to determine an index value of the designated pixel, wherein the index value corresponds to a palette entry of the palette. 26. The video encoder of claim 25, wherein the neighboring sub-block comprises a sub-block left of the first sub-block or a sub-block above the first sub-block, and wherein the designated pixel comprises a top pixel of a leftmost column of the neighboring sub-block or a leftmost pixel of a bottom row of the neighboring sub-block. 27. The video encoder of claim 25, wherein if the flag is signaled, the processor is configured not to encode the pixel values of the pixels of the first sub-block. 28. The video encoder of claim 25 wherein the processor is further configured to not signal the flag in response to a determination that not all pixels of the first sub-block have the same pixel value as the designated pixel. 29. The video encoder of claim 28, wherein if the flag is not signaled, the processor is configured to associate the first sub-block with a sub-block palette, the sub-block palette indicating a subset of the entries of the palette corresponding to pixel values used in the pixels of the sub-block. 30. The video encoder of claim 29, wherein a pixel in the first sub-block is an escape pixel, wherein the escape pixel is a pixel of the sub-block having a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the processor is configured to encode the pixel value associated with the escape pixel after the pixels of the first sub-block that are not designated as escape pixels are encoded. | Video data may comprise one or more blocks, each block being associated with a block palette comprising one or more palette entries specifying pixel values used in the block. A block is further divided into a plurality of sub-blocks. A sub-block scanning order for the block and pixel scanning orders for the sub-blocks are adaptively selected, based upon a distribution of pixel values within the block and sub-blocks. Sub-blocks may be associated with sub-block palettes, specifying pointers to palette entries of the block palette. Some sub-blocks may be encoded based upon pixel values of neighboring sub-blocks.1. A method of encoding video data, comprising:
receiving video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette; for a block of the one or more blocks:
dividing the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block;
selecting a sub-block scanning order for the sub-blocks of the block specifying an order that the plurality of sub-blocks are to be encoded, based at least in part upon a distribution of pixel values within the block;
for a first sub-block of the plurality of sub-blocks, selecting a pixel scanning order for the first sub-block specifying an order that the pixels of the first sub-block are to be encoded, based at least in part upon a distribution of pixel values within the first sub-block; and
encoding the block using the selected sub-block scanning order, wherein the first sub-block is encoded using its selected pixel scanning order, wherein at least a portion of the pixels of the first sub-block are encoded using index values corresponding to palette entries of the palette. 2. The method of claim 1, wherein pixel values comprise color component values. 3. The method of claim 1, wherein selecting a pixel scanning order for the first sub-block comprises:
identifying a plurality of potential pixel scanning orders; evaluating a cost for each of the plurality of potential pixel scanning orders, wherein a cost for a potential pixel scanning order of the plurality of potential pixel scanning orders indicates a bitstream length that would be associated with the first sub-block if the potential pixel scanning order is used for the first sub-block; and selecting a potential pixel scanning order having a lowest cost. 4. The method of claim 3, wherein the plurality of potential pixel scanning orders comprises at least one of: horizontal scanning order, vertical scanning order, horizontal traverse scanning order, and vertical traverse scanning order. 5. The method of claim 1, further comprising associating the first sub-block with a sub-block palette, the sub-block palette referencing a subset of the palette entries corresponding to pixel values used in the pixels of the first sub-block. 6. The method of claim 5, wherein the sub-block palette comprises a plurality of entries, each entry comprising a pointer to a corresponding entry of the palette. 7. The method of claim 5, wherein a pixel in the first sub-block is designated an escape pixel, indicating that the pixel of the first sub-block has a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the pixel value associated with the escape pixel is encoded after the pixels of the first sub-block that are not designated as escape pixels are encoded. 8. The method of claim 1, wherein the first sub-block is encoded using run-length coding, wherein a run-length value is truncated based at least in part upon a run-length upper bound corresponding to a number of pixels in the first sub-block. 9. The method of claim 1, further comprising, for a second sub-block of the plurality of sub-blocks, wherein the second sub-block neighbors the first sub-block, determining a pixel scanning order for the second sub-block based at least in part upon the pixel scanning order for the first sub-block. 10. A method of encoding video data, comprising:
receiving video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette; for a block of the one or more blocks:
dividing the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block; and
for a first sub-block of the plurality of sub-blocks: (i) determining a pixel value of a designated pixel in a neighboring sub-block, (ii) determining whether or not the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block, and (iii) signaling a flag indicating that the pixels of the first sub-block have the same pixel value was the designated pixel, in response to a determination that the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block;
wherein determining the pixel value of the designated pixel comprises determining an index value of the designated pixel, wherein the index value corresponds to a palette entry of the palette. 11. The method of claim 10, wherein the neighboring sub-block comprises a sub-block left of the first sub-block or a sub-block above the first sub-block, and wherein the designated pixel comprises a top pixel of a leftmost column of the neighboring sub-block or a leftmost pixel of a bottom row of the neighboring sub-block. 12. The method of claim 10, wherein if the flag is signaled, the pixel values of the pixels of the first sub-block are not encoded. 13. The method of claim 10, further comprising not signaling the flag in response to a determination that not all pixels of the first sub-block have the same pixel value as the designated pixel. 14. The method of claim 13, further comprising, if the flag is not signaled, associating the first sub-block with a sub-block palette, the sub-block palette indicating a subset of the palette entries corresponding to pixel values used in the pixels of the first sub-block. 15. The method of claim 14, wherein a pixel in the first sub-block is an escape pixel, wherein the escape pixel is a pixel of the sub-block having a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the pixel value associated with the escape pixel is encoded after the pixels of the first sub-block that are not designated as escape pixels are encoded. 16. A video encoder, comprising:
a memory configured to store video data; and a processor in communication with the memory and configured to:
receive video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette;
for a block of the one or more blocks:
divide the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block;
select a sub-block scanning order for the sub-blocks of the block specifying an order that the plurality of sub-blocks are to be encoded, based at least in part upon a distribution of pixel values within the block;
for a first sub-block of the plurality of sub-blocks, select a pixel scanning order for the first sub-block specifying an order that the pixels of the first sub-block are to be encoded, based at least in part upon a distribution of pixel values within the first sub-block; and
encode the block using the selected sub-block scanning order, wherein the first sub-block is encoded using its selected pixel scanning order, wherein at least a portion of the pixels of the first sub-block are encoded using index values corresponding to palette entries of the palette. 17. The video encoder of claim 16, wherein pixel values comprise color component values. 18. The video encoder of claim 16, wherein to select a pixel scanning order for the first sub-block, the processor is configured to:
identify a plurality of potential pixel scanning orders; evaluate a cost for each of the plurality of potential pixel scanning orders, wherein a cost for a potential pixel scanning order of the plurality of potential pixel scanning orders indicates a bitstream length that would be associated with the first sub-block if the potential pixel scanning order is used for the first sub-block; and select a potential pixel scanning order having a lowest cost. 19. The video encoder of claim 18, wherein the plurality of potential pixel scanning orders comprises at least one of: horizontal scanning order, vertical scanning order, horizontal traverse scanning order, and vertical traverse scanning order. 20. The video encoder of claim 16, wherein the processor is further configured to associate the first sub-block with a sub-block palette, the sub-block palette referencing a subset of the palette entries corresponding to pixel values used in the pixels of the first sub-block. 21. The video encoder of claim 20, wherein the sub-block palette comprises a plurality of entries, each entry comprising a pointer to a corresponding entry of the palette. 22. The video encoder of claim 20, wherein a pixel in the first sub-block is designated an escape pixel, indicating that the pixel of the first sub-block has a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the processor is configured to encode the pixel value associated with the escape pixel after the pixels of the first sub-block that are not designated as escape pixels are encoded. 23. The video encoder of claim 16, wherein the processor is configured to encode the first sub-block using run-length coding, wherein a run-length value is truncated based at least in part upon a run-length upper bound corresponding to a number of pixels in the first sub-block. 24. The video encoder of claim 16, wherein for a second sub-block of the plurality of sub-blocks, wherein the second sub-block neighbors the first sub-block, the processor is further configured to determine a pixel scanning order for the second sub-block based at least in part upon the pixel scanning order for the first sub-block. 25. A video encoder, comprising:
a memory configured to store video data; and a processor in communication with the memory and configured to:
receive video data comprising one or more blocks, each block associated with a palette comprising one or more palette entries specifying pixel values used in an associated block of the palette;
for a block of the one or more blocks:
divide the block into a plurality of sub-blocks, each sub-block comprising an array of pixels within the block; and
for a first sub-block of the plurality of sub-blocks: (i) determine a pixel value of a designated pixel in a neighboring sub-block, (ii) determine whether or not the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block, and (iii) signal a flag indicating that the pixels of the first sub-block have the same pixel value was the designated pixel, in response to a determination that the pixels of the first sub-block have the same pixel value as the designated pixel of the neighboring sub-block;
wherein to determine the pixel value of the designated pixel the processor is configured to determine an index value of the designated pixel, wherein the index value corresponds to a palette entry of the palette. 26. The video encoder of claim 25, wherein the neighboring sub-block comprises a sub-block left of the first sub-block or a sub-block above the first sub-block, and wherein the designated pixel comprises a top pixel of a leftmost column of the neighboring sub-block or a leftmost pixel of a bottom row of the neighboring sub-block. 27. The video encoder of claim 25, wherein if the flag is signaled, the processor is configured not to encode the pixel values of the pixels of the first sub-block. 28. The video encoder of claim 25 wherein the processor is further configured to not signal the flag in response to a determination that not all pixels of the first sub-block have the same pixel value as the designated pixel. 29. The video encoder of claim 28, wherein if the flag is not signaled, the processor is configured to associate the first sub-block with a sub-block palette, the sub-block palette indicating a subset of the entries of the palette corresponding to pixel values used in the pixels of the sub-block. 30. The video encoder of claim 29, wherein a pixel in the first sub-block is an escape pixel, wherein the escape pixel is a pixel of the sub-block having a pixel value that does not correspond to a pixel value associated with the sub-block palette, and wherein the processor is configured to encode the pixel value associated with the escape pixel after the pixels of the first sub-block that are not designated as escape pixels are encoded. | 2,400 |
8,388 | 8,388 | 15,084,073 | 2,425 | An image coding device is provided with a determination unit which determines whether to apply an orthogonal transform to a transform block obtained by dividing a prediction difference signal indicating a difference between an input image and a predicted image or perform a transform skip by which the orthogonal transform is not applied, and an orthogonal transform unit which performs processing selected on the basis of the determination, the image coding device comprising a quantization unit which, when the transform skip is selected on the basis of the determination, quantizes the transform block using a first quantization matrix in which the quantization roughnesses of all elements previously shared with a decoding side are equal, and when the orthogonal transform is applied to the transform block on the basis of the determination, quantizes the transform block using the first quantization matrix or a second quantization matrix that is transmitted to the decoding side. | 1. An image encoding device comprising:
a determination unit that determines whether or not to skip an orthogonal transformation for an encoding target block, and a quantization unit that quantizes the encoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the orthogonal transformation and the encoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, wherein the quantization unit quantizes the encoding target block subjected to the orthogonal transformation using the second quantization matrix when the encoding target block does not have the predefined size and the second condition is not satisfied. 2. The image encoding device according to claim 1, wherein
the elements composing the first quantization matrix are values shared with the image encoding device and an image decoding device in advance, and the elements composing the second quantization matrix are values transmitted to the image decoding device. 3. An image decoding device comprising:
a determination unit that determines whether or not to skip an inverse orthogonal transformation for a decoding target block, and an inverse quantization unit that inversely quantizes the decoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the inverse orthogonal transformation and the decoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, wherein the inverse quantization unit inversely quantizes the decoding target block subjected to the inverse orthogonal transformation using the second quantization matrix when the decoding target block does not have the predefined size and the second condition is not satisfied. 4. The image decoding device according to claim 3, wherein
the elements composing the first quantization matrix are values shared with an image encoding device and the image decoding device in advance, and the elements composing the second quantization matrix are values transmitted from the image encoding device. 5. A non-transitory computer-readable storage medium with an executable program stored thereon, wherein the program instructs a microprocessor to perform the following steps:
determining whether or not to skip an orthogonal transformation for an encoding target block, quantizing the encoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the orthogonal transformation and the encoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, and quantizing the encoding target block subjected to the orthogonal transformation using the second quantization matrix when the encoding target block does not have the predefined size and the second condition is not satisfied. 6. A non-transitory computer-readable storage medium with an executable program stored thereon, wherein the program instructs a microprocessor to perform the following steps:
deter mining whether or not to skip an inverse orthogonal transformation for a decoding target block, inversely quantizing the decoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the inverse orthogonal transformation and the decoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, and inversely quantizing the decoding target block subjected to the inverse orthogonal transformation using the second quantization matrix when the decoding target block does not have the predefined size and the second condition is not satisfied. | An image coding device is provided with a determination unit which determines whether to apply an orthogonal transform to a transform block obtained by dividing a prediction difference signal indicating a difference between an input image and a predicted image or perform a transform skip by which the orthogonal transform is not applied, and an orthogonal transform unit which performs processing selected on the basis of the determination, the image coding device comprising a quantization unit which, when the transform skip is selected on the basis of the determination, quantizes the transform block using a first quantization matrix in which the quantization roughnesses of all elements previously shared with a decoding side are equal, and when the orthogonal transform is applied to the transform block on the basis of the determination, quantizes the transform block using the first quantization matrix or a second quantization matrix that is transmitted to the decoding side.1. An image encoding device comprising:
a determination unit that determines whether or not to skip an orthogonal transformation for an encoding target block, and a quantization unit that quantizes the encoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the orthogonal transformation and the encoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, wherein the quantization unit quantizes the encoding target block subjected to the orthogonal transformation using the second quantization matrix when the encoding target block does not have the predefined size and the second condition is not satisfied. 2. The image encoding device according to claim 1, wherein
the elements composing the first quantization matrix are values shared with the image encoding device and an image decoding device in advance, and the elements composing the second quantization matrix are values transmitted to the image decoding device. 3. An image decoding device comprising:
a determination unit that determines whether or not to skip an inverse orthogonal transformation for a decoding target block, and an inverse quantization unit that inversely quantizes the decoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the inverse orthogonal transformation and the decoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, wherein the inverse quantization unit inversely quantizes the decoding target block subjected to the inverse orthogonal transformation using the second quantization matrix when the decoding target block does not have the predefined size and the second condition is not satisfied. 4. The image decoding device according to claim 3, wherein
the elements composing the first quantization matrix are values shared with an image encoding device and the image decoding device in advance, and the elements composing the second quantization matrix are values transmitted from the image encoding device. 5. A non-transitory computer-readable storage medium with an executable program stored thereon, wherein the program instructs a microprocessor to perform the following steps:
determining whether or not to skip an orthogonal transformation for an encoding target block, quantizing the encoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the orthogonal transformation and the encoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, and quantizing the encoding target block subjected to the orthogonal transformation using the second quantization matrix when the encoding target block does not have the predefined size and the second condition is not satisfied. 6. A non-transitory computer-readable storage medium with an executable program stored thereon, wherein the program instructs a microprocessor to perform the following steps:
deter mining whether or not to skip an inverse orthogonal transformation for a decoding target block, inversely quantizing the decoding target block using a first quantization matrix composed of elements having same roughness when a first or a second condition is satisfied, the first condition being that a determination is made to skip the inverse orthogonal transformation and the decoding target block has a predefined size, the second condition being that a matrix enabling flag indicates not to apply a second quantization matrix composed of elements respectively having different roughness, and inversely quantizing the decoding target block subjected to the inverse orthogonal transformation using the second quantization matrix when the decoding target block does not have the predefined size and the second condition is not satisfied. | 2,400 |
8,389 | 8,389 | 12,432,329 | 2,459 | Systems methods and computer programs are disclosed that enable generating transaction messages. In one embodiment, the method comprises: generating a transaction message using a first computing device, the transaction message comprising: compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and a transaction identification that identifies an executing program within the first computing device to execute the transaction; and sending the transaction message over an input/output device connected to the first computing device for processing on a second computing device. | 1. A method comprising:
generating a transaction message using a first computing device, the transaction message comprising:
compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and
a transaction identification that identifies an executing program within the first computing device to execute the transaction; and
sending the transaction message over an input/output device connected to the first computing device for processing on a second computing device. 2. The method of claim 1, wherein the transaction is part of a sequence of transactions, each transaction having a transaction message. 3. The method of claim 2, wherein the generating a transaction message using the first computing device comprises adding the transaction message to a stack of transaction messages in the sequence of transactions; and wherein the sending the transaction message comprises sending the stack of transaction messages to the second computing device. 4. The method of claim 1, wherein the transaction comprises at least one of: transferring an amount of money in a first account to a second account, transferring real property from a first party to a second party, transferring an amount of goods from a first party to a second party, or transferring personal property from a first party to a second party. 5. The method of claim 1, further comprising:
determining whether the transaction was received by the second computing device; and generating a confirmation message comprising an indicator of whether the transaction was received by the second computing device. 6. The method of claim 1, further comprising:
receiving the transaction message using the second computing device; and executing the transaction message using the executing program. 7. The method of claim 1, wherein the previously executed transaction was executed at the first computing device. 8. A first computing device comprising:
a transaction generator for generating a transaction message, the transaction message comprising:
compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and
a transaction identification that identifies an executing program within the first computing device to execute the transaction; and
a sender for sending the transaction message. 9. The first computing device of claim 8, wherein the transaction is part of a sequence of transactions. 10. The first computing device of claim 9, wherein the transaction generator further generates a stack of transactions included in the sequence of transactions; and wherein the sender sends the stack of transaction messages to a second computing device. 11. The first computing device of claim 8, wherein the transaction comprises at least one of: transferring an amount of money in a first account to a second account, transferring real property from a first party to a second party, transferring an amount of goods from a first party to a second party, or transferring personal property from a first party to a second party. 12. The first computing device of claim 8, further comprising:
a receiver for receiving the transaction message; an executing program for executing the transaction; and a received confirmation generator for generating a confirmation message comprising an indicator of whether the transaction was received. 13. The first computing device of claim 8, further comprising
a sent confirmation generator for generating a confirmation message comprising an indicator of whether the transaction was sent. 14. The first computing device of claim 8, wherein the previously executed transaction was executed at the first computing device. 15. A computer program product comprising a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising:
computer-readable program code configured to generate a transaction message, the transaction message comprising:
compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and
a transaction identification that identifies an executing program to execute the transaction; and
computer-readable program code configured to send the transaction message. 16. The computer program product of claim 15, wherein the transaction is part of a sequence of transactions. 17. The computer program product of claim 16, wherein the computer-readable program code configured to generate the transaction message comprises computer-readable program code configured to add the transaction message to a stack of transaction messages in the sequence of transactions; and wherein the computer-readable program code configured to send the transaction message comprises computer-readable program code configured to send the stack of transaction messages. 18. The computer program product of claim 15, further comprising:
computer-readable program code configured to generate a confirmation message comprising an indicator of whether the transaction message was sent. 19. The computer program product of claim 18, further comprising computer-readable program code configured to determine whether the transaction was received. 20. The computer program of claim 19, further comprising computer-readable program code configured to generate a confirmation message comprising an indicator of whether the transaction was received. | Systems methods and computer programs are disclosed that enable generating transaction messages. In one embodiment, the method comprises: generating a transaction message using a first computing device, the transaction message comprising: compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and a transaction identification that identifies an executing program within the first computing device to execute the transaction; and sending the transaction message over an input/output device connected to the first computing device for processing on a second computing device.1. A method comprising:
generating a transaction message using a first computing device, the transaction message comprising:
compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and
a transaction identification that identifies an executing program within the first computing device to execute the transaction; and
sending the transaction message over an input/output device connected to the first computing device for processing on a second computing device. 2. The method of claim 1, wherein the transaction is part of a sequence of transactions, each transaction having a transaction message. 3. The method of claim 2, wherein the generating a transaction message using the first computing device comprises adding the transaction message to a stack of transaction messages in the sequence of transactions; and wherein the sending the transaction message comprises sending the stack of transaction messages to the second computing device. 4. The method of claim 1, wherein the transaction comprises at least one of: transferring an amount of money in a first account to a second account, transferring real property from a first party to a second party, transferring an amount of goods from a first party to a second party, or transferring personal property from a first party to a second party. 5. The method of claim 1, further comprising:
determining whether the transaction was received by the second computing device; and generating a confirmation message comprising an indicator of whether the transaction was received by the second computing device. 6. The method of claim 1, further comprising:
receiving the transaction message using the second computing device; and executing the transaction message using the executing program. 7. The method of claim 1, wherein the previously executed transaction was executed at the first computing device. 8. A first computing device comprising:
a transaction generator for generating a transaction message, the transaction message comprising:
compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and
a transaction identification that identifies an executing program within the first computing device to execute the transaction; and
a sender for sending the transaction message. 9. The first computing device of claim 8, wherein the transaction is part of a sequence of transactions. 10. The first computing device of claim 9, wherein the transaction generator further generates a stack of transactions included in the sequence of transactions; and wherein the sender sends the stack of transaction messages to a second computing device. 11. The first computing device of claim 8, wherein the transaction comprises at least one of: transferring an amount of money in a first account to a second account, transferring real property from a first party to a second party, transferring an amount of goods from a first party to a second party, or transferring personal property from a first party to a second party. 12. The first computing device of claim 8, further comprising:
a receiver for receiving the transaction message; an executing program for executing the transaction; and a received confirmation generator for generating a confirmation message comprising an indicator of whether the transaction was received. 13. The first computing device of claim 8, further comprising
a sent confirmation generator for generating a confirmation message comprising an indicator of whether the transaction was sent. 14. The first computing device of claim 8, wherein the previously executed transaction was executed at the first computing device. 15. A computer program product comprising a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising:
computer-readable program code configured to generate a transaction message, the transaction message comprising:
compensation information comprising instructions indicating a transaction to be executed in order to undo a previously executed transaction; and
a transaction identification that identifies an executing program to execute the transaction; and
computer-readable program code configured to send the transaction message. 16. The computer program product of claim 15, wherein the transaction is part of a sequence of transactions. 17. The computer program product of claim 16, wherein the computer-readable program code configured to generate the transaction message comprises computer-readable program code configured to add the transaction message to a stack of transaction messages in the sequence of transactions; and wherein the computer-readable program code configured to send the transaction message comprises computer-readable program code configured to send the stack of transaction messages. 18. The computer program product of claim 15, further comprising:
computer-readable program code configured to generate a confirmation message comprising an indicator of whether the transaction message was sent. 19. The computer program product of claim 18, further comprising computer-readable program code configured to determine whether the transaction was received. 20. The computer program of claim 19, further comprising computer-readable program code configured to generate a confirmation message comprising an indicator of whether the transaction was received. | 2,400 |
8,390 | 8,390 | 15,459,557 | 2,422 | A navigation system includes a monocentric lens and one or more curved image sensor arrays disposed parallel and spaced apart from the lens to capture respective portions, not all, of the field of view of the lens. | 1. A navigation system comprising:
a monocentric objective lens; and a first curved image sensor array disposed parallel to, and spaced apart from, the lens. 2. A navigation system according to claim 1, wherein:
the lens has a focal length; and the first curved image sensor array is spaced apart from the lens by the focal length. 3. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than 80% of the field of view. 4. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than 25% of the field of view. 5. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens. 6. A navigation system according to claim 1, further comprising a controller communicatively coupled to the first curved image sensor array and configured to use image data from the first curved image sensor array to automatically determine a location of the navigation system. 7. A navigation system according to claim 6, wherein:
the first curved image sensor array is configured to send the image data in a compressed form; and the controller is configured to use the image data in the compressed form to determine the location of the navigation system, without decompressing the image data. 8. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a second curved image sensor array:
disposed parallel to, and spaced apart from, the lens; and
sized and positioned to receive light from a second portion, spatially discontiguous with the first portion, of the field of view. 9. A navigation system according to claim 8, wherein a sum of the first portion of the field of view and the second portion of the field of view is less than all of the field of view. 10. A navigation system according to claim 8, further comprising:
a first plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens; and a second plurality of optical fibers optically coupling the second curved image sensor array to the monocentric objective lens. 11. A navigation system according to claim 8, further comprising a controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to use image data from the first and second curved image sensor arrays to automatically determine a location of the navigation system. 12. A navigation system according to claim 11, wherein:
the first curved image sensor array is configured to send the image data from the first curved image sensor array in a compressed form; the second curved image sensor array is configured to send the image data from the second curved image sensor array in a compressed form; and the controller is configured to use the image data from the first and second curved image sensor arrays in the compressed form to determine the location of the navigation system, without decompressing the image data. 13. A navigation system according to claim 8, further comprising an image-based guidance controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to:
use image data from the first curved image sensor array to provide course guidance information during a first phase of a mission; and use image data from the second curved image sensor array to provide course guidance information during a second phase of the mission. 14. A navigation system according to claim 13, wherein:
the first curved image sensor array is configured such that the first portion of the field of view provides a downward-looking view, relative to the lens; the first phase of the mission comprises a mid-course portion of the mission; the second curved image sensor array is configured such that the second portion of the field of view provides a forward-looking view, relative to the lens; and the second phase of the mission comprises a terminal portion of the mission. 15. A navigation system comprising:
a monocentric objective lens having a field of view; and at least two curved image sensor arrays, wherein:
each curved image sensor array is disposed parallel to, and spaced apart from, the lens; and
each curved image sensor array is sized to receive respective light from a respective spatially discontiguous portion, and less than 80%, of the field of view; 16. A navigation system according to claim 15, wherein each curved image sensor array is sized to receive respective light from less than 25% of the field of view. 17. A navigation system according to claim 15, further comprising a controller communicatively coupled to the at least two curved image sensor arrays and configured to use image data from the at least two curved image sensor arrays to automatically determine a location of the navigation system. 18. A navigation system according to claim 17, wherein:
each curved image sensor array is configured to send the image data in a compressed form; and the controller is configured to use the image data in the compressed form to determine the location of the navigation system, without decompressing the image data. 19. A navigation system according to claim 15, further comprising an image-based guidance controller communicatively coupled to the at least two curved image sensor arrays and configured to:
use image data from at least one curved image sensor array of the at least two curved image sensor arrays to provide course guidance information during a first phase of a mission; and use image data from at least another one curved image sensor array of the at least two curved image sensor arrays to provide course guidance information during a second phase of the mission. 20. A navigation system according to claim 19, wherein each curved image sensor array is sized to receive light from a respective portion, less than all, of the field of view. 21. A navigation system according to claim 20, wherein:
the at least two curved image sensor arrays are configured such that at least one portion of the field of view provides a downward-looking view, relative to the lens; the first phase of the mission comprises a mid-course portion of the mission; the at least two curved image sensor arrays are configured such that at least another portion of the field of view provides a forward-looking view, relative to the lens; and the second phase of the mission comprises a terminal portion of the mission. | A navigation system includes a monocentric lens and one or more curved image sensor arrays disposed parallel and spaced apart from the lens to capture respective portions, not all, of the field of view of the lens.1. A navigation system comprising:
a monocentric objective lens; and a first curved image sensor array disposed parallel to, and spaced apart from, the lens. 2. A navigation system according to claim 1, wherein:
the lens has a focal length; and the first curved image sensor array is spaced apart from the lens by the focal length. 3. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than 80% of the field of view. 4. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from less than 25% of the field of view. 5. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens. 6. A navigation system according to claim 1, further comprising a controller communicatively coupled to the first curved image sensor array and configured to use image data from the first curved image sensor array to automatically determine a location of the navigation system. 7. A navigation system according to claim 6, wherein:
the first curved image sensor array is configured to send the image data in a compressed form; and the controller is configured to use the image data in the compressed form to determine the location of the navigation system, without decompressing the image data. 8. A navigation system according to claim 1, wherein:
the lens has a field of view; and the first curved image sensor array is sized to receive light from a first portion, less than all, of the field of view; the navigation system further comprising: a second curved image sensor array:
disposed parallel to, and spaced apart from, the lens; and
sized and positioned to receive light from a second portion, spatially discontiguous with the first portion, of the field of view. 9. A navigation system according to claim 8, wherein a sum of the first portion of the field of view and the second portion of the field of view is less than all of the field of view. 10. A navigation system according to claim 8, further comprising:
a first plurality of optical fibers optically coupling the first curved image sensor array to the monocentric objective lens; and a second plurality of optical fibers optically coupling the second curved image sensor array to the monocentric objective lens. 11. A navigation system according to claim 8, further comprising a controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to use image data from the first and second curved image sensor arrays to automatically determine a location of the navigation system. 12. A navigation system according to claim 11, wherein:
the first curved image sensor array is configured to send the image data from the first curved image sensor array in a compressed form; the second curved image sensor array is configured to send the image data from the second curved image sensor array in a compressed form; and the controller is configured to use the image data from the first and second curved image sensor arrays in the compressed form to determine the location of the navigation system, without decompressing the image data. 13. A navigation system according to claim 8, further comprising an image-based guidance controller communicatively coupled to the first curved image sensor array and to the second curved image sensor array and configured to:
use image data from the first curved image sensor array to provide course guidance information during a first phase of a mission; and use image data from the second curved image sensor array to provide course guidance information during a second phase of the mission. 14. A navigation system according to claim 13, wherein:
the first curved image sensor array is configured such that the first portion of the field of view provides a downward-looking view, relative to the lens; the first phase of the mission comprises a mid-course portion of the mission; the second curved image sensor array is configured such that the second portion of the field of view provides a forward-looking view, relative to the lens; and the second phase of the mission comprises a terminal portion of the mission. 15. A navigation system comprising:
a monocentric objective lens having a field of view; and at least two curved image sensor arrays, wherein:
each curved image sensor array is disposed parallel to, and spaced apart from, the lens; and
each curved image sensor array is sized to receive respective light from a respective spatially discontiguous portion, and less than 80%, of the field of view; 16. A navigation system according to claim 15, wherein each curved image sensor array is sized to receive respective light from less than 25% of the field of view. 17. A navigation system according to claim 15, further comprising a controller communicatively coupled to the at least two curved image sensor arrays and configured to use image data from the at least two curved image sensor arrays to automatically determine a location of the navigation system. 18. A navigation system according to claim 17, wherein:
each curved image sensor array is configured to send the image data in a compressed form; and the controller is configured to use the image data in the compressed form to determine the location of the navigation system, without decompressing the image data. 19. A navigation system according to claim 15, further comprising an image-based guidance controller communicatively coupled to the at least two curved image sensor arrays and configured to:
use image data from at least one curved image sensor array of the at least two curved image sensor arrays to provide course guidance information during a first phase of a mission; and use image data from at least another one curved image sensor array of the at least two curved image sensor arrays to provide course guidance information during a second phase of the mission. 20. A navigation system according to claim 19, wherein each curved image sensor array is sized to receive light from a respective portion, less than all, of the field of view. 21. A navigation system according to claim 20, wherein:
the at least two curved image sensor arrays are configured such that at least one portion of the field of view provides a downward-looking view, relative to the lens; the first phase of the mission comprises a mid-course portion of the mission; the at least two curved image sensor arrays are configured such that at least another portion of the field of view provides a forward-looking view, relative to the lens; and the second phase of the mission comprises a terminal portion of the mission. | 2,400 |
8,391 | 8,391 | 14,066,999 | 2,453 | Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification. | 1. A method, comprising:
determining, using a processor, a component referenced by a blueprint defining an information technology system; determining a component tool used to manage the component; registering the component with a sensor within the component tool; and responsive to the sensor detecting a change in status of the component within the component tool, sending a notification. 2. The method of claim 1, wherein determining a component referenced by the blueprint is performed responsive to flagging the blueprint for lifecycle management. 3. The method of claim 1, further comprising:
deploying the sensor to the component tool prior to registering the component. 4. The method of claim 1, wherein the component is referenced by the blueprint using a link to the component. 5. The method of claim 1, wherein the notification is sent to a blueprint lifecycle management system. 6. The method of claim 1, further comprising:
deploying an additional sensor to a node of the information technology system defined by the blueprint; and registering a component within the node with the sensor. 7. The method of claim 1, further comprising:
determining a link to the component specified by the blueprint; and verifying validity of the link. 8. The method of claim 1, further comprising:
detecting that the component is not referenced by a new version of the blueprint; and sending a de-register message to the sensor in the component tool; wherein the sensor de-registers the component responsive to the de-register message. 9. The method of claim 8, further comprising:
deleting the sensor responsive to determining that no component within the component tool is referenced by a blueprint flagged for lifecycle management within a blueprint lifecycle management system. 10. A method, comprising:
receiving a user input requesting verification of a blueprint defining an information technology system; responsive to the user input, determining, using a processor, a component referenced by the blueprint and sending an inquiry for the component to a component tool used to manage the component; receiving status information for the component from the component tool; and displaying an indication of the status information for the component. 11-24. (canceled) | Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification.1. A method, comprising:
determining, using a processor, a component referenced by a blueprint defining an information technology system; determining a component tool used to manage the component; registering the component with a sensor within the component tool; and responsive to the sensor detecting a change in status of the component within the component tool, sending a notification. 2. The method of claim 1, wherein determining a component referenced by the blueprint is performed responsive to flagging the blueprint for lifecycle management. 3. The method of claim 1, further comprising:
deploying the sensor to the component tool prior to registering the component. 4. The method of claim 1, wherein the component is referenced by the blueprint using a link to the component. 5. The method of claim 1, wherein the notification is sent to a blueprint lifecycle management system. 6. The method of claim 1, further comprising:
deploying an additional sensor to a node of the information technology system defined by the blueprint; and registering a component within the node with the sensor. 7. The method of claim 1, further comprising:
determining a link to the component specified by the blueprint; and verifying validity of the link. 8. The method of claim 1, further comprising:
detecting that the component is not referenced by a new version of the blueprint; and sending a de-register message to the sensor in the component tool; wherein the sensor de-registers the component responsive to the de-register message. 9. The method of claim 8, further comprising:
deleting the sensor responsive to determining that no component within the component tool is referenced by a blueprint flagged for lifecycle management within a blueprint lifecycle management system. 10. A method, comprising:
receiving a user input requesting verification of a blueprint defining an information technology system; responsive to the user input, determining, using a processor, a component referenced by the blueprint and sending an inquiry for the component to a component tool used to manage the component; receiving status information for the component from the component tool; and displaying an indication of the status information for the component. 11-24. (canceled) | 2,400 |
8,392 | 8,392 | 15,541,847 | 2,472 | Methods and apparatuses exemplified in this disclosure provide mechanisms for a wireless communication device to indicate its Radio Access Technology (RAT) preferences to a wireless communication network, and for a wireless communication network to consider the RAT preferences of a given device when deciding which RAT the device will use. As a non-limiting example of the advantages flowing from these mechanisms, devices operating within a network that includes or is associated with multiple RATs can indicate their preferences for which RAT they use, while still allowing the network to retain control of the RAT selection decisions. Such flexibility offers significant advantages in 5G networks that provide tight integration between multiple RATs—e.g., between LTE and NR air interfaces. However, the methods and apparatuses disclosed herein are not limited to 5G networks. | 1-46. (canceled) 47. A method of operation in a wireless communication device, the method comprising:
performing signal quality measurements for two or more Radio Access Technologies (RATs) that are associated with a wireless communication network and are candidates for use in serving the wireless communication device; determining RAT preferences with respect to the two or more RATs, based on evaluating the signal quality measurements and further based on evaluating one or more operational attributes associated with operating the wireless communication device according to respective ones of the two or more RATs; and indicating the RAT preferences to the wireless communication network, to influence a RAT selection decision made by the wireless communication network for the wireless communication device. 48. The method of claim 47, wherein indicating the RAT preferences comprises indicating at least one of: a preferred RAT indication to bias the RAT selection decision towards a preferred RAT, a non-preferred RAT indication to bias the RAT selection decision away from a non-preferred RAT, and an infeasible RAT indication to prevent selection of an infeasible RAT. 49. The method of claim 47, wherein indicating the RAT preferences comprises explicitly indicating the RAT preferences to the wireless communication network. 50. The method of claim 47, wherein indicating the RAT preferences comprises implicitly indicating the RAT preferences to the wireless communication network. 51. The method of claim 47, wherein indicating the RAT preferences comprises explicitly or implicitly indicating the RAT preferences in a signal quality measurement report sent by the wireless communication device to the wireless communication network for the two or more RATs. 52. The method of claim 51, wherein explicitly indicating the RAT preferences comprises including one or more explicit indicators in the signal quality measurement report and wherein implicitly indicating the RAT preferences comprises biasing one or more signal quality measurements indicated in the signal quality measurement report, said biasing reflecting the RAT preferences. 53. The method of claim 47, wherein indicating the RAT preferences comprises indicating a degree of preference or non-preference for one or more of the two or more RATs. 54. The method of claim 47, wherein indicating the RAT preferences comprises sending one or more flags, each flag corresponding to one of the two or more RATs, and each flag signifying that the corresponding RAT is one of: preferred, non-preferred, and infeasible. 55. The method of claim 47, wherein the one or more operational attributes correspond to relative costs or benefits for the wireless communication device when operating according to respective ones of the two or more RATs. 56. The method of claim 47, wherein the one or more operational attributes comprise a power consumption of the wireless communication device when operating according to respective ones of the two or more RATs. 57. The method of claim 47, wherein the one or more operational attributes comprise at least one of:
a level of activity or computational complexity required of the wireless communication device when operating according to respective ones of the two or more RATs, radio configurations or capabilities of the wireless communication device when operating according to respective ones of the two or more RATs, quality-of-service requirements associated with any ongoing or planned communications by the wireless communication device, and a state of charge of a battery used to power the wireless communication device. 58. A method of operation by a network node in a wireless communication network, the method comprising:
receiving an indication of Radio Access Technology (RAT) preferences of a wireless communication device, the RAT preferences relating to two or more RATs that are associated with the wireless communication network and are, at least ostensibly, candidates for use in serving the wireless communication device; and making a RAT selection decision for the wireless communication device, wherein the RAT selection decision comprises selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences. 59. The method of claim 58, wherein receiving the indication of the RAT preferences comprises receiving one or more explicit indicators and determining the RAT preferences from the one or more explicit indicators. 60. The method of claim 58, wherein the indication of the RAT preferences indicates a degree of preference or non-preference for one or more of the two or more RATs, and wherein the method includes controlling an extent to which the RAT preferences influence the RAT selection decision in dependence on the indicated degree of preference or non-preference. 61. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises:
receiving a measurement report from the wireless communication device that indicates measured signal levels or qualities for respective ones of the two or more RATs; obtaining adjusted signal levels or qualities by adjusting one or more of the measured signal levels or qualities, according to the RAT preferences; and making the RAT selection decision based on the adjusted signal levels or qualities; wherein the RAT preferences comprise one or more signal level or signal quality offset values, each such offset value being used to adjust a corresponding one of the measured signal levels or qualities. 62. The method of claim 58, wherein receiving the indication of RAT preferences comprises receiving at least one of the following indications for at least one of the two or more RATs: an indication of preference, an indication of non-preference, and an indication of infeasibility. 63. The method of claim 62, further comprising excluding from consideration in the RAT selection decision any RAT for which an indication of infeasibility is received. 64. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises making an initial RAT selection and conditionally adjusting the initial RAT selection in dependence on the RAT preferences. 65. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises adjusting one or more values used to make the RAT selection decision, as a function of the RAT preferences, and evaluating the one or more values after the adjusting. 66. The method of claim 58, wherein receiving the indication of the RAT preferences comprises receiving the indication of the RAT preferences in a measurement report sent by the wireless communication device for the two or more RATs. 67. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises performing a biased evaluation by biasing, based on the RAT preferences, an evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, and making the RAT selection decision in dependence on the biased evaluation. 68. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises performing an unbiased evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, making an initial RAT selection decision in dependence on the unbiased evaluation, and conditionally modifying the initial RAT selection decision as a function of the RAT preferences. 69. A wireless communication device comprising:
communication circuitry configured for communicating with a wireless communication network; and processing circuitry operatively associated with the communication circuitry and configured to:
perform signal quality measurements for two or more Radio Access Technologies, RATs that are associated with the wireless communication network and are candidates for use in serving the wireless communication device;
determine RAT preferences with respect to the two or more RATs, based on evaluating the signal quality measurements and further based on evaluating one or more operational attributes associated with operating the wireless communication device according to respective ones of the two or more RATs; and
indicate the RAT preferences to the wireless communication network, to influence a RAT selection decision made by the wireless communication network for the wireless communication device. 70. The wireless communication device of claim 69, wherein the processing circuitry is configured to indicate the RAT preferences by indicating at least one of: a preferred RAT indication to bias the RAT selection decision towards a preferred RAT, a non-preferred RAT indication to bias the RAT selection decision away from a non-preferred RAT, and an infeasible RAT indication to prevent selection of an infeasible RAT. 71. The wireless communication device of claim 69, wherein the processing circuitry is configured to indicate the RAT preferences by implicitly indicating the RAT preferences to the wireless communication network. 72. The wireless communication device of claim 69, wherein the processing circuitry is configured to indicate the RAT preferences by explicitly or implicitly indicating the RAT preferences in a signal quality measurement report sent by the wireless communication device to the wireless communication network for the two or more RATs. 73. The wireless communication device of claim 72, wherein the processing circuitry is configured to explicitly indicate the RAT preferences by including one or more explicit indicators in the signal quality measurement report and wherein the processing circuitry implicitly indicates the RAT preferences by biasing one or more signal quality measurements indicated in the signal quality measurement report, said biasing reflecting the RAT preferences. 74. The wireless communication device of claim 69, wherein the processing circuitry indicates the RAT preferences by indicating a degree of preference or non-preference for one or more of the two or more RATs. 75. The wireless communication device of claim 69, wherein the processing circuitry indicates the RAT preferences by sending one or more flags, each flag corresponding to one of the two or more RATs, and each flag signifying that the corresponding RAT is one of: preferred, non-preferred, and infeasible. 76. The wireless communication device of claim 69, wherein the one or more operational attributes correspond to relative costs or benefits for the wireless communication device when operating according to respective ones of the two or more RATs. 77. The wireless communication device of claim 69, wherein the one or more operational attributes comprise a power consumption of the wireless communication device when operating according to respective ones of the two or more RATs. 78. The wireless communication device of claim 69, wherein the one or more operational attributes comprise at least one of:
a level of activity or computational complexity required of the wireless communication device when operating according to respective ones of the two or more RATs, radio configurations or capabilities of the wireless communication device when operating according to respective ones of the two or more RATs, quality-of-service requirements associated with any ongoing or planned communications by the wireless communication device, and a state of charge of a battery used to power the wireless communication device. 79. A network node comprising:
communication circuitry; and processing circuitry operatively associated with the communication circuitry and configured to: receive, via the communication circuitry, an indication of Radio Access Technology (RAT) preferences of a wireless communication device, the RAT preferences relating to two or more RATs that are associated with the wireless communication network and are candidates for use in serving the wireless communication device; and make a RAT selection decision for the wireless communication device, wherein the RAT selection decision comprises selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences. 80. The network node of claim 79, wherein the indication of the RAT preferences indicates a degree of preference or non-preference for one or more of the two or more RATs, and wherein the processing circuitry is configured to control an extent to which the RAT preferences influence the RAT selection decision in dependence on the indicated degree of preference or non-preference. 81. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to:
receive a measurement report from the wireless communication device that indicates measured signal levels or qualities for respective ones of the two or more RATs; obtain adjusted signal levels or qualities by adjusting one or more of the measured signal levels or qualities, according to the RAT preferences; and make the RAT selection decision based on the adjusted signal levels or qualities; wherein the RAT preferences comprise one or more signal level or signal quality offset values, each such offset value being used to adjust a corresponding one of the measured signal levels or qualities. 82. The network node of claim 79, wherein the processing circuitry is configured to receive the indication of RAT preferences by receiving at least one of the following indications for at least one of the two or more RATs: an indication of preference, an indication of non-preference, and an indication of infeasibility. 83. The network node of claim 82, wherein the processing circuitry is configured to exclude from consideration in the RAT selection decision any RAT for which an indication of infeasibility is received. 84. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to make an initial RAT selection and conditionally adjust the initial RAT selection in dependence on the RAT preferences. 85. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to adjust one or more values used to make the RAT selection decision, as a function of the RAT preferences, and evaluate the one or more values after the adjustment. 86. The network node of claim 79, wherein the processing circuitry is configured to receive the indication of the RAT preferences in a measurement report sent by the wireless communication device for the two or more RATs. 87. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to perform a biased evaluation by biasing, based on the RAT preferences, an evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, and make the RAT selection decision in dependence on the biased evaluation. 88. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to perform an unbiased evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, make an initial RAT selection decision in dependence on the unbiased evaluation, and conditionally modify the initial RAT selection decision as a function of the RAT preferences. | Methods and apparatuses exemplified in this disclosure provide mechanisms for a wireless communication device to indicate its Radio Access Technology (RAT) preferences to a wireless communication network, and for a wireless communication network to consider the RAT preferences of a given device when deciding which RAT the device will use. As a non-limiting example of the advantages flowing from these mechanisms, devices operating within a network that includes or is associated with multiple RATs can indicate their preferences for which RAT they use, while still allowing the network to retain control of the RAT selection decisions. Such flexibility offers significant advantages in 5G networks that provide tight integration between multiple RATs—e.g., between LTE and NR air interfaces. However, the methods and apparatuses disclosed herein are not limited to 5G networks.1-46. (canceled) 47. A method of operation in a wireless communication device, the method comprising:
performing signal quality measurements for two or more Radio Access Technologies (RATs) that are associated with a wireless communication network and are candidates for use in serving the wireless communication device; determining RAT preferences with respect to the two or more RATs, based on evaluating the signal quality measurements and further based on evaluating one or more operational attributes associated with operating the wireless communication device according to respective ones of the two or more RATs; and indicating the RAT preferences to the wireless communication network, to influence a RAT selection decision made by the wireless communication network for the wireless communication device. 48. The method of claim 47, wherein indicating the RAT preferences comprises indicating at least one of: a preferred RAT indication to bias the RAT selection decision towards a preferred RAT, a non-preferred RAT indication to bias the RAT selection decision away from a non-preferred RAT, and an infeasible RAT indication to prevent selection of an infeasible RAT. 49. The method of claim 47, wherein indicating the RAT preferences comprises explicitly indicating the RAT preferences to the wireless communication network. 50. The method of claim 47, wherein indicating the RAT preferences comprises implicitly indicating the RAT preferences to the wireless communication network. 51. The method of claim 47, wherein indicating the RAT preferences comprises explicitly or implicitly indicating the RAT preferences in a signal quality measurement report sent by the wireless communication device to the wireless communication network for the two or more RATs. 52. The method of claim 51, wherein explicitly indicating the RAT preferences comprises including one or more explicit indicators in the signal quality measurement report and wherein implicitly indicating the RAT preferences comprises biasing one or more signal quality measurements indicated in the signal quality measurement report, said biasing reflecting the RAT preferences. 53. The method of claim 47, wherein indicating the RAT preferences comprises indicating a degree of preference or non-preference for one or more of the two or more RATs. 54. The method of claim 47, wherein indicating the RAT preferences comprises sending one or more flags, each flag corresponding to one of the two or more RATs, and each flag signifying that the corresponding RAT is one of: preferred, non-preferred, and infeasible. 55. The method of claim 47, wherein the one or more operational attributes correspond to relative costs or benefits for the wireless communication device when operating according to respective ones of the two or more RATs. 56. The method of claim 47, wherein the one or more operational attributes comprise a power consumption of the wireless communication device when operating according to respective ones of the two or more RATs. 57. The method of claim 47, wherein the one or more operational attributes comprise at least one of:
a level of activity or computational complexity required of the wireless communication device when operating according to respective ones of the two or more RATs, radio configurations or capabilities of the wireless communication device when operating according to respective ones of the two or more RATs, quality-of-service requirements associated with any ongoing or planned communications by the wireless communication device, and a state of charge of a battery used to power the wireless communication device. 58. A method of operation by a network node in a wireless communication network, the method comprising:
receiving an indication of Radio Access Technology (RAT) preferences of a wireless communication device, the RAT preferences relating to two or more RATs that are associated with the wireless communication network and are, at least ostensibly, candidates for use in serving the wireless communication device; and making a RAT selection decision for the wireless communication device, wherein the RAT selection decision comprises selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences. 59. The method of claim 58, wherein receiving the indication of the RAT preferences comprises receiving one or more explicit indicators and determining the RAT preferences from the one or more explicit indicators. 60. The method of claim 58, wherein the indication of the RAT preferences indicates a degree of preference or non-preference for one or more of the two or more RATs, and wherein the method includes controlling an extent to which the RAT preferences influence the RAT selection decision in dependence on the indicated degree of preference or non-preference. 61. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises:
receiving a measurement report from the wireless communication device that indicates measured signal levels or qualities for respective ones of the two or more RATs; obtaining adjusted signal levels or qualities by adjusting one or more of the measured signal levels or qualities, according to the RAT preferences; and making the RAT selection decision based on the adjusted signal levels or qualities; wherein the RAT preferences comprise one or more signal level or signal quality offset values, each such offset value being used to adjust a corresponding one of the measured signal levels or qualities. 62. The method of claim 58, wherein receiving the indication of RAT preferences comprises receiving at least one of the following indications for at least one of the two or more RATs: an indication of preference, an indication of non-preference, and an indication of infeasibility. 63. The method of claim 62, further comprising excluding from consideration in the RAT selection decision any RAT for which an indication of infeasibility is received. 64. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises making an initial RAT selection and conditionally adjusting the initial RAT selection in dependence on the RAT preferences. 65. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises adjusting one or more values used to make the RAT selection decision, as a function of the RAT preferences, and evaluating the one or more values after the adjusting. 66. The method of claim 58, wherein receiving the indication of the RAT preferences comprises receiving the indication of the RAT preferences in a measurement report sent by the wireless communication device for the two or more RATs. 67. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises performing a biased evaluation by biasing, based on the RAT preferences, an evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, and making the RAT selection decision in dependence on the biased evaluation. 68. The method of claim 58, wherein selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences, comprises performing an unbiased evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, making an initial RAT selection decision in dependence on the unbiased evaluation, and conditionally modifying the initial RAT selection decision as a function of the RAT preferences. 69. A wireless communication device comprising:
communication circuitry configured for communicating with a wireless communication network; and processing circuitry operatively associated with the communication circuitry and configured to:
perform signal quality measurements for two or more Radio Access Technologies, RATs that are associated with the wireless communication network and are candidates for use in serving the wireless communication device;
determine RAT preferences with respect to the two or more RATs, based on evaluating the signal quality measurements and further based on evaluating one or more operational attributes associated with operating the wireless communication device according to respective ones of the two or more RATs; and
indicate the RAT preferences to the wireless communication network, to influence a RAT selection decision made by the wireless communication network for the wireless communication device. 70. The wireless communication device of claim 69, wherein the processing circuitry is configured to indicate the RAT preferences by indicating at least one of: a preferred RAT indication to bias the RAT selection decision towards a preferred RAT, a non-preferred RAT indication to bias the RAT selection decision away from a non-preferred RAT, and an infeasible RAT indication to prevent selection of an infeasible RAT. 71. The wireless communication device of claim 69, wherein the processing circuitry is configured to indicate the RAT preferences by implicitly indicating the RAT preferences to the wireless communication network. 72. The wireless communication device of claim 69, wherein the processing circuitry is configured to indicate the RAT preferences by explicitly or implicitly indicating the RAT preferences in a signal quality measurement report sent by the wireless communication device to the wireless communication network for the two or more RATs. 73. The wireless communication device of claim 72, wherein the processing circuitry is configured to explicitly indicate the RAT preferences by including one or more explicit indicators in the signal quality measurement report and wherein the processing circuitry implicitly indicates the RAT preferences by biasing one or more signal quality measurements indicated in the signal quality measurement report, said biasing reflecting the RAT preferences. 74. The wireless communication device of claim 69, wherein the processing circuitry indicates the RAT preferences by indicating a degree of preference or non-preference for one or more of the two or more RATs. 75. The wireless communication device of claim 69, wherein the processing circuitry indicates the RAT preferences by sending one or more flags, each flag corresponding to one of the two or more RATs, and each flag signifying that the corresponding RAT is one of: preferred, non-preferred, and infeasible. 76. The wireless communication device of claim 69, wherein the one or more operational attributes correspond to relative costs or benefits for the wireless communication device when operating according to respective ones of the two or more RATs. 77. The wireless communication device of claim 69, wherein the one or more operational attributes comprise a power consumption of the wireless communication device when operating according to respective ones of the two or more RATs. 78. The wireless communication device of claim 69, wherein the one or more operational attributes comprise at least one of:
a level of activity or computational complexity required of the wireless communication device when operating according to respective ones of the two or more RATs, radio configurations or capabilities of the wireless communication device when operating according to respective ones of the two or more RATs, quality-of-service requirements associated with any ongoing or planned communications by the wireless communication device, and a state of charge of a battery used to power the wireless communication device. 79. A network node comprising:
communication circuitry; and processing circuitry operatively associated with the communication circuitry and configured to: receive, via the communication circuitry, an indication of Radio Access Technology (RAT) preferences of a wireless communication device, the RAT preferences relating to two or more RATs that are associated with the wireless communication network and are candidates for use in serving the wireless communication device; and make a RAT selection decision for the wireless communication device, wherein the RAT selection decision comprises selecting one of the two or more RATs for use by the wireless communication device, based at least in part on the RAT preferences. 80. The network node of claim 79, wherein the indication of the RAT preferences indicates a degree of preference or non-preference for one or more of the two or more RATs, and wherein the processing circuitry is configured to control an extent to which the RAT preferences influence the RAT selection decision in dependence on the indicated degree of preference or non-preference. 81. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to:
receive a measurement report from the wireless communication device that indicates measured signal levels or qualities for respective ones of the two or more RATs; obtain adjusted signal levels or qualities by adjusting one or more of the measured signal levels or qualities, according to the RAT preferences; and make the RAT selection decision based on the adjusted signal levels or qualities; wherein the RAT preferences comprise one or more signal level or signal quality offset values, each such offset value being used to adjust a corresponding one of the measured signal levels or qualities. 82. The network node of claim 79, wherein the processing circuitry is configured to receive the indication of RAT preferences by receiving at least one of the following indications for at least one of the two or more RATs: an indication of preference, an indication of non-preference, and an indication of infeasibility. 83. The network node of claim 82, wherein the processing circuitry is configured to exclude from consideration in the RAT selection decision any RAT for which an indication of infeasibility is received. 84. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to make an initial RAT selection and conditionally adjust the initial RAT selection in dependence on the RAT preferences. 85. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to adjust one or more values used to make the RAT selection decision, as a function of the RAT preferences, and evaluate the one or more values after the adjustment. 86. The network node of claim 79, wherein the processing circuitry is configured to receive the indication of the RAT preferences in a measurement report sent by the wireless communication device for the two or more RATs. 87. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to perform a biased evaluation by biasing, based on the RAT preferences, an evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, and make the RAT selection decision in dependence on the biased evaluation. 88. The network node of claim 79, wherein, to select one of the two or more RATs for use by the wireless communication device, the processing circuitry is configured to perform an unbiased evaluation of relative costs or benefits for the wireless communication network regarding use by the wireless communication device of respective ones of the two or more RATs, make an initial RAT selection decision in dependence on the unbiased evaluation, and conditionally modify the initial RAT selection decision as a function of the RAT preferences. | 2,400 |
8,393 | 8,393 | 13,759,117 | 2,453 | Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification. | 1-10. (canceled) 11. A system comprising:
a processor programmed to initiate executable operations comprising: determining a component referenced by a blueprint defining an information technology system; determining a component tool used to manage the component; registering the component with a sensor within the component tool; and responsive to the sensor detecting a change in status of the component within the component tool, sending a notification. 12. The system of claim 11, wherein determining a component referenced by the blueprint is performed responsive to flagging the blueprint for lifecycle management. 13. The system of claim 11, wherein the processor is further programmed to initiate an executable operation comprising:
deploying the sensor to the component tool prior to registering the component. 14. The system of claim 11, wherein the processor is further programmed to initiate an executable operation comprising:
deploying an additional sensor to a node of the information technology system defined by the blueprint; and registering a component within the node with the sensor. 15. The system of claim 11, wherein the processor is further programmed to initiate executable operations comprising:
determining a link to the component specified by the blueprint; and verifying validity of the link. 16. The system of claim 11, wherein the processor is further programmed to initiate executable operations comprising:
detecting that the component is not referenced by a new version of the blueprint; and sending a de-register message to the sensor in the component tool; wherein the sensor de-registers the component responsive to the de-register message. 17. The system of claim 16, wherein the processor is further programmed to initiate an executable operation comprising:
deleting the sensor responsive to determining that no component within the component tool is referenced by a blueprint flagged for lifecycle management within a blueprint lifecycle management system. 18. A computer program product comprising a computer readable storage medium having program code stored thereon, the program code executable by a processor to perform a method comprising:
determining, using the processor, a component referenced by a blueprint defining an information technology system; determining, using the processor, a component tool used to manage the component; registering, using the processor, the component with a sensor within the component tool; and responsive to the sensor detecting a change in status of the component within the component tool, sending a notification. 19. The computer program product of claim 18, wherein determining a component referenced by the blueprint is performed responsive to flagging the blueprint for lifecycle management. 20. The computer program product of claim 18, wherein the method further comprises:
deploying the sensor to the component tool prior to registering the component. 21. The computer program product of claim 18, wherein the method further comprises:
displaying the notification. 22. The computer program product of claim 18, wherein the method further comprises:
determining a link to the component specified by the blueprint; and verifying validity of the link. 23. The computer program product of claim 18, wherein the method further comprises:
detecting that the component is not referenced by a new version of the blueprint; and sending a de-register message to the sensor in the component tool; wherein the sensor de-registers the component responsive to the de-register message. 24. The computer program product of claim 18, wherein the method further comprises:
deleting the sensor responsive to determining that no component within the component tool is referenced by a blueprint flagged for lifecycle management within a blueprint lifecycle management system. 25. The system of claim 11, wherein the component is referenced by the blueprint using a link to the component. 26. The system of claim 11, wherein the notification is sent to a blueprint lifecycle management system. 27. The system of claim 11, wherein the processor is further programmed to initiate an executable operation comprising displaying the notification. 28. A system comprising:
a processor programmed to initiate executable operations comprising: receiving a user input requesting verification of a blueprint defining an information technology system; responsive to the user input, determining a component referenced by the blueprint and sending an inquiry for the component to a component tool used to manage the component; receiving status information for the component from the component tool; and
displaying an indication of the status information for the component. 29. The computer program product of claim 18, wherein the component is referenced by the blueprint using a link to the component. 30. The computer program product of claim 18, wherein the notification is sent to a blueprint lifecycle management system. 31. The computer program product of claim 18, wherein the method further comprises:
deploying an additional sensor to a node of the information technology system defined by the blueprint; and registering a component within the node with the sensor. 32. A computer program product comprising a computer readable storage medium having program code stored thereon, the program code executable by a processor to perform a method comprising:
receiving, using the processor, a user input requesting verification of a blueprint defining an information technology system; responsive to the user input, determining, using the processor, a component referenced by the blueprint and sending an inquiry for the component to a component tool used to manage the component; receiving, using the processor, status information for the component from the component tool; and displaying, using the processor, an indication of the status information for the component. | Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification.1-10. (canceled) 11. A system comprising:
a processor programmed to initiate executable operations comprising: determining a component referenced by a blueprint defining an information technology system; determining a component tool used to manage the component; registering the component with a sensor within the component tool; and responsive to the sensor detecting a change in status of the component within the component tool, sending a notification. 12. The system of claim 11, wherein determining a component referenced by the blueprint is performed responsive to flagging the blueprint for lifecycle management. 13. The system of claim 11, wherein the processor is further programmed to initiate an executable operation comprising:
deploying the sensor to the component tool prior to registering the component. 14. The system of claim 11, wherein the processor is further programmed to initiate an executable operation comprising:
deploying an additional sensor to a node of the information technology system defined by the blueprint; and registering a component within the node with the sensor. 15. The system of claim 11, wherein the processor is further programmed to initiate executable operations comprising:
determining a link to the component specified by the blueprint; and verifying validity of the link. 16. The system of claim 11, wherein the processor is further programmed to initiate executable operations comprising:
detecting that the component is not referenced by a new version of the blueprint; and sending a de-register message to the sensor in the component tool; wherein the sensor de-registers the component responsive to the de-register message. 17. The system of claim 16, wherein the processor is further programmed to initiate an executable operation comprising:
deleting the sensor responsive to determining that no component within the component tool is referenced by a blueprint flagged for lifecycle management within a blueprint lifecycle management system. 18. A computer program product comprising a computer readable storage medium having program code stored thereon, the program code executable by a processor to perform a method comprising:
determining, using the processor, a component referenced by a blueprint defining an information technology system; determining, using the processor, a component tool used to manage the component; registering, using the processor, the component with a sensor within the component tool; and responsive to the sensor detecting a change in status of the component within the component tool, sending a notification. 19. The computer program product of claim 18, wherein determining a component referenced by the blueprint is performed responsive to flagging the blueprint for lifecycle management. 20. The computer program product of claim 18, wherein the method further comprises:
deploying the sensor to the component tool prior to registering the component. 21. The computer program product of claim 18, wherein the method further comprises:
displaying the notification. 22. The computer program product of claim 18, wherein the method further comprises:
determining a link to the component specified by the blueprint; and verifying validity of the link. 23. The computer program product of claim 18, wherein the method further comprises:
detecting that the component is not referenced by a new version of the blueprint; and sending a de-register message to the sensor in the component tool; wherein the sensor de-registers the component responsive to the de-register message. 24. The computer program product of claim 18, wherein the method further comprises:
deleting the sensor responsive to determining that no component within the component tool is referenced by a blueprint flagged for lifecycle management within a blueprint lifecycle management system. 25. The system of claim 11, wherein the component is referenced by the blueprint using a link to the component. 26. The system of claim 11, wherein the notification is sent to a blueprint lifecycle management system. 27. The system of claim 11, wherein the processor is further programmed to initiate an executable operation comprising displaying the notification. 28. A system comprising:
a processor programmed to initiate executable operations comprising: receiving a user input requesting verification of a blueprint defining an information technology system; responsive to the user input, determining a component referenced by the blueprint and sending an inquiry for the component to a component tool used to manage the component; receiving status information for the component from the component tool; and
displaying an indication of the status information for the component. 29. The computer program product of claim 18, wherein the component is referenced by the blueprint using a link to the component. 30. The computer program product of claim 18, wherein the notification is sent to a blueprint lifecycle management system. 31. The computer program product of claim 18, wherein the method further comprises:
deploying an additional sensor to a node of the information technology system defined by the blueprint; and registering a component within the node with the sensor. 32. A computer program product comprising a computer readable storage medium having program code stored thereon, the program code executable by a processor to perform a method comprising:
receiving, using the processor, a user input requesting verification of a blueprint defining an information technology system; responsive to the user input, determining, using the processor, a component referenced by the blueprint and sending an inquiry for the component to a component tool used to manage the component; receiving, using the processor, status information for the component from the component tool; and displaying, using the processor, an indication of the status information for the component. | 2,400 |
8,394 | 8,394 | 14,721,091 | 2,432 | A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate anomalies experienced by each of multiple attack surfaces is received. The disparate anomalies occur over an extended period of time that exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces. A synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces is generated. In response to receiving a notification that the at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event, an alert that a malicious attack is being attempted against one or more attack surfaces is generated. | 1. A method of probabilistically detecting a low intensity threat event to an attack surface, the method comprising:
receiving, by one or more processors, a notification of disparate anomalies experienced by each of multiple attack surfaces over an extended period of time, wherein the disparate anomalies are different types of anomalies compared to one another, and wherein the extended period of time exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces; generating, by one or more processors, a synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces; receiving, by one or more processors, a notification that at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event; and in response to receiving the notification that the at least one particular attack surface is experiencing the predefined quantity of the disparate anomalies found in the synthetic event, generating, by one or more processors, an alert that a malicious attack is being attempted against one or more of the multiple attack surfaces. 2. The method of claim 1, further comprising:
collecting the disparate anomalies from disparate physical locations; and in response to the collected disparate anomalies from the disparate physical locations exceeding a predetermined level, generating the synthetic event. 3. The method of claim 1, wherein the predefined quantity of the disparate anomalies is one. 4. The method of claim 1, wherein the predefined quantity of the disparate anomalies is a multiple number. 5. The method of claim 1, further comprising:
receiving, by one or more processors, a notification that at least one of the disparate anomalies found in the synthetic event resulted in a successful malicious attack against a certain attack surface; and in response to receiving the notification that at least one of the disparate anomalies found in the synthetic event resulted in the successful malicious attack against the certain attack surface, issuing, by one or more processors, a warning that all of the disparate anomalies found in the synthetic event are suspected malicious attacks. 6. The method of claim 1, further comprising:
receiving, by one or more processors, a notification that at least one of the disparate anomalies found in the synthetic event contains a known malicious feature; and in response to receiving the notification that at least one of the disparate anomalies found in the synthetic event contains the known malicious feature, issuing, by one or more processors, a warning that all of the disparate anomalies found in the synthetic event are suspected malicious attacks. 7. The method of claim 1, wherein the at least one particular attack surface is only one attack surface from a group consisting of an application program, an operating system, a hardware-based storage device, and a hardware-based computing device. 8. The method of claim 1, wherein the at least one particular attack surface is two or more attack surfaces from a group consisting of an application program, an operating system, a hardware-based storage device, and a hardware-based computing device. 9. The method of claim 1, wherein the disparate anomalies occurred at different physical locations during the extended period of time. 10. The method of claim 1, wherein all of the disparate anomalies were attempted misuses of the multiple attack surfaces, and wherein all of the attempted misuses were prevented by security systems on the multiple attack surfaces, and wherein the method further comprises:
appending, by one or more processors, an explanation to the synthetic event describing what prompted the security systems to prevent the attempted misuses. 11. The method of claim 1, wherein one or more of the attack surfaces are cloud-based resources. 12. The method of claim 1, wherein the attack surface is a physical device, and wherein the method further comprises:
receiving, by one or more processors, an anomaly signal from a sensor associated with the physical device, wherein the anomaly signal from the sensor indicates an operational anomaly to the physical device; and in response to receiving the anomaly signal from the sensor associated with the physical device, generating, by one or more processors, an attack signal indicating that the physical device is being maliciously attacked. 13. The method of claim 1, wherein the physical device is a non-computing device. 14. The method of claim 1, wherein the physical device is a computing device. 15. A computer program storage device, the computer program storage device comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code readable and executable by a processor to perform a method comprising:
receiving a notification of disparate anomalies experienced by each of multiple attack surfaces over an extended period of time, wherein the disparate anomalies are different types of anomalies compared to one another, and wherein the extended period of time exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces; generating a synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces; receiving a notification that at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event; and in response to receiving the notification that the at least one particular attack surface is experiencing the predefined quantity of the disparate anomalies found in the synthetic event, generating an alert that a malicious attack is being attempted against one or more of the multiple attack surfaces. 16. The computer program storage device of claim 15, wherein the method further comprises:
collecting the disparate anomalies from disparate physical locations; and in response to the collected disparate anomalies from the disparate physical locations exceeding a predetermined level, generating the synthetic event. 17. A computer system comprising:
a processor, a computer readable memory, and a non-transitory computer readable storage medium; first program instructions to receive a notification of disparate anomalies experienced by each of multiple attack surfaces over an extended period of time, wherein the disparate anomalies are different types of anomalies compared to one another, and wherein the extended period of time exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces; second program instructions to generate a synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces; third program instructions to receive a notification that at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event; and fourth program instructions to, in response to receiving the notification that the at least one particular attack surface is experiencing the predefined quantity of the disparate anomalies found in the synthetic event, generate an alert that a malicious attack is being attempted against one or more of the multiple attack surfaces; and wherein
the first, second, third, and fourth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. 18. The computer system of claim 17, further comprising:
fifth program instructions to collect the disparate anomalies from disparate physical locations; and sixth program instructions to, in response to the collected disparate anomalies from the disparate physical locations exceeding a predetermined level, generate the synthetic event; and
wherein
the fifth and sixth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. 19. The computer system of claim 17, further comprising:
fifth program instructions to receive a notification that at least one of the disparate anomalies found in the synthetic event contains a known malicious feature; and sixth program instructions to, in response to receiving the notification that at least one of the disparate anomalies found in the synthetic event contains the known malicious feature, issue a warning that all of the disparate anomalies found in the synthetic event are suspected malicious attacks; and wherein
the fifth and sixth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. 20. The computer system of claim 17, wherein all of the disparate anomalies were attempted misuses of the multiple attack surfaces, and wherein all of the attempted misuses were prevented by security systems on the multiple attack surfaces, and wherein the computer system further comprises:
fifth program instructions to append an explanation to the synthetic event describing what prompted the security systems to prevent the attempted misuses; and wherein the fifth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. | A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate anomalies experienced by each of multiple attack surfaces is received. The disparate anomalies occur over an extended period of time that exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces. A synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces is generated. In response to receiving a notification that the at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event, an alert that a malicious attack is being attempted against one or more attack surfaces is generated.1. A method of probabilistically detecting a low intensity threat event to an attack surface, the method comprising:
receiving, by one or more processors, a notification of disparate anomalies experienced by each of multiple attack surfaces over an extended period of time, wherein the disparate anomalies are different types of anomalies compared to one another, and wherein the extended period of time exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces; generating, by one or more processors, a synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces; receiving, by one or more processors, a notification that at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event; and in response to receiving the notification that the at least one particular attack surface is experiencing the predefined quantity of the disparate anomalies found in the synthetic event, generating, by one or more processors, an alert that a malicious attack is being attempted against one or more of the multiple attack surfaces. 2. The method of claim 1, further comprising:
collecting the disparate anomalies from disparate physical locations; and in response to the collected disparate anomalies from the disparate physical locations exceeding a predetermined level, generating the synthetic event. 3. The method of claim 1, wherein the predefined quantity of the disparate anomalies is one. 4. The method of claim 1, wherein the predefined quantity of the disparate anomalies is a multiple number. 5. The method of claim 1, further comprising:
receiving, by one or more processors, a notification that at least one of the disparate anomalies found in the synthetic event resulted in a successful malicious attack against a certain attack surface; and in response to receiving the notification that at least one of the disparate anomalies found in the synthetic event resulted in the successful malicious attack against the certain attack surface, issuing, by one or more processors, a warning that all of the disparate anomalies found in the synthetic event are suspected malicious attacks. 6. The method of claim 1, further comprising:
receiving, by one or more processors, a notification that at least one of the disparate anomalies found in the synthetic event contains a known malicious feature; and in response to receiving the notification that at least one of the disparate anomalies found in the synthetic event contains the known malicious feature, issuing, by one or more processors, a warning that all of the disparate anomalies found in the synthetic event are suspected malicious attacks. 7. The method of claim 1, wherein the at least one particular attack surface is only one attack surface from a group consisting of an application program, an operating system, a hardware-based storage device, and a hardware-based computing device. 8. The method of claim 1, wherein the at least one particular attack surface is two or more attack surfaces from a group consisting of an application program, an operating system, a hardware-based storage device, and a hardware-based computing device. 9. The method of claim 1, wherein the disparate anomalies occurred at different physical locations during the extended period of time. 10. The method of claim 1, wherein all of the disparate anomalies were attempted misuses of the multiple attack surfaces, and wherein all of the attempted misuses were prevented by security systems on the multiple attack surfaces, and wherein the method further comprises:
appending, by one or more processors, an explanation to the synthetic event describing what prompted the security systems to prevent the attempted misuses. 11. The method of claim 1, wherein one or more of the attack surfaces are cloud-based resources. 12. The method of claim 1, wherein the attack surface is a physical device, and wherein the method further comprises:
receiving, by one or more processors, an anomaly signal from a sensor associated with the physical device, wherein the anomaly signal from the sensor indicates an operational anomaly to the physical device; and in response to receiving the anomaly signal from the sensor associated with the physical device, generating, by one or more processors, an attack signal indicating that the physical device is being maliciously attacked. 13. The method of claim 1, wherein the physical device is a non-computing device. 14. The method of claim 1, wherein the physical device is a computing device. 15. A computer program storage device, the computer program storage device comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code readable and executable by a processor to perform a method comprising:
receiving a notification of disparate anomalies experienced by each of multiple attack surfaces over an extended period of time, wherein the disparate anomalies are different types of anomalies compared to one another, and wherein the extended period of time exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces; generating a synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces; receiving a notification that at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event; and in response to receiving the notification that the at least one particular attack surface is experiencing the predefined quantity of the disparate anomalies found in the synthetic event, generating an alert that a malicious attack is being attempted against one or more of the multiple attack surfaces. 16. The computer program storage device of claim 15, wherein the method further comprises:
collecting the disparate anomalies from disparate physical locations; and in response to the collected disparate anomalies from the disparate physical locations exceeding a predetermined level, generating the synthetic event. 17. A computer system comprising:
a processor, a computer readable memory, and a non-transitory computer readable storage medium; first program instructions to receive a notification of disparate anomalies experienced by each of multiple attack surfaces over an extended period of time, wherein the disparate anomalies are different types of anomalies compared to one another, and wherein the extended period of time exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces; second program instructions to generate a synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces; third program instructions to receive a notification that at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event; and fourth program instructions to, in response to receiving the notification that the at least one particular attack surface is experiencing the predefined quantity of the disparate anomalies found in the synthetic event, generate an alert that a malicious attack is being attempted against one or more of the multiple attack surfaces; and wherein
the first, second, third, and fourth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. 18. The computer system of claim 17, further comprising:
fifth program instructions to collect the disparate anomalies from disparate physical locations; and sixth program instructions to, in response to the collected disparate anomalies from the disparate physical locations exceeding a predetermined level, generate the synthetic event; and
wherein
the fifth and sixth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. 19. The computer system of claim 17, further comprising:
fifth program instructions to receive a notification that at least one of the disparate anomalies found in the synthetic event contains a known malicious feature; and sixth program instructions to, in response to receiving the notification that at least one of the disparate anomalies found in the synthetic event contains the known malicious feature, issue a warning that all of the disparate anomalies found in the synthetic event are suspected malicious attacks; and wherein
the fifth and sixth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. 20. The computer system of claim 17, wherein all of the disparate anomalies were attempted misuses of the multiple attack surfaces, and wherein all of the attempted misuses were prevented by security systems on the multiple attack surfaces, and wherein the computer system further comprises:
fifth program instructions to append an explanation to the synthetic event describing what prompted the security systems to prevent the attempted misuses; and wherein the fifth program instructions are stored on the non-transitory computer readable storage medium for execution by one or more processors via the computer readable memory. | 2,400 |
8,395 | 8,395 | 15,258,784 | 2,438 | Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform. Some examples may enable correlating a first set of items of threat information from the security information sharing platform. Some examples may enable, responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type. Some examples may enable determining whether a first threat pattern exists based on the new security indicator. | 1. A method for providing enhanced threat intelligence in a security information sharing platform, the method being performed in a computer system comprising a physical processor implementing machine readable instructions, the method comprising:
correlating, by the processor, a first set of items of threat information from the security information sharing platform; responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating, by the processor, a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type; and determining, by the processor, whether a first threat pattern exists based on the new security indicator. 2. The method of claim 1, wherein the first threat pattern comprises a first threat pattern set of security indicators, where each security indicator of the first threat pattern type is associated with a corresponding malicious action type. 3. The method of claim 2, wherein determining whether the first threat pattern exists comprises:
determining, by the processor, whether the security information sharing platform comprises a related set of security indicators, where each security indicator in the related set of security indicators matches a corresponding indicator in the first threat pattern set of security indicators. 4. The method of claim 1, further comprising:
responsive to determining that the first threat pattern is associated with a remediation action, performing the remediation action. 5. The method of claim 1, further comprising:
responsive to determining that the correlated first set of items of threat information do not indicate any malicious action type of a set of malicious action types:
creating, by the processor, a new whitelist indicator comprising information from the correlated first set of items of threat information; and
associating, by the processor, the new whitelist indicator with a whitelist action type. 6. The method of claim 1, further comprising:
responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, creating, by the processor, a second new security indicator comprising second information from the correlated first set of items of threat information and associating the second new security indicator with the second malicious action type; and determining, by the processor, whether a second threat pattern exists based on a relationship between the second new security indicator and related security indicators in the security information sharing platform. 7. A system for providing enhanced intelligence on a security information sharing platform, the system comprising:
a physical processor that implements machine readable instructions that cause the system to: correlate a first set of items of threat information from the security information sharing platform; responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, create a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type; determine a set of related security indicators that are related to the new security indicator; and determine whether a first threat pattern exists based on the new security indicator and the set of related security indicators. 8. The system of claim 9, wherein the first threat pattern comprises a first threat pattern set of security indicators, where each security indicator of the first threat pattern type is associated with a corresponding malicious action type. 9. The system of claim 8, wherein the physical processor causes the system to determine whether the first threat pattern exists by:
determining whether each security indicator in the related set of security indicators matches a corresponding indicator in the first threat pattern set of security indicators. 10. The system of claim 7, wherein the physical processor causes the system to:
determine the set of related security indicators from the first set of correlated information. 11. The system of claim 7, wherein the physical processor causes the system to:
determine whether the first threat pattern is associated with a remediation action; responsive to determining that the first threat pattern is associated with the remediation action, perform the remediation action. 12. The system of claim 7, wherein the physical processor causes the system to:
responsive to determining that the correlated first set of items of threat information do not indicate any malicious action type of a set of malicious action types:
create a new whitelist indicator comprising information from the correlated first set of items of threat information; and
associate the new whitelist indicator with a whitelist action type. 13. The system of claim 7, wherein the physical processor causes the system to:
responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, create a second new security indicator comprising second information from the correlated first set of items of threat information and associate the second new security indicator with the second malicious action type; and determine whether a second threat pattern exists based on the second new security indicator. 14. A non-transitory machine-readable storage medium encoded with instructions executable by the physical processor for providing enhanced intelligence on a security information sharing platform, the non-transitory storage medium comprising instructions to:
correlate a first set of items of threat information from the security information sharing platform; responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, create a first new security indicator comprising information from the correlated first set of items of threat information; associate the first new security indicator with the first malicious action type; responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, create a second new security indicator comprising information from the correlated first set of items of threat information; associate the second new security indicator with the second malicious action type; and determine whether a first threat pattern exists based on the first new security indicator and the second new security indicator. 15. The non-transitory machine-readable storage medium of claim 14, wherein the first threat pattern comprises a first threat pattern set of security indicators, where each security indicator of the first threat pattern type is associated with a corresponding malicious action type. 16. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to determine whether the first threat pattern exists by:
determining a related set of security indicators, wherein the related set of security indicators comprises the first new indicator and the second new indicator; and determining whether each security indicator in the related set of security indicators matches a corresponding indicator in the first threat pattern set of security indicators. 17. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
determine whether the first threat pattern is associated with a remediation action; responsive to determining that the first threat pattern is associated with the remediation action, perform the remediation action. 18. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
responsive to determining that the correlated first set of items of threat information do not indicate any malicious action type of a set of malicious action types:
create a new whitelist indicator comprising information from the correlated first set of items of threat information; and
associate the new whitelist indicator with a whitelist action type. 19. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
correlate a second set of items of threat information from the security information sharing platform; responsive to determining that the correlated second set of items of threat information indicate the first malicious action type, create a third new security indicator comprising information from the correlated second set of items of threat information; associate the third new security indicator with the first malicious action type; determine whether the first threat pattern exists based on the third new security indicator. 20. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, create a fourth new security indicator comprising second information from the correlated first set of items of threat information and associate the fourth new security indicator with the second malicious action type; and determine whether a second threat pattern exists based on the fourth new security indicator. | Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform. Some examples may enable correlating a first set of items of threat information from the security information sharing platform. Some examples may enable, responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type. Some examples may enable determining whether a first threat pattern exists based on the new security indicator.1. A method for providing enhanced threat intelligence in a security information sharing platform, the method being performed in a computer system comprising a physical processor implementing machine readable instructions, the method comprising:
correlating, by the processor, a first set of items of threat information from the security information sharing platform; responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating, by the processor, a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type; and determining, by the processor, whether a first threat pattern exists based on the new security indicator. 2. The method of claim 1, wherein the first threat pattern comprises a first threat pattern set of security indicators, where each security indicator of the first threat pattern type is associated with a corresponding malicious action type. 3. The method of claim 2, wherein determining whether the first threat pattern exists comprises:
determining, by the processor, whether the security information sharing platform comprises a related set of security indicators, where each security indicator in the related set of security indicators matches a corresponding indicator in the first threat pattern set of security indicators. 4. The method of claim 1, further comprising:
responsive to determining that the first threat pattern is associated with a remediation action, performing the remediation action. 5. The method of claim 1, further comprising:
responsive to determining that the correlated first set of items of threat information do not indicate any malicious action type of a set of malicious action types:
creating, by the processor, a new whitelist indicator comprising information from the correlated first set of items of threat information; and
associating, by the processor, the new whitelist indicator with a whitelist action type. 6. The method of claim 1, further comprising:
responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, creating, by the processor, a second new security indicator comprising second information from the correlated first set of items of threat information and associating the second new security indicator with the second malicious action type; and determining, by the processor, whether a second threat pattern exists based on a relationship between the second new security indicator and related security indicators in the security information sharing platform. 7. A system for providing enhanced intelligence on a security information sharing platform, the system comprising:
a physical processor that implements machine readable instructions that cause the system to: correlate a first set of items of threat information from the security information sharing platform; responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, create a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type; determine a set of related security indicators that are related to the new security indicator; and determine whether a first threat pattern exists based on the new security indicator and the set of related security indicators. 8. The system of claim 9, wherein the first threat pattern comprises a first threat pattern set of security indicators, where each security indicator of the first threat pattern type is associated with a corresponding malicious action type. 9. The system of claim 8, wherein the physical processor causes the system to determine whether the first threat pattern exists by:
determining whether each security indicator in the related set of security indicators matches a corresponding indicator in the first threat pattern set of security indicators. 10. The system of claim 7, wherein the physical processor causes the system to:
determine the set of related security indicators from the first set of correlated information. 11. The system of claim 7, wherein the physical processor causes the system to:
determine whether the first threat pattern is associated with a remediation action; responsive to determining that the first threat pattern is associated with the remediation action, perform the remediation action. 12. The system of claim 7, wherein the physical processor causes the system to:
responsive to determining that the correlated first set of items of threat information do not indicate any malicious action type of a set of malicious action types:
create a new whitelist indicator comprising information from the correlated first set of items of threat information; and
associate the new whitelist indicator with a whitelist action type. 13. The system of claim 7, wherein the physical processor causes the system to:
responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, create a second new security indicator comprising second information from the correlated first set of items of threat information and associate the second new security indicator with the second malicious action type; and determine whether a second threat pattern exists based on the second new security indicator. 14. A non-transitory machine-readable storage medium encoded with instructions executable by the physical processor for providing enhanced intelligence on a security information sharing platform, the non-transitory storage medium comprising instructions to:
correlate a first set of items of threat information from the security information sharing platform; responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, create a first new security indicator comprising information from the correlated first set of items of threat information; associate the first new security indicator with the first malicious action type; responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, create a second new security indicator comprising information from the correlated first set of items of threat information; associate the second new security indicator with the second malicious action type; and determine whether a first threat pattern exists based on the first new security indicator and the second new security indicator. 15. The non-transitory machine-readable storage medium of claim 14, wherein the first threat pattern comprises a first threat pattern set of security indicators, where each security indicator of the first threat pattern type is associated with a corresponding malicious action type. 16. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to determine whether the first threat pattern exists by:
determining a related set of security indicators, wherein the related set of security indicators comprises the first new indicator and the second new indicator; and determining whether each security indicator in the related set of security indicators matches a corresponding indicator in the first threat pattern set of security indicators. 17. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
determine whether the first threat pattern is associated with a remediation action; responsive to determining that the first threat pattern is associated with the remediation action, perform the remediation action. 18. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
responsive to determining that the correlated first set of items of threat information do not indicate any malicious action type of a set of malicious action types:
create a new whitelist indicator comprising information from the correlated first set of items of threat information; and
associate the new whitelist indicator with a whitelist action type. 19. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
correlate a second set of items of threat information from the security information sharing platform; responsive to determining that the correlated second set of items of threat information indicate the first malicious action type, create a third new security indicator comprising information from the correlated second set of items of threat information; associate the third new security indicator with the first malicious action type; determine whether the first threat pattern exists based on the third new security indicator. 20. The non-transitory machine-readable storage medium of claim 14, wherein the non-transitory storage medium comprises instructions to:
responsive to determining that the correlated first set of items of threat information indicate a second malicious action type, create a fourth new security indicator comprising second information from the correlated first set of items of threat information and associate the fourth new security indicator with the second malicious action type; and determine whether a second threat pattern exists based on the fourth new security indicator. | 2,400 |
8,396 | 8,396 | 14,670,296 | 2,455 | A computational system including first and second clusters of servers, the first cluster corresponding to a first set of cluster attributes and the second cluster to a second set of cluster attributes, the first set of cluster attributes defining a common set of attributes for each member server of the first cluster and the second set of cluster attributes defining a common set of attributes for each member server of the second cluster, wherein the first and second sets of cluster attributes are different. | 1. A system, comprising:
first and second clusters of servers, the first cluster corresponding to a first set of cluster attributes and the second cluster to a second set of cluster attributes, the first set of cluster attributes defining a common set of attributes for each member server of the first cluster and the second set of cluster attributes defining a common set of attributes for each member server of the second cluster, wherein the first and second sets of cluster attributes are different. 2. The system of claim 1, wherein the system is a general purpose application platform, wherein each first and second cluster runs multiple applications, and wherein identities of applications in a first set of software applications to be run by the member servers of the first cluster and associated configurations of the members of the first set of software applications are in the first set of cluster attributes and identities of applications in a second set of software applications to be run by the member servers of the second cluster and associated configurations of the members of the second set of software applications are in the first set of cluster attributes. 3. The system of claim 1, wherein the attributes in the first and second sets of cluster attributes comprise a plurality of: cluster type and/or version, cluster server minimum version, minimum and/or maximum number of cluster servers, minimum cluster server resource specification, required software applications and/or minimum versions, optional software applications and/or minimum versions, whether the attribute is viewable on an administrator user interface, whether the attribute is editable by an administrator, whether the cluster is open for new software application inclusions or closed to new software application inclusion, data grid type and configuration, load balancer enablement and configuration, disk allocations, memory allocations, open ports, port ranges, and rate limits. 4. The system of claim 2, wherein the first and second sets of software applications comprise one or more of the following applications: enhanced caller ID services, recording services, call blocking services, call routing services, mid-call announcement services, service watchdog, access to components, serviceability agent and netSNMP service, provisioning database service, management agent service, firewall service, operating system, hypervisor service, data grid cluster manager and/or gigaspaces manager, gigaspaces container, container, custom application router, data access API service, logging AP service, eventing framework service, SIP sequenced service, SIP named service, SIP virtual endpoint service, HTTP named application, a proxy application, a Back-to-Back User Agent (B2BUA), a named application service, gateway, context store service, workflow engine, unified speech service, a WebRTC gateway, a work assignment engine, performance center service, presence service, unified agent desktop, and call event/control service. 5. The system of claim 1, wherein the first and second sets of cluster attributes are part, respectively, of first and second cluster definitions, each of the first and second cluster definitions further comprising a plurality of a cluster name, cluster type, server identifiers, and application identifiers. 6. The system of claim 5, wherein the first and second sets of cluster definitions comprise the server identifiers and application identifiers and wherein the server identifiers of the first and second sets of cluster definitions are disjoint sets. 7. The system of claim 6, wherein the application identifiers of the first and second sets of cluster definitions have at least one application identifier in common. 8. A system, comprising:
a processor; and a tangible and non-transient computer readable medium comprising: a first set of cluster attributes corresponding to a first cluster of servers and a second set of cluster attributes corresponding to a second cluster of servers, the first set of cluster attributes defining a common set of attributes for each member server of the first cluster and the second set of cluster attributes defining a common set of attributes for each member server of the second cluster, wherein the first and second sets of cluster attributes are different. 9. The system of claim 8, wherein the system is a general purpose application platform, wherein each first and second cluster runs multiple applications, and wherein identities of applications in a first set of software applications to be run by the member servers of the first cluster and associated configurations of the members of the first set of software applications are in the first set of cluster attributes and identities of applications in a second set of software applications to be run by the member servers of the second cluster and associated configurations of the members of the second set of software applications are in the first set of cluster attributes. 10. The system of claim 8, wherein the attributes in the first and second sets of cluster attributes comprise a plurality of: cluster type and/or version, cluster server minimum version, minimum and/or maximum number of cluster servers, minimum cluster server resource specification, required software applications and/or minimum versions, optional software applications and/or minimum versions, whether the attribute is viewable on an administrator user interface, whether the attribute is editable by an administrator, whether the cluster is open for new software application inclusions or closed to new software application inclusion, data grid type and configuration, load balancer enablement and configuration, disk allocations, memory allocations, open ports, port ranges, and rate limits. 11. The system of claim 10, wherein the first and second sets of software applications comprise one or more of the following applications: enhanced caller ID services, recording services, call blocking services, call routing services, mid-call announcement services, service watchdog, access to components, serviceability agent and netSNMP service, provisioning database service, management agent service, firewall service, operating system, hypervisor service, data grid cluster manager and/or gigaspaces manager, gigaspaces container, container, custom application router, data access API service, logging AP service, eventing framework service, SIP sequenced service, SIP named service, SIP virtual endpoint service, HTTP named application, a proxy application, a Back-to-Back User Agent (B2BUA), a named application service, gateway, context store service, workflow engine, unified speech service, a WebRTC gateway, a work assignment engine, performance center service, presence service, unified agent desktop, and call event/control service. 12. The system of claim 8, wherein the first and second sets of cluster attributes are part, respectively, of first and second cluster definitions, each of the first and second cluster definitions further comprising a plurality of a cluster name, cluster type, server identifiers, and application identifiers. 13. The system of claim 12, wherein the first and second sets of cluster definitions comprise the server identifiers and application identifiers and wherein the server identifiers of the first and second sets of cluster profiles are disjoint sets. 14. The system of claim 13, wherein the application identifiers of the first and second sets of cluster definitions are have at least one application identifier in common. 15. A method, comprising:
selecting a first cluster object; assigning an identifier to the first cluster object; associating the first cluster object with at least one of a cluster profile type and set of attributes; and assigning a plurality of servers to the first cluster object to form a first cluster of servers, wherein, when the first cluster profile is compared to a second cluster profile for a second cluster of servers, at least one of the following is true: (i) the attributes of the first cluster is different from the attributes of the second cluster and (ii) the servers in the first and second clusters are disjoint sets. 16. The method of claim 15, wherein (i) is true and wherein the attributes in the first and second sets of cluster attributes comprise a plurality of: cluster type and/or version, cluster server minimum version, minimum and/or maximum number of cluster servers, minimum cluster server resource specification, required software applications and/or minimum versions, optional software applications and/or minimum versions, whether the attribute is viewable on an administrator user interface, whether the attribute is editable by an administrator, whether the cluster is open for new software application inclusions or closed to new software application inclusion, data grid type and configuration, load balancer enablement and configuration, disk allocations, memory allocations, open ports, port ranges, and rate limits. 17. The method of claim 15, wherein (ii) is true and wherein, when a server is associated with the first cluster object, the server uses the first cluster attributes to configure and initialize a corresponding data grid to install one or more software applications specified in the attributes. 18. The method of claim 15, wherein, during provisioning of the servers in the first cluster, a load balancer is configured automatically to distribute traffic among all of the provisioned servers without requiring a domain name service to translate domain names to corresponding IP addresses. 19. The method of claim 15, wherein the first and second clusters are part of a general purpose application platform, wherein each first and second cluster runs multiple applications, and wherein identities of applications in a first set of software applications to be run by the member servers of the first cluster and associated configurations of the members of the first set of software applications are in the first set of cluster attributes and identities of applications in a second set of software applications to be run by the member servers of the second cluster and associated configurations of the members of the second set of software applications are in the first set of cluster attributes. 20. The method of claim 19, wherein the first and second sets of software applications comprise one or more of the following applications: enhanced caller ID services, recording services, call blocking services, call routing services, mid-call announcement services, service watchdog, access to components, serviceability agent and netSNMP service, provisioning database service, management agent service, firewall service, operating system, hypervisor service, data grid cluster manager and/or gigaspaces manager, gigaspaces container, container, custom application router, data access API service, logging AP service, eventing framework service, SIP sequenced service, SIP named service, SIP virtual endpoint service, HTTP named application, a proxy application, a Back-to-Back User Agent (B2BUA), a named application service, gateway, context store service, workflow engine, unified speech service, a WebRTC gateway, a work assignment engine, performance center service, presence service, unified agent desktop, and call event/control service. | A computational system including first and second clusters of servers, the first cluster corresponding to a first set of cluster attributes and the second cluster to a second set of cluster attributes, the first set of cluster attributes defining a common set of attributes for each member server of the first cluster and the second set of cluster attributes defining a common set of attributes for each member server of the second cluster, wherein the first and second sets of cluster attributes are different.1. A system, comprising:
first and second clusters of servers, the first cluster corresponding to a first set of cluster attributes and the second cluster to a second set of cluster attributes, the first set of cluster attributes defining a common set of attributes for each member server of the first cluster and the second set of cluster attributes defining a common set of attributes for each member server of the second cluster, wherein the first and second sets of cluster attributes are different. 2. The system of claim 1, wherein the system is a general purpose application platform, wherein each first and second cluster runs multiple applications, and wherein identities of applications in a first set of software applications to be run by the member servers of the first cluster and associated configurations of the members of the first set of software applications are in the first set of cluster attributes and identities of applications in a second set of software applications to be run by the member servers of the second cluster and associated configurations of the members of the second set of software applications are in the first set of cluster attributes. 3. The system of claim 1, wherein the attributes in the first and second sets of cluster attributes comprise a plurality of: cluster type and/or version, cluster server minimum version, minimum and/or maximum number of cluster servers, minimum cluster server resource specification, required software applications and/or minimum versions, optional software applications and/or minimum versions, whether the attribute is viewable on an administrator user interface, whether the attribute is editable by an administrator, whether the cluster is open for new software application inclusions or closed to new software application inclusion, data grid type and configuration, load balancer enablement and configuration, disk allocations, memory allocations, open ports, port ranges, and rate limits. 4. The system of claim 2, wherein the first and second sets of software applications comprise one or more of the following applications: enhanced caller ID services, recording services, call blocking services, call routing services, mid-call announcement services, service watchdog, access to components, serviceability agent and netSNMP service, provisioning database service, management agent service, firewall service, operating system, hypervisor service, data grid cluster manager and/or gigaspaces manager, gigaspaces container, container, custom application router, data access API service, logging AP service, eventing framework service, SIP sequenced service, SIP named service, SIP virtual endpoint service, HTTP named application, a proxy application, a Back-to-Back User Agent (B2BUA), a named application service, gateway, context store service, workflow engine, unified speech service, a WebRTC gateway, a work assignment engine, performance center service, presence service, unified agent desktop, and call event/control service. 5. The system of claim 1, wherein the first and second sets of cluster attributes are part, respectively, of first and second cluster definitions, each of the first and second cluster definitions further comprising a plurality of a cluster name, cluster type, server identifiers, and application identifiers. 6. The system of claim 5, wherein the first and second sets of cluster definitions comprise the server identifiers and application identifiers and wherein the server identifiers of the first and second sets of cluster definitions are disjoint sets. 7. The system of claim 6, wherein the application identifiers of the first and second sets of cluster definitions have at least one application identifier in common. 8. A system, comprising:
a processor; and a tangible and non-transient computer readable medium comprising: a first set of cluster attributes corresponding to a first cluster of servers and a second set of cluster attributes corresponding to a second cluster of servers, the first set of cluster attributes defining a common set of attributes for each member server of the first cluster and the second set of cluster attributes defining a common set of attributes for each member server of the second cluster, wherein the first and second sets of cluster attributes are different. 9. The system of claim 8, wherein the system is a general purpose application platform, wherein each first and second cluster runs multiple applications, and wherein identities of applications in a first set of software applications to be run by the member servers of the first cluster and associated configurations of the members of the first set of software applications are in the first set of cluster attributes and identities of applications in a second set of software applications to be run by the member servers of the second cluster and associated configurations of the members of the second set of software applications are in the first set of cluster attributes. 10. The system of claim 8, wherein the attributes in the first and second sets of cluster attributes comprise a plurality of: cluster type and/or version, cluster server minimum version, minimum and/or maximum number of cluster servers, minimum cluster server resource specification, required software applications and/or minimum versions, optional software applications and/or minimum versions, whether the attribute is viewable on an administrator user interface, whether the attribute is editable by an administrator, whether the cluster is open for new software application inclusions or closed to new software application inclusion, data grid type and configuration, load balancer enablement and configuration, disk allocations, memory allocations, open ports, port ranges, and rate limits. 11. The system of claim 10, wherein the first and second sets of software applications comprise one or more of the following applications: enhanced caller ID services, recording services, call blocking services, call routing services, mid-call announcement services, service watchdog, access to components, serviceability agent and netSNMP service, provisioning database service, management agent service, firewall service, operating system, hypervisor service, data grid cluster manager and/or gigaspaces manager, gigaspaces container, container, custom application router, data access API service, logging AP service, eventing framework service, SIP sequenced service, SIP named service, SIP virtual endpoint service, HTTP named application, a proxy application, a Back-to-Back User Agent (B2BUA), a named application service, gateway, context store service, workflow engine, unified speech service, a WebRTC gateway, a work assignment engine, performance center service, presence service, unified agent desktop, and call event/control service. 12. The system of claim 8, wherein the first and second sets of cluster attributes are part, respectively, of first and second cluster definitions, each of the first and second cluster definitions further comprising a plurality of a cluster name, cluster type, server identifiers, and application identifiers. 13. The system of claim 12, wherein the first and second sets of cluster definitions comprise the server identifiers and application identifiers and wherein the server identifiers of the first and second sets of cluster profiles are disjoint sets. 14. The system of claim 13, wherein the application identifiers of the first and second sets of cluster definitions are have at least one application identifier in common. 15. A method, comprising:
selecting a first cluster object; assigning an identifier to the first cluster object; associating the first cluster object with at least one of a cluster profile type and set of attributes; and assigning a plurality of servers to the first cluster object to form a first cluster of servers, wherein, when the first cluster profile is compared to a second cluster profile for a second cluster of servers, at least one of the following is true: (i) the attributes of the first cluster is different from the attributes of the second cluster and (ii) the servers in the first and second clusters are disjoint sets. 16. The method of claim 15, wherein (i) is true and wherein the attributes in the first and second sets of cluster attributes comprise a plurality of: cluster type and/or version, cluster server minimum version, minimum and/or maximum number of cluster servers, minimum cluster server resource specification, required software applications and/or minimum versions, optional software applications and/or minimum versions, whether the attribute is viewable on an administrator user interface, whether the attribute is editable by an administrator, whether the cluster is open for new software application inclusions or closed to new software application inclusion, data grid type and configuration, load balancer enablement and configuration, disk allocations, memory allocations, open ports, port ranges, and rate limits. 17. The method of claim 15, wherein (ii) is true and wherein, when a server is associated with the first cluster object, the server uses the first cluster attributes to configure and initialize a corresponding data grid to install one or more software applications specified in the attributes. 18. The method of claim 15, wherein, during provisioning of the servers in the first cluster, a load balancer is configured automatically to distribute traffic among all of the provisioned servers without requiring a domain name service to translate domain names to corresponding IP addresses. 19. The method of claim 15, wherein the first and second clusters are part of a general purpose application platform, wherein each first and second cluster runs multiple applications, and wherein identities of applications in a first set of software applications to be run by the member servers of the first cluster and associated configurations of the members of the first set of software applications are in the first set of cluster attributes and identities of applications in a second set of software applications to be run by the member servers of the second cluster and associated configurations of the members of the second set of software applications are in the first set of cluster attributes. 20. The method of claim 19, wherein the first and second sets of software applications comprise one or more of the following applications: enhanced caller ID services, recording services, call blocking services, call routing services, mid-call announcement services, service watchdog, access to components, serviceability agent and netSNMP service, provisioning database service, management agent service, firewall service, operating system, hypervisor service, data grid cluster manager and/or gigaspaces manager, gigaspaces container, container, custom application router, data access API service, logging AP service, eventing framework service, SIP sequenced service, SIP named service, SIP virtual endpoint service, HTTP named application, a proxy application, a Back-to-Back User Agent (B2BUA), a named application service, gateway, context store service, workflow engine, unified speech service, a WebRTC gateway, a work assignment engine, performance center service, presence service, unified agent desktop, and call event/control service. | 2,400 |
8,397 | 8,397 | 15,286,304 | 2,464 | Various communication systems may benefit from carrier aggregation. For example, carrier aggregation may benefit from improved resource allocation. A method, in certain embodiments, includes allocate resources in a subframe so as to avoid at least one of a first resource or a last resource in the subframe. The subframe does not comprise a sounding reference signal. The method also includes sending a message comprising the resource allocation of the subframe to a user equipment. | 1. An apparatus, comprising:
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: allocate resources in a subframe so as to avoid at least one of a first resource or a last resource in the subframe, wherein the subframe does not comprise a sounding reference signal; and send a message comprising the resource allocation of the subframe to a user equipment. 2. The apparatus according to claim 1, wherein the allocated resources are included in a format 3physical uplink control channel 3. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to determine at an access node a performance impact of avoiding a use of at least one of the first resource or the last resource in the subframe. 4. The apparatus according to claim 1, wherein the allocating of resources is avoided in at least one of the first resource or the last resource when a number of the user equipment per subframe multiplexed in a control channel is not reduced. 5. The apparatus according to claim 1, wherein the allocated resources do not comprise at least one of the first resource or the last resource even when the sounding reference signal is not sent in the subframe. 6. The apparatus according to claim 1, wherein the access node is serving a primary cell. 7. The apparatus according to claim 1, wherein the apparatus comprises an access node, a base station, an evolved Node B, or a server. 8. A method, comprising:
allocating resources in a subframe so as to avoid the use of at least one of a first resource or a last resource in the subframe, wherein the subframe does not comprise a sounding reference signal; and causing a transmission of a message comprising the resource allocation of the subframe to a user equipment. 9. The method according to claim 8, wherein the allocated resources are included in a format 3 physical uplink control channel 10. The method according to claim 8, further comprising determining at an access node a performance impact of avoiding a use of at least one of the first or the last resource in the subframe. 11. The method according to claim 8, wherein the allocating of resources is avoided in at least one of the first resource or the last resource when a number of the user equipment per subframe multiplexed in a control channel is not reduced. 12. The method according to claim 8, wherein the allocated resources do not comprise at least one of the first resource or the last resource even when the sounding reference signal is not sent in the subframe. 13. The method according to claim 8, wherein the access node is serving a primary cell. 14. An apparatus, comprising:
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive at a user equipment allocated uplink resources from an access node; and cause a transmission of a subframe that does not comprise a sounding reference signal from the user equipment to the access node using the allocated uplink resources, wherein the allocated resources do not comprise at least one of a first resource or a last resource in the subframe. 15. The apparatus according to claim 14, wherein the allocated resources are included in a format 3 physical uplink control channel 16. The apparatus according to claim 14, wherein a use of at least one of the first resource or the last resource is avoided when a performance impact of the avoidance is not negative. 17. The apparatus according to claim 16, wherein the performance impact is not negative when a number of the user equipment per the subframe is not reduced, wherein the subframe comprises a control channel 18. The apparatus according to claim 14, wherein the apparatus comprises a user equipment. | Various communication systems may benefit from carrier aggregation. For example, carrier aggregation may benefit from improved resource allocation. A method, in certain embodiments, includes allocate resources in a subframe so as to avoid at least one of a first resource or a last resource in the subframe. The subframe does not comprise a sounding reference signal. The method also includes sending a message comprising the resource allocation of the subframe to a user equipment.1. An apparatus, comprising:
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: allocate resources in a subframe so as to avoid at least one of a first resource or a last resource in the subframe, wherein the subframe does not comprise a sounding reference signal; and send a message comprising the resource allocation of the subframe to a user equipment. 2. The apparatus according to claim 1, wherein the allocated resources are included in a format 3physical uplink control channel 3. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to determine at an access node a performance impact of avoiding a use of at least one of the first resource or the last resource in the subframe. 4. The apparatus according to claim 1, wherein the allocating of resources is avoided in at least one of the first resource or the last resource when a number of the user equipment per subframe multiplexed in a control channel is not reduced. 5. The apparatus according to claim 1, wherein the allocated resources do not comprise at least one of the first resource or the last resource even when the sounding reference signal is not sent in the subframe. 6. The apparatus according to claim 1, wherein the access node is serving a primary cell. 7. The apparatus according to claim 1, wherein the apparatus comprises an access node, a base station, an evolved Node B, or a server. 8. A method, comprising:
allocating resources in a subframe so as to avoid the use of at least one of a first resource or a last resource in the subframe, wherein the subframe does not comprise a sounding reference signal; and causing a transmission of a message comprising the resource allocation of the subframe to a user equipment. 9. The method according to claim 8, wherein the allocated resources are included in a format 3 physical uplink control channel 10. The method according to claim 8, further comprising determining at an access node a performance impact of avoiding a use of at least one of the first or the last resource in the subframe. 11. The method according to claim 8, wherein the allocating of resources is avoided in at least one of the first resource or the last resource when a number of the user equipment per subframe multiplexed in a control channel is not reduced. 12. The method according to claim 8, wherein the allocated resources do not comprise at least one of the first resource or the last resource even when the sounding reference signal is not sent in the subframe. 13. The method according to claim 8, wherein the access node is serving a primary cell. 14. An apparatus, comprising:
at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive at a user equipment allocated uplink resources from an access node; and cause a transmission of a subframe that does not comprise a sounding reference signal from the user equipment to the access node using the allocated uplink resources, wherein the allocated resources do not comprise at least one of a first resource or a last resource in the subframe. 15. The apparatus according to claim 14, wherein the allocated resources are included in a format 3 physical uplink control channel 16. The apparatus according to claim 14, wherein a use of at least one of the first resource or the last resource is avoided when a performance impact of the avoidance is not negative. 17. The apparatus according to claim 16, wherein the performance impact is not negative when a number of the user equipment per the subframe is not reduced, wherein the subframe comprises a control channel 18. The apparatus according to claim 14, wherein the apparatus comprises a user equipment. | 2,400 |
8,398 | 8,398 | 15,138,102 | 2,444 | The current document is directed to methods and systems for frequency-domain analysis of operational and performance metric values and other data generated and collected within computer systems, including large distributed computer systems and virtualized data centers. In one implementation, each set of time-ordered values for each metric in a set of metrics is partitioned into time intervals, transformed from the time domain to the frequency domain, and aligned to generate a metric surface in a frequency-time-amplitude space. The metric surfaces are then pairwise compared to identify related metrics. Transfer functions are generated for transforming metric surfaces into one another. The comparison values and transfer functions are used to produce graphs that encapsulate discovered relationships between metrics. | 1. An automated subsystem of a computer system, the automated subsystem comprising:
one or more processors; one or more memories; one or more mass-storage devices; and computer instructions stored in one or more of the one or more memories that, when retrieved from memory and executed by one or more of the one or more processors, control the automated subsystem to
identify time-ordered metric-value data stored within the computer system,
partition a total time spanning the earliest-in-time metric value to the latest-in-time metric value into multiple time intervals,
for each time interval, transform the metric-value data associated with times within the time interval from the time domain to the frequency domain to generate corresponding frequency-domain data for the time interval,
assemble the frequency-domain data for the multiple time intervals into a metric surface within a frequency-amplitude-time space, and
store, in one or more of the one or more memories and mass-storage devices, a representation of the metric surface in association with an indication of a metric with respect to which the time-ordered metric-value data was generated. 2. The automated subsystem of claim 1 wherein the time-ordered metric-value data is a set of representations of time/metric-value data points that represent sampled values of the metric selected from among a performance metric, an operational-characteristic metric, and an operational-behavior metric for the computer system over a time period of length equal to the total time. 3. The automated subsystem of claim 2 wherein the metric is related to the performance, operational characteristics, or operational behavior of one of:
the computer system;
a single component or subcomponent of the computer system; and
an aggregation of multiple components and/or subcomponents of the computer system. 4. The automated subsystem of claim 2 wherein the metric is related to values computed from one or more sets of time-ordered metric values related to the performance, operational characteristics, or operational behavior of one of:
the computer system;
a single component or subcomponent of the computer system; and
an aggregation of multiple components and/or subcomponents of the computer system. 5. The automated subsystem of claim 2 wherein the computer system is one of:
a personal computer;
a server;
a workstation;
a multi-computer-system data center;
a distributed computer system;
a virtual data center;
a geographically distributed computer system; and
and aggregation of geographically distributed data centers. 6. The automated subsystem of claim 1 wherein the metric-value data associated with times within the time intervals are transformed from the time domain to the frequency domain by application of a discrete Fourier transform. 7. The automated subsystem of claim 1 wherein the metric surface within the frequency-amplitude-time space is a discrete set of points or a continuous surface generated from a discrete set of points; wherein the frequency-amplitude-time space is defined by frequency, time, and amplitude axes; wherein the frequency-domain data for each of the multiple time intervals are arranged as amplitude-time slices at successive positions along the time coordinate axis, the amplitude-frequency data points for each amplitude-time slice representing a cross-section of the metric surface; and wherein the amplitude axis represents amplitude or squared amplitude values. 8. An automated subsystem of a computer system, the automated subsystem comprising:
one or more processors; one or more memories; one or more mass-storage devices; and computer instructions stored in one or more of the one or more memories that, when retrieved from memory and executed by one or more of the one or more processors, control the automated subsystem to
identify two metric surfaces stored within the computer system;
compare the two metric surfaces to generate a comparison-metric value and at least one transfer function that, when applied to a first metric surface of the two metric surfaces, transforms the first metric surface into the other of the two metric surfaces; and
store a representation of the metric surface in association with an indication of the metric in one or more of the one or more memories and mass-storage devices. 9. The automated subsystem of claim 8 wherein the metric surface within the frequency-amplitude-time space is a discrete set of points or a continuous surface generated from a discrete set of points; wherein the frequency-amplitude-time space is defined by frequency, time, and amplitude axes; wherein the frequency-domain data for each of the multiple time intervals are arranged as amplitude-time slices at successive positions along the time coordinate axis, the amplitude-frequency data points for each amplitude-time slice representing a cross-section of the metric surface; and wherein the amplitude axis represents amplitude or squared amplitude values. 10. The automated subsystem of claim 9 wherein two metric surfaces are compared to generate a comparison-metric value by:
aligning the two metric surfaces in space by applying one or more operations to one or both of the metric surfaces; and
computing the comparison metric from the aligned metric surfaces. 11. The automated subsystem of claim 10 wherein the operations applied to one or both of the metric surfaces are selected from among:
a translation operation that translates a metric surface in a direction of the frequency axis;
a translation operation that translates a metric surface in a direction of the time axis;
a translation operation that translates a metric surface in a direction of the amplitude axis;
a resealing operation that rescales a metric surface, and the frequency-time-amplitude space that includes it, with respect to the frequency axis;
a resealing operation that rescales a metric surface, and the frequency-time-amplitude space that includes it, with respect to the time axis;
a resealing operation that rescales a metric surface, and the frequency-time-amplitude space that includes it, with respect to the amplitude axis;
a rotation operation that rotates a metric surface with respect to the frequency axis;
a rotation operation that rotates a metric surface with respect to the time axis;
a rotation operation that rotates a metric surface with respect to the amplitude axis; and
trimming and cutting operations. 12. The automated subsystem of claim 10 wherein each metric surface is generated from time-ordered metric-value data by
partitioning a total time spanning the earliest-in-time metric value to the latest-in-time metric value into multiple time intervals;
for each time interval, transforming the metric-value data associated with times within the time interval from the time domain to the frequency domain to generate corresponding frequency-domain data for the time interval,
assembling the frequency-domain data for the multiple time intervals into a metric surface within a frequency-amplitude-time space, and
storing, in one or more of the one or more memories and mass-storage devices, a representation of the metric surface in association with an indication of a metric with respect to which the time-ordered metric-value data was generated. 13. The automated subsystem of claim 10 wherein computing the comparison metric from the aligned metric surfaces further comprises:
identifying features within each of the aligned metric surfaces;
identifying one or more pairs of related features, a first member of each pair occurring within a first metric surface of the aligned metric surfaces and a second member of each pair occurring within a second metric surface of the aligned metric surfaces;
computing differences between the features of one or more of the one or more pairs of related features; and
generating the comparison metric to be inversely proportional to the computed differences. 14. The automated subsystem of claim 13 wherein the features are selected from among peaks and valleys of the metric surfaces. 15. The automated subsystem of claim 10 wherein computing the comparison metric from the aligned metric surfaces further comprises:
determining the volume lying between the two aligned metric surfaces; and
generating the comparison metric to be inversely proportional to the determined volume. 16. The automated subsystem of claim 10 wherein the at least one transfer function is generated from the operations applied to one or both of the two aligned metric surfaces to align the two metric surfaces in space. 17. The automated subsystem of claim 9 further comprising: 18. The automated subsystem of claim 8 further including using comparison metrics and transfer functions generated from multiple sets of time-ordered metric-value data collected for multiple components of the computer system to construct a component graph in which nodes represent the components and each edge is labeled with one or both transfer functions for the metric surfaces associated with the two components represented by the two nodes connected by the edge. 19. The automated subsystem of claim 18 further including combining multiple component graphs into a composite component graph. 20. Computer instructions stored in a physical data-storage device within a computer system having one or more processors, one or more memories, and one or more mass-storage devices that, when retrieved from the physical data-storage device and executed by one or more of the one or more processors, control the computer system to
identify time-ordered metric-value data stored within the computer system, partition a total time spanning the earliest-in-time metric value to the latest-in-time metric value into multiple time intervals, for each time interval, transform the metric-value data associated with times within the time interval from the time domain to the frequency domain to generate corresponding frequency-domain data for the time interval, assemble the frequency-domain data for the multiple time intervals into a metric surface within a frequency-amplitude-time space, and store, in one or more of the one or more memories and mass-storage devices, a representation of the metric surface in association with an indication of a metric with respect to which the time-ordered metric-value data was generated. | The current document is directed to methods and systems for frequency-domain analysis of operational and performance metric values and other data generated and collected within computer systems, including large distributed computer systems and virtualized data centers. In one implementation, each set of time-ordered values for each metric in a set of metrics is partitioned into time intervals, transformed from the time domain to the frequency domain, and aligned to generate a metric surface in a frequency-time-amplitude space. The metric surfaces are then pairwise compared to identify related metrics. Transfer functions are generated for transforming metric surfaces into one another. The comparison values and transfer functions are used to produce graphs that encapsulate discovered relationships between metrics.1. An automated subsystem of a computer system, the automated subsystem comprising:
one or more processors; one or more memories; one or more mass-storage devices; and computer instructions stored in one or more of the one or more memories that, when retrieved from memory and executed by one or more of the one or more processors, control the automated subsystem to
identify time-ordered metric-value data stored within the computer system,
partition a total time spanning the earliest-in-time metric value to the latest-in-time metric value into multiple time intervals,
for each time interval, transform the metric-value data associated with times within the time interval from the time domain to the frequency domain to generate corresponding frequency-domain data for the time interval,
assemble the frequency-domain data for the multiple time intervals into a metric surface within a frequency-amplitude-time space, and
store, in one or more of the one or more memories and mass-storage devices, a representation of the metric surface in association with an indication of a metric with respect to which the time-ordered metric-value data was generated. 2. The automated subsystem of claim 1 wherein the time-ordered metric-value data is a set of representations of time/metric-value data points that represent sampled values of the metric selected from among a performance metric, an operational-characteristic metric, and an operational-behavior metric for the computer system over a time period of length equal to the total time. 3. The automated subsystem of claim 2 wherein the metric is related to the performance, operational characteristics, or operational behavior of one of:
the computer system;
a single component or subcomponent of the computer system; and
an aggregation of multiple components and/or subcomponents of the computer system. 4. The automated subsystem of claim 2 wherein the metric is related to values computed from one or more sets of time-ordered metric values related to the performance, operational characteristics, or operational behavior of one of:
the computer system;
a single component or subcomponent of the computer system; and
an aggregation of multiple components and/or subcomponents of the computer system. 5. The automated subsystem of claim 2 wherein the computer system is one of:
a personal computer;
a server;
a workstation;
a multi-computer-system data center;
a distributed computer system;
a virtual data center;
a geographically distributed computer system; and
and aggregation of geographically distributed data centers. 6. The automated subsystem of claim 1 wherein the metric-value data associated with times within the time intervals are transformed from the time domain to the frequency domain by application of a discrete Fourier transform. 7. The automated subsystem of claim 1 wherein the metric surface within the frequency-amplitude-time space is a discrete set of points or a continuous surface generated from a discrete set of points; wherein the frequency-amplitude-time space is defined by frequency, time, and amplitude axes; wherein the frequency-domain data for each of the multiple time intervals are arranged as amplitude-time slices at successive positions along the time coordinate axis, the amplitude-frequency data points for each amplitude-time slice representing a cross-section of the metric surface; and wherein the amplitude axis represents amplitude or squared amplitude values. 8. An automated subsystem of a computer system, the automated subsystem comprising:
one or more processors; one or more memories; one or more mass-storage devices; and computer instructions stored in one or more of the one or more memories that, when retrieved from memory and executed by one or more of the one or more processors, control the automated subsystem to
identify two metric surfaces stored within the computer system;
compare the two metric surfaces to generate a comparison-metric value and at least one transfer function that, when applied to a first metric surface of the two metric surfaces, transforms the first metric surface into the other of the two metric surfaces; and
store a representation of the metric surface in association with an indication of the metric in one or more of the one or more memories and mass-storage devices. 9. The automated subsystem of claim 8 wherein the metric surface within the frequency-amplitude-time space is a discrete set of points or a continuous surface generated from a discrete set of points; wherein the frequency-amplitude-time space is defined by frequency, time, and amplitude axes; wherein the frequency-domain data for each of the multiple time intervals are arranged as amplitude-time slices at successive positions along the time coordinate axis, the amplitude-frequency data points for each amplitude-time slice representing a cross-section of the metric surface; and wherein the amplitude axis represents amplitude or squared amplitude values. 10. The automated subsystem of claim 9 wherein two metric surfaces are compared to generate a comparison-metric value by:
aligning the two metric surfaces in space by applying one or more operations to one or both of the metric surfaces; and
computing the comparison metric from the aligned metric surfaces. 11. The automated subsystem of claim 10 wherein the operations applied to one or both of the metric surfaces are selected from among:
a translation operation that translates a metric surface in a direction of the frequency axis;
a translation operation that translates a metric surface in a direction of the time axis;
a translation operation that translates a metric surface in a direction of the amplitude axis;
a resealing operation that rescales a metric surface, and the frequency-time-amplitude space that includes it, with respect to the frequency axis;
a resealing operation that rescales a metric surface, and the frequency-time-amplitude space that includes it, with respect to the time axis;
a resealing operation that rescales a metric surface, and the frequency-time-amplitude space that includes it, with respect to the amplitude axis;
a rotation operation that rotates a metric surface with respect to the frequency axis;
a rotation operation that rotates a metric surface with respect to the time axis;
a rotation operation that rotates a metric surface with respect to the amplitude axis; and
trimming and cutting operations. 12. The automated subsystem of claim 10 wherein each metric surface is generated from time-ordered metric-value data by
partitioning a total time spanning the earliest-in-time metric value to the latest-in-time metric value into multiple time intervals;
for each time interval, transforming the metric-value data associated with times within the time interval from the time domain to the frequency domain to generate corresponding frequency-domain data for the time interval,
assembling the frequency-domain data for the multiple time intervals into a metric surface within a frequency-amplitude-time space, and
storing, in one or more of the one or more memories and mass-storage devices, a representation of the metric surface in association with an indication of a metric with respect to which the time-ordered metric-value data was generated. 13. The automated subsystem of claim 10 wherein computing the comparison metric from the aligned metric surfaces further comprises:
identifying features within each of the aligned metric surfaces;
identifying one or more pairs of related features, a first member of each pair occurring within a first metric surface of the aligned metric surfaces and a second member of each pair occurring within a second metric surface of the aligned metric surfaces;
computing differences between the features of one or more of the one or more pairs of related features; and
generating the comparison metric to be inversely proportional to the computed differences. 14. The automated subsystem of claim 13 wherein the features are selected from among peaks and valleys of the metric surfaces. 15. The automated subsystem of claim 10 wherein computing the comparison metric from the aligned metric surfaces further comprises:
determining the volume lying between the two aligned metric surfaces; and
generating the comparison metric to be inversely proportional to the determined volume. 16. The automated subsystem of claim 10 wherein the at least one transfer function is generated from the operations applied to one or both of the two aligned metric surfaces to align the two metric surfaces in space. 17. The automated subsystem of claim 9 further comprising: 18. The automated subsystem of claim 8 further including using comparison metrics and transfer functions generated from multiple sets of time-ordered metric-value data collected for multiple components of the computer system to construct a component graph in which nodes represent the components and each edge is labeled with one or both transfer functions for the metric surfaces associated with the two components represented by the two nodes connected by the edge. 19. The automated subsystem of claim 18 further including combining multiple component graphs into a composite component graph. 20. Computer instructions stored in a physical data-storage device within a computer system having one or more processors, one or more memories, and one or more mass-storage devices that, when retrieved from the physical data-storage device and executed by one or more of the one or more processors, control the computer system to
identify time-ordered metric-value data stored within the computer system, partition a total time spanning the earliest-in-time metric value to the latest-in-time metric value into multiple time intervals, for each time interval, transform the metric-value data associated with times within the time interval from the time domain to the frequency domain to generate corresponding frequency-domain data for the time interval, assemble the frequency-domain data for the multiple time intervals into a metric surface within a frequency-amplitude-time space, and store, in one or more of the one or more memories and mass-storage devices, a representation of the metric surface in association with an indication of a metric with respect to which the time-ordered metric-value data was generated. | 2,400 |
8,399 | 8,399 | 14,596,461 | 2,437 | A business action fraud detection system for a website includes a business action classifier to classify a series of operations from a single web session as a business action. The system also includes a fraud detection processor to determine a score for each operation from the statistical comparison of the data of each request forming part of the operation against statistical models generated from data received in a training phase and the score combining probabilities that the transmission and navigation activity of a session are those expected of a normal user. | 1. A business action fraud detection system for a website, the system comprising:
a business action classifier to classify a series of operations from a single web session as a business action; and a fraud detection processor to determine a score for each operation from the statistical comparison of the data of each request forming part of the operation against statistical models generated from data received in at least one of a training phase and a production phase, said score combining probabilities that the transmission and navigation activity of a session are those expected of a normal user. 2. The fraud detection system of claim 1 wherein said processor comprises a query analyzer to analyze at least one of: textual, numerical, enumeration and URL values within parameters sent in an incoming website request. 3. The fraud detection system of claim 1 wherein said processor comprises analyzers to analyze at least one of: geo-location of an HTTP session, trajectory to a webpage of an HTTP session and landing speed parameters to said web page of an HTTP session. 4. The fraud detection system of claim 1 wherein said processor comprises an operation classifier to determine which operation was requested in an HTTP request. 5. The fraud detection system of claim 1 and also comprising at least one statistical model storing the statistics of operation determined during at least one of a training phase and a production phase of said system. 6. The fraud detection system of claim 5 and wherein said at least one statistical model is at least one statistical model per the population of users and at least one statistical model per user. 7. The fraud detection system of claim 5 and wherein said statistical models include at least an operations model, a trajectory model, a geolocation model, a query model per operation and a business action model. 8. The fraud detection system of claim 1 and also comprising a rule editor to enable an administrator to define at least one rule that combines both statistical and deterministic criteria in order to trigger an alert in said system. 9. The fraud detection system of claim 8 and wherein each said rule is at least one of the following types of rules: behavioral rule, geographic rule, pattern rule, parameter rule and cloud intelligence rule. 10. A method for detecting business action fraud on a website, the method comprising:
classifying a series of operations from a single web session as a business action; and determining a score for each operation from a statistical comparison of the data of each request forming part of the operation against statistical models generated from data received in a training phase, said score combining probabilities that the transmission and navigation activity of a session are those expected of a normal user. 11. The method of claim 10 wherein said determining comprises analyzing at least one of: textual, numerical, enumeration and URL values within parameters in an incoming website request. 12. The method of claim 10 wherein said determining comprises analyzing at least one of: geo-location of an HTTP session, trajectory to a webpage of an HTTP session and landing speed parameters to said web page of an HTTP session. 13. The method of claim 10 wherein said determining comprises classifying which operation was requested in an HTTP request. 14. The method of claim 10 and also comprising at least one statistical model storing the statistics of operation determined during a training phase of said system. 15. The method of claim 14 and wherein said at least one statistical model is at least one statistical model per the population of users and at least one statistical model per user. 16. The method of claim 14 and wherein said statistical models include at least an operations model, a trajectory model, a geolocation model, a query model per operation and a business action model. 17. The method of claim 10 and also comprising a rule editor to enable an administrator to define at least one rule that combines both statistical and deterministic criteria in order to trigger an alert in said system. 18. The method of claim 17 and wherein each said rule is at least one of the following types of rules: behavioral rule, geographic rule, pattern rule, parameter rule and cloud intelligence rule. | A business action fraud detection system for a website includes a business action classifier to classify a series of operations from a single web session as a business action. The system also includes a fraud detection processor to determine a score for each operation from the statistical comparison of the data of each request forming part of the operation against statistical models generated from data received in a training phase and the score combining probabilities that the transmission and navigation activity of a session are those expected of a normal user.1. A business action fraud detection system for a website, the system comprising:
a business action classifier to classify a series of operations from a single web session as a business action; and a fraud detection processor to determine a score for each operation from the statistical comparison of the data of each request forming part of the operation against statistical models generated from data received in at least one of a training phase and a production phase, said score combining probabilities that the transmission and navigation activity of a session are those expected of a normal user. 2. The fraud detection system of claim 1 wherein said processor comprises a query analyzer to analyze at least one of: textual, numerical, enumeration and URL values within parameters sent in an incoming website request. 3. The fraud detection system of claim 1 wherein said processor comprises analyzers to analyze at least one of: geo-location of an HTTP session, trajectory to a webpage of an HTTP session and landing speed parameters to said web page of an HTTP session. 4. The fraud detection system of claim 1 wherein said processor comprises an operation classifier to determine which operation was requested in an HTTP request. 5. The fraud detection system of claim 1 and also comprising at least one statistical model storing the statistics of operation determined during at least one of a training phase and a production phase of said system. 6. The fraud detection system of claim 5 and wherein said at least one statistical model is at least one statistical model per the population of users and at least one statistical model per user. 7. The fraud detection system of claim 5 and wherein said statistical models include at least an operations model, a trajectory model, a geolocation model, a query model per operation and a business action model. 8. The fraud detection system of claim 1 and also comprising a rule editor to enable an administrator to define at least one rule that combines both statistical and deterministic criteria in order to trigger an alert in said system. 9. The fraud detection system of claim 8 and wherein each said rule is at least one of the following types of rules: behavioral rule, geographic rule, pattern rule, parameter rule and cloud intelligence rule. 10. A method for detecting business action fraud on a website, the method comprising:
classifying a series of operations from a single web session as a business action; and determining a score for each operation from a statistical comparison of the data of each request forming part of the operation against statistical models generated from data received in a training phase, said score combining probabilities that the transmission and navigation activity of a session are those expected of a normal user. 11. The method of claim 10 wherein said determining comprises analyzing at least one of: textual, numerical, enumeration and URL values within parameters in an incoming website request. 12. The method of claim 10 wherein said determining comprises analyzing at least one of: geo-location of an HTTP session, trajectory to a webpage of an HTTP session and landing speed parameters to said web page of an HTTP session. 13. The method of claim 10 wherein said determining comprises classifying which operation was requested in an HTTP request. 14. The method of claim 10 and also comprising at least one statistical model storing the statistics of operation determined during a training phase of said system. 15. The method of claim 14 and wherein said at least one statistical model is at least one statistical model per the population of users and at least one statistical model per user. 16. The method of claim 14 and wherein said statistical models include at least an operations model, a trajectory model, a geolocation model, a query model per operation and a business action model. 17. The method of claim 10 and also comprising a rule editor to enable an administrator to define at least one rule that combines both statistical and deterministic criteria in order to trigger an alert in said system. 18. The method of claim 17 and wherein each said rule is at least one of the following types of rules: behavioral rule, geographic rule, pattern rule, parameter rule and cloud intelligence rule. | 2,400 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.