Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
8,500
8,500
14,818,495
2,435
A computing device detects that another computing device has connected to a network. The computing device determines whether the other computing device is valid and whether the computing device is being utilized for one or more suspicious activities. Based on determining that the other computing device is being utilized for one or more suspicious activities, the computing device determines a location of the other computing device, determines whether a user associated with the other computing device can be identified, and based on determining that the user associated with the other computing device cannot be identified, disables the other computing device, and transmits an alert to security personnel.
1. A method for administering security for a network, comprising the steps of: detecting, by one or more processors, that a computing device has connected to a network; determining, by one or more processors, whether the computing device is valid, wherein determining whether the computing device is valid further comprises comparing a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities: determining, by one or more processors, a location of the computing device; determining, by one or more processors, whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, disabling the computing device and transmitting an alert to security personnel. 2. The method of claim 1, further comprising: based on determining that the computing device is not valid, determining, by one or more processors, a location of the computing device and transmitting an alert to security personnel. 3. The method of claim 1, further comprising: based on determining that the user associated with the computing device can be identified, transmitting an alert to security personnel. 4. The method of claim 1, wherein the step of determining, by one or more processors, a location of the computing device further comprises determining one or more access points of the network accessed by the computing device and utilizing triangulation techniques. 5. The method of claim 1, wherein the step of determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities further comprises determining whether an amount of confidential documents accessed by the computing device exceeds a threshold value. 6. The method of claim 1, wherein the step of determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities further comprises: comparing one or more resources accessed in a first time period to one or more resources accessed in a previous time period; determining a similarity factor based on comparing one or more resources accessed in a first time period to one or more resources accessed in a previous time period; and determining whether the similarity factor exceeds a threshold value. 7. The method of claim 1, wherein the computing device contains a network protocol enabled that allows for the computing device to be disabled by way of the network. 8. A computer program product for administering security for a network, the computer program product comprising: one or more computer-readable storage devices and program instructions stored on at least one of the one or more computer-readable storage devices, the program instructions comprising: program instructions to detect that a computing device has connected to a network; program instructions to determine whether the computing device is valid, wherein determining whether the computing device is valid further comprises program instructions to compare a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, program instructions to determine whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities: program instructions to determine a location of the computing device; program instructions to determine whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, program instructions to disable the computing device and transmit an alert to security personnel. 9. The computer program product of claim 8, further comprising: based on determining that the computing device is not valid, program instructions to determine a location of the computing device and transmitting an alert to security personnel. 10. The computer program product of claim 8, further comprising: based on determining that the user associated with the computing device can be identified, program instructions to transmit an alert to security personnel. 11. The computer program product of claim 8, wherein the program instructions to determine a location of the computing device further comprises program instructions to determine one or more access points of the network accessed by the computing device and utilize triangulation techniques. 12. The computer program product of claim 8, wherein the program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises program instructions to determine whether an amount of confidential documents accessed by the computing device exceeds a threshold value. 13. The computer program product of claim 8, wherein program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises: program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; program instructions to determine a similarity factor based on the program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; and program instructions to determine whether the similarity factor exceeds a threshold value. 14. The computer program product of claim 8, wherein the computing device contains a network protocol enabled that allows for the computing device to be disabled by way of the network. 15. A computer system administering security for a network, the computer system comprising: one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising: program instructions to detect that a computing device has connected to a network; program instructions to determine whether the computing device is valid, wherein determining whether the computing device is valid further comprises program instructions to compare a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, program instructions to determine whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities: program instructions to determine a location of the computing device; program instructions to determine whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, program instructions to disable the computing device and transmit an alert to security personnel. 16. The computer system of claim 15, further comprising: based on determining that the computing device is not valid, program instructions to determine a location of the computing device and transmitting an alert to security personnel. 17. The computer system of claim 15, further comprising: based on determining that the user associated with the computing device can be identified, program instructions to transmit an alert to security personnel. 18. The computer system of claim 15, wherein the program instructions to determine a location of the computing device further comprises program instructions to determine one or more access points of the network accessed by the computing device and utilize triangulation techniques. 19. The computer system of claim 15, wherein the program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises program instructions to determine whether an amount of confidential documents accessed by the computing device exceeds a threshold value. 20. The computer system of claim 15, wherein program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises: program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; program instructions to determine a similarity factor based on the program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; and program instructions to determine whether the similarity factor exceeds a threshold value.
A computing device detects that another computing device has connected to a network. The computing device determines whether the other computing device is valid and whether the computing device is being utilized for one or more suspicious activities. Based on determining that the other computing device is being utilized for one or more suspicious activities, the computing device determines a location of the other computing device, determines whether a user associated with the other computing device can be identified, and based on determining that the user associated with the other computing device cannot be identified, disables the other computing device, and transmits an alert to security personnel.1. A method for administering security for a network, comprising the steps of: detecting, by one or more processors, that a computing device has connected to a network; determining, by one or more processors, whether the computing device is valid, wherein determining whether the computing device is valid further comprises comparing a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities: determining, by one or more processors, a location of the computing device; determining, by one or more processors, whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, disabling the computing device and transmitting an alert to security personnel. 2. The method of claim 1, further comprising: based on determining that the computing device is not valid, determining, by one or more processors, a location of the computing device and transmitting an alert to security personnel. 3. The method of claim 1, further comprising: based on determining that the user associated with the computing device can be identified, transmitting an alert to security personnel. 4. The method of claim 1, wherein the step of determining, by one or more processors, a location of the computing device further comprises determining one or more access points of the network accessed by the computing device and utilizing triangulation techniques. 5. The method of claim 1, wherein the step of determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities further comprises determining whether an amount of confidential documents accessed by the computing device exceeds a threshold value. 6. The method of claim 1, wherein the step of determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities further comprises: comparing one or more resources accessed in a first time period to one or more resources accessed in a previous time period; determining a similarity factor based on comparing one or more resources accessed in a first time period to one or more resources accessed in a previous time period; and determining whether the similarity factor exceeds a threshold value. 7. The method of claim 1, wherein the computing device contains a network protocol enabled that allows for the computing device to be disabled by way of the network. 8. A computer program product for administering security for a network, the computer program product comprising: one or more computer-readable storage devices and program instructions stored on at least one of the one or more computer-readable storage devices, the program instructions comprising: program instructions to detect that a computing device has connected to a network; program instructions to determine whether the computing device is valid, wherein determining whether the computing device is valid further comprises program instructions to compare a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, program instructions to determine whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities: program instructions to determine a location of the computing device; program instructions to determine whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, program instructions to disable the computing device and transmit an alert to security personnel. 9. The computer program product of claim 8, further comprising: based on determining that the computing device is not valid, program instructions to determine a location of the computing device and transmitting an alert to security personnel. 10. The computer program product of claim 8, further comprising: based on determining that the user associated with the computing device can be identified, program instructions to transmit an alert to security personnel. 11. The computer program product of claim 8, wherein the program instructions to determine a location of the computing device further comprises program instructions to determine one or more access points of the network accessed by the computing device and utilize triangulation techniques. 12. The computer program product of claim 8, wherein the program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises program instructions to determine whether an amount of confidential documents accessed by the computing device exceeds a threshold value. 13. The computer program product of claim 8, wherein program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises: program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; program instructions to determine a similarity factor based on the program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; and program instructions to determine whether the similarity factor exceeds a threshold value. 14. The computer program product of claim 8, wherein the computing device contains a network protocol enabled that allows for the computing device to be disabled by way of the network. 15. A computer system administering security for a network, the computer system comprising: one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising: program instructions to detect that a computing device has connected to a network; program instructions to determine whether the computing device is valid, wherein determining whether the computing device is valid further comprises program instructions to compare a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, program instructions to determine whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities: program instructions to determine a location of the computing device; program instructions to determine whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, program instructions to disable the computing device and transmit an alert to security personnel. 16. The computer system of claim 15, further comprising: based on determining that the computing device is not valid, program instructions to determine a location of the computing device and transmitting an alert to security personnel. 17. The computer system of claim 15, further comprising: based on determining that the user associated with the computing device can be identified, program instructions to transmit an alert to security personnel. 18. The computer system of claim 15, wherein the program instructions to determine a location of the computing device further comprises program instructions to determine one or more access points of the network accessed by the computing device and utilize triangulation techniques. 19. The computer system of claim 15, wherein the program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises program instructions to determine whether an amount of confidential documents accessed by the computing device exceeds a threshold value. 20. The computer system of claim 15, wherein program instructions to determine whether the computing device is being utilized for one or more suspicious activities further comprises: program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; program instructions to determine a similarity factor based on the program instructions to compare one or more resources accessed in a first time period to one or more resources accessed in a previous time period; and program instructions to determine whether the similarity factor exceeds a threshold value.
2,400
8,501
8,501
13,758,544
2,483
Video coding schemes may include one or more filters to reduce coding artifacts and improve video quality. These filters may be applied to decode video data in a predetermined sequence. The output from one or more of these filters may be selected for different images, blocks, or sets of video data and then copied and/or routed to a display or a buffer storing reference data that is used to decode other video data in a data stream. Providing the ability to select which filter output is used for display and as a reference may result in better video quality for multiple types of video data. The filters that are selected for display and for reference may be different and may vary for different images, blocks, and data sets.
1. A computer-implemented method comprising: identifying a sequence of n filters applied to decoded video data for predicting a subsequent picture in a video coding scheme; selecting, for each of a plurality of sets of video data to be encoded according to the video coding scheme using a processing device, a number m of sequential filters in the identified sequence to be applied to the respective set of video data during decoding before outputting the respective decoded video data to a display, where m≦n and m varies for different sets of video data; and encoding the filter selection for each of the video data sets in metadata transmitted with the encoded video data to a decoder. 2. The computer-implemented method of claim 1, wherein the metadata is coded to instruct the decoder to redirect the decoded video data to the display after the decoded video data is processed by the mth filter specified in the metadata. 3. The computer-implemented method of claim 1, further comprising: identifying, for at least one of the video data sets, an additional number of k sequential filters separate from the identified sequence of n filters that is applied to the at least one video data set during decoding after the selected m sequential filters and before outputting the respective decoded video data to the display; and encoding the filter selection of the k sequential filters for the at least one video data set in metadata transmitted with the encoded video data to the decoder. 4. The computer-implemented method of claim 3, wherein the additional number of k sequential filters are selected from a set of filters that is only applied to video data outputted for display and is not applied for predicting subsequent pictures. 5. The computer-implemented method of claim 3, further comprising instructing the decoder not to apply any others filters except for the identified sequence of n filters for prediction and the identified sequence of m and then k filters for output to the display. 6. A computer-implemented method comprising: identifying a sequence of n filters applied to decoded video data for predicting a subsequent picture in a video coding scheme; receiving metadata and video data encoded according to the video coding scheme from a transmitter; identifying from the metadata a number m of sequential filters in the identified sequence that is to be applied to a set of the transmitted video data during decoding before outputting the respective decoded video data to a display, where m≦n and m varies for different sets of video data; applying, using a processing device, the n filters in the identified sequence to the set of video data; and routing to the display the set of video data outputted by the mth filter specified in the metadata. 7. The computer-implemented method of claim 6, further comprising: identifying, for at least one of the video data sets from the metadata, an additional number of k sequential filters separate from the identified sequence of n filters that is applied to the at least one video data set during decoding after the selected m sequential filters and before outputting the respective decoded video data to the display; and applying the k filters in the identified sequence to the at least one set of video data outputted by the mth filter and routed to the display before displaying the at least one set of video data. 8. The computer-implemented method of claim 7, wherein the at least one set of video data outputted by at least one of the mth filter and the kth filter is routed to a display buffer which buffers the video data for the display before the displaying the at least one set of video data and the video data outputted by the nth filter is routed to a reference buffer which buffers the video data for predicting subsequent pictures. 9. The computer-implemented method of claim 8, wherein the reference buffer and the display buffer are two distinct buffers. 10. The computer-implemented method of claim 8, wherein the reference buffer and the display buffer are part of a single buffer. 11. The computer-implemented method of claim 10, further comprising storing the outputted video data from the nth filter and the outputted video data from at least one of the mth filter the kth filter in the single buffer. 12. The computer-implemented method of claim 10, further comprising: linking respective video data stored in the single buffer to either reference data for prediction or display data for display; and retrieving the respective data for prediction and for display from the single buffer through the linking. 13. The computer-implemented method of claim 7, wherein k≧0. 14. The computer-implemented method of claim 8, further comprising, when the identified last filter for the displayed video data is positioned later in the identified filter sequence than the identified last filter for the reference buffered video data: routing a copy of the decoded video data outputted by the identified last filter for the reference buffered video data to the buffer; continue processing the decoded video data outputted by the identified last filter for the reference buffered video data through any remaining filters in the identified filter sequence until the identified last filter for the displayed video data; and outputting the decoded video data filtered by the identified last filter for the displayed video data to the display. 15. The computer-implemented method of claim 6, further comprising: storing video data outputted by the nth filter as reference data; and discarding the reference data after the reference data is no longer needed to predict subsequent pictures. 16. The computer-implemented method of claim 6, further comprising: adding corner edge filtering corresponding to corner points in blocks, macroblocks, or coding units of an image to at least one of the filters; excluding the corner points subject to the corner edge filtering from horizontal and vertical filtering to remove a dependency between the vertical and the horizontal filtering in at least one of the filters; and applying each of the vertical, the horizontal, and the corner edge filtering to the image. 17. The computer-implemented method of claim 16, further comprising examining motion and mode characteristics of at least four neighboring blocks when applying the corner edge filtering to the image. 18. The computer-implemented method of claim 16, further comprising applying the corner edge filtering differently when the corner edge filtering corresponds to a single pixel instead of impacting at least one additional pixel in a horizontal or vertical direction that is associated with neither the vertical nor the horizontal filtering. 19. A computer-implemented method comprising: identifying a sequence of filters applied to decoded video data in a video coding scheme; selecting, for each of a plurality of sets of video data to be encoded according to the video coding scheme using a processing device, a filter in the identified sequence having an output that is optimized for use as a reference during subsequent decoding based on a type of video data to be encoded, the selected filter varying for different sets of video data; and encoding the selected filter for each of the video data sets in metadata transmitted with the encoded video data to a decoder. 20. The computer-implemented method of claim 19, wherein the metadata is coded to instruct the decoder to redirect the output from the at least one selected filter to a buffer during decoding that stores reference video data used to decode subsequent data. 21. A computer-implemented method comprising: identifying a sequence of filters applied to decoded video data in a video coding scheme; receiving metadata and video data encoded according to the video coding scheme from a transmitter; identifying from the metadata a filter in the identified sequence having an output that is used as reference for decoding subsequent video data in a stream, the filter varying for different sets of transmitted video data using a processing device; saving the output from the identified filter for each respective set of transmitted video data in a buffer storing reference data used during decoding; and decoding the subsequent video data based on the saved output stored as reference data in the buffer. 22. An image processor comprising: a plurality of filters arranged in a predetermined sequence; a decision unit for identifying a filter in the predetermined sequence having an output used as a reference for coding subsequent video data in a stream, the identified filter varying for different sets of video data in the stream; and a processing device for encoding the video data in the stream and encoding the identifying filter as metadata transmitted with the encoded video data. 23. The image processor of claim 22, wherein the decision unit further identifies a filter in the predetermined sequence having an output to be routed to a display and the processing device encodes the identified filter having the output to be routed to the display as metadata transmitted with the encoded video data. 24. The image processor of claim 22, wherein the decision unit identifies the filter in the sequence based on a user supplied filter selection input. 25. The image processor of claim 22, wherein the decision unit identifies the filter in the sequence based on data included in the stream. 26. An image processor comprising: a plurality of filters arranged in a predetermined sequence; a decision unit for identifying a filter in the predetermined sequence having an output used as a reference for decoding subsequent video data in an encoded video stream from metadata included in the encoded video stream, the identified filter varying for different sets of video data in the stream; a reference buffer for storing reference data; a processing device for routing the output from the identified filter in the sequence to the reference buffer; and a decoder for decoding the subsequent video data based on the reference data stored in the reference buffer. 27. The image processor of claim 26, wherein the decision unit further identifies a filter in the predetermined sequence having an output to be routed to a display from the metadata and the processing device routes the respective filter output to the display. 28. The image processor of claim 26, further comprising a display buffer for storing the output routed to the display as part of the routing. 29. The image processor of claim 28, wherein the reference buffer and the display buffer are part of a single buffer. 30. The image processor of claim 28, wherein the reference buffer and the display buffer are separate buffers.
Video coding schemes may include one or more filters to reduce coding artifacts and improve video quality. These filters may be applied to decode video data in a predetermined sequence. The output from one or more of these filters may be selected for different images, blocks, or sets of video data and then copied and/or routed to a display or a buffer storing reference data that is used to decode other video data in a data stream. Providing the ability to select which filter output is used for display and as a reference may result in better video quality for multiple types of video data. The filters that are selected for display and for reference may be different and may vary for different images, blocks, and data sets.1. A computer-implemented method comprising: identifying a sequence of n filters applied to decoded video data for predicting a subsequent picture in a video coding scheme; selecting, for each of a plurality of sets of video data to be encoded according to the video coding scheme using a processing device, a number m of sequential filters in the identified sequence to be applied to the respective set of video data during decoding before outputting the respective decoded video data to a display, where m≦n and m varies for different sets of video data; and encoding the filter selection for each of the video data sets in metadata transmitted with the encoded video data to a decoder. 2. The computer-implemented method of claim 1, wherein the metadata is coded to instruct the decoder to redirect the decoded video data to the display after the decoded video data is processed by the mth filter specified in the metadata. 3. The computer-implemented method of claim 1, further comprising: identifying, for at least one of the video data sets, an additional number of k sequential filters separate from the identified sequence of n filters that is applied to the at least one video data set during decoding after the selected m sequential filters and before outputting the respective decoded video data to the display; and encoding the filter selection of the k sequential filters for the at least one video data set in metadata transmitted with the encoded video data to the decoder. 4. The computer-implemented method of claim 3, wherein the additional number of k sequential filters are selected from a set of filters that is only applied to video data outputted for display and is not applied for predicting subsequent pictures. 5. The computer-implemented method of claim 3, further comprising instructing the decoder not to apply any others filters except for the identified sequence of n filters for prediction and the identified sequence of m and then k filters for output to the display. 6. A computer-implemented method comprising: identifying a sequence of n filters applied to decoded video data for predicting a subsequent picture in a video coding scheme; receiving metadata and video data encoded according to the video coding scheme from a transmitter; identifying from the metadata a number m of sequential filters in the identified sequence that is to be applied to a set of the transmitted video data during decoding before outputting the respective decoded video data to a display, where m≦n and m varies for different sets of video data; applying, using a processing device, the n filters in the identified sequence to the set of video data; and routing to the display the set of video data outputted by the mth filter specified in the metadata. 7. The computer-implemented method of claim 6, further comprising: identifying, for at least one of the video data sets from the metadata, an additional number of k sequential filters separate from the identified sequence of n filters that is applied to the at least one video data set during decoding after the selected m sequential filters and before outputting the respective decoded video data to the display; and applying the k filters in the identified sequence to the at least one set of video data outputted by the mth filter and routed to the display before displaying the at least one set of video data. 8. The computer-implemented method of claim 7, wherein the at least one set of video data outputted by at least one of the mth filter and the kth filter is routed to a display buffer which buffers the video data for the display before the displaying the at least one set of video data and the video data outputted by the nth filter is routed to a reference buffer which buffers the video data for predicting subsequent pictures. 9. The computer-implemented method of claim 8, wherein the reference buffer and the display buffer are two distinct buffers. 10. The computer-implemented method of claim 8, wherein the reference buffer and the display buffer are part of a single buffer. 11. The computer-implemented method of claim 10, further comprising storing the outputted video data from the nth filter and the outputted video data from at least one of the mth filter the kth filter in the single buffer. 12. The computer-implemented method of claim 10, further comprising: linking respective video data stored in the single buffer to either reference data for prediction or display data for display; and retrieving the respective data for prediction and for display from the single buffer through the linking. 13. The computer-implemented method of claim 7, wherein k≧0. 14. The computer-implemented method of claim 8, further comprising, when the identified last filter for the displayed video data is positioned later in the identified filter sequence than the identified last filter for the reference buffered video data: routing a copy of the decoded video data outputted by the identified last filter for the reference buffered video data to the buffer; continue processing the decoded video data outputted by the identified last filter for the reference buffered video data through any remaining filters in the identified filter sequence until the identified last filter for the displayed video data; and outputting the decoded video data filtered by the identified last filter for the displayed video data to the display. 15. The computer-implemented method of claim 6, further comprising: storing video data outputted by the nth filter as reference data; and discarding the reference data after the reference data is no longer needed to predict subsequent pictures. 16. The computer-implemented method of claim 6, further comprising: adding corner edge filtering corresponding to corner points in blocks, macroblocks, or coding units of an image to at least one of the filters; excluding the corner points subject to the corner edge filtering from horizontal and vertical filtering to remove a dependency between the vertical and the horizontal filtering in at least one of the filters; and applying each of the vertical, the horizontal, and the corner edge filtering to the image. 17. The computer-implemented method of claim 16, further comprising examining motion and mode characteristics of at least four neighboring blocks when applying the corner edge filtering to the image. 18. The computer-implemented method of claim 16, further comprising applying the corner edge filtering differently when the corner edge filtering corresponds to a single pixel instead of impacting at least one additional pixel in a horizontal or vertical direction that is associated with neither the vertical nor the horizontal filtering. 19. A computer-implemented method comprising: identifying a sequence of filters applied to decoded video data in a video coding scheme; selecting, for each of a plurality of sets of video data to be encoded according to the video coding scheme using a processing device, a filter in the identified sequence having an output that is optimized for use as a reference during subsequent decoding based on a type of video data to be encoded, the selected filter varying for different sets of video data; and encoding the selected filter for each of the video data sets in metadata transmitted with the encoded video data to a decoder. 20. The computer-implemented method of claim 19, wherein the metadata is coded to instruct the decoder to redirect the output from the at least one selected filter to a buffer during decoding that stores reference video data used to decode subsequent data. 21. A computer-implemented method comprising: identifying a sequence of filters applied to decoded video data in a video coding scheme; receiving metadata and video data encoded according to the video coding scheme from a transmitter; identifying from the metadata a filter in the identified sequence having an output that is used as reference for decoding subsequent video data in a stream, the filter varying for different sets of transmitted video data using a processing device; saving the output from the identified filter for each respective set of transmitted video data in a buffer storing reference data used during decoding; and decoding the subsequent video data based on the saved output stored as reference data in the buffer. 22. An image processor comprising: a plurality of filters arranged in a predetermined sequence; a decision unit for identifying a filter in the predetermined sequence having an output used as a reference for coding subsequent video data in a stream, the identified filter varying for different sets of video data in the stream; and a processing device for encoding the video data in the stream and encoding the identifying filter as metadata transmitted with the encoded video data. 23. The image processor of claim 22, wherein the decision unit further identifies a filter in the predetermined sequence having an output to be routed to a display and the processing device encodes the identified filter having the output to be routed to the display as metadata transmitted with the encoded video data. 24. The image processor of claim 22, wherein the decision unit identifies the filter in the sequence based on a user supplied filter selection input. 25. The image processor of claim 22, wherein the decision unit identifies the filter in the sequence based on data included in the stream. 26. An image processor comprising: a plurality of filters arranged in a predetermined sequence; a decision unit for identifying a filter in the predetermined sequence having an output used as a reference for decoding subsequent video data in an encoded video stream from metadata included in the encoded video stream, the identified filter varying for different sets of video data in the stream; a reference buffer for storing reference data; a processing device for routing the output from the identified filter in the sequence to the reference buffer; and a decoder for decoding the subsequent video data based on the reference data stored in the reference buffer. 27. The image processor of claim 26, wherein the decision unit further identifies a filter in the predetermined sequence having an output to be routed to a display from the metadata and the processing device routes the respective filter output to the display. 28. The image processor of claim 26, further comprising a display buffer for storing the output routed to the display as part of the routing. 29. The image processor of claim 28, wherein the reference buffer and the display buffer are part of a single buffer. 30. The image processor of claim 28, wherein the reference buffer and the display buffer are separate buffers.
2,400
8,502
8,502
15,421,426
2,442
Methods, systems and computer program products for load balancing using Mobile Internet Protocol (IP) Version 6 are provided. A request for a connection is received from a client at a routing stack. A Mobile IP Version 6 Binding Update message is transmitted from the routing stack to the client responsive to the received request. The Binding Update message identifies a selected target stack so as to allow the client to communicate directly with the target stack bypassing the routing stack.
1.-50: (canceled) 51. A load balancing system using Mobile Internet Protocol (IP) Version 6, comprising: an Internet Protocol (IP) workload balancing system comprising a Sysplex Distributor including a computer processor and a memory communicatively coupled to the processor, the memory including a routing stack, wherein the routing stack of the Sysplex Distributor is configured to: receive, from a client, a request for a Transmission Control Protocol (“TCP”) connection; and transmit a Mobile IP Version 6 Binding Update message to the client responsive to the received request, wherein the Binding Update message identifies a selected target stack, and the target stack is communicated with directly by the client utilizing the Binding Update message thereby bypassing the routing stack. 52. The load balancing system of claim 51, wherein the Binding Update message comprises: a home address of the connection as an internet protocol address associated with the routing stack and a care-of address of the connection as an IP address associated with the target stack so as to allow the client to create a binding cache entry that maps the IP address associated with the routing stack to the IP address associated with the target stack. 53. The load balancing system of claim 52, wherein the IP address associated with the routing stack comprises a virtual IP address (VIPA). 54. The system of claim 1, wherein the routing stack is further configured to: transmit a Mobile IP Version 6 Home Test Init message to the client, the Home Test Init message including a request that the client return a Mobile IP Version 6 Home Test message to the routing stack; receive the Home Test message at the routing stack from the client responsive to the transmitted Home Test Init message; and transmit a Mobile IP Version 6 Care-of Test Init message to the client for the target stack, a source IP address of the Care-of Test Init message being set to an IP address of the target stack. 55. (canceled) 56. (canceled) 57. (canceled) 58. (canceled) 59. The load balancing system of claim 52, wherein the client is further configured to: create the binding cache entry that maps the home address to the care-of address so as to allow direct communication between the client and the target stack; and transmit a binding acknowledgment directly to the target stack bypassing the routing stack. 60. (canceled) 61. The load balancing system of claim 51, wherein the routing stack is further configured to receive mobile IP version 6 messages from the target stack so as to allow the routing stack to maintain a routing table associated with the routing stack that is substantially similar to a routing table associated with the target stack. 62. The load balancing system of claim 53, wherein the Binding Update message comprises a first Binding Update message, wherein the routing stack is further configured to: detect a problem with the target stack; delete the binding cache entry at the client responsive to the detected problem; and transmit a second Binding Update message to the client, the second Binding Update message indicating that the care-of address and the home address should both be set to the VIPA so as to allow direct communication between the client and the routing stack. 63. (canceled) 64. A computer program product comprising a computer readable storage memory device storing therein computer readable program code for load balancing using Mobile Internet Protocol (IP) Version 6, the computer readable program code, which when executed by a computer hardware system, causes the computer hardware system to: receive, from a client, a request for a Transmission Control Protocol (“TCP”) connection at a routing stack within a Sysplex Distributor of an Internet Protocol (IP) workload balancing system; and transmit, from the routing stack of the Sysplex Distributor, a Mobile IP Version 6 Binding Update message to the client responsive to the received request, the Binding Update message identifying a selected target stack so as to allow the client to communicate directly with the target stack bypassing the routing stack of the Sysplex Distributor. 65. The computer program product of claim 64, wherein the Binding Update message comprises a home address of the connection as an internet protocol address associated with the routing stack and a care-of address of the connection as an IP address associated with the target stack so as to allow the client to create a binding cache entry that maps the IP address associated with the routing stack to the IP address associated with the target stack. 66. The computer program product of claim 65, wherein the IP address associated with the routing stack comprises a virtual IP address (VIPA). 67. The computer program product of claim 64, wherein the computer readable program code further causes the computer hardware system to: transmit, from the routing stack, the request for the connection to the selected target stack; receive, at the routing stack, notification from the target stack that the connection request has been accepted by the target stack; and update a routing table at the routing stack. 68. The computer program product of claim 67, wherein the routing table at the routing stack is updated to indicate that the target stack has accepted the connection request responsive to the received notification. 69. The computer program product of claim 67, wherein the computer readable program code further causes the computer hardware system to: transmit, from the routing stack, a Mobile IP Version 6 Home Test Init message to the client, the Home Test Init message including a request that the client return a Mobile IP Version 6 Home Test message to the routing stack; receive the Home Test message at the routing stack from the client responsive to the transmitted Home Test Init message; and transmit, from the routing stack or the target stack, a Mobile IP Version 6 Care-of Test Init message to the client for the target stack, a source IP address of the Care-of Test Init message being set to an IP address of the target stack. 70. (canceled) 71. (canceled) 72. (canceled) 73. (canceled) 74. The computer program product of claim 65, wherein the computer readable program code further causes the computer hardware system to: create, at the client, the binding cache entry that maps the home address to the care-of address so as to allow direct communication between the client and the target stack; and transmit, from the client, a binding acknowledgment directly to the target stack bypassing the routing stack. 75. The computer program product of claim 74, wherein the computer readable program code further causes the computer hardware system to: receive, at the routing stack, a copy of the binding acknowledgment from the target stack; update a routing table associated with the routing stack to include state information; and transmit a binding information request to the target stack including the state information so as to allow the target stack to update a routing table associated with the target stack. 76. The computer program product of claim 64, wherein the computer readable program code further causes the computer hardware system to receive, at the routing stack, mobile IP version 6 messages from the target stack so as to allow the routing stack to maintain a routing table associated with the routing stack that is substantially similar to a routing table associated with the target stack. 77. The computer program product of claim 64, wherein the computer readable program code further causes the computer hardware system to transmit, from the client, a binding refresh request to the target stack, the binding refresh request including a request to send another Binding Update message from the target stack. 78. The computer program product of claim 66, wherein the Binding Update message comprises a first Binding Update message, and the computer readable program code further causes the computer hardware system to: detect, at the routing stack, a problem with the target stack; delete the binding cache entry at the client responsive to the detected problem; and transmit, from the routing stack, a second Binding Update message to the client, the second Binding Update message indicating that the care-of address and the home address should both be set to the VIPA so as to allow direct communication between the client and the routing stack.
Methods, systems and computer program products for load balancing using Mobile Internet Protocol (IP) Version 6 are provided. A request for a connection is received from a client at a routing stack. A Mobile IP Version 6 Binding Update message is transmitted from the routing stack to the client responsive to the received request. The Binding Update message identifies a selected target stack so as to allow the client to communicate directly with the target stack bypassing the routing stack.1.-50: (canceled) 51. A load balancing system using Mobile Internet Protocol (IP) Version 6, comprising: an Internet Protocol (IP) workload balancing system comprising a Sysplex Distributor including a computer processor and a memory communicatively coupled to the processor, the memory including a routing stack, wherein the routing stack of the Sysplex Distributor is configured to: receive, from a client, a request for a Transmission Control Protocol (“TCP”) connection; and transmit a Mobile IP Version 6 Binding Update message to the client responsive to the received request, wherein the Binding Update message identifies a selected target stack, and the target stack is communicated with directly by the client utilizing the Binding Update message thereby bypassing the routing stack. 52. The load balancing system of claim 51, wherein the Binding Update message comprises: a home address of the connection as an internet protocol address associated with the routing stack and a care-of address of the connection as an IP address associated with the target stack so as to allow the client to create a binding cache entry that maps the IP address associated with the routing stack to the IP address associated with the target stack. 53. The load balancing system of claim 52, wherein the IP address associated with the routing stack comprises a virtual IP address (VIPA). 54. The system of claim 1, wherein the routing stack is further configured to: transmit a Mobile IP Version 6 Home Test Init message to the client, the Home Test Init message including a request that the client return a Mobile IP Version 6 Home Test message to the routing stack; receive the Home Test message at the routing stack from the client responsive to the transmitted Home Test Init message; and transmit a Mobile IP Version 6 Care-of Test Init message to the client for the target stack, a source IP address of the Care-of Test Init message being set to an IP address of the target stack. 55. (canceled) 56. (canceled) 57. (canceled) 58. (canceled) 59. The load balancing system of claim 52, wherein the client is further configured to: create the binding cache entry that maps the home address to the care-of address so as to allow direct communication between the client and the target stack; and transmit a binding acknowledgment directly to the target stack bypassing the routing stack. 60. (canceled) 61. The load balancing system of claim 51, wherein the routing stack is further configured to receive mobile IP version 6 messages from the target stack so as to allow the routing stack to maintain a routing table associated with the routing stack that is substantially similar to a routing table associated with the target stack. 62. The load balancing system of claim 53, wherein the Binding Update message comprises a first Binding Update message, wherein the routing stack is further configured to: detect a problem with the target stack; delete the binding cache entry at the client responsive to the detected problem; and transmit a second Binding Update message to the client, the second Binding Update message indicating that the care-of address and the home address should both be set to the VIPA so as to allow direct communication between the client and the routing stack. 63. (canceled) 64. A computer program product comprising a computer readable storage memory device storing therein computer readable program code for load balancing using Mobile Internet Protocol (IP) Version 6, the computer readable program code, which when executed by a computer hardware system, causes the computer hardware system to: receive, from a client, a request for a Transmission Control Protocol (“TCP”) connection at a routing stack within a Sysplex Distributor of an Internet Protocol (IP) workload balancing system; and transmit, from the routing stack of the Sysplex Distributor, a Mobile IP Version 6 Binding Update message to the client responsive to the received request, the Binding Update message identifying a selected target stack so as to allow the client to communicate directly with the target stack bypassing the routing stack of the Sysplex Distributor. 65. The computer program product of claim 64, wherein the Binding Update message comprises a home address of the connection as an internet protocol address associated with the routing stack and a care-of address of the connection as an IP address associated with the target stack so as to allow the client to create a binding cache entry that maps the IP address associated with the routing stack to the IP address associated with the target stack. 66. The computer program product of claim 65, wherein the IP address associated with the routing stack comprises a virtual IP address (VIPA). 67. The computer program product of claim 64, wherein the computer readable program code further causes the computer hardware system to: transmit, from the routing stack, the request for the connection to the selected target stack; receive, at the routing stack, notification from the target stack that the connection request has been accepted by the target stack; and update a routing table at the routing stack. 68. The computer program product of claim 67, wherein the routing table at the routing stack is updated to indicate that the target stack has accepted the connection request responsive to the received notification. 69. The computer program product of claim 67, wherein the computer readable program code further causes the computer hardware system to: transmit, from the routing stack, a Mobile IP Version 6 Home Test Init message to the client, the Home Test Init message including a request that the client return a Mobile IP Version 6 Home Test message to the routing stack; receive the Home Test message at the routing stack from the client responsive to the transmitted Home Test Init message; and transmit, from the routing stack or the target stack, a Mobile IP Version 6 Care-of Test Init message to the client for the target stack, a source IP address of the Care-of Test Init message being set to an IP address of the target stack. 70. (canceled) 71. (canceled) 72. (canceled) 73. (canceled) 74. The computer program product of claim 65, wherein the computer readable program code further causes the computer hardware system to: create, at the client, the binding cache entry that maps the home address to the care-of address so as to allow direct communication between the client and the target stack; and transmit, from the client, a binding acknowledgment directly to the target stack bypassing the routing stack. 75. The computer program product of claim 74, wherein the computer readable program code further causes the computer hardware system to: receive, at the routing stack, a copy of the binding acknowledgment from the target stack; update a routing table associated with the routing stack to include state information; and transmit a binding information request to the target stack including the state information so as to allow the target stack to update a routing table associated with the target stack. 76. The computer program product of claim 64, wherein the computer readable program code further causes the computer hardware system to receive, at the routing stack, mobile IP version 6 messages from the target stack so as to allow the routing stack to maintain a routing table associated with the routing stack that is substantially similar to a routing table associated with the target stack. 77. The computer program product of claim 64, wherein the computer readable program code further causes the computer hardware system to transmit, from the client, a binding refresh request to the target stack, the binding refresh request including a request to send another Binding Update message from the target stack. 78. The computer program product of claim 66, wherein the Binding Update message comprises a first Binding Update message, and the computer readable program code further causes the computer hardware system to: detect, at the routing stack, a problem with the target stack; delete the binding cache entry at the client responsive to the detected problem; and transmit, from the routing stack, a second Binding Update message to the client, the second Binding Update message indicating that the care-of address and the home address should both be set to the VIPA so as to allow direct communication between the client and the routing stack.
2,400
8,503
8,503
15,900,928
2,492
Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use of the content without authorization. For example, the service provider can distribute encrypted content for recording by a subscriber at a remote location. At or around a time of recording the encrypted content, and on behalf of the user, the service provider initiates storage of the corresponding decryption information that is needed to decrypt the recorded encrypted content. In order to play back the recorded segments of the encrypted content, the subscriber communicates with a server resource to be authenticated. Subsequent to being authenticated, the server resource distributes a copy of decryption information needed to decrypt the previously recorded segments of encrypted content to the subscriber. Accordingly, the service provider retains control of playing back content via controlled distribution of the corresponding copy of decryption information.
1. A method comprising: utilizing first content access information to retrieve segments of encrypted content associated with a request and copies of original decryption keys to decrypt the segments of encrypted content; storing the segments of encrypted content for later retrieval; and producing second content access information to provide a mapping between the stored segments of encrypted content and the stored copies of original decryption keys. 2. The method as in claim 1 further comprising: utilizing the first content access information to retrieve the copies of original decryption keys; and storing the copies of original decryption keys. 3. The method as in claim 2, wherein the first content access information provides a mapping between the retrieved segments of encrypted content and the retrieved copies of original decryption keys. 4. The method as in claim 1 further comprising: distributing the second content access information to the subscriber. 5. The method as in claim 1, wherein the request specifies particular content to record on behalf of the subscriber, the method further comprising: retrieving the first content access information in response to receiving selection of the particular content for recording; and producing the second content access information to facilitate subsequent playback of the particular content by the subscriber. 6. The method as in claim 5, wherein the segments of encrypted content become no longer available from a resource as specified by the first content access information subsequent to storing the segments of encrypted content for later retrieval. 7. The method as in claim 5, wherein the original decryption keys become no longer available from a resource as specified by the first content access information subsequent to storing the original decryption keys for later retrieval. 8. The method as in claim 1, wherein the segments of encrypted content are available to the subscriber from a service provider; and wherein the service provider requires authorization of the subscriber prior to providing corresponding access to the copies of original decryption keys. 9. The method as in claim 1, wherein the subscriber: i) retrieves the segments of encrypted content through gateway hardware operated by a service provider to which the subscriber subscribes, and ii) stores the retrieved segments of encrypted content in a first repository for later retrieval; and wherein a server resource operated by the service provider stores the copies of original decryption keys in a second repository accessible to the subscriber through the gateway hardware. 10. The method as in claim 9, wherein the service provider requires authorization of the subscriber prior to distribution of the stored copies of original decryption keys from the second repository through the gateway hardware to the subscriber. 11. A system comprising: a server resource from which to distribute content; gateway hardware to provide a subscriber access to the server resource; and computer processor hardware operable to: utilize first content access information to retrieve segments of encrypted content associated with a request for content; store the segments of encrypted content for later retrieval; and produce second content access information to provide a mapping between the stored segments of encrypted content and copies of original decryption keys to decrypt the stored segments of encrypted content. 12. The system as in claim 11, wherein the computer processor hardware is further operable to utilize the first content access information to retrieve the copies of original decryption keys. 13. The system as in claim 12, wherein the first content access information provides a mapping between the retrieved segments of encrypted content and the copies of original decryption keys. 14. The system as in claim 11 wherein the computer processor hardware is further operable to distribute the second content access information to the subscriber to retrieve the copies of original decryption keys. 15. The system as in claim 11, wherein the request specifies particular content to record on behalf of the subscriber; and wherein the computer processor hardware is further operable to: retrieve the first content access information in response to receiving selection of the particular content for recording; and produce the second content access information to facilitate subsequent playback of the particular content by the subscriber. 16. The system as in claim 15, wherein the segments of encrypted content become no longer available from a resource as specified by the first content access information subsequent to storing the segments of encrypted content for later retrieval. 17. The system as in claim 16, wherein the original decryption keys become no longer available from a resource as specified by the first content access information subsequent to storing the original decryption keys for later retrieval. 18. The system as in claim 11, wherein the segments of encrypted content are available to the subscriber from a service provider; and wherein the service provider requires authorization of the subscriber prior to the service provider providing access to the encrypted segments of content to access the copies of the original decryption keys. 19. The system as in claim 11, wherein the subscriber i) retrieves the segments of encrypted content through gateway hardware operated by a service provider to which the subscriber subscribes and ii) stores the retrieved segments of encrypted content in a first repository for later retrieval; and wherein the server resource operated by the service provider stores the copies of original decryption keys in a second repository, the second repository accessible to the subscriber through the gateway hardware. 20. The system as in claim 19, wherein the service provider requires authorization of the subscriber prior to distribution of the stored copies of original decryption keys from the second repository through the gateway hardware to the subscriber. 21. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, cause the computer processor hardware to: utilize first content access information to retrieve segments of encrypted content associated with a request and copies of original decryption keys; store the segments of encrypted content for later retrieval; and produce second content access information to provide a mapping between the stored segments of encrypted content and the copies of original decryption keys.
Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use of the content without authorization. For example, the service provider can distribute encrypted content for recording by a subscriber at a remote location. At or around a time of recording the encrypted content, and on behalf of the user, the service provider initiates storage of the corresponding decryption information that is needed to decrypt the recorded encrypted content. In order to play back the recorded segments of the encrypted content, the subscriber communicates with a server resource to be authenticated. Subsequent to being authenticated, the server resource distributes a copy of decryption information needed to decrypt the previously recorded segments of encrypted content to the subscriber. Accordingly, the service provider retains control of playing back content via controlled distribution of the corresponding copy of decryption information.1. A method comprising: utilizing first content access information to retrieve segments of encrypted content associated with a request and copies of original decryption keys to decrypt the segments of encrypted content; storing the segments of encrypted content for later retrieval; and producing second content access information to provide a mapping between the stored segments of encrypted content and the stored copies of original decryption keys. 2. The method as in claim 1 further comprising: utilizing the first content access information to retrieve the copies of original decryption keys; and storing the copies of original decryption keys. 3. The method as in claim 2, wherein the first content access information provides a mapping between the retrieved segments of encrypted content and the retrieved copies of original decryption keys. 4. The method as in claim 1 further comprising: distributing the second content access information to the subscriber. 5. The method as in claim 1, wherein the request specifies particular content to record on behalf of the subscriber, the method further comprising: retrieving the first content access information in response to receiving selection of the particular content for recording; and producing the second content access information to facilitate subsequent playback of the particular content by the subscriber. 6. The method as in claim 5, wherein the segments of encrypted content become no longer available from a resource as specified by the first content access information subsequent to storing the segments of encrypted content for later retrieval. 7. The method as in claim 5, wherein the original decryption keys become no longer available from a resource as specified by the first content access information subsequent to storing the original decryption keys for later retrieval. 8. The method as in claim 1, wherein the segments of encrypted content are available to the subscriber from a service provider; and wherein the service provider requires authorization of the subscriber prior to providing corresponding access to the copies of original decryption keys. 9. The method as in claim 1, wherein the subscriber: i) retrieves the segments of encrypted content through gateway hardware operated by a service provider to which the subscriber subscribes, and ii) stores the retrieved segments of encrypted content in a first repository for later retrieval; and wherein a server resource operated by the service provider stores the copies of original decryption keys in a second repository accessible to the subscriber through the gateway hardware. 10. The method as in claim 9, wherein the service provider requires authorization of the subscriber prior to distribution of the stored copies of original decryption keys from the second repository through the gateway hardware to the subscriber. 11. A system comprising: a server resource from which to distribute content; gateway hardware to provide a subscriber access to the server resource; and computer processor hardware operable to: utilize first content access information to retrieve segments of encrypted content associated with a request for content; store the segments of encrypted content for later retrieval; and produce second content access information to provide a mapping between the stored segments of encrypted content and copies of original decryption keys to decrypt the stored segments of encrypted content. 12. The system as in claim 11, wherein the computer processor hardware is further operable to utilize the first content access information to retrieve the copies of original decryption keys. 13. The system as in claim 12, wherein the first content access information provides a mapping between the retrieved segments of encrypted content and the copies of original decryption keys. 14. The system as in claim 11 wherein the computer processor hardware is further operable to distribute the second content access information to the subscriber to retrieve the copies of original decryption keys. 15. The system as in claim 11, wherein the request specifies particular content to record on behalf of the subscriber; and wherein the computer processor hardware is further operable to: retrieve the first content access information in response to receiving selection of the particular content for recording; and produce the second content access information to facilitate subsequent playback of the particular content by the subscriber. 16. The system as in claim 15, wherein the segments of encrypted content become no longer available from a resource as specified by the first content access information subsequent to storing the segments of encrypted content for later retrieval. 17. The system as in claim 16, wherein the original decryption keys become no longer available from a resource as specified by the first content access information subsequent to storing the original decryption keys for later retrieval. 18. The system as in claim 11, wherein the segments of encrypted content are available to the subscriber from a service provider; and wherein the service provider requires authorization of the subscriber prior to the service provider providing access to the encrypted segments of content to access the copies of the original decryption keys. 19. The system as in claim 11, wherein the subscriber i) retrieves the segments of encrypted content through gateway hardware operated by a service provider to which the subscriber subscribes and ii) stores the retrieved segments of encrypted content in a first repository for later retrieval; and wherein the server resource operated by the service provider stores the copies of original decryption keys in a second repository, the second repository accessible to the subscriber through the gateway hardware. 20. The system as in claim 19, wherein the service provider requires authorization of the subscriber prior to distribution of the stored copies of original decryption keys from the second repository through the gateway hardware to the subscriber. 21. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, cause the computer processor hardware to: utilize first content access information to retrieve segments of encrypted content associated with a request and copies of original decryption keys; store the segments of encrypted content for later retrieval; and produce second content access information to provide a mapping between the stored segments of encrypted content and the copies of original decryption keys.
2,400
8,504
8,504
15,842,061
2,419
A method of scaling complexity of a video processing system including determining a power saving factor based on an operating parameter and adjusting processing of video information based on the power saving factor to reduce computation complexity. The operating parameter may include available power and/or available processing capacity. A method of complexity scalability for a video processing system using prioritized layered coding including determining a power saving factor based on one or more metrics, such as power capacity and/or available processing capacity, and reducing processing complexity of multiple prioritized coding functions in a predetermined order of priority based on the level of the power saving factor. A video processing system including a power management circuit which determines the power saving factor and a video encoder system which correspondingly adjusts computation complexity.
1-24. (canceled) 25. A method of scaling complexity of a video processing system, comprising: determining a frame size, a frame rate and a frame type suitable for a given power level; determining a power saving factor based on at least one operating parameter of the video processing system, the at least one operating parameter including available power, wherein the power saving factor is at a first level corresponding to said given power level and is adjusted in response to decreases of available power; and adjusting processing of video information by the video processing system when the power saving factor indicates less available power than the given power level to reduce computation complexity while maintaining the frame size, the frame rate and the frame type equal to that determined for the given power level, wherein said adjusting processing of video information comprises: performing prediction error adjustment to adjust an amount of sub-pixel interpolation when the power saving factor is at least a second level which indicates less available power than when at the first level. 26. The method of claim 25, wherein said determining a power saving factor based on at least one operating parameter of the video processing system comprises determining the power saving factor based on available power and available processing capacity. 27. The method of claim 25, wherein said adjusting processing of video information based on the power saving factor comprises successively reducing processing complexity of a plurality of prioritized coding methods from a lowest priority to a highest priority in response to changes of the power saving factor indicating successively decreasing level of available power. 28. The method of claim 27, further comprising prioritizing the coding methods based on coding efficiency and computation cost. 29. The method of claim 25, wherein said performing prediction error adjustment comprises reducing an amount of sub-pixel interpolation in response to a change of the power saving factor indicating less available power than the given power level. 30. The method of claim 25, wherein said adjusting processing of video information comprises forcing the intracoding mode when the power saving factor indicates that available power is less than a predetermined level and when a motion error metric is at least a predetermined threshold. 31. The method of claim 25, wherein said adjusting processing of video information comprises successively reducing processing of intra prediction for intracoding mode in response to changes of the power saving factor indicating successively decreasing level of available power. 32. The method of claim 25, wherein said adjusting processing of video information comprises successively reducing motion search processing in response to changes of the power saving factor indicating successively decreasing available power. 33. The method of claim 32, wherein said successively reducing motion search comprises sequentially reducing a motion search window in response to changes of the power saving factor indicating sequentially decreasing levels of available power. 34. A method of scaling complexity of a video processing system, comprising: determining a frame size, a frame rate and a frame type for a power saving factor that indicates a given power level; determining a level of the power saving factor based on at least one operating parameter of the video processing system, the at least one operating parameter including available power, wherein the power saving factor is at a first level corresponding to said given power level and increases with decreasing available power level; and adjusting processing complexity of at least one coding method by the video processing system for a given video sequence in response to increases of the power saving factor while maintaining frame size, frame rate and frame type equal to that determined for the given power level, wherein said adjusting processing complexity comprises: performing prediction error adjustment to adjust an amount of sub-pixel interpolation when the power saving factor is at least a second level which is greater than the first level. 35. The method of claim 34, wherein said adjusting processing complexity further comprises limiting processing of intra prediction for an intracoding mode when the power saving factor is at least a third level. 36. The method of claim 34, wherein said adjusting processing complexity further comprises adjusting motion search processing when the power saving factor is at least a third level. 37. The method of claim 34, wherein said adjusting processing complexity further comprises forcing intracoding mode for at least one video block when the power saving factor is at least a third level. 38. The method of claim 34 wherein said adjusting processing complexity further comprises performing fast mode decision to reduce processing performed for selecting between an intracoding mode and an intercoding mode for each video block of a frame when the power saving factor is at least a third level. 39. A method of processing video information comprising: processing video information by the video processing system based on a power saving factor, the processing video information includes processing video information at a frame size, frame rate, and a frame type; determining a change in the power saving factor and adjusting the processing video information by the video processing system in response to the change, wherein the adjusting includes changing the computation complexity of the processing video information while maintaining the frame size, the frame rate and the frame type, wherein the adjusting the processing video information comprises: performing prediction error adjustment to adjust an amount of sub-pixel interpolation. 40. The method of claim 39, wherein the performing prediction error adjustment comprises reducing an amount of sub-pixel interpolation in response to the change of the power saving factor indicating a less computation complexity. 41. The method of claim 39 wherein the power saving factor is determined based on at least one operating parameter of the video processing system. 42. The method of claim 39 wherein the power saving factor is determined by a setting. 43. The method of claim 39 wherein the reducing the computation complexity of the processing video information comprises reducing an amount of sub-pixel interpolation. 44. The method of claim 43 wherein the reducing an amount of sub-pixel interpolation includes not performing sub-pixel interpolation. 45. The method of claim 43 wherein the reducing an amount of sub-pixel interpolation includes reducing a level of sub-pixel interpolation. 46. The method of claim 39 wherein the processing video information includes performing ¼ pixel interpolation, wherein the adjusting the processing video information by the video processing system in response to the change includes not performing ¼ pixel interpolation. 47. The method of claim 39 wherein the processing of video information includes performing ½ pixel interpolation, wherein the adjusting the processing of video information by the video processing system in response to the change includes not performing ½ pixel interpolation. 48. The method of claim 39, wherein the adjusting the processing video information by the video processing system further comprises limiting processing of intra prediction for an intracoding mode. 49. The method of claim 39, wherein the adjusting the processing video information by the video processing system further comprises adjusting motion search processing. 50. The method of claim 39, wherein the adjusting the processing video information by the video processing system further comprises forcing intracoding mode for at least one video block. 51. The method of claim 39 wherein the adjusting the processing video information by the video processing system further comprises performing fast mode decision to reduce processing performed for selecting between an intracoding mode and an intercoding mode for each video block of a frame.
A method of scaling complexity of a video processing system including determining a power saving factor based on an operating parameter and adjusting processing of video information based on the power saving factor to reduce computation complexity. The operating parameter may include available power and/or available processing capacity. A method of complexity scalability for a video processing system using prioritized layered coding including determining a power saving factor based on one or more metrics, such as power capacity and/or available processing capacity, and reducing processing complexity of multiple prioritized coding functions in a predetermined order of priority based on the level of the power saving factor. A video processing system including a power management circuit which determines the power saving factor and a video encoder system which correspondingly adjusts computation complexity.1-24. (canceled) 25. A method of scaling complexity of a video processing system, comprising: determining a frame size, a frame rate and a frame type suitable for a given power level; determining a power saving factor based on at least one operating parameter of the video processing system, the at least one operating parameter including available power, wherein the power saving factor is at a first level corresponding to said given power level and is adjusted in response to decreases of available power; and adjusting processing of video information by the video processing system when the power saving factor indicates less available power than the given power level to reduce computation complexity while maintaining the frame size, the frame rate and the frame type equal to that determined for the given power level, wherein said adjusting processing of video information comprises: performing prediction error adjustment to adjust an amount of sub-pixel interpolation when the power saving factor is at least a second level which indicates less available power than when at the first level. 26. The method of claim 25, wherein said determining a power saving factor based on at least one operating parameter of the video processing system comprises determining the power saving factor based on available power and available processing capacity. 27. The method of claim 25, wherein said adjusting processing of video information based on the power saving factor comprises successively reducing processing complexity of a plurality of prioritized coding methods from a lowest priority to a highest priority in response to changes of the power saving factor indicating successively decreasing level of available power. 28. The method of claim 27, further comprising prioritizing the coding methods based on coding efficiency and computation cost. 29. The method of claim 25, wherein said performing prediction error adjustment comprises reducing an amount of sub-pixel interpolation in response to a change of the power saving factor indicating less available power than the given power level. 30. The method of claim 25, wherein said adjusting processing of video information comprises forcing the intracoding mode when the power saving factor indicates that available power is less than a predetermined level and when a motion error metric is at least a predetermined threshold. 31. The method of claim 25, wherein said adjusting processing of video information comprises successively reducing processing of intra prediction for intracoding mode in response to changes of the power saving factor indicating successively decreasing level of available power. 32. The method of claim 25, wherein said adjusting processing of video information comprises successively reducing motion search processing in response to changes of the power saving factor indicating successively decreasing available power. 33. The method of claim 32, wherein said successively reducing motion search comprises sequentially reducing a motion search window in response to changes of the power saving factor indicating sequentially decreasing levels of available power. 34. A method of scaling complexity of a video processing system, comprising: determining a frame size, a frame rate and a frame type for a power saving factor that indicates a given power level; determining a level of the power saving factor based on at least one operating parameter of the video processing system, the at least one operating parameter including available power, wherein the power saving factor is at a first level corresponding to said given power level and increases with decreasing available power level; and adjusting processing complexity of at least one coding method by the video processing system for a given video sequence in response to increases of the power saving factor while maintaining frame size, frame rate and frame type equal to that determined for the given power level, wherein said adjusting processing complexity comprises: performing prediction error adjustment to adjust an amount of sub-pixel interpolation when the power saving factor is at least a second level which is greater than the first level. 35. The method of claim 34, wherein said adjusting processing complexity further comprises limiting processing of intra prediction for an intracoding mode when the power saving factor is at least a third level. 36. The method of claim 34, wherein said adjusting processing complexity further comprises adjusting motion search processing when the power saving factor is at least a third level. 37. The method of claim 34, wherein said adjusting processing complexity further comprises forcing intracoding mode for at least one video block when the power saving factor is at least a third level. 38. The method of claim 34 wherein said adjusting processing complexity further comprises performing fast mode decision to reduce processing performed for selecting between an intracoding mode and an intercoding mode for each video block of a frame when the power saving factor is at least a third level. 39. A method of processing video information comprising: processing video information by the video processing system based on a power saving factor, the processing video information includes processing video information at a frame size, frame rate, and a frame type; determining a change in the power saving factor and adjusting the processing video information by the video processing system in response to the change, wherein the adjusting includes changing the computation complexity of the processing video information while maintaining the frame size, the frame rate and the frame type, wherein the adjusting the processing video information comprises: performing prediction error adjustment to adjust an amount of sub-pixel interpolation. 40. The method of claim 39, wherein the performing prediction error adjustment comprises reducing an amount of sub-pixel interpolation in response to the change of the power saving factor indicating a less computation complexity. 41. The method of claim 39 wherein the power saving factor is determined based on at least one operating parameter of the video processing system. 42. The method of claim 39 wherein the power saving factor is determined by a setting. 43. The method of claim 39 wherein the reducing the computation complexity of the processing video information comprises reducing an amount of sub-pixel interpolation. 44. The method of claim 43 wherein the reducing an amount of sub-pixel interpolation includes not performing sub-pixel interpolation. 45. The method of claim 43 wherein the reducing an amount of sub-pixel interpolation includes reducing a level of sub-pixel interpolation. 46. The method of claim 39 wherein the processing video information includes performing ¼ pixel interpolation, wherein the adjusting the processing video information by the video processing system in response to the change includes not performing ¼ pixel interpolation. 47. The method of claim 39 wherein the processing of video information includes performing ½ pixel interpolation, wherein the adjusting the processing of video information by the video processing system in response to the change includes not performing ½ pixel interpolation. 48. The method of claim 39, wherein the adjusting the processing video information by the video processing system further comprises limiting processing of intra prediction for an intracoding mode. 49. The method of claim 39, wherein the adjusting the processing video information by the video processing system further comprises adjusting motion search processing. 50. The method of claim 39, wherein the adjusting the processing video information by the video processing system further comprises forcing intracoding mode for at least one video block. 51. The method of claim 39 wherein the adjusting the processing video information by the video processing system further comprises performing fast mode decision to reduce processing performed for selecting between an intracoding mode and an intercoding mode for each video block of a frame.
2,400
8,505
8,505
16,020,709
2,424
A method for assessing viewer interest in content and advertisements may include receiving an indication regarding a content playback mode change (e.g., a change from a skip or fast-forward mode to a pause or rewind mode) occurring during playing of a media content segment such as a television program or movie. The method then proceeds to associate the playback mode change with a sub-segment of the television program, such as an advertisement or commercial, and a level of interest of a user in the advertisement or commercial is determined based on the associated content playback mode change. An item, such as an advertisement or promotional offer can be selected to be presented to the user based on the determined level of interest of the user in the advertisement or commercial. Systems for assessing viewer interest in content and advertisements include devices and components configured to perform or enable such methods.
1. A computer-implemented method comprising: receiving, by at least one computer processor, an indication regarding a content playback mode change occurring during playing of a media content segment; associating, by at least one computer processor, the content playback mode change with a sub-segment of the media content segment, wherein the associating the content playback mode change with a sub-segment of the media content segment includes: receiving, by at least one computer processor, an indication that the sub-segment of the media content segment is being played or being skipped through by use of stored metadata associated with the media content segment; receiving, by at least one computer processor, an indication that the content playback mode change caused one or more of the following to occur: frames of the sub-segment of the media content segment to be played more than once before the entire media content segment was finished being played and frames of the sub-segment of the media content segment to be played more than once within a determined timeframe; and associating, by at least one computer processor, the content playback mode change with the sub-segment of the media content segment based on what the received indication that the content playback mode change caused had indicated; and assigning, by at least one computer processor, a level of interest of a user in the sub-segment of the media content segment based on the associated content playback mode change. 2. The method of claim 1 wherein the receiving, associating and assigning the level of interest is performed by a receiving device that is configured to perform the playing of the media content segment. 3. The method of claim 1 wherein the receiving the indication regarding the content playback mode includes receiving the indication regarding the content playback mode change from a receiving device that is configured to perform the playing of the media content segment, and the associating and determining is performed by one or more computer systems remote from the receiving device that is configured to perform the playing of the media content segment. 4. A system comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured to: receive an indication regarding a content playback mode change occurring during playing of a media content segment; associate the content playback mode change with a sub-segment of the media content segment, wherein the at least one processor is configured to associate the content playback mode change with a sub-segment of the media content segment by at least being configured to: receive an indication that the sub-segment of the media content segment is being played or being skipped through by use of stored metadata associated with the media content segment; receive an indication that the content playback mode change caused one or more of the following to occur: frames of the sub-segment of the media content segment to be played more than once before the entire media content segment was finished being played and frames of the sub-segment of the media content segment to be played more than once within a determined timeframe; and associate the content playback mode change with the sub-segment of the media content segment based on what the received indication that the content playback mode change caused had indicated; and assign a level of interest of a user in the sub-segment of the media content segment based on the associated content playback mode change. 5. The system of claim 4 wherein the at least one processor is of a receiving device that is configured to perform the playing of the media content segment. 6. The system of claim 4 wherein the indication regarding the content playback mode change is received from a receiving device that is configured to perform the playing of the media content segment, and the at least one processor is of a one or more computer systems remote from the receiving device that is configured to perform the playing of the media content segment. 7. A non-transitory computer-readable storage medium having computer executable instructions thereon, that when executed by a computer processor, cause the following method to be performed: receiving an association between a content playback mode change and a sub-segment of a media content segment played by a user, the association based on an indication that the content playback mode change caused one or more of the following to occur: frames of the sub-segment of the media content segment to be played more than once before the entire media content segment was finished being played and frames of the sub-segment of the media content segment to be played more than once within a determined timeframe; assigning a level of interest of the user in the sub-segment of the media content segment based on the received association between the content playback mode change and the sub-segment; and selecting an item to present to the user based on the determined level of interest of the user in the sub-segment of the media content segment. 8. The non-transitory computer-readable storage medium of claim 7 wherein the selected item is one or more of: an advertisement, a program, a product offer, an electronic program guide configuration, a Web page, an email, a text message, a promotion, a coupon, a phone call, a product offer, a service offer, a digital video segment, and an audio segment. 9. The non-transitory computer-readable storage medium of claim 7 wherein the assigning a level of interest of the user in the sub-segment of the media content segment comprises: determining a positive level of interest of the user in the sub-segment of the media content segment if the received association between the content playback mode change and the sub-segment indicates the user attempted to view the sub-segment of the media content segment in normal speed playback mode instead of skipping the sub-segment of the media content segment. 10. The non-transitory computer-readable storage medium of claim 9 wherein the computer executable instructions, when executed by a computer processor, further cause the following to be performed: repeating the receiving the association and the determining the positive level of interest, for a plurality of sub-segments of media content; and determining a category of interest based on the determined positive level of interest in the plurality of sub-segments of media content. 11. The non-transitory computer-readable storage medium of claim 10 wherein the computer executable instructions, when executed by a computer processor, further cause the following to be performed: communicating the determined positive level of interest to a service provider; and receiving, in response to the communicating the determined positive level of interest, selected media content at least some of which is selected for display to the user based on the determined positive level of interest. 12. The non-transitory computer-readable storage medium of claim 11 wherein the sub-segment of the media content segment is an advertisement. 13. The non-transitory computer-readable storage medium of claim 12 wherein the computer executable instructions, when executed by a computer processor, further cause the following to be performed: recording the media content segment before receiving the association between a content playback mode change and the sub-segment of a media content segment. 14. The non-transitory computer-readable storage medium of claim 13 wherein the recording the media content segment includes recording the media content segment in a memory buffer to enable the user to perform a rewind function on the media content segment while viewing a broadcast of the media content segment in real time or while receiving the media content segment as streaming video. 15. The non-transitory computer-readable storage medium of claim 14 wherein the entire media content segment is previously recorded prior to the media content segment being played by the user. 16. (canceled)
A method for assessing viewer interest in content and advertisements may include receiving an indication regarding a content playback mode change (e.g., a change from a skip or fast-forward mode to a pause or rewind mode) occurring during playing of a media content segment such as a television program or movie. The method then proceeds to associate the playback mode change with a sub-segment of the television program, such as an advertisement or commercial, and a level of interest of a user in the advertisement or commercial is determined based on the associated content playback mode change. An item, such as an advertisement or promotional offer can be selected to be presented to the user based on the determined level of interest of the user in the advertisement or commercial. Systems for assessing viewer interest in content and advertisements include devices and components configured to perform or enable such methods.1. A computer-implemented method comprising: receiving, by at least one computer processor, an indication regarding a content playback mode change occurring during playing of a media content segment; associating, by at least one computer processor, the content playback mode change with a sub-segment of the media content segment, wherein the associating the content playback mode change with a sub-segment of the media content segment includes: receiving, by at least one computer processor, an indication that the sub-segment of the media content segment is being played or being skipped through by use of stored metadata associated with the media content segment; receiving, by at least one computer processor, an indication that the content playback mode change caused one or more of the following to occur: frames of the sub-segment of the media content segment to be played more than once before the entire media content segment was finished being played and frames of the sub-segment of the media content segment to be played more than once within a determined timeframe; and associating, by at least one computer processor, the content playback mode change with the sub-segment of the media content segment based on what the received indication that the content playback mode change caused had indicated; and assigning, by at least one computer processor, a level of interest of a user in the sub-segment of the media content segment based on the associated content playback mode change. 2. The method of claim 1 wherein the receiving, associating and assigning the level of interest is performed by a receiving device that is configured to perform the playing of the media content segment. 3. The method of claim 1 wherein the receiving the indication regarding the content playback mode includes receiving the indication regarding the content playback mode change from a receiving device that is configured to perform the playing of the media content segment, and the associating and determining is performed by one or more computer systems remote from the receiving device that is configured to perform the playing of the media content segment. 4. A system comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured to: receive an indication regarding a content playback mode change occurring during playing of a media content segment; associate the content playback mode change with a sub-segment of the media content segment, wherein the at least one processor is configured to associate the content playback mode change with a sub-segment of the media content segment by at least being configured to: receive an indication that the sub-segment of the media content segment is being played or being skipped through by use of stored metadata associated with the media content segment; receive an indication that the content playback mode change caused one or more of the following to occur: frames of the sub-segment of the media content segment to be played more than once before the entire media content segment was finished being played and frames of the sub-segment of the media content segment to be played more than once within a determined timeframe; and associate the content playback mode change with the sub-segment of the media content segment based on what the received indication that the content playback mode change caused had indicated; and assign a level of interest of a user in the sub-segment of the media content segment based on the associated content playback mode change. 5. The system of claim 4 wherein the at least one processor is of a receiving device that is configured to perform the playing of the media content segment. 6. The system of claim 4 wherein the indication regarding the content playback mode change is received from a receiving device that is configured to perform the playing of the media content segment, and the at least one processor is of a one or more computer systems remote from the receiving device that is configured to perform the playing of the media content segment. 7. A non-transitory computer-readable storage medium having computer executable instructions thereon, that when executed by a computer processor, cause the following method to be performed: receiving an association between a content playback mode change and a sub-segment of a media content segment played by a user, the association based on an indication that the content playback mode change caused one or more of the following to occur: frames of the sub-segment of the media content segment to be played more than once before the entire media content segment was finished being played and frames of the sub-segment of the media content segment to be played more than once within a determined timeframe; assigning a level of interest of the user in the sub-segment of the media content segment based on the received association between the content playback mode change and the sub-segment; and selecting an item to present to the user based on the determined level of interest of the user in the sub-segment of the media content segment. 8. The non-transitory computer-readable storage medium of claim 7 wherein the selected item is one or more of: an advertisement, a program, a product offer, an electronic program guide configuration, a Web page, an email, a text message, a promotion, a coupon, a phone call, a product offer, a service offer, a digital video segment, and an audio segment. 9. The non-transitory computer-readable storage medium of claim 7 wherein the assigning a level of interest of the user in the sub-segment of the media content segment comprises: determining a positive level of interest of the user in the sub-segment of the media content segment if the received association between the content playback mode change and the sub-segment indicates the user attempted to view the sub-segment of the media content segment in normal speed playback mode instead of skipping the sub-segment of the media content segment. 10. The non-transitory computer-readable storage medium of claim 9 wherein the computer executable instructions, when executed by a computer processor, further cause the following to be performed: repeating the receiving the association and the determining the positive level of interest, for a plurality of sub-segments of media content; and determining a category of interest based on the determined positive level of interest in the plurality of sub-segments of media content. 11. The non-transitory computer-readable storage medium of claim 10 wherein the computer executable instructions, when executed by a computer processor, further cause the following to be performed: communicating the determined positive level of interest to a service provider; and receiving, in response to the communicating the determined positive level of interest, selected media content at least some of which is selected for display to the user based on the determined positive level of interest. 12. The non-transitory computer-readable storage medium of claim 11 wherein the sub-segment of the media content segment is an advertisement. 13. The non-transitory computer-readable storage medium of claim 12 wherein the computer executable instructions, when executed by a computer processor, further cause the following to be performed: recording the media content segment before receiving the association between a content playback mode change and the sub-segment of a media content segment. 14. The non-transitory computer-readable storage medium of claim 13 wherein the recording the media content segment includes recording the media content segment in a memory buffer to enable the user to perform a rewind function on the media content segment while viewing a broadcast of the media content segment in real time or while receiving the media content segment as streaming video. 15. The non-transitory computer-readable storage medium of claim 14 wherein the entire media content segment is previously recorded prior to the media content segment being played by the user. 16. (canceled)
2,400
8,506
8,506
13,545,261
2,481
In one embodiment, a method comprising receiving at a single encoding engine an input video stream according to a first version of a video characteristics, such as frame rate, profile and level, and coding standard, and generating by the single encoding engine, in parallel, a plurality of streams comprising a first encoded stream according to a first version of the video characteristic and a second encoded stream according to a second version of the video characteristic, the second encoded stream generated based on video coding information used to generate the first encoded stream.
1. A method, comprising: receiving at a single encoding engine an input video stream according to a first version of a video characteristic; and generating by the single encoding engine, in parallel, a plurality of streams comprising a first encoded stream according to a first version of the video characteristic and a second encoded stream according to a second version of the video characteristic, the second encoded stream generated based on video coding information used to generate the first encoded stream. 2. The method of claim 1, wherein the video characteristic comprises frame rate, and where in the first version and the second version differ in a value of the frame rate. 3. The method of claim 2, wherein the video coding information comprises motion vector search results used for inter prediction. 4. The method of claim 3, wherein the motion vector search results comprise motion vectors, partitions of one coding unit, motion vector search range, or any combination thereof. 5. The method of claim 3, wherein the second version comprises a lower frame rate than the first version, wherein generating comprises generating the second encoded stream at the lower frame rate video by sharing the motion vector search results applied in generating the first encoded stream, wherein the generating of the second encoded stream occurs without performing an additional motion search operation. 6. The method of claim 3, wherein the second version comprises a lower frame rate than the first version, wherein generating comprises generating the second encoded stream at the lower frame rate video by deriving motion vectors from motion vectors corresponding to the first encoded stream. 7. The method of claim 6, wherein the deriving is based on a repeated or non-repeated pattern of pictures corresponding to the first encoded stream. 8. The method of claim 7, further comprising selecting an intra period of the repeating pattern of pictures to align the intra pictures of streams of different frame rates. 9. The method of claim 7, further comprising substituting a reference picture corresponding to the first encoded stream and unavailable for the second encoded stream with another reference picture. 10. The method of claim 9, wherein deriving further comprises scaling the motion vectors corresponding to the first encoded stream based on differences in temporal distances between a current picture, the substitute reference picture, and the unavailable reference picture. 11. The method of claim 7, further comprising selecting an intra period of the repeating pattern of pictures to be a multiple of a temporal downscale factor. 12. The method of claim 3, wherein the first encoded stream comprises a combination of a base layer and an enhanced layer video stream, and the second encoded stream comprises only either a base layer or enhanced layer video stream, the motion search results corresponding to generation of the first encoded stream and used to generate motion vectors for the base layer video stream. 13. The method of claim 2, wherein the video coding information comprises a mode decision for inter and intra prediction. 14. The method of claim 13, wherein partitions of the inter prediction corresponding to the second encoded stream are the same as partitions of the inter prediction corresponding to the first encoded stream. 15. The method of claim 13, wherein the intra prediction mode decision of each coding unit corresponding to the first encoded stream is used for the second encoded stream when a same intra picture is shared between the two streams. 16. The method of claim 1, wherein the video characteristic comprises profile and level, and wherein the first version and the second version differ in either profile, level, or a combination of both. 17. The method of claim 16, wherein the video coding information comprises motion vector search results used for inter prediction, the motion vector search results comprising motion vectors, partitions of one coding unit, motion vector search range, or any combination thereof. 18. The method of claim 17, wherein the generation of the second encoded stream is based on either a first motion vector search range used in providing the first encoded stream or a second motion vector search range that is a subset of the first motion vector search range, the first and second encoded streams provided based on a temporally common search operation. 19. The method of claim 16, wherein the video coding information comprises a selection between inter or intra prediction for a given coding unit or an intra mode decision for intra prediction. 20. A system, comprising: a single encoding engine configured in hardware to receive an input video stream according to a first version of a video characteristic and generate a plurality of encoded streams in parallel that include different versions of the video characteristic, the plural encoded streams generated based on video coding information used to generate one of the plural encoded streams.
In one embodiment, a method comprising receiving at a single encoding engine an input video stream according to a first version of a video characteristics, such as frame rate, profile and level, and coding standard, and generating by the single encoding engine, in parallel, a plurality of streams comprising a first encoded stream according to a first version of the video characteristic and a second encoded stream according to a second version of the video characteristic, the second encoded stream generated based on video coding information used to generate the first encoded stream.1. A method, comprising: receiving at a single encoding engine an input video stream according to a first version of a video characteristic; and generating by the single encoding engine, in parallel, a plurality of streams comprising a first encoded stream according to a first version of the video characteristic and a second encoded stream according to a second version of the video characteristic, the second encoded stream generated based on video coding information used to generate the first encoded stream. 2. The method of claim 1, wherein the video characteristic comprises frame rate, and where in the first version and the second version differ in a value of the frame rate. 3. The method of claim 2, wherein the video coding information comprises motion vector search results used for inter prediction. 4. The method of claim 3, wherein the motion vector search results comprise motion vectors, partitions of one coding unit, motion vector search range, or any combination thereof. 5. The method of claim 3, wherein the second version comprises a lower frame rate than the first version, wherein generating comprises generating the second encoded stream at the lower frame rate video by sharing the motion vector search results applied in generating the first encoded stream, wherein the generating of the second encoded stream occurs without performing an additional motion search operation. 6. The method of claim 3, wherein the second version comprises a lower frame rate than the first version, wherein generating comprises generating the second encoded stream at the lower frame rate video by deriving motion vectors from motion vectors corresponding to the first encoded stream. 7. The method of claim 6, wherein the deriving is based on a repeated or non-repeated pattern of pictures corresponding to the first encoded stream. 8. The method of claim 7, further comprising selecting an intra period of the repeating pattern of pictures to align the intra pictures of streams of different frame rates. 9. The method of claim 7, further comprising substituting a reference picture corresponding to the first encoded stream and unavailable for the second encoded stream with another reference picture. 10. The method of claim 9, wherein deriving further comprises scaling the motion vectors corresponding to the first encoded stream based on differences in temporal distances between a current picture, the substitute reference picture, and the unavailable reference picture. 11. The method of claim 7, further comprising selecting an intra period of the repeating pattern of pictures to be a multiple of a temporal downscale factor. 12. The method of claim 3, wherein the first encoded stream comprises a combination of a base layer and an enhanced layer video stream, and the second encoded stream comprises only either a base layer or enhanced layer video stream, the motion search results corresponding to generation of the first encoded stream and used to generate motion vectors for the base layer video stream. 13. The method of claim 2, wherein the video coding information comprises a mode decision for inter and intra prediction. 14. The method of claim 13, wherein partitions of the inter prediction corresponding to the second encoded stream are the same as partitions of the inter prediction corresponding to the first encoded stream. 15. The method of claim 13, wherein the intra prediction mode decision of each coding unit corresponding to the first encoded stream is used for the second encoded stream when a same intra picture is shared between the two streams. 16. The method of claim 1, wherein the video characteristic comprises profile and level, and wherein the first version and the second version differ in either profile, level, or a combination of both. 17. The method of claim 16, wherein the video coding information comprises motion vector search results used for inter prediction, the motion vector search results comprising motion vectors, partitions of one coding unit, motion vector search range, or any combination thereof. 18. The method of claim 17, wherein the generation of the second encoded stream is based on either a first motion vector search range used in providing the first encoded stream or a second motion vector search range that is a subset of the first motion vector search range, the first and second encoded streams provided based on a temporally common search operation. 19. The method of claim 16, wherein the video coding information comprises a selection between inter or intra prediction for a given coding unit or an intra mode decision for intra prediction. 20. A system, comprising: a single encoding engine configured in hardware to receive an input video stream according to a first version of a video characteristic and generate a plurality of encoded streams in parallel that include different versions of the video characteristic, the plural encoded streams generated based on video coding information used to generate one of the plural encoded streams.
2,400
8,507
8,507
14,794,011
2,477
Embodiments described herein relate to a system and method for providing flexible receiver configuration in wireless communication systems, such as 802.11 WLAN systems. In one embodiment, a wireless device may transmit a first data frame including first configuration information specifying a first configuration of the receiver to notify a remote device that the wireless device intends to configure its receiver according to the first configuration. After receiving an acknowledgement frame confirming the first configuration information, the wireless device may configure the receiver according to the first configuration. In another embodiment, a wireless device may receive a first data frame including first configuration information and further including a request that the wireless device configure its receiver according to the first configuration. In response, the wireless device may configure the receiver according to the first configuration. In either case, the wireless device may receive subsequent communications according to the first configuration.
1. A method for reconfiguring a receiver in a wireless device, the method comprising: by the wireless device: transmitting a first data frame comprising first configuration information specifying a first configuration of the receiver; receiving a first acknowledgement frame according to a second configuration of the receiver, the first acknowledgement frame confirming the first configuration information; configuring the receiver according to the first configuration in response to the receiving the first acknowledgement frame; and receiving a second data frame according to the first configuration, after the configuring the receiver according to the first configuration. 2. The method of claim 1, wherein the first configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 3. The method of claim 1, wherein the first configuration information is comprised in a header of the first data frame, and wherein the first configuration information is confirmed in a header of the first acknowledgement frame. 4. The method of claim 3, wherein the header of the first data frame and the header of the first acknowledgement frame comprise media access control (MAC) headers. 5. The method of claim 1, wherein the second data frame comprises second configuration information specifying a third configuration of the receiver, the method further comprising: by the wireless device: transmitting a second acknowledgement frame confirming the second configuration information; configuring the receiver according to the third configuration in response to the receiving the second data frame; and receiving a third data frame according to the third configuration, after the configuring the receiver according to the third configuration. 6. The method of claim 5, wherein each of the first configuration information and the second configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 7. The method of claim 6, wherein the first data frame further comprises an indication that the first configuration information comprises a notice from the wireless device that the receiver will be configured according to the first configuration; and wherein the second data frame further comprises an indication that the second configuration information comprises a request from a sender of the second data frame that the receiver be configured according to the third configuration. 8. A wireless communication device comprising: a radio comprising a receiver; and a processing element operably coupled to the radio, wherein the processing element is configured to cause the wireless communication device to: transmit a first data frame, having a header comprising first configuration information specifying a first configuration of the receiver; receive a first acknowledgement frame according to a second configuration of the receiver, the first acknowledgement frame having a header confirming the first configuration information; and configure the receiver according to the first configuration in response to the receiving the first acknowledgement frame. 9. The wireless communication device of claim 8, wherein the first configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 10. The wireless communication device of claim 8, wherein the header of the first data frame and the header of the first acknowledgement frame comprise media access control (MAC) headers. 11. The wireless communication device of claim 8, wherein the second data frame comprises second configuration information specifying a third configuration of the receiver, wherein the processing element is further configured to cause the wireless communication device to: transmit a second acknowledgement frame confirming the second configuration information; configure the receiver according to the third configuration in response to the receiving the second data frame; and receive a third data frame according to the third configuration, after the configuring the receiver according to the third configuration. 12. The wireless communication device of claim 11, wherein each of the first configuration information and the second configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 13. The wireless communication device of claim 12, wherein the first data frame further comprises an indication that the first configuration information comprises a notice from the wireless communication device that the receiver will be configured according to the first configuration; and wherein the second data frame further comprises an indication that the second configuration information comprises a request from a sender of the second data frame that the receiver be configured according to the third configuration. 14. A non-transitory computer-readable memory medium comprising program instructions that, when executed at a wireless communication device, cause the wireless communication device to: transmit a first data frame comprising first configuration information specifying a first configuration of a receiver of the wireless communication device; configure the receiver according to the first configuration; and receive a second data frame according to the first configuration, after the configuring the receiver according to the first configuration. 15. The non-transitory computer-readable memory medium of claim 14, wherein the first configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 16. The non-transitory computer-readable memory medium of claim 14, wherein the program instructions, when executed at the wireless communication device, further cause the wireless communication device to: receive a first acknowledgement frame according to a second configuration of the receiver, the first acknowledgement frame confirming the first configuration information, wherein the configuring the receiver according to the first configuration is in response to the receiving the first acknowledgement frame; wherein the first configuration information is comprised in a header of the first data frame, and wherein the first configuration information is confirmed in a header of the first acknowledgement frame. 17. The non-transitory computer-readable memory medium of claim 16, wherein the header of the first data frame and the header of the first acknowledgement frame comprise media access control (MAC) headers. 18. The non-transitory computer-readable memory medium of claim 14, wherein the second data frame comprises second configuration information specifying a third configuration of the receiver, wherein the program instructions, when executed at the wireless communication device, further cause the wireless communication device to: transmit a second acknowledgement frame confirming the second configuration information; configure the receiver according to the third configuration in response to the receiving the second data frame; and receive a third data frame according to the third configuration, after the configuring the receiver according to the third configuration. 19. The non-transitory computer-readable memory medium of claim 18, wherein each of the first configuration information and the second configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 20. The non-transitory computer-readable memory medium of claim 19, wherein the first data frame further comprises an indication that the first configuration information comprises a notice from the wireless device that the receiver will be configured according to the first configuration; and wherein the second data frame further comprises an indication that the second configuration information comprises a request from a sender of the second data frame that the receiver be configured according to the third configuration.
Embodiments described herein relate to a system and method for providing flexible receiver configuration in wireless communication systems, such as 802.11 WLAN systems. In one embodiment, a wireless device may transmit a first data frame including first configuration information specifying a first configuration of the receiver to notify a remote device that the wireless device intends to configure its receiver according to the first configuration. After receiving an acknowledgement frame confirming the first configuration information, the wireless device may configure the receiver according to the first configuration. In another embodiment, a wireless device may receive a first data frame including first configuration information and further including a request that the wireless device configure its receiver according to the first configuration. In response, the wireless device may configure the receiver according to the first configuration. In either case, the wireless device may receive subsequent communications according to the first configuration.1. A method for reconfiguring a receiver in a wireless device, the method comprising: by the wireless device: transmitting a first data frame comprising first configuration information specifying a first configuration of the receiver; receiving a first acknowledgement frame according to a second configuration of the receiver, the first acknowledgement frame confirming the first configuration information; configuring the receiver according to the first configuration in response to the receiving the first acknowledgement frame; and receiving a second data frame according to the first configuration, after the configuring the receiver according to the first configuration. 2. The method of claim 1, wherein the first configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 3. The method of claim 1, wherein the first configuration information is comprised in a header of the first data frame, and wherein the first configuration information is confirmed in a header of the first acknowledgement frame. 4. The method of claim 3, wherein the header of the first data frame and the header of the first acknowledgement frame comprise media access control (MAC) headers. 5. The method of claim 1, wherein the second data frame comprises second configuration information specifying a third configuration of the receiver, the method further comprising: by the wireless device: transmitting a second acknowledgement frame confirming the second configuration information; configuring the receiver according to the third configuration in response to the receiving the second data frame; and receiving a third data frame according to the third configuration, after the configuring the receiver according to the third configuration. 6. The method of claim 5, wherein each of the first configuration information and the second configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 7. The method of claim 6, wherein the first data frame further comprises an indication that the first configuration information comprises a notice from the wireless device that the receiver will be configured according to the first configuration; and wherein the second data frame further comprises an indication that the second configuration information comprises a request from a sender of the second data frame that the receiver be configured according to the third configuration. 8. A wireless communication device comprising: a radio comprising a receiver; and a processing element operably coupled to the radio, wherein the processing element is configured to cause the wireless communication device to: transmit a first data frame, having a header comprising first configuration information specifying a first configuration of the receiver; receive a first acknowledgement frame according to a second configuration of the receiver, the first acknowledgement frame having a header confirming the first configuration information; and configure the receiver according to the first configuration in response to the receiving the first acknowledgement frame. 9. The wireless communication device of claim 8, wherein the first configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 10. The wireless communication device of claim 8, wherein the header of the first data frame and the header of the first acknowledgement frame comprise media access control (MAC) headers. 11. The wireless communication device of claim 8, wherein the second data frame comprises second configuration information specifying a third configuration of the receiver, wherein the processing element is further configured to cause the wireless communication device to: transmit a second acknowledgement frame confirming the second configuration information; configure the receiver according to the third configuration in response to the receiving the second data frame; and receive a third data frame according to the third configuration, after the configuring the receiver according to the third configuration. 12. The wireless communication device of claim 11, wherein each of the first configuration information and the second configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 13. The wireless communication device of claim 12, wherein the first data frame further comprises an indication that the first configuration information comprises a notice from the wireless communication device that the receiver will be configured according to the first configuration; and wherein the second data frame further comprises an indication that the second configuration information comprises a request from a sender of the second data frame that the receiver be configured according to the third configuration. 14. A non-transitory computer-readable memory medium comprising program instructions that, when executed at a wireless communication device, cause the wireless communication device to: transmit a first data frame comprising first configuration information specifying a first configuration of a receiver of the wireless communication device; configure the receiver according to the first configuration; and receive a second data frame according to the first configuration, after the configuring the receiver according to the first configuration. 15. The non-transitory computer-readable memory medium of claim 14, wherein the first configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 16. The non-transitory computer-readable memory medium of claim 14, wherein the program instructions, when executed at the wireless communication device, further cause the wireless communication device to: receive a first acknowledgement frame according to a second configuration of the receiver, the first acknowledgement frame confirming the first configuration information, wherein the configuring the receiver according to the first configuration is in response to the receiving the first acknowledgement frame; wherein the first configuration information is comprised in a header of the first data frame, and wherein the first configuration information is confirmed in a header of the first acknowledgement frame. 17. The non-transitory computer-readable memory medium of claim 16, wherein the header of the first data frame and the header of the first acknowledgement frame comprise media access control (MAC) headers. 18. The non-transitory computer-readable memory medium of claim 14, wherein the second data frame comprises second configuration information specifying a third configuration of the receiver, wherein the program instructions, when executed at the wireless communication device, further cause the wireless communication device to: transmit a second acknowledgement frame confirming the second configuration information; configure the receiver according to the third configuration in response to the receiving the second data frame; and receive a third data frame according to the third configuration, after the configuring the receiver according to the third configuration. 19. The non-transitory computer-readable memory medium of claim 18, wherein each of the first configuration information and the second configuration information comprises at least one of an indication of a channel width of the receiver and an indication of a number of active receive spatial streams of the receiver. 20. The non-transitory computer-readable memory medium of claim 19, wherein the first data frame further comprises an indication that the first configuration information comprises a notice from the wireless device that the receiver will be configured according to the first configuration; and wherein the second data frame further comprises an indication that the second configuration information comprises a request from a sender of the second data frame that the receiver be configured according to the third configuration.
2,400
8,508
8,508
16,532,930
2,494
The electronic device with one or more processors and memory receives an input of a user. The electronic device, in accordance with the input, identifies a respective task type from a plurality of predefined task types associated with a plurality of third party service providers. The respective task type is associated with at least one third party service provider for which the user is authorized and at least one third party service provider for which the user is not authorized. In response to identifying the respective task type, the electronic device sends a request to perform at least a portion of a task to a third party service provider of the plurality of third party service providers that is associated with the respective task type.
1. (canceled) 2. A method of processing a user input, the method performed at an electronic device with one or more processors and memory, the method comprising: at the electronic device: receiving a first set of one or more predefined task types from a service provider; integrating the first set of one or more predefined task types with a second set of predefined task types not associated with the service provider to generate a plurality of predefined task types; receiving an input of a user specifying a task; selecting, based on the user input, a task type from the plurality of predefined task types, the task type corresponding to one of the first set of the one or more predefined task types and to the task; and, in response to selecting the task type, sending to the service provider a request to perform at least a portion of the task. 3. The method of claim 2, wherein the input is a voice input of the user that has been converted to text. 4. The method of claim 2, further comprising: prior to receiving the input of the user, receiving from the service provider an identification of a vocabulary; and selecting the task type in accordance with the identification of the vocabulary. 5. The method of claim 4, further comprising, associating the vocabulary with the first set of the one or more predefined task types. 6. The method of claim 4, wherein receiving the identification of the vocabulary includes receiving the vocabulary. 7. The method of claim 4, wherein receiving the identification of the vocabulary includes receiving an identification of a vocabulary accessible to the electronic device prior to receiving the identification of the vocabulary. 8. The method of claim 2, further comprising: obtaining one or more results corresponding to the input from the service provider; and providing at least a subset of the one or more results for presentation to the user. 9. The method of claim 2, wherein: the electronic device is a portable electronic device of the user; and the portable electronic device does not store a software application corresponding to the service provider. 10. The method of claim 9, wherein the portable electronic device is a phone. 11. An electronic device, comprising: one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: receiving a first set of one or more predefined task types from a service provider; integrating the first set of one or more predefined task types with a second set of predefined task types not associated with the service provider to generate a plurality of predefined task types; receiving an input of a user specifying a task; selecting, based on the user input, a task type from the plurality of predefined task types, the task type corresponding to one of the first set of the one or more predefined task types and to the task; and, in response to selecting the task type, sending to the service provider a request to perform at least a portion of the task. 12. The electronic device of claim 11, wherein the input is a voice input of the user that has been converted to text. 13. The electronic device of claim 11, wherein the one or more programs further include instructions for: prior to receiving the input of the user, receiving from the service provider an identification of a vocabulary; and selecting the task type in accordance with the identification of the vocabulary. 14. The electronic device of claim 13, wherein the one or more programs further include instructions for: associating the vocabulary with the first set of one or more predefined task types. 15. The electronic device of claim 13, wherein receiving the identification of the vocabulary includes receiving the vocabulary. 16. The electronic device of claim 13, wherein receiving the identification of the vocabulary includes receiving an identification of a vocabulary accessible to the electronic device prior to receiving the identification of the vocabulary. 17. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by one or more processors of an electronic device, cause the device to: receive a first set of one or more predefined task types from a service provider; integrate the first set of one or more predefined task types with a second set of predefined task types not associated with the service provider to generate a plurality of predefined tasks; receive an input of a user specifying a task; select, based on the user input, a task type from the plurality of predefined task types, the task type corresponding to one of the first set of the one or more predefined task types and to the task; and, in response to selecting the task type, send to the service provider a request to perform at least a portion of the task. 18. The non-transitory computer readable storage medium of claim 17, wherein the input is a voice input of the user that has been converted to text. 19. The non-transitory computer readable storage medium of claim 17, wherein the one or more programs further cause the device to: prior to receiving the input of the user, receive from the service provider an identification of a vocabulary; and select the task type in accordance with the identification of the vocabulary. 20. The non-transitory computer readable storage medium of claim 19, wherein the one or more programs further cause the device to: associating the vocabulary with the first set of the one or more predefined task types. 21. The non-transitory computer readable storage medium of claim 19, wherein receiving the identification of the vocabulary includes receiving the vocabulary. 22. The non-transitory computer readable storage medium of claim 19, wherein receiving the identification of the vocabulary includes receiving an identification of a vocabulary accessible to the electronic device prior to receiving the identification of the vocabulary.
The electronic device with one or more processors and memory receives an input of a user. The electronic device, in accordance with the input, identifies a respective task type from a plurality of predefined task types associated with a plurality of third party service providers. The respective task type is associated with at least one third party service provider for which the user is authorized and at least one third party service provider for which the user is not authorized. In response to identifying the respective task type, the electronic device sends a request to perform at least a portion of a task to a third party service provider of the plurality of third party service providers that is associated with the respective task type.1. (canceled) 2. A method of processing a user input, the method performed at an electronic device with one or more processors and memory, the method comprising: at the electronic device: receiving a first set of one or more predefined task types from a service provider; integrating the first set of one or more predefined task types with a second set of predefined task types not associated with the service provider to generate a plurality of predefined task types; receiving an input of a user specifying a task; selecting, based on the user input, a task type from the plurality of predefined task types, the task type corresponding to one of the first set of the one or more predefined task types and to the task; and, in response to selecting the task type, sending to the service provider a request to perform at least a portion of the task. 3. The method of claim 2, wherein the input is a voice input of the user that has been converted to text. 4. The method of claim 2, further comprising: prior to receiving the input of the user, receiving from the service provider an identification of a vocabulary; and selecting the task type in accordance with the identification of the vocabulary. 5. The method of claim 4, further comprising, associating the vocabulary with the first set of the one or more predefined task types. 6. The method of claim 4, wherein receiving the identification of the vocabulary includes receiving the vocabulary. 7. The method of claim 4, wherein receiving the identification of the vocabulary includes receiving an identification of a vocabulary accessible to the electronic device prior to receiving the identification of the vocabulary. 8. The method of claim 2, further comprising: obtaining one or more results corresponding to the input from the service provider; and providing at least a subset of the one or more results for presentation to the user. 9. The method of claim 2, wherein: the electronic device is a portable electronic device of the user; and the portable electronic device does not store a software application corresponding to the service provider. 10. The method of claim 9, wherein the portable electronic device is a phone. 11. An electronic device, comprising: one or more processors; a memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: receiving a first set of one or more predefined task types from a service provider; integrating the first set of one or more predefined task types with a second set of predefined task types not associated with the service provider to generate a plurality of predefined task types; receiving an input of a user specifying a task; selecting, based on the user input, a task type from the plurality of predefined task types, the task type corresponding to one of the first set of the one or more predefined task types and to the task; and, in response to selecting the task type, sending to the service provider a request to perform at least a portion of the task. 12. The electronic device of claim 11, wherein the input is a voice input of the user that has been converted to text. 13. The electronic device of claim 11, wherein the one or more programs further include instructions for: prior to receiving the input of the user, receiving from the service provider an identification of a vocabulary; and selecting the task type in accordance with the identification of the vocabulary. 14. The electronic device of claim 13, wherein the one or more programs further include instructions for: associating the vocabulary with the first set of one or more predefined task types. 15. The electronic device of claim 13, wherein receiving the identification of the vocabulary includes receiving the vocabulary. 16. The electronic device of claim 13, wherein receiving the identification of the vocabulary includes receiving an identification of a vocabulary accessible to the electronic device prior to receiving the identification of the vocabulary. 17. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by one or more processors of an electronic device, cause the device to: receive a first set of one or more predefined task types from a service provider; integrate the first set of one or more predefined task types with a second set of predefined task types not associated with the service provider to generate a plurality of predefined tasks; receive an input of a user specifying a task; select, based on the user input, a task type from the plurality of predefined task types, the task type corresponding to one of the first set of the one or more predefined task types and to the task; and, in response to selecting the task type, send to the service provider a request to perform at least a portion of the task. 18. The non-transitory computer readable storage medium of claim 17, wherein the input is a voice input of the user that has been converted to text. 19. The non-transitory computer readable storage medium of claim 17, wherein the one or more programs further cause the device to: prior to receiving the input of the user, receive from the service provider an identification of a vocabulary; and select the task type in accordance with the identification of the vocabulary. 20. The non-transitory computer readable storage medium of claim 19, wherein the one or more programs further cause the device to: associating the vocabulary with the first set of the one or more predefined task types. 21. The non-transitory computer readable storage medium of claim 19, wherein receiving the identification of the vocabulary includes receiving the vocabulary. 22. The non-transitory computer readable storage medium of claim 19, wherein receiving the identification of the vocabulary includes receiving an identification of a vocabulary accessible to the electronic device prior to receiving the identification of the vocabulary.
2,400
8,509
8,509
16,161,532
2,477
A network node (e.g., base station, eNodeB) is described herein which indicates an implicit reject status in at least one of a frequency correction channel (FCCH) block or a synchronization channel (SCH) block, and transmits the at least one of the FCCH block or the SCH block to at least one wireless device. Further, a wireless device is described herein which receives the at least one of the FCCH block or the SCH block, determines if the received at least one of the FCCH block or the SCH block indicates an implicit reject status is set, and when the received at least one of the FCCH block or the SCH block indicates the implicit reject status is set and when the wireless device has a specific configuration, determines not to attempt to access the wireless communication system.
1. A network node configured to control system overload in a wireless communication system, the network node comprising: a processing module configured to indicate an implicit reject status in a synchronization channel (SCH) block; and a transceiver module configured to transmit the SCH block to at least one wireless device, wherein the implicit reject status indicates if a system access is allowed by the at least one wireless device prior to the at least one wireless device attempting the system access. 2. The network node of claim 1, wherein the processing module is configured to indicate the implicit reject status in the SCH block by using a part of the SCH block. 3. The network node of claim 2, wherein the processing module is configured to use the part of the SCH block to indicate the implicit reject status by one of the following: including a single bit indication in a payload part of the SCH block; using an alternative cyclic redundancy check (CRC) code in the SCH block; using a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; using an alternative training sequence code (TSC) in the SCH block; or adding a bit to the SCH block to be XORed with a bit by the at least one wireless device. 4. The network node of claim 2, wherein the processing module is configured to use the part of the SCH block to indicate the implicit reject status by including a multiple bit indication in a payload part of the SCH block. 5. The network node of claim 4, wherein each wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 6. The network node of claim 4, wherein each wireless device is configured according to a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the different type of wireless device is granted system access opportunities. 7. The network node of claim 1, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 8. The network node of claim 1, wherein the transceiver module is further configured to transmit multiple repetitions of the SCH block when the at least one wireless device is operating in extended coverage. 9. The network node of claim 1, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell. 10. A method in a network node of a wireless communication system configured to control system overload, the method comprising: indicating an implicit reject status in a synchronization channel (SCH) block; and transmitting the SCH block to at least one wireless device, wherein the implicit reject status indicates if a system access is allowed by the at least one wireless device prior to the at least one wireless device attempting the system access. 11. The method of claim 10, wherein the step of indicating the implicit reject status in the SCH block further comprises using a part of the SCH block. 12. The method of claim 11, wherein the using step comprises one of the following: including a single bit indication in a payload part of the SCH block; using an alternative cyclic redundancy check (CRC) code in the SCH block; using a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; using an alternative training sequence counter (TSC) in the SCH block; or adding a bit to the SCH block to be XORed with a bit by the at least one wireless device. 13. The method of claim 11, wherein the using step comprises including a multiple bit indication in a payload part of the SCH block. 14. The method of claim 13, wherein each wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 15. The method of claim 13, wherein each wireless device is configured according to a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the different type of wireless device is granted system access opportunities. 16. The method of claim 10, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 17. The method of claim 10, wherein the transmitting step further comprises transmitting multiple repetitions of the SCH block when the at least one wireless device is operating in extended coverage. 18. The method of claim 10, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell. 19. A wireless device configured to interface with a wireless communication system and further configured to control system overload, the wireless device comprising: a transceiver module configured to receive a synchronization channel (SCH) block; and a processing module configured to determine whether the received SCH block indicates an implicit reject status is set, wherein the implicit reject status indicates if a system access is allowed by the wireless device prior to the wireless device attempting the system access. 20. The wireless device of claim 19, wherein the processing module is configured to determine if the received SCH block indicates the implicit reject status is set by performing one of the following: reading a single bit indication in a payload part of the SCH block; reading an alternative cyclic redundancy check (CRC) code in the SCH block; detecting a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; reading an alternative training sequence code (TSC) in the SCH block; or XORing a bit with a bit in the SCH block. 21. The wireless device of claim 19, wherein the processing module is configured to determine if the received SCH block indicates the implicit reject status is set by reading a multiple bit indication in a payload part of the SCH block. 22. The wireless device of claim 21, wherein the wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 23. The wireless device of claim 21, wherein the wireless device is configured to have a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the wireless device is granted a system access opportunity. 24. The wireless device of claim 19, wherein the wireless device is configured to be a non-priority access type such that when the received SCH block indicates the implicit reject status is set, the wireless device determines not to attempt to access the wireless communication system. 25. The wireless device of claim 19, wherein the processing module further configured to not attempt to access the wireless communication system when the received SCH block indicates the implicit reject status is set and when the wireless device has a specific configuration. 26. The wireless device of claim 19, wherein the wireless device is an Internet of Things (IoT) wireless device. 27. The wireless device of claim 19, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 28. The wireless device of claim 19, wherein the transceiver module is further configured to receive multiple repetitions of the SCH block when the wireless device is operating in extended coverage. 29. The wireless device of claim 19, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell. 30. A method in a wireless device configured to interface with a wireless communication system and further configured to control system overload, the method comprising: receiving a synchronization channel (SCH) block; and determining whether the received SCH block indicates an implicit reject status is set, wherein the implicit reject status indicates if a system access is allowed by the wireless device prior to the wireless device attempting the system access. 31. The method of claim 30, wherein the step of determining if the received SCH block indicates the implicit reject status is set further comprises one of the following: reading a single bit indication in a payload part of the SCH block; reading an alternative cyclic redundancy check (CRC) code in the SCH block; detecting a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; reading an alternative training sequence code (TSC) in the SCH block; or XORing a bit with a bit in the SCH block. 32. The method of claim 30, wherein the step of determining if the received SCH block indicates the implicit reject status is set further comprises reading a multiple bit indication in a payload part of the SCH block. 33. The method of claim 32, wherein the wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 34. The method of claim 32, wherein the wireless device is configured to have a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the wireless device is granted a system access opportunity. 35. The method of claim 30, wherein the wireless device is configured to be a non-priority access type such that when the received SCH block indicates the implicit reject status is set, the wireless device determines not to attempt to access the wireless communication system. 36. The method of claim 30, further comprising not attempting to access the wireless communication system when the received SCH block indicates the implicit reject status is set and when the wireless device has a specific configuration. 37. The method of claim 30, wherein the wireless device is an Internet of Things (IoT) wireless device. 38. The method of claim 30, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 39. The method of claim 30, wherein the receiving step further comprises receiving multiple repetitions of the SCH block when the wireless device is operating in extended coverage. 40. The method of claim 30, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell.
A network node (e.g., base station, eNodeB) is described herein which indicates an implicit reject status in at least one of a frequency correction channel (FCCH) block or a synchronization channel (SCH) block, and transmits the at least one of the FCCH block or the SCH block to at least one wireless device. Further, a wireless device is described herein which receives the at least one of the FCCH block or the SCH block, determines if the received at least one of the FCCH block or the SCH block indicates an implicit reject status is set, and when the received at least one of the FCCH block or the SCH block indicates the implicit reject status is set and when the wireless device has a specific configuration, determines not to attempt to access the wireless communication system.1. A network node configured to control system overload in a wireless communication system, the network node comprising: a processing module configured to indicate an implicit reject status in a synchronization channel (SCH) block; and a transceiver module configured to transmit the SCH block to at least one wireless device, wherein the implicit reject status indicates if a system access is allowed by the at least one wireless device prior to the at least one wireless device attempting the system access. 2. The network node of claim 1, wherein the processing module is configured to indicate the implicit reject status in the SCH block by using a part of the SCH block. 3. The network node of claim 2, wherein the processing module is configured to use the part of the SCH block to indicate the implicit reject status by one of the following: including a single bit indication in a payload part of the SCH block; using an alternative cyclic redundancy check (CRC) code in the SCH block; using a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; using an alternative training sequence code (TSC) in the SCH block; or adding a bit to the SCH block to be XORed with a bit by the at least one wireless device. 4. The network node of claim 2, wherein the processing module is configured to use the part of the SCH block to indicate the implicit reject status by including a multiple bit indication in a payload part of the SCH block. 5. The network node of claim 4, wherein each wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 6. The network node of claim 4, wherein each wireless device is configured according to a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the different type of wireless device is granted system access opportunities. 7. The network node of claim 1, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 8. The network node of claim 1, wherein the transceiver module is further configured to transmit multiple repetitions of the SCH block when the at least one wireless device is operating in extended coverage. 9. The network node of claim 1, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell. 10. A method in a network node of a wireless communication system configured to control system overload, the method comprising: indicating an implicit reject status in a synchronization channel (SCH) block; and transmitting the SCH block to at least one wireless device, wherein the implicit reject status indicates if a system access is allowed by the at least one wireless device prior to the at least one wireless device attempting the system access. 11. The method of claim 10, wherein the step of indicating the implicit reject status in the SCH block further comprises using a part of the SCH block. 12. The method of claim 11, wherein the using step comprises one of the following: including a single bit indication in a payload part of the SCH block; using an alternative cyclic redundancy check (CRC) code in the SCH block; using a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; using an alternative training sequence counter (TSC) in the SCH block; or adding a bit to the SCH block to be XORed with a bit by the at least one wireless device. 13. The method of claim 11, wherein the using step comprises including a multiple bit indication in a payload part of the SCH block. 14. The method of claim 13, wherein each wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 15. The method of claim 13, wherein each wireless device is configured according to a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the different type of wireless device is granted system access opportunities. 16. The method of claim 10, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 17. The method of claim 10, wherein the transmitting step further comprises transmitting multiple repetitions of the SCH block when the at least one wireless device is operating in extended coverage. 18. The method of claim 10, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell. 19. A wireless device configured to interface with a wireless communication system and further configured to control system overload, the wireless device comprising: a transceiver module configured to receive a synchronization channel (SCH) block; and a processing module configured to determine whether the received SCH block indicates an implicit reject status is set, wherein the implicit reject status indicates if a system access is allowed by the wireless device prior to the wireless device attempting the system access. 20. The wireless device of claim 19, wherein the processing module is configured to determine if the received SCH block indicates the implicit reject status is set by performing one of the following: reading a single bit indication in a payload part of the SCH block; reading an alternative cyclic redundancy check (CRC) code in the SCH block; detecting a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; reading an alternative training sequence code (TSC) in the SCH block; or XORing a bit with a bit in the SCH block. 21. The wireless device of claim 19, wherein the processing module is configured to determine if the received SCH block indicates the implicit reject status is set by reading a multiple bit indication in a payload part of the SCH block. 22. The wireless device of claim 21, wherein the wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 23. The wireless device of claim 21, wherein the wireless device is configured to have a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the wireless device is granted a system access opportunity. 24. The wireless device of claim 19, wherein the wireless device is configured to be a non-priority access type such that when the received SCH block indicates the implicit reject status is set, the wireless device determines not to attempt to access the wireless communication system. 25. The wireless device of claim 19, wherein the processing module further configured to not attempt to access the wireless communication system when the received SCH block indicates the implicit reject status is set and when the wireless device has a specific configuration. 26. The wireless device of claim 19, wherein the wireless device is an Internet of Things (IoT) wireless device. 27. The wireless device of claim 19, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 28. The wireless device of claim 19, wherein the transceiver module is further configured to receive multiple repetitions of the SCH block when the wireless device is operating in extended coverage. 29. The wireless device of claim 19, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell. 30. A method in a wireless device configured to interface with a wireless communication system and further configured to control system overload, the method comprising: receiving a synchronization channel (SCH) block; and determining whether the received SCH block indicates an implicit reject status is set, wherein the implicit reject status indicates if a system access is allowed by the wireless device prior to the wireless device attempting the system access. 31. The method of claim 30, wherein the step of determining if the received SCH block indicates the implicit reject status is set further comprises one of the following: reading a single bit indication in a payload part of the SCH block; reading an alternative cyclic redundancy check (CRC) code in the SCH block; detecting a negative modulation index for Gaussian Minimum Shift Keying (GMSK) modulation of the SCH block; reading an alternative training sequence code (TSC) in the SCH block; or XORing a bit with a bit in the SCH block. 32. The method of claim 30, wherein the step of determining if the received SCH block indicates the implicit reject status is set further comprises reading a multiple bit indication in a payload part of the SCH block. 33. The method of claim 32, wherein the wireless device is configured to have a specific coverage class, and each bit or bit combination in the multiple bit indication corresponds to a different coverage class. 34. The method of claim 32, wherein the wireless device is configured to have a specific type, and each bit or bit combination in the multiple bit indication corresponds to a different type and provides for a time interval during which the wireless device is granted a system access opportunity. 35. The method of claim 30, wherein the wireless device is configured to be a non-priority access type such that when the received SCH block indicates the implicit reject status is set, the wireless device determines not to attempt to access the wireless communication system. 36. The method of claim 30, further comprising not attempting to access the wireless communication system when the received SCH block indicates the implicit reject status is set and when the wireless device has a specific configuration. 37. The method of claim 30, wherein the wireless device is an Internet of Things (IoT) wireless device. 38. The method of claim 30, wherein the wireless device obtains the implicit reject status without being required to read a downlink (DL) Access Grant Channel (AGCH) block or a Paging Channel (PCH) block in addition to reading the SCH block. 39. The method of claim 30, wherein the receiving step further comprises receiving multiple repetitions of the SCH block when the wireless device is operating in extended coverage. 40. The method of claim 30, wherein the SCH block is a broadcast message intended for any wireless device that is camping on a given cell or intending to camp on a given cell.
2,400
8,510
8,510
15,467,827
2,466
A base station selects, from among a plurality of code sequences orthogonal to one another, one code sequence by which an uplink signal including a demodulation reference signal repeated in a plurality of subframes is multiplied and transmits, to a terminal for which transmission of the repeated uplink signal is configured, information indicating the selected code sequence by using a field for indicating a cyclic shift and an orthogonal sequence used for the demodulation reference signal. A terminal receives information indicating one of a plurality of code sequences orthogonal to one another using a field for indicating a cyclic shift and an orthogonal sequence used for a demodulation reference signal and multiplies an uplink signal including the demodulation reference signal repeated in a plurality of subframes by the code sequence indicated by the information.
1. A communication device comprising: circuitry, which, in operation, selects, from among a plurality of code sequences orthogonal to one another, one code sequence by which an uplink signal including a demodulation reference signal repeated in a plurality of subframes is multiplied; and a transmitter, which, in operation, transmits, to a terminal for which transmission of the repeated uplink signal is configured, information indicating the selected code sequence by using a field for indicating a cyclic shift and an orthogonal sequence used for the demodulation reference signal. 2. The communication device according to claim 1, wherein the plurality of code sequences are associated one to one with a plurality of values indicated by using bits constituting the field. 3. The communication device according to claim 1, wherein a plurality of values indicated by using bits constituting the field are associated one to one with a plurality of combinations of the code sequence, the cyclic shift, and the orthogonal sequence. 4. The communication device according to claim 1, wherein among a plurality of values indicated by using bits constituting the field, two values associated one to one with two cyclic shifts having a maximum cyclic shift difference are associated one to one with two code sequences having low mutual orthogonality among the plurality of code sequences. 5. The communication device according to claim 1, wherein when the number of the plurality of code sequences is smaller than the number of values indicated by using bits constituting the field, one code sequence is associated with two of the values that are associated with neighboring cyclic shifts. 6. The communication device according to claim 1, wherein when the number of the plurality of code sequences is smaller than the number of values indicated by using bits constituting the field, a plurality of values indicated by using, among the bits, a number of bits required for indicating one code sequence among the plurality of code sequences are associated one to one with a plurality of combinations of the code sequence, the cyclic shift, and the orthogonal sequence and the bits other than the bits required for indicating the code sequence are known bits. 7. The communication device according to claim 1, wherein components of the selected code sequence are multiplied by the uplink signals each in one of the plurality of subframes, respectively. 8. A communication device comprising: a receiver, which, in operation, receives information indicating one of a plurality of code sequences orthogonal to one another by using a field for indicating a cyclic shift and an orthogonal sequence used for a demodulation reference signal; and circuitry, which, in operation, multiplies an uplink signal including the demodulation reference signal repeated in a plurality of subframes by the code sequence indicated by the information. 9. The communication device according to claim 8, wherein the circuitry, in operation, multiplies the uplink signals each in one of the plurality of subframes by components of the selected code sequence, respectively. 10. A communication method comprising: selecting, from among a plurality of code sequences orthogonal to one another, one code sequence by which an uplink signal including a demodulation reference signal repeated in a plurality of subframes is multiplied; and transmitting, to a terminal for which transmission of the repeated uplink signal is configured, information indicating the selected code sequence by using a field for indicating a cyclic shift and an orthogonal sequence used for the demodulation reference signal. 11. A communication method comprising: receiving information indicating one of a plurality of code sequences orthogonal to one another by using a field for indicating a cyclic shift and an orthogonal sequence used for a demodulation reference signal; and multiplying an uplink signal including the demodulation reference signal repeated in a plurality of subframes by the code sequence indicated by the information.
A base station selects, from among a plurality of code sequences orthogonal to one another, one code sequence by which an uplink signal including a demodulation reference signal repeated in a plurality of subframes is multiplied and transmits, to a terminal for which transmission of the repeated uplink signal is configured, information indicating the selected code sequence by using a field for indicating a cyclic shift and an orthogonal sequence used for the demodulation reference signal. A terminal receives information indicating one of a plurality of code sequences orthogonal to one another using a field for indicating a cyclic shift and an orthogonal sequence used for a demodulation reference signal and multiplies an uplink signal including the demodulation reference signal repeated in a plurality of subframes by the code sequence indicated by the information.1. A communication device comprising: circuitry, which, in operation, selects, from among a plurality of code sequences orthogonal to one another, one code sequence by which an uplink signal including a demodulation reference signal repeated in a plurality of subframes is multiplied; and a transmitter, which, in operation, transmits, to a terminal for which transmission of the repeated uplink signal is configured, information indicating the selected code sequence by using a field for indicating a cyclic shift and an orthogonal sequence used for the demodulation reference signal. 2. The communication device according to claim 1, wherein the plurality of code sequences are associated one to one with a plurality of values indicated by using bits constituting the field. 3. The communication device according to claim 1, wherein a plurality of values indicated by using bits constituting the field are associated one to one with a plurality of combinations of the code sequence, the cyclic shift, and the orthogonal sequence. 4. The communication device according to claim 1, wherein among a plurality of values indicated by using bits constituting the field, two values associated one to one with two cyclic shifts having a maximum cyclic shift difference are associated one to one with two code sequences having low mutual orthogonality among the plurality of code sequences. 5. The communication device according to claim 1, wherein when the number of the plurality of code sequences is smaller than the number of values indicated by using bits constituting the field, one code sequence is associated with two of the values that are associated with neighboring cyclic shifts. 6. The communication device according to claim 1, wherein when the number of the plurality of code sequences is smaller than the number of values indicated by using bits constituting the field, a plurality of values indicated by using, among the bits, a number of bits required for indicating one code sequence among the plurality of code sequences are associated one to one with a plurality of combinations of the code sequence, the cyclic shift, and the orthogonal sequence and the bits other than the bits required for indicating the code sequence are known bits. 7. The communication device according to claim 1, wherein components of the selected code sequence are multiplied by the uplink signals each in one of the plurality of subframes, respectively. 8. A communication device comprising: a receiver, which, in operation, receives information indicating one of a plurality of code sequences orthogonal to one another by using a field for indicating a cyclic shift and an orthogonal sequence used for a demodulation reference signal; and circuitry, which, in operation, multiplies an uplink signal including the demodulation reference signal repeated in a plurality of subframes by the code sequence indicated by the information. 9. The communication device according to claim 8, wherein the circuitry, in operation, multiplies the uplink signals each in one of the plurality of subframes by components of the selected code sequence, respectively. 10. A communication method comprising: selecting, from among a plurality of code sequences orthogonal to one another, one code sequence by which an uplink signal including a demodulation reference signal repeated in a plurality of subframes is multiplied; and transmitting, to a terminal for which transmission of the repeated uplink signal is configured, information indicating the selected code sequence by using a field for indicating a cyclic shift and an orthogonal sequence used for the demodulation reference signal. 11. A communication method comprising: receiving information indicating one of a plurality of code sequences orthogonal to one another by using a field for indicating a cyclic shift and an orthogonal sequence used for a demodulation reference signal; and multiplying an uplink signal including the demodulation reference signal repeated in a plurality of subframes by the code sequence indicated by the information.
2,400
8,511
8,511
14,630,621
2,481
The present invention relates to a system and method of digital video recording of media content from a content delivery network (CDN) stored to a device such as a set-top box with integrated digital video recorder (DVR), to network digital video recorder (nDVR), or both. The system and method for DVR recording of media content recognizes and corrects non-uniform media content from different resolutions, bit-rate or other degraded fragments/segments (such as an incomplete transfer) from adaptive bit rate streaming (ABR), CDN disruptions, and other recording problems. The system and method determines instances of non-uniform media content data with file information about the media content data available from a resource manager. The file information is used to identify corresponding uniform media content data equivalent to the instances of non-uniform media content data. The system and method obtains uniform media content data using the resource manager from the CDN and replaces one or more files of the non-uniform media content data in storage with the uniform media content data so as to ensure quality in the user experience when later viewing the DVR or nDVR recording.
1. A system for managing a transmission of media content over an access link between a device of a user and a source of the media content in a content delivery network (CDN), the system comprising: a scheduler configured to: operate in connection with a digital video recorder, whereby said scheduler is configured to schedule the recording of a media content data at a predetermined time using a digital video recording (DVR) by the user communicating a selection to a resource manager; a resource manager configured to: receive said service request from said scheduler for delivery of said media content data, identify said media content data of said service request for delivery; process said service request by determining one or more user characteristics of said request for delivery of said media content data; store said media content data in storage located in said CDN; determine instances of non-uniform media content data with file information of said media content data available to said resource manager; and identify from said file information locations in a manifest file of corresponding uniform media content data equivalent to said instances of non-uniform media content data in the CDN; and a content processing and communication system communicatively coupled with said resource manager and configured to: replace one or more files of said non-uniform media content data in storage with said uniform media content data; deliver said uniform media content data using said resource manager to said user; and store said media content data in storage located in said requesting device. 2. The system of claim 1 wherein said content processing and communication system is configured to store said media content data in storage located in said a user device. 3. The system of claim 1 wherein said content processing and communication system communicates is further configured to store said media content data in storage of said resource manager located in said CDN. 4. A method of digital video recording of media content from a content delivery network (CDN), comprising, the steps of: scheduling the recording of a media content data at a predetermined time using a digital video recording (DVR) by a user communicating a selection to a resource manager; storing said media content data in storage located in said CDN; determining instances of non-uniform media content data with file information of said media content data available to said resource manager; identifying from said file information corresponding uniform media content data equivalent to said instances of non-uniform media content data; obtaining said uniform media content data using said resource manager from said CDN; and replacing one or more files of said non-uniform media content data in storage with said uniform media content data. 5. The method of claim 4, wherein said scheduling step further includes said predetermined time is now available said media content as displayed by a catalog service adapted to display said predetermined time(s) of said scheduling of said digital video recording linear or non-linear media content. 6. The method of claim 4, wherein said scheduling step further includes said predetermined time is in a future available from a catalog service adapted to display said future time for said scheduling of said digital video recording linear or non-linear media content. 7. The method of claim 4, wherein said storing step further includes storing said media content data in storage is located in storage of a user device. 8. The method of claim 4, wherein said storing step further includes storing said media content data in storage is located in storage of the resource manager on the network. 9. The method of claim 4, wherein said step of determining instances of non-uniform media content data with file information compares bit rate information of said media content data. 10. The method of claim 4, wherein said step of determining instances of non-uniform media content data with file information compares bit rate information of said media content data. 11. The method of claim 4, wherein said step of determining instances of non-uniform media content data with file information compares file size information from said file information with an actual stored file size information of said media content data stored on said device.
The present invention relates to a system and method of digital video recording of media content from a content delivery network (CDN) stored to a device such as a set-top box with integrated digital video recorder (DVR), to network digital video recorder (nDVR), or both. The system and method for DVR recording of media content recognizes and corrects non-uniform media content from different resolutions, bit-rate or other degraded fragments/segments (such as an incomplete transfer) from adaptive bit rate streaming (ABR), CDN disruptions, and other recording problems. The system and method determines instances of non-uniform media content data with file information about the media content data available from a resource manager. The file information is used to identify corresponding uniform media content data equivalent to the instances of non-uniform media content data. The system and method obtains uniform media content data using the resource manager from the CDN and replaces one or more files of the non-uniform media content data in storage with the uniform media content data so as to ensure quality in the user experience when later viewing the DVR or nDVR recording.1. A system for managing a transmission of media content over an access link between a device of a user and a source of the media content in a content delivery network (CDN), the system comprising: a scheduler configured to: operate in connection with a digital video recorder, whereby said scheduler is configured to schedule the recording of a media content data at a predetermined time using a digital video recording (DVR) by the user communicating a selection to a resource manager; a resource manager configured to: receive said service request from said scheduler for delivery of said media content data, identify said media content data of said service request for delivery; process said service request by determining one or more user characteristics of said request for delivery of said media content data; store said media content data in storage located in said CDN; determine instances of non-uniform media content data with file information of said media content data available to said resource manager; and identify from said file information locations in a manifest file of corresponding uniform media content data equivalent to said instances of non-uniform media content data in the CDN; and a content processing and communication system communicatively coupled with said resource manager and configured to: replace one or more files of said non-uniform media content data in storage with said uniform media content data; deliver said uniform media content data using said resource manager to said user; and store said media content data in storage located in said requesting device. 2. The system of claim 1 wherein said content processing and communication system is configured to store said media content data in storage located in said a user device. 3. The system of claim 1 wherein said content processing and communication system communicates is further configured to store said media content data in storage of said resource manager located in said CDN. 4. A method of digital video recording of media content from a content delivery network (CDN), comprising, the steps of: scheduling the recording of a media content data at a predetermined time using a digital video recording (DVR) by a user communicating a selection to a resource manager; storing said media content data in storage located in said CDN; determining instances of non-uniform media content data with file information of said media content data available to said resource manager; identifying from said file information corresponding uniform media content data equivalent to said instances of non-uniform media content data; obtaining said uniform media content data using said resource manager from said CDN; and replacing one or more files of said non-uniform media content data in storage with said uniform media content data. 5. The method of claim 4, wherein said scheduling step further includes said predetermined time is now available said media content as displayed by a catalog service adapted to display said predetermined time(s) of said scheduling of said digital video recording linear or non-linear media content. 6. The method of claim 4, wherein said scheduling step further includes said predetermined time is in a future available from a catalog service adapted to display said future time for said scheduling of said digital video recording linear or non-linear media content. 7. The method of claim 4, wherein said storing step further includes storing said media content data in storage is located in storage of a user device. 8. The method of claim 4, wherein said storing step further includes storing said media content data in storage is located in storage of the resource manager on the network. 9. The method of claim 4, wherein said step of determining instances of non-uniform media content data with file information compares bit rate information of said media content data. 10. The method of claim 4, wherein said step of determining instances of non-uniform media content data with file information compares bit rate information of said media content data. 11. The method of claim 4, wherein said step of determining instances of non-uniform media content data with file information compares file size information from said file information with an actual stored file size information of said media content data stored on said device.
2,400
8,512
8,512
15,876,715
2,495
In some embodiments, an electronic device organizes and selectively grants access to its authorization with a primary content provider to applications downloaded on the electronic device for viewing content from secondary content providers. In some embodiments, an electronic device prompts a user to download applications associated with a primary content provider in response to the user authorizing the electronic device with the primary content provider.
1. A method comprising: at an electronic device that is in communication with a display and one or more input devices: receiving, via the one or more input devices, a sequence of one or more inputs to authorize a user to access first content from multiple sources via a single account; and in response to receiving the sequence of one or more inputs: authorizing the user to access the first content via one or more applications installed on the electronic device; and prompting the user to download additional applications that have access to the first content, wherein the additional applications are not downloaded on the electronic device. 2. The method of claim 1, wherein: in accordance with a determination that the sequence of one or more inputs to authorize the user to access the first content from the multiple sources via the single account was received from within an application for accessing the first content on the electronic device, prompting the user to download the additional applications includes displaying, in the application, a prompt to download the additional applications. 3. The method of claim 1, wherein: prompting the user to download the additional applications includes displaying, in a settings user interface of an operating system of the electronic device, a prompt to download the additional applications. 4. The method of claim 1, wherein: prompting the user to download the additional applications includes displaying, in a settings user interface of an operating system of the electronic device, a plurality of selectable user interface elements, each selectable user interface element corresponding to a respective one of the additional applications, and each selectable user interface element selectable to download the corresponding respective additional application. 5. The method of claim 1, wherein: prompting the user to download the additional applications includes displaying, in an application store user interface of the electronic device from which a plurality of applications can be downloaded to the electronic device, a selectable user interface element that corresponds to a respective primary content provider associated with the single account and is selectable to initiate a process to download the additional applications, wherein: in accordance with a determination that the single account is with a first primary content provider, the selectable user interface element corresponds to the first primary content provider, and in accordance with a determination that the single account is with a second primary content provider, the selectable user interface element corresponds to the second primary content provider. 6. The method of claim 1, further comprising: receiving, via the one or more input devices, input for downloading one or more of the additional applications; and in response to receiving the input for downloading the one or more of the additional applications, downloading the one or more of the additional applications, without downloading others of the additional applications. 7. The method of claim 1, further comprising: after authorizing the user to access the first content via the one or more applications installed on the electronic device, receiving, via the one or more input devices, an input corresponding to a request to search the first content for content having a user-specified characteristic; and in response to receiving the input corresponding to the request to search the first content for content having the user-specified characteristic, providing access to a first subset of the first content, having the user-specified characteristic, accessible from the one or more applications installed on the electronic device. 8. The method of claim 1, further comprising: displaying, on the display, an application store user interface of the electronic device from which a plurality of applications can be downloaded to the electronic device, wherein: in accordance with a determination that the user has been authorized to access the first content from multiple sources via the single account with a primary content provider, the application store user interface includes a first link selectable to initiate a process to display a user interface in the application store that is specific to the primary content provider, the user interface that is specific to the primary content provider including one or more links to download the additional applications that are not downloaded on the electronic device. 9. The method of claim 8, further comprising: after authorizing the user to access the first content via the one or more applications installed on the electronic device, displaying, on the display, a settings user interface of an operating system of the electronic device, the settings user interface including a selectable link for directly accessing the user interface in the application store that is specific to the primary content provider. 10. An electronic device, comprising: one or more processors; a display; one or more input devices; and a non-transitory computer-readable storage medium including one or more sequences of instructions which, when executed by the one or more processors, cause the one or more processors to perform a method comprising: receiving, via the one or more input devices, a sequence of one or more inputs to authorize a user to access first content from multiple sources via a single account; and in response to receiving the sequence of one or more inputs: authorizing the user to access the first content via one or more applications installed on the electronic device; and prompting the user to download additional applications that have access to the first content, wherein the additional applications are not downloaded on the electronic device. 11. A non-transitory computer readable storage medium including one or more sequences of instructions which, when executed by one or more processors of an electronic device with a display device and one or more input devices, cause the one or more processors to perform a method comprising: receiving, via the one or more input devices, a sequence of one or more inputs to authorize a user to access first content from multiple sources via a single account; and in response to receiving the sequence of one or more inputs: authorizing the user to access the first content via one or more applications installed on the electronic device; and prompting the user to download additional applications that have access to the first content, wherein the additional applications are not downloaded on the electronic device.
In some embodiments, an electronic device organizes and selectively grants access to its authorization with a primary content provider to applications downloaded on the electronic device for viewing content from secondary content providers. In some embodiments, an electronic device prompts a user to download applications associated with a primary content provider in response to the user authorizing the electronic device with the primary content provider.1. A method comprising: at an electronic device that is in communication with a display and one or more input devices: receiving, via the one or more input devices, a sequence of one or more inputs to authorize a user to access first content from multiple sources via a single account; and in response to receiving the sequence of one or more inputs: authorizing the user to access the first content via one or more applications installed on the electronic device; and prompting the user to download additional applications that have access to the first content, wherein the additional applications are not downloaded on the electronic device. 2. The method of claim 1, wherein: in accordance with a determination that the sequence of one or more inputs to authorize the user to access the first content from the multiple sources via the single account was received from within an application for accessing the first content on the electronic device, prompting the user to download the additional applications includes displaying, in the application, a prompt to download the additional applications. 3. The method of claim 1, wherein: prompting the user to download the additional applications includes displaying, in a settings user interface of an operating system of the electronic device, a prompt to download the additional applications. 4. The method of claim 1, wherein: prompting the user to download the additional applications includes displaying, in a settings user interface of an operating system of the electronic device, a plurality of selectable user interface elements, each selectable user interface element corresponding to a respective one of the additional applications, and each selectable user interface element selectable to download the corresponding respective additional application. 5. The method of claim 1, wherein: prompting the user to download the additional applications includes displaying, in an application store user interface of the electronic device from which a plurality of applications can be downloaded to the electronic device, a selectable user interface element that corresponds to a respective primary content provider associated with the single account and is selectable to initiate a process to download the additional applications, wherein: in accordance with a determination that the single account is with a first primary content provider, the selectable user interface element corresponds to the first primary content provider, and in accordance with a determination that the single account is with a second primary content provider, the selectable user interface element corresponds to the second primary content provider. 6. The method of claim 1, further comprising: receiving, via the one or more input devices, input for downloading one or more of the additional applications; and in response to receiving the input for downloading the one or more of the additional applications, downloading the one or more of the additional applications, without downloading others of the additional applications. 7. The method of claim 1, further comprising: after authorizing the user to access the first content via the one or more applications installed on the electronic device, receiving, via the one or more input devices, an input corresponding to a request to search the first content for content having a user-specified characteristic; and in response to receiving the input corresponding to the request to search the first content for content having the user-specified characteristic, providing access to a first subset of the first content, having the user-specified characteristic, accessible from the one or more applications installed on the electronic device. 8. The method of claim 1, further comprising: displaying, on the display, an application store user interface of the electronic device from which a plurality of applications can be downloaded to the electronic device, wherein: in accordance with a determination that the user has been authorized to access the first content from multiple sources via the single account with a primary content provider, the application store user interface includes a first link selectable to initiate a process to display a user interface in the application store that is specific to the primary content provider, the user interface that is specific to the primary content provider including one or more links to download the additional applications that are not downloaded on the electronic device. 9. The method of claim 8, further comprising: after authorizing the user to access the first content via the one or more applications installed on the electronic device, displaying, on the display, a settings user interface of an operating system of the electronic device, the settings user interface including a selectable link for directly accessing the user interface in the application store that is specific to the primary content provider. 10. An electronic device, comprising: one or more processors; a display; one or more input devices; and a non-transitory computer-readable storage medium including one or more sequences of instructions which, when executed by the one or more processors, cause the one or more processors to perform a method comprising: receiving, via the one or more input devices, a sequence of one or more inputs to authorize a user to access first content from multiple sources via a single account; and in response to receiving the sequence of one or more inputs: authorizing the user to access the first content via one or more applications installed on the electronic device; and prompting the user to download additional applications that have access to the first content, wherein the additional applications are not downloaded on the electronic device. 11. A non-transitory computer readable storage medium including one or more sequences of instructions which, when executed by one or more processors of an electronic device with a display device and one or more input devices, cause the one or more processors to perform a method comprising: receiving, via the one or more input devices, a sequence of one or more inputs to authorize a user to access first content from multiple sources via a single account; and in response to receiving the sequence of one or more inputs: authorizing the user to access the first content via one or more applications installed on the electronic device; and prompting the user to download additional applications that have access to the first content, wherein the additional applications are not downloaded on the electronic device.
2,400
8,513
8,513
15,328,950
2,421
Provided are a video transmission device, a terminal, a video transmission system, a control method, a program, and an information storage medium that contribute to reduced time and effort for a user during communication of information on a video managed by a video delivery system that delivers the video using a terminal different from the video transmission device that sends the video to be delivered by live streaming. A video transmission section sends, to a video delivery system that delivers videos by live streaming, a video to be delivered by the video delivery system. A video-related information communication control section controls an information terminal associated with a gaming device such that information on the video managed by the video delivery system can be communicated with the video delivery system.
1. A video transmission device comprising: a video transmission section adapted to send, to a video delivery system operable to deliver videos by live streaming, a video to be delivered by the video delivery system; and a communication control section adapted to control a terminal associated with the video transmission device such that information on the video managed by the video delivery system can be communicated with the video delivery system. 2. The video transmission device of claim 1, wherein information on the video is comments posted from users viewing the video that is delivered by the video delivery system by live streaming. 3. The video transmission device of claim 2, wherein the communication control section performs control such that the terminal can post comments via a communication session established between the terminal and the video delivery system and used by the video transmission section to send the video. 4. The video transmission device of claim 1, wherein the communication control section relays communication of information on the video managed by the video delivery system between the video delivery system, the destination of the video sent from the video transmission section, and the terminal, the video transmission section sends the video by a communication scheme that is in keeping with the video delivery system, the destination of the video, and the video transmission section communicates, with the terminal, the information on the video managed by the video delivery system, the destination of the video, by a common communication scheme that is independent of the video delivery system, the destination of the video sent from the video transmission section. 5. The video transmission device of claim 1, wherein the terminal is a terminal that can be used by the video delivery system independently of the video transmission device. 6. A terminal comprising: a communication section adapted to communicate, with a video delivery system that delivers videos by live streaming and is the destination of the video sent from a video transmission device, information on the video managed by the video delivery system, the video transmission device sending the video to be delivered by the video delivery system and being associated with the terminal, wherein the communication section is controlled such that information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated with the video delivery system. 7. A video transmission system comprising: a video transmission device; and a terminal, wherein the video transmission device includes a video transmission section adapted to send, to a video delivery system that delivers videos by live streaming, a video to be delivered by the video delivery system, and a communication control section adapted to control the terminal associated with the video transmission device such that information on the video managed by the video delivery system can be communicated with the video delivery system, the terminal includes a communication section adapted to communicate, with the video delivery system that is the destination of the video sent from the video transmission device, information on the video managed by the video delivery system, and the communication section is controlled such that the information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated with the video delivery system. 8. A control method comprising: sending, by a video transmission device, a video to be delivered by a video delivery system that delivers videos by live streaming to the video delivery system; and controlling a terminal associated with the video transmission device such that information on the video managed by the video delivery system can be communicated with the video delivery system. 9. A control method comprising: communicating, by a terminal associated with a video transmission device sending a video to be delivered by a video delivery system, the destination of the video sent from the video transmission device by live streaming to the video delivery system, information on the video managed by the video delivery system with the video delivery system; and performing control such that information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated between the video delivery system and the terminal. 10. A non-transitory, computer readable storage medium containing a computer program, which when executed by a computer, causes the computer to perform actions, comprising: sending, by a video transmission section, to a video delivery system that delivers videos by live streaming, a video to be delivered by the video delivery system; and controlling, by a communication control section, a terminal associated with the computer such that information on the video managed by the video delivery system can be communicated with the video delivery system. 11. (canceled) 12. A non-transitory, computer readable storage medium containing a computer program, which when executed by a computer, causes the computer to perform actions, comprising: communicating, by a communication section, with a video delivery system that delivers videos by live streaming and is the destination of a video sent from a video transmission device, information on the video managed by the video delivery system, the video transmission device sending the video to be delivered by the video delivery system and being associated with the computer, wherein the computer is controlled such that information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated with the video delivery system. 13. (canceled)
Provided are a video transmission device, a terminal, a video transmission system, a control method, a program, and an information storage medium that contribute to reduced time and effort for a user during communication of information on a video managed by a video delivery system that delivers the video using a terminal different from the video transmission device that sends the video to be delivered by live streaming. A video transmission section sends, to a video delivery system that delivers videos by live streaming, a video to be delivered by the video delivery system. A video-related information communication control section controls an information terminal associated with a gaming device such that information on the video managed by the video delivery system can be communicated with the video delivery system.1. A video transmission device comprising: a video transmission section adapted to send, to a video delivery system operable to deliver videos by live streaming, a video to be delivered by the video delivery system; and a communication control section adapted to control a terminal associated with the video transmission device such that information on the video managed by the video delivery system can be communicated with the video delivery system. 2. The video transmission device of claim 1, wherein information on the video is comments posted from users viewing the video that is delivered by the video delivery system by live streaming. 3. The video transmission device of claim 2, wherein the communication control section performs control such that the terminal can post comments via a communication session established between the terminal and the video delivery system and used by the video transmission section to send the video. 4. The video transmission device of claim 1, wherein the communication control section relays communication of information on the video managed by the video delivery system between the video delivery system, the destination of the video sent from the video transmission section, and the terminal, the video transmission section sends the video by a communication scheme that is in keeping with the video delivery system, the destination of the video, and the video transmission section communicates, with the terminal, the information on the video managed by the video delivery system, the destination of the video, by a common communication scheme that is independent of the video delivery system, the destination of the video sent from the video transmission section. 5. The video transmission device of claim 1, wherein the terminal is a terminal that can be used by the video delivery system independently of the video transmission device. 6. A terminal comprising: a communication section adapted to communicate, with a video delivery system that delivers videos by live streaming and is the destination of the video sent from a video transmission device, information on the video managed by the video delivery system, the video transmission device sending the video to be delivered by the video delivery system and being associated with the terminal, wherein the communication section is controlled such that information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated with the video delivery system. 7. A video transmission system comprising: a video transmission device; and a terminal, wherein the video transmission device includes a video transmission section adapted to send, to a video delivery system that delivers videos by live streaming, a video to be delivered by the video delivery system, and a communication control section adapted to control the terminal associated with the video transmission device such that information on the video managed by the video delivery system can be communicated with the video delivery system, the terminal includes a communication section adapted to communicate, with the video delivery system that is the destination of the video sent from the video transmission device, information on the video managed by the video delivery system, and the communication section is controlled such that the information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated with the video delivery system. 8. A control method comprising: sending, by a video transmission device, a video to be delivered by a video delivery system that delivers videos by live streaming to the video delivery system; and controlling a terminal associated with the video transmission device such that information on the video managed by the video delivery system can be communicated with the video delivery system. 9. A control method comprising: communicating, by a terminal associated with a video transmission device sending a video to be delivered by a video delivery system, the destination of the video sent from the video transmission device by live streaming to the video delivery system, information on the video managed by the video delivery system with the video delivery system; and performing control such that information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated between the video delivery system and the terminal. 10. A non-transitory, computer readable storage medium containing a computer program, which when executed by a computer, causes the computer to perform actions, comprising: sending, by a video transmission section, to a video delivery system that delivers videos by live streaming, a video to be delivered by the video delivery system; and controlling, by a communication control section, a terminal associated with the computer such that information on the video managed by the video delivery system can be communicated with the video delivery system. 11. (canceled) 12. A non-transitory, computer readable storage medium containing a computer program, which when executed by a computer, causes the computer to perform actions, comprising: communicating, by a communication section, with a video delivery system that delivers videos by live streaming and is the destination of a video sent from a video transmission device, information on the video managed by the video delivery system, the video transmission device sending the video to be delivered by the video delivery system and being associated with the computer, wherein the computer is controlled such that information on the video managed by the video delivery system, the destination of the video sent from the video transmission device, can be communicated with the video delivery system. 13. (canceled)
2,400
8,514
8,514
14,583,311
2,459
Techniques for prompting communication among members of a social network are described. A social server may include an interaction detection component configured to detect a user interaction of a first user with an information unit. An information component of the social server may be configured to store an association between the first user and the information unit. A correlation component of the social server may be configured to correlate the first user with one or more other users based upon one or more stored associations. A messaging server may include a display component and a messaging component. The display component may be configured to provide a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation. The messaging component may be configured to initiate a communication with the one or more other users in response to a selection of the prompt by the first user. Other embodiments are described and claimed.
1. A computer-implemented method, comprising: detecting, by an interaction detection component, a user interaction of a first user with an information unit; storing on a non-transitory computer-readable storage medium, by an information component, an association between the first user and the information unit; correlating, by a correlation component, the first user with one or more other users based upon one or more stored associations; providing, by a display component, a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation; and initiating a communication with the one or more other users, by a messaging component, in response to a selection of the prompt by the first user. 2. The computer-implemented method of claim 1, wherein the information unit is one or more of a user profile, status update, check-in, news article, media content, or advertisement. 3. The computer-implemented method of claim 1, wherein the correlation is based upon a coefficient derived by a coefficient component. 4. The computer-implemented method of claim 1, wherein the correlation is based upon an affinity between a plurality of users determined by an affinity component. 5. The computer-implemented method of claim 1, wherein the correlation is based upon presence information and history information received from the messaging component. 6. The computer-implemented method of claim 1, wherein the display component includes a badge component configured to select a badge related to the one or more stored associations, the display component configured to associate the selected badge with the display of the one or more other users in a messaging application. 7. The computer-implemented method of claim 6, wherein the display component is configured to display additional information related to the correlation in response to an interaction with the selected badge. 8. A system, comprising: one or more processing circuits; a social server comprising: an interaction detection component operative on the one or more processing circuits and configured to detect a user interaction of a first user with an information unit; an information component operative on the one or more processing circuits and configured to store an association between the first user and the information unit; a correlation component operative on the one or more processing circuits and configured to correlate the first user with one or more other users based upon one or more stored associations; and a messaging server comprising: a display component operative on the one or more processing circuits and configured to provide a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation; and a messaging component operative on the one or more processing circuits and configured to initiate a communication with the one or more other users in response to a selection of the prompt by the first user. 9. The system of claim 8, wherein the information unit is one or more of a user profile, status update, check-in, news article, media content, or advertisement. 10. The system of claim 8, the social server further comprising a coefficient component operative on the one or more processor circuits and configured to derive a coefficient used by the correlation component to correlate the first user with one or more other users based upon one or more stored associations. 11. The system of claim 8, the social server further comprising an affinity component operative on the one or more processor circuits and configured to determine an affinity between a plurality of users used by the correlation component to correlate the first user with one or more other users based upon one or more stored associations. 12. The system of claim 8, wherein the correlation is based upon presence information and history information received from the messaging component. 13. The system of claim 8, wherein the display component includes a badge component operative on the one or more processor circuits and configured to select a badge related to the one or more stored associations, the display component configured to associate the selected badge with the display of the one or more other users in a messaging application. 14. The system of claim 13, wherein the display component is configured to display additional information related to the correlation in response to an interaction with the selected badge. 15. An article comprising at least one non-transitory computer-readable storage medium including instructions that, when executed by processor circuitry, cause a system to: detect, by an interaction detection component, a user interaction of a first user with an information unit; store on a non-transitory computer-readable storage medium, by an information component, an association between the first user and the information unit; correlate, by a correlation component, the first user with one or more other users based upon one or more stored associations; provide, by a display component, a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation; and initiate a communication with the one or more other users, by a messaging component, in response to a selection of the prompt by the first user. 16. The article of claim 15, wherein the information unit is one or more of a user profile, status update, check-in, news article, media content, or advertisement. 17. The article of claim 15, wherein the correlation is based upon a coefficient derived by a coefficient component. 18. The article of claim 15, wherein the correlation is based upon an affinity between a plurality of users determined by an affinity component. 19. The article of claim 15, wherein the correlation is based upon presence information and history information received from the messaging component. 20. The article of claim 15, wherein the display component includes a badge component configured to select a badge related to the one or more stored associations, the display component configured to associate the selected badge with the display of the one or more other users in a messaging application. 21. The article of claim 20, wherein the display component is configured to display additional information related to the correlation in response to an interaction with the selected badge.
Techniques for prompting communication among members of a social network are described. A social server may include an interaction detection component configured to detect a user interaction of a first user with an information unit. An information component of the social server may be configured to store an association between the first user and the information unit. A correlation component of the social server may be configured to correlate the first user with one or more other users based upon one or more stored associations. A messaging server may include a display component and a messaging component. The display component may be configured to provide a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation. The messaging component may be configured to initiate a communication with the one or more other users in response to a selection of the prompt by the first user. Other embodiments are described and claimed.1. A computer-implemented method, comprising: detecting, by an interaction detection component, a user interaction of a first user with an information unit; storing on a non-transitory computer-readable storage medium, by an information component, an association between the first user and the information unit; correlating, by a correlation component, the first user with one or more other users based upon one or more stored associations; providing, by a display component, a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation; and initiating a communication with the one or more other users, by a messaging component, in response to a selection of the prompt by the first user. 2. The computer-implemented method of claim 1, wherein the information unit is one or more of a user profile, status update, check-in, news article, media content, or advertisement. 3. The computer-implemented method of claim 1, wherein the correlation is based upon a coefficient derived by a coefficient component. 4. The computer-implemented method of claim 1, wherein the correlation is based upon an affinity between a plurality of users determined by an affinity component. 5. The computer-implemented method of claim 1, wherein the correlation is based upon presence information and history information received from the messaging component. 6. The computer-implemented method of claim 1, wherein the display component includes a badge component configured to select a badge related to the one or more stored associations, the display component configured to associate the selected badge with the display of the one or more other users in a messaging application. 7. The computer-implemented method of claim 6, wherein the display component is configured to display additional information related to the correlation in response to an interaction with the selected badge. 8. A system, comprising: one or more processing circuits; a social server comprising: an interaction detection component operative on the one or more processing circuits and configured to detect a user interaction of a first user with an information unit; an information component operative on the one or more processing circuits and configured to store an association between the first user and the information unit; a correlation component operative on the one or more processing circuits and configured to correlate the first user with one or more other users based upon one or more stored associations; and a messaging server comprising: a display component operative on the one or more processing circuits and configured to provide a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation; and a messaging component operative on the one or more processing circuits and configured to initiate a communication with the one or more other users in response to a selection of the prompt by the first user. 9. The system of claim 8, wherein the information unit is one or more of a user profile, status update, check-in, news article, media content, or advertisement. 10. The system of claim 8, the social server further comprising a coefficient component operative on the one or more processor circuits and configured to derive a coefficient used by the correlation component to correlate the first user with one or more other users based upon one or more stored associations. 11. The system of claim 8, the social server further comprising an affinity component operative on the one or more processor circuits and configured to determine an affinity between a plurality of users used by the correlation component to correlate the first user with one or more other users based upon one or more stored associations. 12. The system of claim 8, wherein the correlation is based upon presence information and history information received from the messaging component. 13. The system of claim 8, wherein the display component includes a badge component operative on the one or more processor circuits and configured to select a badge related to the one or more stored associations, the display component configured to associate the selected badge with the display of the one or more other users in a messaging application. 14. The system of claim 13, wherein the display component is configured to display additional information related to the correlation in response to an interaction with the selected badge. 15. An article comprising at least one non-transitory computer-readable storage medium including instructions that, when executed by processor circuitry, cause a system to: detect, by an interaction detection component, a user interaction of a first user with an information unit; store on a non-transitory computer-readable storage medium, by an information component, an association between the first user and the information unit; correlate, by a correlation component, the first user with one or more other users based upon one or more stored associations; provide, by a display component, a prompt to the first user suggesting that the first user initiate a communication with the one or more other users, the prompt based at least in part on the correlation; and initiate a communication with the one or more other users, by a messaging component, in response to a selection of the prompt by the first user. 16. The article of claim 15, wherein the information unit is one or more of a user profile, status update, check-in, news article, media content, or advertisement. 17. The article of claim 15, wherein the correlation is based upon a coefficient derived by a coefficient component. 18. The article of claim 15, wherein the correlation is based upon an affinity between a plurality of users determined by an affinity component. 19. The article of claim 15, wherein the correlation is based upon presence information and history information received from the messaging component. 20. The article of claim 15, wherein the display component includes a badge component configured to select a badge related to the one or more stored associations, the display component configured to associate the selected badge with the display of the one or more other users in a messaging application. 21. The article of claim 20, wherein the display component is configured to display additional information related to the correlation in response to an interaction with the selected badge.
2,400
8,515
8,515
15,685,984
2,466
In an example embodiment disclosed herein there is described a multi-radio device which comprises a first radio that first radio comprises a transmitter, and a second radio that second radio comprises a receiver that monitors a channel to obtain data representative of a predefined channel parameter. The second radio is operable to receive a signal from the first radio that indicates when the transmitter of the first radio is transmitting. The receiver of the second radio selectively excludes data representative of a predefined channel parameter based on whether the transmitter of the first radio is transmitting.
1. A multi-radio device, comprising: a first radio comprising a transmitter; and a second radio comprising a receiver and configured to: selectively monitor, using the receiver, a channel to obtain data representative of a measurement of a predefined channel parameter; receive, using a communication path distinct from a wireless communication path between the first and second radios, a signal from the first radio providing data indicating whether the transmitter of the first radio is transmitting; determine, based on the received signal, a length of time that the transmitter was transmitting during a sampling period for the measurement; and based on the determined length of time, selectively exclude measurements of the predefined channel parameter obtained while the transmitter of the first radio is transmitting. 2. The multi-radio device set forth in claim 1, wherein selectively excluding measurements of the predefined channel parameter comprises discarding the data representative of the measurements of the predefined channel parameter that are obtained while the transmitter is transmitting. 3. The multi-radio device set forth in claim 2, wherein: the second radio obtains data representative of a measurement of the predefined channel parameter during a predefined time period comprising a plurality of discrete sampling time intervals; and wherein the second radio ignores data representative of the measurement of the predefined channel parameter obtained during one or more of the plurality of discrete sampling time intervals of the predefined sampling period responsive to the signal indicating the first radio was transmitting during the predefined time period. 4. The multi-radio device set forth in claim 1, wherein: the second radio further comprises a counter storing a counter value indicating the length of time the transmitter was transmitting during the sampling period; and the second radio ignores data representative of a measurement of the predefined channel parameter obtained during the sampling period responsive to determining the counter value is above a predetermined threshold value. 5. The multi-radio device set forth in claim 4, wherein: the second radio aggregates data representative of measurements of the predefined channel parameter for a predetermined time period that comprises a plurality of sampling periods; and the second radio determines a representation of the aggregated data representative of the measurements of the predefined channel parameter by filtering the aggregated data and a number representative of good samples obtained during the sampling period. 6. The multi-radio device set forth in claim 5, wherein the second radio determines an average channel parameter from a plurality of predetermined time periods. 7. The multi-radio device set forth in claim 1, wherein the transmitter comprises a power amplifier; and the signal provided to the second radio is derived from an output of the power amplifier. 8. The multi-radio device set forth in claim 7, wherein the first radio further comprises a sensor device coupled with the output of the power amplifier, wherein the second radio is coupled with the sensor device and receives the signal from the sensor device. 9. The multi-radio device set forth in claim 1, wherein: the transmitter comprises a power amplifier comprising an output enable signal for switching power on to the power amplifier; and the signal provided to the second radio is derived from the output enable signal. 10. The multi-radio device set forth in claim 1, wherein the predefined channel parameter is one of a clear channel assessment, a noise floor, a bit error rate, and a packet error rate. 11. The multi-radio device set forth in claim 1, wherein: the second radio raises a threshold for ignoring measurements made while the transmitter is transmitting; and the second radio excludes signals below the threshold. 12. The multi-radio device set forth in claim 1, wherein the first radio operates on a first channel within a band, and the second radio operates on a second channel within the band. 13. The multi-radio device set forth in claim 12, wherein the second radio selectively excludes the measurements of the predefined channel parameter obtained while the transmitter of the first radio is transmitting by discarding data for a portion of a transmit spectral mask of the first radio that is expected to overlap the second channel. 14. The multi-radio device set forth in claim 1, wherein the communication path distinct from the receiver is conductive between the first and second radios. 15. The multi-radio device set forth in claim 1, wherein the signal received from the first radio indicates that the transmitter is disabled or attenuated. 16. Logic encoded in a non-transitory, tangible computer readable medium for execution by a processor, and when executed by the processor the logic being operable to: obtain, from a receiver of an associated multi-radio device having one or more wireless receivers, first data representative of a measured channel parameter, wherein the first data is obtained during a predetermined sampling period; obtain, using a communication path distinct from the one or more wireless receivers, second data indicating whether a co-located transmitter is transmitting; determine, based on the second data, a length of time that the co-located transmitter was transmitting during the sampling period; based on the determined length of time, selectively discard the first data representative of the measured channel parameter while the co-located transmitter is transmitting; and aggregate the first data representative of the measured channel parameter. 17. The logic set forth in claim 16, the logic being further operable to: discard the first data representative of the measured channel parameter responsive to determining the transmitter was transmitting for more than a predetermined threshold during the sampling period. 18. The logic set forth in claim 17, wherein the aggregate of the first data representative of the measured channel parameter for a predetermined time period comprises a plurality of sampling periods. 19. The logic set forth in claim 18, the logic being further operable to average the first data representative of the measured channel parameter for a plurality of predetermined time periods. 20. A method, comprising: obtaining a measurement of a channel parameter by a receiver, the receiver associated with a multi-radio device having one or more wireless receivers; receiving, using a communication path distinct from the one or more wireless receivers, a signal indicating whether a transmitter that is co-located with the receiver is transmitting; determining, based on the received signal, a length of time that the transmitter was transmitting during a sampling period for the measurement; based on the determined length of time, ignoring measurements for the channel parameter while the received signal indicates the transmitter is transmitting; and aggregating measurements of the channel parameter. 21. The method of claim 20, wherein ignoring measurements for the channel parameter while the signal indicating whether the transmitter that is co-located with the receiver is transmitting indicates the transmitter is transmitting further comprises: raising a threshold for the measurement of the channel parameter while the transmitter is transmitting; and, ignoring measurements of the channel parameter that are below the raised threshold.
In an example embodiment disclosed herein there is described a multi-radio device which comprises a first radio that first radio comprises a transmitter, and a second radio that second radio comprises a receiver that monitors a channel to obtain data representative of a predefined channel parameter. The second radio is operable to receive a signal from the first radio that indicates when the transmitter of the first radio is transmitting. The receiver of the second radio selectively excludes data representative of a predefined channel parameter based on whether the transmitter of the first radio is transmitting.1. A multi-radio device, comprising: a first radio comprising a transmitter; and a second radio comprising a receiver and configured to: selectively monitor, using the receiver, a channel to obtain data representative of a measurement of a predefined channel parameter; receive, using a communication path distinct from a wireless communication path between the first and second radios, a signal from the first radio providing data indicating whether the transmitter of the first radio is transmitting; determine, based on the received signal, a length of time that the transmitter was transmitting during a sampling period for the measurement; and based on the determined length of time, selectively exclude measurements of the predefined channel parameter obtained while the transmitter of the first radio is transmitting. 2. The multi-radio device set forth in claim 1, wherein selectively excluding measurements of the predefined channel parameter comprises discarding the data representative of the measurements of the predefined channel parameter that are obtained while the transmitter is transmitting. 3. The multi-radio device set forth in claim 2, wherein: the second radio obtains data representative of a measurement of the predefined channel parameter during a predefined time period comprising a plurality of discrete sampling time intervals; and wherein the second radio ignores data representative of the measurement of the predefined channel parameter obtained during one or more of the plurality of discrete sampling time intervals of the predefined sampling period responsive to the signal indicating the first radio was transmitting during the predefined time period. 4. The multi-radio device set forth in claim 1, wherein: the second radio further comprises a counter storing a counter value indicating the length of time the transmitter was transmitting during the sampling period; and the second radio ignores data representative of a measurement of the predefined channel parameter obtained during the sampling period responsive to determining the counter value is above a predetermined threshold value. 5. The multi-radio device set forth in claim 4, wherein: the second radio aggregates data representative of measurements of the predefined channel parameter for a predetermined time period that comprises a plurality of sampling periods; and the second radio determines a representation of the aggregated data representative of the measurements of the predefined channel parameter by filtering the aggregated data and a number representative of good samples obtained during the sampling period. 6. The multi-radio device set forth in claim 5, wherein the second radio determines an average channel parameter from a plurality of predetermined time periods. 7. The multi-radio device set forth in claim 1, wherein the transmitter comprises a power amplifier; and the signal provided to the second radio is derived from an output of the power amplifier. 8. The multi-radio device set forth in claim 7, wherein the first radio further comprises a sensor device coupled with the output of the power amplifier, wherein the second radio is coupled with the sensor device and receives the signal from the sensor device. 9. The multi-radio device set forth in claim 1, wherein: the transmitter comprises a power amplifier comprising an output enable signal for switching power on to the power amplifier; and the signal provided to the second radio is derived from the output enable signal. 10. The multi-radio device set forth in claim 1, wherein the predefined channel parameter is one of a clear channel assessment, a noise floor, a bit error rate, and a packet error rate. 11. The multi-radio device set forth in claim 1, wherein: the second radio raises a threshold for ignoring measurements made while the transmitter is transmitting; and the second radio excludes signals below the threshold. 12. The multi-radio device set forth in claim 1, wherein the first radio operates on a first channel within a band, and the second radio operates on a second channel within the band. 13. The multi-radio device set forth in claim 12, wherein the second radio selectively excludes the measurements of the predefined channel parameter obtained while the transmitter of the first radio is transmitting by discarding data for a portion of a transmit spectral mask of the first radio that is expected to overlap the second channel. 14. The multi-radio device set forth in claim 1, wherein the communication path distinct from the receiver is conductive between the first and second radios. 15. The multi-radio device set forth in claim 1, wherein the signal received from the first radio indicates that the transmitter is disabled or attenuated. 16. Logic encoded in a non-transitory, tangible computer readable medium for execution by a processor, and when executed by the processor the logic being operable to: obtain, from a receiver of an associated multi-radio device having one or more wireless receivers, first data representative of a measured channel parameter, wherein the first data is obtained during a predetermined sampling period; obtain, using a communication path distinct from the one or more wireless receivers, second data indicating whether a co-located transmitter is transmitting; determine, based on the second data, a length of time that the co-located transmitter was transmitting during the sampling period; based on the determined length of time, selectively discard the first data representative of the measured channel parameter while the co-located transmitter is transmitting; and aggregate the first data representative of the measured channel parameter. 17. The logic set forth in claim 16, the logic being further operable to: discard the first data representative of the measured channel parameter responsive to determining the transmitter was transmitting for more than a predetermined threshold during the sampling period. 18. The logic set forth in claim 17, wherein the aggregate of the first data representative of the measured channel parameter for a predetermined time period comprises a plurality of sampling periods. 19. The logic set forth in claim 18, the logic being further operable to average the first data representative of the measured channel parameter for a plurality of predetermined time periods. 20. A method, comprising: obtaining a measurement of a channel parameter by a receiver, the receiver associated with a multi-radio device having one or more wireless receivers; receiving, using a communication path distinct from the one or more wireless receivers, a signal indicating whether a transmitter that is co-located with the receiver is transmitting; determining, based on the received signal, a length of time that the transmitter was transmitting during a sampling period for the measurement; based on the determined length of time, ignoring measurements for the channel parameter while the received signal indicates the transmitter is transmitting; and aggregating measurements of the channel parameter. 21. The method of claim 20, wherein ignoring measurements for the channel parameter while the signal indicating whether the transmitter that is co-located with the receiver is transmitting indicates the transmitter is transmitting further comprises: raising a threshold for the measurement of the channel parameter while the transmitter is transmitting; and, ignoring measurements of the channel parameter that are below the raised threshold.
2,400
8,516
8,516
16,276,095
2,449
Various methods, apparatuses, and media for notifying a user of an operational state of a web application are provided. Three values that relate to data caching, error occurrence, and data retrieval are used to determine the operational state. The methods may use a software module that is compatible with any React JavaScript application.
1. A method for notifying a user of an operational state of a web application, the method comprising: obtaining, from the web application, a first value that relates to a data caching state, a second value that relates to an error state, and a third value that relates to a data retrieval state; determining, based on the obtained first value, the obtained second value, and the obtained third value, the operational state of the web application; and displaying, on a screen of a user device, information that relates to the determined operational state. 2. The method of claim 1, wherein the method is implemented in a React JavaScript framework by using a set of computer-readable instructions that is compatible with any React JavaScript application. 3. The method of claim 1, further comprising receiving, from the user, at least one instruction relating to a content of the information that relates to the determined operational state, and determining, based on the received at least one instruction, the content of the information to be displayed. 4. The method of claim 1, wherein when the operational state of the web application is determined as a data caching state, the displaying comprises displaying a rotating spinner icon. 5. The method of claim 1, wherein when the operational state of the web application is determined as an error state, the displaying comprises displaying a text string that indicates an occurrence of an error. 6. The method of claim 1, wherein the web application includes at least one from among a Gmail application, a Dropbox application, and a Facebook application. 7. The method of claim 1, further comprising updating the operational state by continuously obtaining, from the web application, each of the first value, the second value, and the third value, and when at least one from among the first value, the second value, and the third value has changed, determining an updated operational state and displaying updated information that relates to the determined updated operational state. 8. A computing apparatus, comprising: a display; a processor; and a communication interface coupled to each of the processor and the display, wherein the processor is configured to: obtain, from a web application that is running on the computing apparatus, a first value that relates to a data caching state, a second value that relates to an error state, and a third value that relates to a data retrieval state; determine, based on the obtained first value, the obtained second value, and the obtained third value, an operational state of the web application; and cause the display to display information that relates to the determined operational state. 9. The computing apparatus of claim 8, wherein the processor is further configured to receive, from a user via the communication interface, at least one instruction relating to a content of the information that relates to the determined operational state, and to determine, based on the received at least one instruction, the content of the information to be displayed. 10. The computing apparatus of claim 8, wherein when the operational state of the web application is determined as a data caching state, the processor is further configured to cause the display to display a rotating spinner icon. 11. The computing apparatus of claim 8, wherein when the operational state of the web application is determined as an error state, the processor is further configured to cause the display to display a text string that indicates an occurrence of an error. 12. The computing apparatus of claim 8, wherein the web application includes at least one from among a Gmail application, a Dropbox application, and a Facebook application. 13. The computing apparatus of claim 8, wherein the processor is further configured to update the operational state by continuously obtaining, from the web application, each of the first value, the second value, and the third value, and when at least one from among the first value, the second value, and the third value has changed, to determine an updated operational state and to cause the display to display updated information that relates to the determined updated operational state. 14. A non-transitory computer-readable medium configured to store first instructions for implementing a method for notifying a user of an operational state of a web application, wherein when executed, the first instructions cause a computer to: obtain, from the web application, a first value that relates to a data caching state, a second value that relates to an error state, and a third value that relates to a data retrieval state; determine, based on the obtained first value, the obtained second value, and the obtained third value, the operational state of the web application; and display, on a screen of a user device, information that relates to the determined operational state. 15. The computer-readable medium of claim 14, wherein the method is implemented in a React JavaScript framework, and wherein the first instructions are compatible with any React JavaScript application. 16. The computer-readable medium of claim 14, wherein the first instructions further cause the computer to receive, from the user, at least one second instruction relating to a content of the information that relates to the determined operational state, and to determine, based on the received at least one second instruction, the content of the information to be displayed. 17. The computer-readable medium of claim 14, wherein when the operational state of the web application is determined as a data caching state, the first instructions further cause the computer to display a rotating spinner icon. 18. The computer-readable medium of claim 14, wherein when the operational state of the web application is determined as an error state, the first instructions further cause the computer to display a text string that indicates an occurrence of an error. 19. The computer-readable medium of claim 14, wherein the web application includes at least one from among a Gmail application, a Dropbox application, and a Facebook application. 20. The computer-readable medium of claim 14, wherein the first instructions further cause the computer to update the operational state by continuously obtaining, from the web application, each of the first value, the second value, and the third value, and when at least one from among the first value, the second value, and the third value has changed, determining an updated operational state and displaying updated information that relates to the determined updated operational state.
Various methods, apparatuses, and media for notifying a user of an operational state of a web application are provided. Three values that relate to data caching, error occurrence, and data retrieval are used to determine the operational state. The methods may use a software module that is compatible with any React JavaScript application.1. A method for notifying a user of an operational state of a web application, the method comprising: obtaining, from the web application, a first value that relates to a data caching state, a second value that relates to an error state, and a third value that relates to a data retrieval state; determining, based on the obtained first value, the obtained second value, and the obtained third value, the operational state of the web application; and displaying, on a screen of a user device, information that relates to the determined operational state. 2. The method of claim 1, wherein the method is implemented in a React JavaScript framework by using a set of computer-readable instructions that is compatible with any React JavaScript application. 3. The method of claim 1, further comprising receiving, from the user, at least one instruction relating to a content of the information that relates to the determined operational state, and determining, based on the received at least one instruction, the content of the information to be displayed. 4. The method of claim 1, wherein when the operational state of the web application is determined as a data caching state, the displaying comprises displaying a rotating spinner icon. 5. The method of claim 1, wherein when the operational state of the web application is determined as an error state, the displaying comprises displaying a text string that indicates an occurrence of an error. 6. The method of claim 1, wherein the web application includes at least one from among a Gmail application, a Dropbox application, and a Facebook application. 7. The method of claim 1, further comprising updating the operational state by continuously obtaining, from the web application, each of the first value, the second value, and the third value, and when at least one from among the first value, the second value, and the third value has changed, determining an updated operational state and displaying updated information that relates to the determined updated operational state. 8. A computing apparatus, comprising: a display; a processor; and a communication interface coupled to each of the processor and the display, wherein the processor is configured to: obtain, from a web application that is running on the computing apparatus, a first value that relates to a data caching state, a second value that relates to an error state, and a third value that relates to a data retrieval state; determine, based on the obtained first value, the obtained second value, and the obtained third value, an operational state of the web application; and cause the display to display information that relates to the determined operational state. 9. The computing apparatus of claim 8, wherein the processor is further configured to receive, from a user via the communication interface, at least one instruction relating to a content of the information that relates to the determined operational state, and to determine, based on the received at least one instruction, the content of the information to be displayed. 10. The computing apparatus of claim 8, wherein when the operational state of the web application is determined as a data caching state, the processor is further configured to cause the display to display a rotating spinner icon. 11. The computing apparatus of claim 8, wherein when the operational state of the web application is determined as an error state, the processor is further configured to cause the display to display a text string that indicates an occurrence of an error. 12. The computing apparatus of claim 8, wherein the web application includes at least one from among a Gmail application, a Dropbox application, and a Facebook application. 13. The computing apparatus of claim 8, wherein the processor is further configured to update the operational state by continuously obtaining, from the web application, each of the first value, the second value, and the third value, and when at least one from among the first value, the second value, and the third value has changed, to determine an updated operational state and to cause the display to display updated information that relates to the determined updated operational state. 14. A non-transitory computer-readable medium configured to store first instructions for implementing a method for notifying a user of an operational state of a web application, wherein when executed, the first instructions cause a computer to: obtain, from the web application, a first value that relates to a data caching state, a second value that relates to an error state, and a third value that relates to a data retrieval state; determine, based on the obtained first value, the obtained second value, and the obtained third value, the operational state of the web application; and display, on a screen of a user device, information that relates to the determined operational state. 15. The computer-readable medium of claim 14, wherein the method is implemented in a React JavaScript framework, and wherein the first instructions are compatible with any React JavaScript application. 16. The computer-readable medium of claim 14, wherein the first instructions further cause the computer to receive, from the user, at least one second instruction relating to a content of the information that relates to the determined operational state, and to determine, based on the received at least one second instruction, the content of the information to be displayed. 17. The computer-readable medium of claim 14, wherein when the operational state of the web application is determined as a data caching state, the first instructions further cause the computer to display a rotating spinner icon. 18. The computer-readable medium of claim 14, wherein when the operational state of the web application is determined as an error state, the first instructions further cause the computer to display a text string that indicates an occurrence of an error. 19. The computer-readable medium of claim 14, wherein the web application includes at least one from among a Gmail application, a Dropbox application, and a Facebook application. 20. The computer-readable medium of claim 14, wherein the first instructions further cause the computer to update the operational state by continuously obtaining, from the web application, each of the first value, the second value, and the third value, and when at least one from among the first value, the second value, and the third value has changed, determining an updated operational state and displaying updated information that relates to the determined updated operational state.
2,400
8,517
8,517
15,640,357
2,449
The present disclosure relates to systems and methods for automatically converting one or more emails to one or more chat conversations and for automatically converting a chat conversation to an email thread.
1. A system for automatically converting one or more emails to one or more chat conversations, comprising: a memory storing instructions; and a processor configured to execute the instructions to: receive an email thread having at least one email, receive a request to convert the email thread to a chat conversation, determine a plurality of recipients from the email thread, parse the email thread to determine a plurality of conversation flows, generate a plurality of chat conversations based on the plurality of recipients and corresponding to the plurality of conversation flows, and generate chat messages between one or more of the recipients containing portions of the email thread in an order determined by the plurality of conversation flows. 2. The system of claim 1, further comprising instructions to: receive an identifier associated with a user; compare the identifier to a database of known identifiers; and continue executing the instructions only if the identifier matches a known identifier. 3. The system of claim 1, further comprising instructions to: generate a unique confirmation code in response to the request; transmit the unique confirmation code to a user; receive a code from the user; and continue executing the instructions only if the code from the user matches the unique confirmation code. 4. The system of claim 1, wherein the instructions to receive an email thread further comprise instructions to: receive a forwarded email having the email thread; and extract the email thread from the forwarded email. 5. A method for automatically converting one or more emails to one or more chat conversations, comprising: receiving an email thread having at least one email, receiving a request to convert the email thread to a chat conversation, determining a plurality of recipients from the email thread, parsing the email thread to determine a plurality of conversation flows, generating a plurality of chat conversations based on the plurality of recipients and corresponding to the plurality of conversation flows, and generating chat messages between one or more of the recipients containing portions of the email thread in an order determined by the plurality of conversation flows. 6. The method of claim 5, further comprising: receiving an identifier associated with a user; comparing the identifier to a database of known identifiers; and continuing the method only if the identifier matches a known identifier. 7. The method of claim 5, further comprising: generating a unique confirmation code in response to the request; transmitting the unique confirmation code to a user; receiving a code from the user; and continuing the method only if the code from the user matches the unique confirmation code. 8. The method of claim 5, wherein receiving an email thread further comprises: receiving a forwarded email having the email thread; and extracting the email thread from the forwarded email. 9. A system for automatically converting a chat conversation to an email thread, comprising: a memory storing instructions; and a processor configured to execute the instructions to: receive at least one chat conversation, receive a request to convert the at least one chat conversation to an email thread, determine a plurality of recipients from the at least one chat conversation, parse the at least one chat conversation to determine a plurality of conversation flows, generate a plurality of email threads between the determined recipients containing portions of the chat conversation in an order determined by the plurality of conversation flows, and transmit the generated email threads to an email host for delivery to the determined recipients. 10. The system of claim 9, further comprising instructions to: receive an identifier associated with a user; compare the identifier to a database of known identifiers; and continue executing the instructions only if the identifier matches a known identifier. 11. The system of claim 9, further comprising instructions to: generate a unique confirmation code in response to the request; transmit the unique confirmation code to a user; receive a code from the user; and continue executing the instructions only if the code from the user matches the unique confirmation code. 12. A method for automatically converting a chat conversation to an email thread, comprising: receiving at least one chat conversation, receiving a request to convert the at least one chat conversation to an email thread, determining a plurality of recipients from the at least one chat conversation, parsing the at least one chat conversation to determine a plurality of conversation flows, generating a plurality of email threads between the determined recipients containing portions of the chat conversation in an order determined by the plurality of conversation flows, and transmitting the generated email threads to an email host for delivery to the determined recipients. 13. The method of claim 12, further comprising: receiving an identifier associated with a user; comparing the identifier to a database of known identifiers; and continuing the method only if the identifier matches a known identifier. 14. The method of claim 12, further comprising: generating a unique confirmation code in response to the request; transmitting the unique confirmation code to a user; receiving a code from the user; and continuing the method only if the code from the user matches the unique confirmation code. 15. The system of claim 1, wherein at least one conversation flow comprises a temporal flow. 16. The system of claim 15, wherein the processor is further configured to determine the temporal flow based on timestamps of the at least one email. 17. The system of claim 1, wherein at least one conversation flow comprises a logical flow. 18. The system of claim 17, wherein the processor is further configured to determine the logical flow by classifying the at least one email by subject based on context clues extracted from the at least one email. 19. The system of claim 1, wherein the one or more conversation flows include a fork representing a split in a flow. 20. The system of claim 19, wherein the fork divides a conversation flow into a main flow and a tributary flow.
The present disclosure relates to systems and methods for automatically converting one or more emails to one or more chat conversations and for automatically converting a chat conversation to an email thread.1. A system for automatically converting one or more emails to one or more chat conversations, comprising: a memory storing instructions; and a processor configured to execute the instructions to: receive an email thread having at least one email, receive a request to convert the email thread to a chat conversation, determine a plurality of recipients from the email thread, parse the email thread to determine a plurality of conversation flows, generate a plurality of chat conversations based on the plurality of recipients and corresponding to the plurality of conversation flows, and generate chat messages between one or more of the recipients containing portions of the email thread in an order determined by the plurality of conversation flows. 2. The system of claim 1, further comprising instructions to: receive an identifier associated with a user; compare the identifier to a database of known identifiers; and continue executing the instructions only if the identifier matches a known identifier. 3. The system of claim 1, further comprising instructions to: generate a unique confirmation code in response to the request; transmit the unique confirmation code to a user; receive a code from the user; and continue executing the instructions only if the code from the user matches the unique confirmation code. 4. The system of claim 1, wherein the instructions to receive an email thread further comprise instructions to: receive a forwarded email having the email thread; and extract the email thread from the forwarded email. 5. A method for automatically converting one or more emails to one or more chat conversations, comprising: receiving an email thread having at least one email, receiving a request to convert the email thread to a chat conversation, determining a plurality of recipients from the email thread, parsing the email thread to determine a plurality of conversation flows, generating a plurality of chat conversations based on the plurality of recipients and corresponding to the plurality of conversation flows, and generating chat messages between one or more of the recipients containing portions of the email thread in an order determined by the plurality of conversation flows. 6. The method of claim 5, further comprising: receiving an identifier associated with a user; comparing the identifier to a database of known identifiers; and continuing the method only if the identifier matches a known identifier. 7. The method of claim 5, further comprising: generating a unique confirmation code in response to the request; transmitting the unique confirmation code to a user; receiving a code from the user; and continuing the method only if the code from the user matches the unique confirmation code. 8. The method of claim 5, wherein receiving an email thread further comprises: receiving a forwarded email having the email thread; and extracting the email thread from the forwarded email. 9. A system for automatically converting a chat conversation to an email thread, comprising: a memory storing instructions; and a processor configured to execute the instructions to: receive at least one chat conversation, receive a request to convert the at least one chat conversation to an email thread, determine a plurality of recipients from the at least one chat conversation, parse the at least one chat conversation to determine a plurality of conversation flows, generate a plurality of email threads between the determined recipients containing portions of the chat conversation in an order determined by the plurality of conversation flows, and transmit the generated email threads to an email host for delivery to the determined recipients. 10. The system of claim 9, further comprising instructions to: receive an identifier associated with a user; compare the identifier to a database of known identifiers; and continue executing the instructions only if the identifier matches a known identifier. 11. The system of claim 9, further comprising instructions to: generate a unique confirmation code in response to the request; transmit the unique confirmation code to a user; receive a code from the user; and continue executing the instructions only if the code from the user matches the unique confirmation code. 12. A method for automatically converting a chat conversation to an email thread, comprising: receiving at least one chat conversation, receiving a request to convert the at least one chat conversation to an email thread, determining a plurality of recipients from the at least one chat conversation, parsing the at least one chat conversation to determine a plurality of conversation flows, generating a plurality of email threads between the determined recipients containing portions of the chat conversation in an order determined by the plurality of conversation flows, and transmitting the generated email threads to an email host for delivery to the determined recipients. 13. The method of claim 12, further comprising: receiving an identifier associated with a user; comparing the identifier to a database of known identifiers; and continuing the method only if the identifier matches a known identifier. 14. The method of claim 12, further comprising: generating a unique confirmation code in response to the request; transmitting the unique confirmation code to a user; receiving a code from the user; and continuing the method only if the code from the user matches the unique confirmation code. 15. The system of claim 1, wherein at least one conversation flow comprises a temporal flow. 16. The system of claim 15, wherein the processor is further configured to determine the temporal flow based on timestamps of the at least one email. 17. The system of claim 1, wherein at least one conversation flow comprises a logical flow. 18. The system of claim 17, wherein the processor is further configured to determine the logical flow by classifying the at least one email by subject based on context clues extracted from the at least one email. 19. The system of claim 1, wherein the one or more conversation flows include a fork representing a split in a flow. 20. The system of claim 19, wherein the fork divides a conversation flow into a main flow and a tributary flow.
2,400
8,518
8,518
14,589,124
2,458
Techniques for network resource caching are described. In one embodiment, an apparatus may comprise a client proxy component and a resource component. The client proxy component may receive a request for a data item and transmit a delta update to the client device in response to the request. The resource component may determine that the cached resource hash corresponds to the older version of the data item and determine the current version of the data item. In another embodiment, an apparatus may comprise a prediction component and a cache management component. The prediction component may predict a user interest in receiving a data item on a device. The cache management component may retrieve the data item from a network server in response to the predicted user interest and cache the data item on the device. Other embodiments are described and claimed.
1. A computer-implemented method, comprising: receiving a request for a data item from a client device at a proxy server device, the request comprising a cached resource hash; determining that the cached resource hash corresponds to an older version of the data item; determining a current version of the data item; and transmitting a delta update to the client device in response to the request, the delta update comprising differences between the older version of the data item and the current version of the data item. 2. The method of claim 1, comprising: retrieving the current version of the data item from a network server associated with the data item; retrieving the older version of the data item from a resource cache associated with the proxy server device; and generating the delta update by calculating a differential between the older version of the data item and the current version of the data item. 3. The method of claim 2, comprising: generating a current version cache resource hash corresponding to the current version of the data item; and storing the delta update in the resource cache, the delta update indexed by the current version cache resource hash generated from the current version of the data item. 4. The method of claim 1, the proxy server device associated with a resource cache, the resource cache containing two or more cached delta updates corresponding to the data item, comprising: retrieving the two or more cached delta updates from the resource cache; and combining the two or more cached delta updates to form the delta update. 5. The method of claim 1, the cached resource hash corresponding to a data item template generated from the older version of the data item, the data item template comprising static elements of the data item. 6. The method of claim 1, the cached resource hash corresponding to a modified older version of the data item, the modified older version excluding one or more dynamic elements of the data item. 7. The method of claim 6, wherein a timestamp for the data item comprises at least one of the one or more dynamic elements of the data item excluded from the modified older version during generation of the cached resource hash. 8. The method of claim 1, wherein determining that the cached resource hash corresponds to the older version of the data item comprises performing an index-based retrieval against a resource cache, the cached resource hash used as an index for the index-based retrieval. 9. An apparatus, comprising: a processor circuit on a device; a client proxy component operative on the processor circuit to receive a request for a data item from a client device at a proxy server device, the request comprising a cached resource hash and transmit a delta update to the client device in response to the request, the delta update comprising differences between an older version of the data item and a current version of the data item; and a resource component operative on the processor circuit to determine that the cached resource hash corresponds to the older version of the data item and determine the current version of the data item. 10. The apparatus of claim 9, the resource component operative to retrieve the current version of the data item from a network server associated with the data item, retrieve the older version of the data item from a resource cache associated with the proxy server device, and generate the delta update by calculating a differential between the older version of the data item and the current version of the data item. 11. The apparatus of claim 10, the resource component operative to generate a current version cache resource hash corresponding to the current version of the data item and store the delta update in the resource cache, the delta update indexed by the current version cache resource hash generated from the current version of the data item. 12. The apparatus of claim 9, the proxy server device associated with a resource cache, the resource cache containing two or more cached delta updates corresponding to the data item, the resource component operative to retrieve the two or more cached delta updates from the resource cache and combine the two or more cached delta updates to form the delta update. 13. The apparatus of claim 9, the cached resource hash corresponding to a data item template generated from the older version of the data item, the data item template comprising static elements of the data item. 14. The apparatus of claim 9, the cached resource hash corresponding to a modified older version of the data item, the modified older version excluding one or more dynamic elements of the data item. 15. The apparatus of claim 9, wherein determining that the cached resource hash corresponds to the older version of the data item comprises performing an index-based retrieval against a resource cache, the cached resource hash used as an index for the index-based retrieval. 16. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to: receive a request for a data item from a client device at a proxy server device, the request comprising a cached resource hash; determine that the cached resource hash corresponds to an older version of the data item; determine a current version of the data item; and transmit a delta update to the client device in response to the request, the delta update comprising differences between the older version of the data item and the current version of the data item. 17. The computer-readable storage medium of claim 16, comprising further instructions that, when executed, cause a system to: retrieve the current version of the data item from a network server associated with the data item; retrieve the older version of the data item from a resource cache associated with the proxy server device; and generate the delta update by calculating a differential between the older version of the data item and the current version of the data item. 18. The computer-readable storage medium of claim 16, the cached resource hash corresponding to a data item template generated from the older version of the data item, the data item template comprising static elements of the data item. 19. The computer-readable storage medium of claim 16, the cached resource hash corresponding to a modified older version of the data item, the modified older version excluding one or more dynamic elements of the data item. 20. The computer-readable storage medium of claim 16, wherein determining that the cached resource hash corresponds to the older version of the data item comprises performing an index-based retrieval against a resource cache, the cached resource hash used as an index for the index-based retrieval.
Techniques for network resource caching are described. In one embodiment, an apparatus may comprise a client proxy component and a resource component. The client proxy component may receive a request for a data item and transmit a delta update to the client device in response to the request. The resource component may determine that the cached resource hash corresponds to the older version of the data item and determine the current version of the data item. In another embodiment, an apparatus may comprise a prediction component and a cache management component. The prediction component may predict a user interest in receiving a data item on a device. The cache management component may retrieve the data item from a network server in response to the predicted user interest and cache the data item on the device. Other embodiments are described and claimed.1. A computer-implemented method, comprising: receiving a request for a data item from a client device at a proxy server device, the request comprising a cached resource hash; determining that the cached resource hash corresponds to an older version of the data item; determining a current version of the data item; and transmitting a delta update to the client device in response to the request, the delta update comprising differences between the older version of the data item and the current version of the data item. 2. The method of claim 1, comprising: retrieving the current version of the data item from a network server associated with the data item; retrieving the older version of the data item from a resource cache associated with the proxy server device; and generating the delta update by calculating a differential between the older version of the data item and the current version of the data item. 3. The method of claim 2, comprising: generating a current version cache resource hash corresponding to the current version of the data item; and storing the delta update in the resource cache, the delta update indexed by the current version cache resource hash generated from the current version of the data item. 4. The method of claim 1, the proxy server device associated with a resource cache, the resource cache containing two or more cached delta updates corresponding to the data item, comprising: retrieving the two or more cached delta updates from the resource cache; and combining the two or more cached delta updates to form the delta update. 5. The method of claim 1, the cached resource hash corresponding to a data item template generated from the older version of the data item, the data item template comprising static elements of the data item. 6. The method of claim 1, the cached resource hash corresponding to a modified older version of the data item, the modified older version excluding one or more dynamic elements of the data item. 7. The method of claim 6, wherein a timestamp for the data item comprises at least one of the one or more dynamic elements of the data item excluded from the modified older version during generation of the cached resource hash. 8. The method of claim 1, wherein determining that the cached resource hash corresponds to the older version of the data item comprises performing an index-based retrieval against a resource cache, the cached resource hash used as an index for the index-based retrieval. 9. An apparatus, comprising: a processor circuit on a device; a client proxy component operative on the processor circuit to receive a request for a data item from a client device at a proxy server device, the request comprising a cached resource hash and transmit a delta update to the client device in response to the request, the delta update comprising differences between an older version of the data item and a current version of the data item; and a resource component operative on the processor circuit to determine that the cached resource hash corresponds to the older version of the data item and determine the current version of the data item. 10. The apparatus of claim 9, the resource component operative to retrieve the current version of the data item from a network server associated with the data item, retrieve the older version of the data item from a resource cache associated with the proxy server device, and generate the delta update by calculating a differential between the older version of the data item and the current version of the data item. 11. The apparatus of claim 10, the resource component operative to generate a current version cache resource hash corresponding to the current version of the data item and store the delta update in the resource cache, the delta update indexed by the current version cache resource hash generated from the current version of the data item. 12. The apparatus of claim 9, the proxy server device associated with a resource cache, the resource cache containing two or more cached delta updates corresponding to the data item, the resource component operative to retrieve the two or more cached delta updates from the resource cache and combine the two or more cached delta updates to form the delta update. 13. The apparatus of claim 9, the cached resource hash corresponding to a data item template generated from the older version of the data item, the data item template comprising static elements of the data item. 14. The apparatus of claim 9, the cached resource hash corresponding to a modified older version of the data item, the modified older version excluding one or more dynamic elements of the data item. 15. The apparatus of claim 9, wherein determining that the cached resource hash corresponds to the older version of the data item comprises performing an index-based retrieval against a resource cache, the cached resource hash used as an index for the index-based retrieval. 16. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to: receive a request for a data item from a client device at a proxy server device, the request comprising a cached resource hash; determine that the cached resource hash corresponds to an older version of the data item; determine a current version of the data item; and transmit a delta update to the client device in response to the request, the delta update comprising differences between the older version of the data item and the current version of the data item. 17. The computer-readable storage medium of claim 16, comprising further instructions that, when executed, cause a system to: retrieve the current version of the data item from a network server associated with the data item; retrieve the older version of the data item from a resource cache associated with the proxy server device; and generate the delta update by calculating a differential between the older version of the data item and the current version of the data item. 18. The computer-readable storage medium of claim 16, the cached resource hash corresponding to a data item template generated from the older version of the data item, the data item template comprising static elements of the data item. 19. The computer-readable storage medium of claim 16, the cached resource hash corresponding to a modified older version of the data item, the modified older version excluding one or more dynamic elements of the data item. 20. The computer-readable storage medium of claim 16, wherein determining that the cached resource hash corresponds to the older version of the data item comprises performing an index-based retrieval against a resource cache, the cached resource hash used as an index for the index-based retrieval.
2,400
8,519
8,519
13,774,984
2,466
Systems, devices and methods described herein provide or possess functionality that enables dynamically selecting a data rate from a plurality of available data rates. In one implementation, an initial data rate for transmitting a packet is reduced aggressively until it is determined that consecutive packets were transmitted successfully. In another implementation, an initial data rate is increased moderately after it is determined that consecutive packets were transmitted successfully.
1. A system for accessing information, comprising: a processor; and a storage including instructions that, when executed by the processor, cause the processor to: determine unsuccessful transmission of a data packet at a first data rate; and retransmit the data packet at a second data rate, the second data rate at least two data rates lower than the first data rate. 2. The system according to claim 1, wherein the system is a mobile device having IEEE 802.11 wireless communication capability. 3. The system according to claim 1, wherein the first and second data rates are included in a plurality of data rates. 4. The system according to claim 1, wherein the instructions further cause the processor to receive an acknowledgment indicating that the data packet retransmitted at the second data rate was received, and transmit a subsequent data packet at a third data rate, the third data rate being greater than the second data rate. 5. The system according to claim 1, wherein the instructions further cause the processor to determine a plurality of unsuccessful transmissions of the data packet at the first data rate, the retransmit act executed after the plurality of unsuccessful transmissions of the data packet at the first data rate. 6. The system according to claim 1, wherein the instructions further cause the processor to retransmit the data packet a predetermined maximum number of times, wherein a final retransmit of the data packet is at a lowest data rate of a plurality of data rates. 7. The system according to claim 6, wherein the predetermined maximum number of times is seven and the lowest data rate the plurality of data rates is 1 Mbit/s. 8. A system, comprising: a processor; and a storage including instructions that, when executed by the processor, cause the processor to: determine that at least a plurality of data packets required retransmission attempts in advance of determining successful transmission of the plurality of data packets; decrement at least two data rate positions in a plurality of data rates to establish a decremented data rate; and transmit a data packet at the decremented data rate. 9. The system according to claim 8, wherein the system is a mobile device having IEEE 802.11 wireless communication capability. 10. The system according to claim 8, wherein the instructions further cause the processor to receive an acknowledgment indicating that the data packet retransmitted at the decremented data rate was received, and transmit a subsequent data packet at an incremented data rate greater than the decremented data rate. 11. The system according to claim 10, wherein the incremented data rate is one data rate greater than the decremented data rate. 12. The system according to claim 8, wherein the plurality of data rates includes data rates 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48 and 54 Mbit/s. 13. A tangible computer-readable medium storing computer-executable instructions that, when executed a processor, perform a method, comprising: determining unsuccessful transmission of a data packet at a first data rate; and retransmitting the data packet at a second data rate, the second data rate at least two data rates lower than the first data rate. 14. The tangible computer-readable medium including computer-executable instructions according to claim 13, wherein the first and second data rates are included in a predetermined set of data rates. 15. The tangible computer-readable medium including computer-executable instructions according to claim 14, wherein the predetermined set of data rates includes data rates 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48 and 54 Mbit/s. 16. The tangible computer-readable medium including computer-executable instructions according to claim 13, wherein the determining act determines unsuccessful transmission of the data packet at the first data rate at least two times before executing the retransmitting act. 17. The tangible computer-readable medium including computer-executable instructions according to claim 13, further comprising determining successful transmission of the data packet at the second data rate; and transmitting a subsequent data packet at a third data rate, the third data rate being greater than the second data rate. 18. A tangible computer-readable medium storing computer-executable instructions that, when executed a processor, perform a method, comprising: determining that first and second data packets were transmitted successfully at a first data rate after one or more retransmissions of each of the first and second data packets; and transmitting a third data packet at a second data rate, the second data rate at least one data rate increment greater than the first data rate. 19. The tangible computer-readable medium including computer-executable instructions according to claim 18, wherein the first and second data rates are selected from a predetermined set of data rates. 20. The tangible computer-readable medium including computer-executable instructions according to claim 18, further comprising determining an unsuccessful transmission of the third data packet at the second data rate, and retransmitting the third data packet at a third data rate at least two decremented data rate positions lower than the second data rate, wherein the first second and third data rates are selected from a predetermined list of data rates.
Systems, devices and methods described herein provide or possess functionality that enables dynamically selecting a data rate from a plurality of available data rates. In one implementation, an initial data rate for transmitting a packet is reduced aggressively until it is determined that consecutive packets were transmitted successfully. In another implementation, an initial data rate is increased moderately after it is determined that consecutive packets were transmitted successfully.1. A system for accessing information, comprising: a processor; and a storage including instructions that, when executed by the processor, cause the processor to: determine unsuccessful transmission of a data packet at a first data rate; and retransmit the data packet at a second data rate, the second data rate at least two data rates lower than the first data rate. 2. The system according to claim 1, wherein the system is a mobile device having IEEE 802.11 wireless communication capability. 3. The system according to claim 1, wherein the first and second data rates are included in a plurality of data rates. 4. The system according to claim 1, wherein the instructions further cause the processor to receive an acknowledgment indicating that the data packet retransmitted at the second data rate was received, and transmit a subsequent data packet at a third data rate, the third data rate being greater than the second data rate. 5. The system according to claim 1, wherein the instructions further cause the processor to determine a plurality of unsuccessful transmissions of the data packet at the first data rate, the retransmit act executed after the plurality of unsuccessful transmissions of the data packet at the first data rate. 6. The system according to claim 1, wherein the instructions further cause the processor to retransmit the data packet a predetermined maximum number of times, wherein a final retransmit of the data packet is at a lowest data rate of a plurality of data rates. 7. The system according to claim 6, wherein the predetermined maximum number of times is seven and the lowest data rate the plurality of data rates is 1 Mbit/s. 8. A system, comprising: a processor; and a storage including instructions that, when executed by the processor, cause the processor to: determine that at least a plurality of data packets required retransmission attempts in advance of determining successful transmission of the plurality of data packets; decrement at least two data rate positions in a plurality of data rates to establish a decremented data rate; and transmit a data packet at the decremented data rate. 9. The system according to claim 8, wherein the system is a mobile device having IEEE 802.11 wireless communication capability. 10. The system according to claim 8, wherein the instructions further cause the processor to receive an acknowledgment indicating that the data packet retransmitted at the decremented data rate was received, and transmit a subsequent data packet at an incremented data rate greater than the decremented data rate. 11. The system according to claim 10, wherein the incremented data rate is one data rate greater than the decremented data rate. 12. The system according to claim 8, wherein the plurality of data rates includes data rates 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48 and 54 Mbit/s. 13. A tangible computer-readable medium storing computer-executable instructions that, when executed a processor, perform a method, comprising: determining unsuccessful transmission of a data packet at a first data rate; and retransmitting the data packet at a second data rate, the second data rate at least two data rates lower than the first data rate. 14. The tangible computer-readable medium including computer-executable instructions according to claim 13, wherein the first and second data rates are included in a predetermined set of data rates. 15. The tangible computer-readable medium including computer-executable instructions according to claim 14, wherein the predetermined set of data rates includes data rates 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48 and 54 Mbit/s. 16. The tangible computer-readable medium including computer-executable instructions according to claim 13, wherein the determining act determines unsuccessful transmission of the data packet at the first data rate at least two times before executing the retransmitting act. 17. The tangible computer-readable medium including computer-executable instructions according to claim 13, further comprising determining successful transmission of the data packet at the second data rate; and transmitting a subsequent data packet at a third data rate, the third data rate being greater than the second data rate. 18. A tangible computer-readable medium storing computer-executable instructions that, when executed a processor, perform a method, comprising: determining that first and second data packets were transmitted successfully at a first data rate after one or more retransmissions of each of the first and second data packets; and transmitting a third data packet at a second data rate, the second data rate at least one data rate increment greater than the first data rate. 19. The tangible computer-readable medium including computer-executable instructions according to claim 18, wherein the first and second data rates are selected from a predetermined set of data rates. 20. The tangible computer-readable medium including computer-executable instructions according to claim 18, further comprising determining an unsuccessful transmission of the third data packet at the second data rate, and retransmitting the third data packet at a third data rate at least two decremented data rate positions lower than the second data rate, wherein the first second and third data rates are selected from a predetermined list of data rates.
2,400
8,520
8,520
15,604,078
2,485
A synchronization device synchronizes cameras capturing a multi-view session. In particular, the synchronization device receives a respective capturing parameter for each of a plurality of individual cameras, and selects a multi-view capturing parameter, to be used in capturing a multi-view session, that matches with the capturing parameters of at least some of the individual cameras. The synchronization device selects at least two cameras, from the plurality of individual cameras, suitable for capturing the multi-view session using the multi-view capturing parameter, and notifies the selected cameras to start capturing the multi-view session at respective times using the multi-view capturing parameter.
1. A method, implemented by a synchronization device, for synchronizing cameras capturing a multi-view session, the method comprising: receiving a respective capturing parameter for each of a plurality of individual cameras; selecting a multi-view capturing parameter, to be used in capturing a multi-view session, that matches with the capturing parameters of at least some of the individual cameras; selecting at least two cameras, from the plurality of individual cameras, suitable for capturing the multi-view session using the multi-view capturing parameter; notifying the selected cameras to start capturing the multi-view session at respective times using the multi-view capturing parameter. 2. The method of claim 1, further comprising receiving a trigger message to initiate the capturing of the multi-view session. 3. The method of claim 1, wherein receiving the capturing parameters comprises receiving a given capturing parameter during a registration procedure for registering the corresponding individual camera. 4. The method of claim 1, further comprising transmitting a message announcing the multi-view session to the plurality of individual cameras and receiving the capturing parameters in response. 5. The method of claim 4, wherein the message announcing the multi-view session is a Short Message Service message. 6. The method of claim 1, further comprising receiving a location and orientation of at least one of the individual cameras, and in response, determining a capturing location and orientation for at least one of the selected cameras to use in capturing the multi-view session. 7. The method of claim 1, wherein: the capturing parameters comprise technical capabilities of the individual cameras; selecting the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras comprises selecting the multi-view capturing parameter based on the technical capabilities of the individual cameras. 8. The method of claim 1, wherein: receiving the capturing parameters comprises receiving a frame capture rate for at least two of the individual cameras; selecting the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras comprises selecting a lowest of the frame capture rates as the multi-view capturing parameter. 9. The method of claim 1, further comprising receiving an update to the capturing parameters and reselecting the multi-view capturing parameter to be used in capturing the multi-view session in response. 10. The method of claim 1, further comprising determining the time for a selected camera to start capturing the multi-view session based on a packet round-trip travel time between the synchronization device and the selected camera. 11. A synchronization device, for synchronizing cameras capturing a multi-view session, the synchronization device comprising: a receiver configured to receive a respective capturing parameter for each of a plurality of individual cameras; processing circuitry communicatively coupled to the receiver and configured to: select a multi-view capturing parameter, to be used in capturing a multi-view session, that matches with the capturing parameters of at least some of the individual cameras; select at least two cameras, from the plurality of individual cameras, suitable for capturing the multi-view session using the multi-view capturing parameter; a transmitter communicatively coupled to the processing circuitry and configured to notify the selected cameras to start capturing the multi-view session at respective times using the multi-view capturing parameter. 12. The synchronization device of claim 11, wherein the receiver is further configured to receive a trigger message to initiate the capturing of the multi-view session. 13. The synchronization device of claim 11, wherein to receive the capturing parameters the receiver is configured to receive a given capturing parameter during a registration procedure for registering the corresponding individual camera. 14. The synchronization device of claim 11, wherein the transmitter is further configured to transmit a message announcing the multi-view session to the plurality of individual cameras and the receiver is configured to receive the capturing parameters in response. 15. The synchronization device of claim 14, wherein the message announcing the multi-view session is a Short Message Service message. 16. The synchronization device of claim 11, wherein the receiver is further configured to receive a location and orientation of at least one of the individual cameras, and the processing circuitry is further configured to, in response, determine a capturing location and orientation for at least one of the selected cameras to use in capturing the multi-view session. 17. The synchronization device of claim 11, wherein: the capturing parameters comprise technical capabilities of the individual cameras; to select the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras, the processing circuitry is configured to select the multi-view capturing parameter based on the technical capabilities of the individual cameras. 18. The synchronization device of claim 11, wherein: to receive the capturing parameters, the receiver is configured to receive a frame capture rate for at least two of the individual cameras; to select the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras, the processing circuitry is configured to select a lowest of the frame capture rates as the multi-view capturing parameter. 19. The synchronization device of claim 11, wherein the receiver is further configured to receive an update to the capturing parameters and the processing circuitry is configured to, in response, reselect the multi-view capturing parameter to be used in capturing the multi-view session. 20. The synchronization device of claim 11, wherein the processing circuitry is further configured determine the time for a selected camera to start capturing the multi-view session based on a packet round-trip travel time between the synchronization device and the selected camera.
A synchronization device synchronizes cameras capturing a multi-view session. In particular, the synchronization device receives a respective capturing parameter for each of a plurality of individual cameras, and selects a multi-view capturing parameter, to be used in capturing a multi-view session, that matches with the capturing parameters of at least some of the individual cameras. The synchronization device selects at least two cameras, from the plurality of individual cameras, suitable for capturing the multi-view session using the multi-view capturing parameter, and notifies the selected cameras to start capturing the multi-view session at respective times using the multi-view capturing parameter.1. A method, implemented by a synchronization device, for synchronizing cameras capturing a multi-view session, the method comprising: receiving a respective capturing parameter for each of a plurality of individual cameras; selecting a multi-view capturing parameter, to be used in capturing a multi-view session, that matches with the capturing parameters of at least some of the individual cameras; selecting at least two cameras, from the plurality of individual cameras, suitable for capturing the multi-view session using the multi-view capturing parameter; notifying the selected cameras to start capturing the multi-view session at respective times using the multi-view capturing parameter. 2. The method of claim 1, further comprising receiving a trigger message to initiate the capturing of the multi-view session. 3. The method of claim 1, wherein receiving the capturing parameters comprises receiving a given capturing parameter during a registration procedure for registering the corresponding individual camera. 4. The method of claim 1, further comprising transmitting a message announcing the multi-view session to the plurality of individual cameras and receiving the capturing parameters in response. 5. The method of claim 4, wherein the message announcing the multi-view session is a Short Message Service message. 6. The method of claim 1, further comprising receiving a location and orientation of at least one of the individual cameras, and in response, determining a capturing location and orientation for at least one of the selected cameras to use in capturing the multi-view session. 7. The method of claim 1, wherein: the capturing parameters comprise technical capabilities of the individual cameras; selecting the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras comprises selecting the multi-view capturing parameter based on the technical capabilities of the individual cameras. 8. The method of claim 1, wherein: receiving the capturing parameters comprises receiving a frame capture rate for at least two of the individual cameras; selecting the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras comprises selecting a lowest of the frame capture rates as the multi-view capturing parameter. 9. The method of claim 1, further comprising receiving an update to the capturing parameters and reselecting the multi-view capturing parameter to be used in capturing the multi-view session in response. 10. The method of claim 1, further comprising determining the time for a selected camera to start capturing the multi-view session based on a packet round-trip travel time between the synchronization device and the selected camera. 11. A synchronization device, for synchronizing cameras capturing a multi-view session, the synchronization device comprising: a receiver configured to receive a respective capturing parameter for each of a plurality of individual cameras; processing circuitry communicatively coupled to the receiver and configured to: select a multi-view capturing parameter, to be used in capturing a multi-view session, that matches with the capturing parameters of at least some of the individual cameras; select at least two cameras, from the plurality of individual cameras, suitable for capturing the multi-view session using the multi-view capturing parameter; a transmitter communicatively coupled to the processing circuitry and configured to notify the selected cameras to start capturing the multi-view session at respective times using the multi-view capturing parameter. 12. The synchronization device of claim 11, wherein the receiver is further configured to receive a trigger message to initiate the capturing of the multi-view session. 13. The synchronization device of claim 11, wherein to receive the capturing parameters the receiver is configured to receive a given capturing parameter during a registration procedure for registering the corresponding individual camera. 14. The synchronization device of claim 11, wherein the transmitter is further configured to transmit a message announcing the multi-view session to the plurality of individual cameras and the receiver is configured to receive the capturing parameters in response. 15. The synchronization device of claim 14, wherein the message announcing the multi-view session is a Short Message Service message. 16. The synchronization device of claim 11, wherein the receiver is further configured to receive a location and orientation of at least one of the individual cameras, and the processing circuitry is further configured to, in response, determine a capturing location and orientation for at least one of the selected cameras to use in capturing the multi-view session. 17. The synchronization device of claim 11, wherein: the capturing parameters comprise technical capabilities of the individual cameras; to select the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras, the processing circuitry is configured to select the multi-view capturing parameter based on the technical capabilities of the individual cameras. 18. The synchronization device of claim 11, wherein: to receive the capturing parameters, the receiver is configured to receive a frame capture rate for at least two of the individual cameras; to select the multi-view capturing parameter that matches with the capturing parameters of at least some of the individual cameras, the processing circuitry is configured to select a lowest of the frame capture rates as the multi-view capturing parameter. 19. The synchronization device of claim 11, wherein the receiver is further configured to receive an update to the capturing parameters and the processing circuitry is configured to, in response, reselect the multi-view capturing parameter to be used in capturing the multi-view session. 20. The synchronization device of claim 11, wherein the processing circuitry is further configured determine the time for a selected camera to start capturing the multi-view session based on a packet round-trip travel time between the synchronization device and the selected camera.
2,400
8,521
8,521
15,690,435
2,439
A gateway including a hardware security module (HSM) implementing a hardware random number generator and a non-transitory memory maintaining a key injection status table (KIST). The gateway is programmed to distribute keys generated using the random number generator to a plurality of electronic control units (ECUs) responsive to a trigger to begin key distribution received from an end-of-line (EOL) tool, and send the KIST to the EOL tool responsive to completion of the key distribution. A key generated using a hardware random number generator is sent in an encrypted message to a vehicle electronic control unit (ECU), responsive to receiving a unique identifier (UID) of the ECU over a vehicle bus. Responsive to an indication of success from the ECU in a second encrypted message, a key injection status table (KIST) is updated to indicate that the key was applied to the ECU.
1. A system comprising: a gateway including a hardware security module (HSM) implementing a hardware random number generator and a non-transitory memory maintaining a key injection status table (KIST), programmed to distribute keys generated using the random number generator to a plurality of electronic control units (ECUs) responsive to a trigger to begin key distribution received from an end-of-line (EOL) tool, and send the KIST to the EOL tool responsive to completion of the key distribution. 2. The system of claim 1, wherein the gateway is further programmed to update the KIST responsive to receipt of confirmation from one of the plurality of ECUs that one of the keys has been successfully injected to a key slot of the one of the plurality of ECUs. 3. The system of claim 1, wherein the gateway is further programmed to: request a unique identifier (UID) of one of the plurality of ECUs; generate a key using the random number generator for the UID; send the key to the one of the plurality of ECUs; and update the KIST to indicate that the key was sent to the UID of the one of the plurality of ECUs. 4. The system of claim 1, wherein the gateway is further programmed to send a key to one of the plurality of ECUs utilizing a M123 sequence that includes (i) a UID of the one of the plurality of ECUs, (ii) a target key slot index of the one of the plurality of ECUs into which the key is to be placed, and (iii) an encrypted copy of the key. 5. The system of claim 4, wherein the gateway is further programmed to receive, in response to the M123 sequence, a M45 response that includes a verification of placement of the key that is computed using the key to be placed. 6. The system of claim 1, wherein the gateway is further programmed to send the KIST responsive to receipt of a KIST request message from the EOL tool. 7. A method comprising: sending a key generated using a hardware random number generator in an encrypted message to a vehicle electronic control unit (ECU), responsive to receiving a unique identifier (UID) of the ECU over a vehicle bus; and responsive to an indication of success from the ECU in a second encrypted message, updating a key injection status table (KIST) to indicate that the key was applied to the ECU. 8. The method of claim 7, further comprising: requesting a second unique identifier (UID) of a second ECU over the vehicle bus; generating a second key using the hardware random number generator; sending the second key in a third encrypted message to the second ECU; and responsive to an indication of success from the second ECU in a fourth encrypted message, updating the KIST to indicate that the second key was applied to the second ECU. 9. The method of claim 8, further comprising: receiving a ping status message from an end-of-line (EOL) tool, and sending the KIST to the EOL tool responsive to completion of key distribution to the ECU and the second ECU. 10. The method of claim 7, further comprising initiating key distribution to the ECU responsive to receipt of an authorization message from an end-of-line (EOL) tool. 11. The method of claim 7, further comprising including, in the encrypted message, (i) a UID of the ECU, (ii) a target key slot index of the ECU into which the key is to be placed, and (iii) an encrypted copy of the key. 12. The method of claim 11, further comprising receiving, in the second encrypted message, a verification of placement of the key that is computed using the key to be placed. 13. A system comprising: a processor programmed to, responsive to an indication of success from an ECU in an encrypted response message received responsive to sending a key generated using a hardware random number generator in an encrypted request message to the ECU, update a key injection status table (KIST) to indicate that the key was applied to the ECU. 14. The system of claim 13, wherein the processor is further programmed to, responsive to receiving a unique identifier (UID) of a vehicle electronic control unit (ECU) over a vehicle bus, send the encrypted request message to the ECU. 15. The system of claim 13, wherein the processor is further programmed to distribute keys including the key to a plurality of electronic control units (ECUs) including the ECU, responsive to a trigger to begin key distribution received from an end-of-line (EOL) tool. 16. The system of claim 15, wherein the processor is further programmed to receive a ping status message from the end-of-line (EOL) tool, and send the KIST to the EOL tool responsive to completion of key distribution to a plurality of ECUs including the ECU.
A gateway including a hardware security module (HSM) implementing a hardware random number generator and a non-transitory memory maintaining a key injection status table (KIST). The gateway is programmed to distribute keys generated using the random number generator to a plurality of electronic control units (ECUs) responsive to a trigger to begin key distribution received from an end-of-line (EOL) tool, and send the KIST to the EOL tool responsive to completion of the key distribution. A key generated using a hardware random number generator is sent in an encrypted message to a vehicle electronic control unit (ECU), responsive to receiving a unique identifier (UID) of the ECU over a vehicle bus. Responsive to an indication of success from the ECU in a second encrypted message, a key injection status table (KIST) is updated to indicate that the key was applied to the ECU.1. A system comprising: a gateway including a hardware security module (HSM) implementing a hardware random number generator and a non-transitory memory maintaining a key injection status table (KIST), programmed to distribute keys generated using the random number generator to a plurality of electronic control units (ECUs) responsive to a trigger to begin key distribution received from an end-of-line (EOL) tool, and send the KIST to the EOL tool responsive to completion of the key distribution. 2. The system of claim 1, wherein the gateway is further programmed to update the KIST responsive to receipt of confirmation from one of the plurality of ECUs that one of the keys has been successfully injected to a key slot of the one of the plurality of ECUs. 3. The system of claim 1, wherein the gateway is further programmed to: request a unique identifier (UID) of one of the plurality of ECUs; generate a key using the random number generator for the UID; send the key to the one of the plurality of ECUs; and update the KIST to indicate that the key was sent to the UID of the one of the plurality of ECUs. 4. The system of claim 1, wherein the gateway is further programmed to send a key to one of the plurality of ECUs utilizing a M123 sequence that includes (i) a UID of the one of the plurality of ECUs, (ii) a target key slot index of the one of the plurality of ECUs into which the key is to be placed, and (iii) an encrypted copy of the key. 5. The system of claim 4, wherein the gateway is further programmed to receive, in response to the M123 sequence, a M45 response that includes a verification of placement of the key that is computed using the key to be placed. 6. The system of claim 1, wherein the gateway is further programmed to send the KIST responsive to receipt of a KIST request message from the EOL tool. 7. A method comprising: sending a key generated using a hardware random number generator in an encrypted message to a vehicle electronic control unit (ECU), responsive to receiving a unique identifier (UID) of the ECU over a vehicle bus; and responsive to an indication of success from the ECU in a second encrypted message, updating a key injection status table (KIST) to indicate that the key was applied to the ECU. 8. The method of claim 7, further comprising: requesting a second unique identifier (UID) of a second ECU over the vehicle bus; generating a second key using the hardware random number generator; sending the second key in a third encrypted message to the second ECU; and responsive to an indication of success from the second ECU in a fourth encrypted message, updating the KIST to indicate that the second key was applied to the second ECU. 9. The method of claim 8, further comprising: receiving a ping status message from an end-of-line (EOL) tool, and sending the KIST to the EOL tool responsive to completion of key distribution to the ECU and the second ECU. 10. The method of claim 7, further comprising initiating key distribution to the ECU responsive to receipt of an authorization message from an end-of-line (EOL) tool. 11. The method of claim 7, further comprising including, in the encrypted message, (i) a UID of the ECU, (ii) a target key slot index of the ECU into which the key is to be placed, and (iii) an encrypted copy of the key. 12. The method of claim 11, further comprising receiving, in the second encrypted message, a verification of placement of the key that is computed using the key to be placed. 13. A system comprising: a processor programmed to, responsive to an indication of success from an ECU in an encrypted response message received responsive to sending a key generated using a hardware random number generator in an encrypted request message to the ECU, update a key injection status table (KIST) to indicate that the key was applied to the ECU. 14. The system of claim 13, wherein the processor is further programmed to, responsive to receiving a unique identifier (UID) of a vehicle electronic control unit (ECU) over a vehicle bus, send the encrypted request message to the ECU. 15. The system of claim 13, wherein the processor is further programmed to distribute keys including the key to a plurality of electronic control units (ECUs) including the ECU, responsive to a trigger to begin key distribution received from an end-of-line (EOL) tool. 16. The system of claim 15, wherein the processor is further programmed to receive a ping status message from the end-of-line (EOL) tool, and send the KIST to the EOL tool responsive to completion of key distribution to a plurality of ECUs including the ECU.
2,400
8,522
8,522
15,750,046
2,421
Method for subsequently displaying a stream of images (44, I0, I) (44, I0, I) in a display area (46) of a display device (32), wherein a point of regard (POR; POR1, POR2, PORn) of a user (40) looking at the display area (46) and, a first area (48; A1, A2, A3, A4) within the display area (46) is determined around the point of regard (POR; POR1, POR2, PORn). A first image (44, I) of the stream of images (44, I0, I) is displayed in the display area (46) such that a first part (50) of the first image (44, I), which is displayed in the first area (48; A1, A2, A3, A4), is displayed according to a first parameter value of at least one parameter, which is correlated with an image characteristic of the first image (44, I), and a second part (52) of the first image (44, I), which is displayed in at least one second area outside the first area (48; A1, A2, A3, A4), is displayed according to a second parameter value of the at least one parameter. Moreover, the determining of the point of regard (POR; POR1, POR2, PORn) is performed as predicting the point of regard (POR; POR1, POR2, PORn) for a certain future point of time (T), at which the first image (44, I) is displayed, in dependency of at least one result (42, 68, 54) of at least one image related analysis.
1-27. (canceled) 28. A method comprising: determining gaze data of an eye of a user at a plurality of times; classifying the gaze data of an eye of a user at the plurality of times as either a static fixation, a moving fixation, or a saccade; determining a point of regard of the user at a particular time subsequent to the plurality of times based at least in part on the classification; and displaying an image at the particular time such that a first part of the image in a first area around the point of regard is displayed according to a first parameter value of an image quality parameter and a second part of the first image in at least one second area outside the first area is displayed according to a second parameter value of the image quality parameter. 29. The method of claim 28, wherein determining the gaze data of the eye of the user comprises: capturing a plurality of images of the eye of the user at the plurality of times; and determining, based on the plurality of images of the eye of the user, a plurality of gaze directions of the user at the plurality of times, wherein classifying the gaze data of the eye of the user at the plurality of times is based on the plurality of gaze directions of the user at the plurality of times. 30. The method of claim 28, wherein determining the gaze data of the eye of the user comprises: displaying, to the user, a plurality of display images at the plurality of times; determining, based on the plurality of display images, a plurality of saliency points at the plurality of times, wherein classifying the gaze data of the eye of the user at the plurality of times is based on the plurality of saliency points at the plurality of times. 31. The method of claim 28, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a static fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining that a minimum fixation period is not reached; and determining the point of regard of the user at the particular time as the current point of regard of the user. 32. The method of claim 28, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a moving fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining a direction and speed of gaze motion based on the gaze data of the eye of the user at the plurality of times; and determining the point of regard of the user at the particular time based on the current point of regard of the user and the direction and speed of gaze motion. 33. The method of claim 28, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a saccade, determining the point of regard of the user at the particular time comprises: determining a point of regard of the user during a saccade onset; determining a direction and speed of gaze motion during the saccade onset; and determining the point of regard of the user at the particular time based on the point of regard of the user during the saccade onset and the direction and speed of gaze motion. 34. The method of claim 28, further comprising determining a size of the first area based on the gaze data of the eye of the user. 35. The method of claim 34, wherein determining the size of the first area includes: determining an uncertainty of the gaze data of the eye of the user; and determining the size of the first area based on the uncertainty. 36. The method of claim 28, wherein the image quality parameter is a resolution parameter. 37. The method of claim 28, wherein determining the point of regard of the user at a particular time subsequent to the plurality of times includes determining a plurality of points of regard of the user and the image is displayed at the particular time such that a first part of the image in respective first areas around the plurality of points of regard are displayed according to the first parameter value of the image quality parameter and the second part of the first image in at least one second area outside the respective first areas is displayed according to the second parameter value of the image quality parameter. 38. An apparatus comprising: a processor to: determine gaze data of an eye of a user at a plurality of times; classify the gaze data of an eye of a user at the plurality of times as either a static fixation, a moving fixation, or a saccade; and determine a point of regard of the user at a particular time subsequent to the plurality of times based at least in part on the classification; and a display device to display an image at the particular time such that a first part of the image in a first area around the point of regard is displayed according to a first parameter value of an image quality parameter and a second part of the first image in at least one second area outside the first area is displayed according to a second parameter value of the image quality parameter. 39. The apparatus of claim 38, the processor is to determine the gaze data of the eye of the user by: capturing a plurality of images of the eye of the user at the plurality of times; and determining, based on the plurality of images of the eye of the user, a plurality of gaze directions of the user at the plurality of times, wherein classifying the gaze data of the eye of the user at the plurality of times is based on the plurality of gaze directions of the user at the plurality of times. 40. The apparatus of claim 38, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a static fixation, the processor is to determine the point of regard of the user at the particular time by: determining a current point of regard of the user; determining that a minimum fixation period is not reached; and determining the point of regard of the user at the particular time as the current point of regard of the user. 41. The apparatus of claim 38, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a moving fixation, the processor is to determine the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining a direction and speed of gaze motion based on the gaze data of the eye of the user at the plurality of times; and determining the point of regard of the user at the particular time based on the current point of regard of the user and the direction and speed of gaze motion. 42. The apparatus of claim 38, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a saccade, the processor is to determine the point of regard of the user at the particular time comprises: determining a point of regard of the user during a saccade onset; determining a direction and speed of gaze motion during the saccade onset; and determining the point of regard of the user at the particular time based on the point of regard of the user during the saccade onset and the direction and speed of gaze motion. 43. The apparatus of claim 38, wherein the processor is further to: determining an uncertainty of the gaze data of the eye of the user; and determining a size of the first area based on the uncertainty. 44. A non-transitory computer-readable medium encoding instructions which, when executed, cause a processor to perform operations comprising: determining gaze data of an eye of a user at a plurality of times; classifying the gaze data of an eye of a user at the plurality of times as either a static fixation, a moving fixation, or a saccade; determining a point of regard of the user at a particular time subsequent to the plurality of times based at least in part on the classification; and displaying an image at the particular time such that a first part of the image in a first area around the point of regard is displayed according to a first parameter value of an image quality parameter and a second part of the first image in at least one second area outside the first area is displayed according to a second parameter value of the image quality parameter. 45. The non-transitory computer-readable medium of claim 44, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a static fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining that a minimum fixation period is not reached; and determining the point of regard of the user at the particular time as the current point of regard of the user. 46. The non-transitory computer-readable medium of claim 44, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a moving fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining a direction and speed of gaze motion based on the gaze data of the eye of the user at the plurality of times; and determining the point of regard of the user at the particular time based on the current point of regard of the user and the direction and speed of gaze motion. 47. The non-transitory computer-readable medium of claim 44, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a saccade, determining the point of regard of the user at the particular time comprises: determining a point of regard of the user during a saccade onset; determining a direction and speed of gaze motion during the saccade onset; and determining the point of regard of the user at the particular time based on the point of regard of the user during the saccade onset and the direction and speed of gaze motion.
Method for subsequently displaying a stream of images (44, I0, I) (44, I0, I) in a display area (46) of a display device (32), wherein a point of regard (POR; POR1, POR2, PORn) of a user (40) looking at the display area (46) and, a first area (48; A1, A2, A3, A4) within the display area (46) is determined around the point of regard (POR; POR1, POR2, PORn). A first image (44, I) of the stream of images (44, I0, I) is displayed in the display area (46) such that a first part (50) of the first image (44, I), which is displayed in the first area (48; A1, A2, A3, A4), is displayed according to a first parameter value of at least one parameter, which is correlated with an image characteristic of the first image (44, I), and a second part (52) of the first image (44, I), which is displayed in at least one second area outside the first area (48; A1, A2, A3, A4), is displayed according to a second parameter value of the at least one parameter. Moreover, the determining of the point of regard (POR; POR1, POR2, PORn) is performed as predicting the point of regard (POR; POR1, POR2, PORn) for a certain future point of time (T), at which the first image (44, I) is displayed, in dependency of at least one result (42, 68, 54) of at least one image related analysis.1-27. (canceled) 28. A method comprising: determining gaze data of an eye of a user at a plurality of times; classifying the gaze data of an eye of a user at the plurality of times as either a static fixation, a moving fixation, or a saccade; determining a point of regard of the user at a particular time subsequent to the plurality of times based at least in part on the classification; and displaying an image at the particular time such that a first part of the image in a first area around the point of regard is displayed according to a first parameter value of an image quality parameter and a second part of the first image in at least one second area outside the first area is displayed according to a second parameter value of the image quality parameter. 29. The method of claim 28, wherein determining the gaze data of the eye of the user comprises: capturing a plurality of images of the eye of the user at the plurality of times; and determining, based on the plurality of images of the eye of the user, a plurality of gaze directions of the user at the plurality of times, wherein classifying the gaze data of the eye of the user at the plurality of times is based on the plurality of gaze directions of the user at the plurality of times. 30. The method of claim 28, wherein determining the gaze data of the eye of the user comprises: displaying, to the user, a plurality of display images at the plurality of times; determining, based on the plurality of display images, a plurality of saliency points at the plurality of times, wherein classifying the gaze data of the eye of the user at the plurality of times is based on the plurality of saliency points at the plurality of times. 31. The method of claim 28, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a static fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining that a minimum fixation period is not reached; and determining the point of regard of the user at the particular time as the current point of regard of the user. 32. The method of claim 28, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a moving fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining a direction and speed of gaze motion based on the gaze data of the eye of the user at the plurality of times; and determining the point of regard of the user at the particular time based on the current point of regard of the user and the direction and speed of gaze motion. 33. The method of claim 28, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a saccade, determining the point of regard of the user at the particular time comprises: determining a point of regard of the user during a saccade onset; determining a direction and speed of gaze motion during the saccade onset; and determining the point of regard of the user at the particular time based on the point of regard of the user during the saccade onset and the direction and speed of gaze motion. 34. The method of claim 28, further comprising determining a size of the first area based on the gaze data of the eye of the user. 35. The method of claim 34, wherein determining the size of the first area includes: determining an uncertainty of the gaze data of the eye of the user; and determining the size of the first area based on the uncertainty. 36. The method of claim 28, wherein the image quality parameter is a resolution parameter. 37. The method of claim 28, wherein determining the point of regard of the user at a particular time subsequent to the plurality of times includes determining a plurality of points of regard of the user and the image is displayed at the particular time such that a first part of the image in respective first areas around the plurality of points of regard are displayed according to the first parameter value of the image quality parameter and the second part of the first image in at least one second area outside the respective first areas is displayed according to the second parameter value of the image quality parameter. 38. An apparatus comprising: a processor to: determine gaze data of an eye of a user at a plurality of times; classify the gaze data of an eye of a user at the plurality of times as either a static fixation, a moving fixation, or a saccade; and determine a point of regard of the user at a particular time subsequent to the plurality of times based at least in part on the classification; and a display device to display an image at the particular time such that a first part of the image in a first area around the point of regard is displayed according to a first parameter value of an image quality parameter and a second part of the first image in at least one second area outside the first area is displayed according to a second parameter value of the image quality parameter. 39. The apparatus of claim 38, the processor is to determine the gaze data of the eye of the user by: capturing a plurality of images of the eye of the user at the plurality of times; and determining, based on the plurality of images of the eye of the user, a plurality of gaze directions of the user at the plurality of times, wherein classifying the gaze data of the eye of the user at the plurality of times is based on the plurality of gaze directions of the user at the plurality of times. 40. The apparatus of claim 38, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a static fixation, the processor is to determine the point of regard of the user at the particular time by: determining a current point of regard of the user; determining that a minimum fixation period is not reached; and determining the point of regard of the user at the particular time as the current point of regard of the user. 41. The apparatus of claim 38, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a moving fixation, the processor is to determine the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining a direction and speed of gaze motion based on the gaze data of the eye of the user at the plurality of times; and determining the point of regard of the user at the particular time based on the current point of regard of the user and the direction and speed of gaze motion. 42. The apparatus of claim 38, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a saccade, the processor is to determine the point of regard of the user at the particular time comprises: determining a point of regard of the user during a saccade onset; determining a direction and speed of gaze motion during the saccade onset; and determining the point of regard of the user at the particular time based on the point of regard of the user during the saccade onset and the direction and speed of gaze motion. 43. The apparatus of claim 38, wherein the processor is further to: determining an uncertainty of the gaze data of the eye of the user; and determining a size of the first area based on the uncertainty. 44. A non-transitory computer-readable medium encoding instructions which, when executed, cause a processor to perform operations comprising: determining gaze data of an eye of a user at a plurality of times; classifying the gaze data of an eye of a user at the plurality of times as either a static fixation, a moving fixation, or a saccade; determining a point of regard of the user at a particular time subsequent to the plurality of times based at least in part on the classification; and displaying an image at the particular time such that a first part of the image in a first area around the point of regard is displayed according to a first parameter value of an image quality parameter and a second part of the first image in at least one second area outside the first area is displayed according to a second parameter value of the image quality parameter. 45. The non-transitory computer-readable medium of claim 44, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a static fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining that a minimum fixation period is not reached; and determining the point of regard of the user at the particular time as the current point of regard of the user. 46. The non-transitory computer-readable medium of claim 44, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a moving fixation, determining the point of regard of the user at the particular time comprises: determining a current point of regard of the user; determining a direction and speed of gaze motion based on the gaze data of the eye of the user at the plurality of times; and determining the point of regard of the user at the particular time based on the current point of regard of the user and the direction and speed of gaze motion. 47. The non-transitory computer-readable medium of claim 44, wherein, in response to classifying the gaze data of the eye of the user at the plurality of times as a saccade, determining the point of regard of the user at the particular time comprises: determining a point of regard of the user during a saccade onset; determining a direction and speed of gaze motion during the saccade onset; and determining the point of regard of the user at the particular time based on the point of regard of the user during the saccade onset and the direction and speed of gaze motion.
2,400
8,523
8,523
15,792,217
2,426
Disclosed are various embodiments that relate to enhancing video content with extrinsic data. A video content feature is rendered on a display. A user interface can be rendered on top of the video content feature on the display. The user interface can presents cast member indicia, where the cast member indicia correspond to respective cast members in the video content feature. In response to receiving a selection of one of the cast member indicia from a user, the user interface is updated to present a timeline component. A sequence of scenes from the video content feature are played. The sequence of scenes can correspond to scenes in which a selected cast member appear.
1. A non-transitory computer-readable medium embodying a program that, when executed in at least one computing device, causes the at least one computing device to at least: cause a video content feature to be rendered on a display; cause a user interface to be rendered on top of the video content feature on the display, the user interface configured to present a plurality of cast member images, individual ones of the plurality of cast member images corresponding to a respective cast member in the video content feature; update the user interface to present a timeline visually indicating a subset of scenes; and launch a sequential play of the subset of scenes. 2. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least: receive a selection of the subset of scenes, the subset of scenes corresponding to at least one scene in the timeline other than a current scene; and receive a selection of a jump component of the user interface, wherein the sequential play of the subset of scenes is in response to the selection of the jump component. 3. The non-transitory computer-readable medium of claim 2, wherein the program further causes the at least one computing device to at least hide the user interface in response to the selection of the jump component. 4. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least: receive a selection of a bookmark component corresponding to a scene in the video content feature; and add a bookmark to the scene in the video content feature to a user account. 5. The non-transitory computer-readable medium of claim 1, wherein the subset of scenes correspond to a plurality of bookmarks associated with a user account. 6. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least determine the subset of scenes by identifying scenes with a respective bookmark frequency from a group of user accounts that exceeds a threshold frequency. 7. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to update the user interface to present the timeline in response to receiving a selection of one of the plurality of cast member images corresponding to a cast member, and the cast member appears in the subset of scenes. 8. A system, comprising: a data store; and at least one computing device communicably coupled to the data store, the at least one computing device being configured to at least: cause a user interface to be rendered on top of a video content feature on a display, the user interface configured to present a plurality of cast member indicia, individual ones of the plurality of cast member indicia corresponding to a respective cast member in the video content feature; and in response to receiving a selection of one of the plurality of cast member indicia, update the user interface to present a timeline visually indicating a subset of scenes in which the respective cast member appears; and play the subset of scenes sequentially. 9. The system of claim 8, wherein the at least one computing device is further configured to at least receive a selection of a sequential play component of the user interface, the subset of scenes being played sequentially in response to the selection of the sequential play component of the user interface. 10. The system of claim 8, wherein the subset of scenes are non-contiguous. 11. The system of claim 8, wherein the at least one computing device is further configured to at least determine a respective indicia position of individual ones of the plurality of cast member indicia within the user interface based at least in part on a respective cast member position that the respective cast member appears in a current video frame of the video content feature. 12. The system of claim 11, wherein positional data including the respective position that each of the respective cast members appears is encoded within a current scene. 13. The system of claim 11, wherein the at least one computing device is further configured to at least position at least one cast member indicia on: a side of the display, a top of the display, or a bottom of the display based at least in part on at least one respective cast member corresponding to the at least one cast member indicia not appearing in the current video frame of the video content feature. 14. The system of claim 11, wherein the respective indicia position of the individual ones of the plurality of cast member indicia is further based at least in part on configuration preferences associated with a user account. 15. A method, comprising: causing, via at least one of one or more computing devices, a video content feature to be rendered on a display; causing, via at least one of the one or more computing devices, a user interface to be rendered on top of the video content feature on the display, the user interface comprising a timeline visually indicating a subset of scenes in which a cast member appears; receiving, via at least one of the one or more computing devices, a selection of a sequential play component of the user interface; and in response to receiving the selection of the sequential play component, launching, via at least one of the one or more computing devices, a sequential play of the subset of scenes. 16. The method claim 15, further comprising customizing, via at least one of the one or more computing devices, the timeline within the user interface based at least in part on profile data associated with at least one user account. 17. The method of claim 15, wherein the user interface is further configured to present a plurality of cast member indicia, individual ones of the plurality of cast member indicia corresponding to a respective cast member in the video content feature, and the timeline is rendered in the user interface in response to receiving a selection of the cast member from the plurality of cast member indicia. 18. The method of claim 17, wherein the plurality of cast member indicia correspond to cast members who are in a current scene of the video content feature. 19. The method of claim 15, wherein only a portion of the timeline is shown on the user interface. 20. The method of claim 15, wherein the timeline omits a visual indication of a division of a plurality of scenes that are not in the subset of scenes.
Disclosed are various embodiments that relate to enhancing video content with extrinsic data. A video content feature is rendered on a display. A user interface can be rendered on top of the video content feature on the display. The user interface can presents cast member indicia, where the cast member indicia correspond to respective cast members in the video content feature. In response to receiving a selection of one of the cast member indicia from a user, the user interface is updated to present a timeline component. A sequence of scenes from the video content feature are played. The sequence of scenes can correspond to scenes in which a selected cast member appear.1. A non-transitory computer-readable medium embodying a program that, when executed in at least one computing device, causes the at least one computing device to at least: cause a video content feature to be rendered on a display; cause a user interface to be rendered on top of the video content feature on the display, the user interface configured to present a plurality of cast member images, individual ones of the plurality of cast member images corresponding to a respective cast member in the video content feature; update the user interface to present a timeline visually indicating a subset of scenes; and launch a sequential play of the subset of scenes. 2. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least: receive a selection of the subset of scenes, the subset of scenes corresponding to at least one scene in the timeline other than a current scene; and receive a selection of a jump component of the user interface, wherein the sequential play of the subset of scenes is in response to the selection of the jump component. 3. The non-transitory computer-readable medium of claim 2, wherein the program further causes the at least one computing device to at least hide the user interface in response to the selection of the jump component. 4. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least: receive a selection of a bookmark component corresponding to a scene in the video content feature; and add a bookmark to the scene in the video content feature to a user account. 5. The non-transitory computer-readable medium of claim 1, wherein the subset of scenes correspond to a plurality of bookmarks associated with a user account. 6. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least determine the subset of scenes by identifying scenes with a respective bookmark frequency from a group of user accounts that exceeds a threshold frequency. 7. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to update the user interface to present the timeline in response to receiving a selection of one of the plurality of cast member images corresponding to a cast member, and the cast member appears in the subset of scenes. 8. A system, comprising: a data store; and at least one computing device communicably coupled to the data store, the at least one computing device being configured to at least: cause a user interface to be rendered on top of a video content feature on a display, the user interface configured to present a plurality of cast member indicia, individual ones of the plurality of cast member indicia corresponding to a respective cast member in the video content feature; and in response to receiving a selection of one of the plurality of cast member indicia, update the user interface to present a timeline visually indicating a subset of scenes in which the respective cast member appears; and play the subset of scenes sequentially. 9. The system of claim 8, wherein the at least one computing device is further configured to at least receive a selection of a sequential play component of the user interface, the subset of scenes being played sequentially in response to the selection of the sequential play component of the user interface. 10. The system of claim 8, wherein the subset of scenes are non-contiguous. 11. The system of claim 8, wherein the at least one computing device is further configured to at least determine a respective indicia position of individual ones of the plurality of cast member indicia within the user interface based at least in part on a respective cast member position that the respective cast member appears in a current video frame of the video content feature. 12. The system of claim 11, wherein positional data including the respective position that each of the respective cast members appears is encoded within a current scene. 13. The system of claim 11, wherein the at least one computing device is further configured to at least position at least one cast member indicia on: a side of the display, a top of the display, or a bottom of the display based at least in part on at least one respective cast member corresponding to the at least one cast member indicia not appearing in the current video frame of the video content feature. 14. The system of claim 11, wherein the respective indicia position of the individual ones of the plurality of cast member indicia is further based at least in part on configuration preferences associated with a user account. 15. A method, comprising: causing, via at least one of one or more computing devices, a video content feature to be rendered on a display; causing, via at least one of the one or more computing devices, a user interface to be rendered on top of the video content feature on the display, the user interface comprising a timeline visually indicating a subset of scenes in which a cast member appears; receiving, via at least one of the one or more computing devices, a selection of a sequential play component of the user interface; and in response to receiving the selection of the sequential play component, launching, via at least one of the one or more computing devices, a sequential play of the subset of scenes. 16. The method claim 15, further comprising customizing, via at least one of the one or more computing devices, the timeline within the user interface based at least in part on profile data associated with at least one user account. 17. The method of claim 15, wherein the user interface is further configured to present a plurality of cast member indicia, individual ones of the plurality of cast member indicia corresponding to a respective cast member in the video content feature, and the timeline is rendered in the user interface in response to receiving a selection of the cast member from the plurality of cast member indicia. 18. The method of claim 17, wherein the plurality of cast member indicia correspond to cast members who are in a current scene of the video content feature. 19. The method of claim 15, wherein only a portion of the timeline is shown on the user interface. 20. The method of claim 15, wherein the timeline omits a visual indication of a division of a plurality of scenes that are not in the subset of scenes.
2,400
8,524
8,524
15,857,169
2,445
A method and system for generating an optimization instruction set based on communication between at least one server and at least one client are provided. The method includes aggregating a plurality of messages communicated from the at least one server to the at least one client; analyzing the plurality of messages to determine a plurality of resources to be consolidated; and generating an optimization instruction set for consolidating the determined plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources.
1. A method for generating an optimization instruction set based on communication between at least one server and at least one client, comprising: aggregating a plurality of messages communicated from the at least one server to the at least one client; analyzing the plurality of messages to determine a plurality of resources to be consolidated; and generating an optimization instruction set for consolidating the determined plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources. 2. The method of claim 1, further comprising: classifying the plurality of resources to be consolidated into a least one group of resources of the same type. 3. The method of claim 2, further comprising: parsing each of the plurality of messages to derive a plurality of message tokens; classifying the tokens according to a predetermined type; and compiling instructions for at least one token type. 4. The method of claim 3, wherein the at least one group of resources of the same type includes: a plurality of cascading style sheets, and wherein the generated instruction set includes consolidated cascading style sheets. 5. The method of claim 4, further comprising: analyzing each token to determine whether the token represents an external link to a cascading style sheet (CSS) file; flagging each token that represent an external link to a CSS file; analyzing each flagged token to determine if the flagged token is suitable for consolidation; fetching a corresponding CSS file; and appending the corresponding CSS file to a new consolidated CSS file. 6. The method of claim 3, wherein the at least one group of resources of the same type includes: a plurality of images, and wherein the generated instruction set includes consolidated images. 7. The method of claim 6, further comprising: based on the analyzed plurality of messages, obtaining a copy of a corresponding response; constructing a Document Object Model (DOM) from the corresponding response; analyzing the DOM to obtain all tags indicative of images; obtaining images identified by their tags; and consolidating the obtained images into any one of: an image sprite and a set of image sprites. 8. The method of claim 3, wherein the at least one group of resources of the same type includes: a plurality of JavaScript resources, and wherein the generated instruction set includes a consolidated set of JavaScript resources. 9. The method of claim 8, further comprising: analyzing each token and determining whether the token represents an external link to a JavaScript file; flagging each token that represent an external link to a JavaScript file analyzing each flagged token to determine if the flagged token is suitable for consolidation; fetching resources linked to by each token determined to be suitable for consolidation; and creating a consolidated JavaScript file including JavaScript resources, wherein the JavaScript resources are semantically validated. 10. The method of claim 1, further comprising: storing the generated optimization instruction set in a storage device; and applying the generated instruction set to accelerate communication between at least one client and at least one server. 11. The method of claim 10, wherein applying the generated instruction set further comprises: rewriting resource references to use a Uniform Resource Identifier (URI) stem that increases the number of concurrent connections. 12. The method of claim 10, wherein applying the generated instruction set further comprises: aliasing references within the plurality of messages. 13. The method of claim 10, wherein applying the generated instruction set comprises: predicting resource usage; and preloading at least one resource based on the predicted resource usage. 14. The method of claim 1, wherein applying the generated instruction set comprises: identifying static links within the plurality of messages; and transmitting identified static links to a client prior to rendering of other portions of the message. 15. The method of claim 1, wherein applying the generated instruction set comprises: identifying JavaScript code within the plurality of messages; and deferring at least one of loading and execution of the identified JavaScript code. 16. The method of claim 1, wherein each message comprises at least one of: a client HTTP request, and a server HTTP response to a client HTTP request. 17. A system for generating an optimization instruction set based on communication between at least one server and at least one client, comprising: a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: aggregate a plurality of messages communicated from the at least one server to the at least one client; analyze the plurality of messages to determine a plurality of resources to be consolidated; and generate an optimization instruction set for consolidating the identified plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources. 18. The system of claim 17, wherein the system is deployed between the at least one server and at least one client. 19. The system of claim 18, wherein the system is installed in the at least one server. 20. A non-transitory computer readable medium having stored thereon instructions for causing a processing circuitry to perform a process for generating an optimization instruction set based on communication between at least one server and at least one client, the process comprising: aggregating a plurality of messages communicated from the at least one server to the at least one client; analyzing the plurality of messages to determine a plurality of resources to be consolidated; and generating an optimization instruction set for consolidating the identified plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources.
A method and system for generating an optimization instruction set based on communication between at least one server and at least one client are provided. The method includes aggregating a plurality of messages communicated from the at least one server to the at least one client; analyzing the plurality of messages to determine a plurality of resources to be consolidated; and generating an optimization instruction set for consolidating the determined plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources.1. A method for generating an optimization instruction set based on communication between at least one server and at least one client, comprising: aggregating a plurality of messages communicated from the at least one server to the at least one client; analyzing the plurality of messages to determine a plurality of resources to be consolidated; and generating an optimization instruction set for consolidating the determined plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources. 2. The method of claim 1, further comprising: classifying the plurality of resources to be consolidated into a least one group of resources of the same type. 3. The method of claim 2, further comprising: parsing each of the plurality of messages to derive a plurality of message tokens; classifying the tokens according to a predetermined type; and compiling instructions for at least one token type. 4. The method of claim 3, wherein the at least one group of resources of the same type includes: a plurality of cascading style sheets, and wherein the generated instruction set includes consolidated cascading style sheets. 5. The method of claim 4, further comprising: analyzing each token to determine whether the token represents an external link to a cascading style sheet (CSS) file; flagging each token that represent an external link to a CSS file; analyzing each flagged token to determine if the flagged token is suitable for consolidation; fetching a corresponding CSS file; and appending the corresponding CSS file to a new consolidated CSS file. 6. The method of claim 3, wherein the at least one group of resources of the same type includes: a plurality of images, and wherein the generated instruction set includes consolidated images. 7. The method of claim 6, further comprising: based on the analyzed plurality of messages, obtaining a copy of a corresponding response; constructing a Document Object Model (DOM) from the corresponding response; analyzing the DOM to obtain all tags indicative of images; obtaining images identified by their tags; and consolidating the obtained images into any one of: an image sprite and a set of image sprites. 8. The method of claim 3, wherein the at least one group of resources of the same type includes: a plurality of JavaScript resources, and wherein the generated instruction set includes a consolidated set of JavaScript resources. 9. The method of claim 8, further comprising: analyzing each token and determining whether the token represents an external link to a JavaScript file; flagging each token that represent an external link to a JavaScript file analyzing each flagged token to determine if the flagged token is suitable for consolidation; fetching resources linked to by each token determined to be suitable for consolidation; and creating a consolidated JavaScript file including JavaScript resources, wherein the JavaScript resources are semantically validated. 10. The method of claim 1, further comprising: storing the generated optimization instruction set in a storage device; and applying the generated instruction set to accelerate communication between at least one client and at least one server. 11. The method of claim 10, wherein applying the generated instruction set further comprises: rewriting resource references to use a Uniform Resource Identifier (URI) stem that increases the number of concurrent connections. 12. The method of claim 10, wherein applying the generated instruction set further comprises: aliasing references within the plurality of messages. 13. The method of claim 10, wherein applying the generated instruction set comprises: predicting resource usage; and preloading at least one resource based on the predicted resource usage. 14. The method of claim 1, wherein applying the generated instruction set comprises: identifying static links within the plurality of messages; and transmitting identified static links to a client prior to rendering of other portions of the message. 15. The method of claim 1, wherein applying the generated instruction set comprises: identifying JavaScript code within the plurality of messages; and deferring at least one of loading and execution of the identified JavaScript code. 16. The method of claim 1, wherein each message comprises at least one of: a client HTTP request, and a server HTTP response to a client HTTP request. 17. A system for generating an optimization instruction set based on communication between at least one server and at least one client, comprising: a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: aggregate a plurality of messages communicated from the at least one server to the at least one client; analyze the plurality of messages to determine a plurality of resources to be consolidated; and generate an optimization instruction set for consolidating the identified plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources. 18. The system of claim 17, wherein the system is deployed between the at least one server and at least one client. 19. The system of claim 18, wherein the system is installed in the at least one server. 20. A non-transitory computer readable medium having stored thereon instructions for causing a processing circuitry to perform a process for generating an optimization instruction set based on communication between at least one server and at least one client, the process comprising: aggregating a plurality of messages communicated from the at least one server to the at least one client; analyzing the plurality of messages to determine a plurality of resources to be consolidated; and generating an optimization instruction set for consolidating the identified plurality of resources, wherein the generated optimization instruction set comprises instructions for replacing the plurality of resources with the consolidated resources.
2,400
8,525
8,525
14,876,743
2,447
Resource command messages comprise commands and command urgency or importance information that is interpreted by a resource device and is coupled with information relating to the resource device to determine when to process the command within the resource command message. Resource devices comprising a plurality of resource nodes provide increased performance, responsiveness, and load balancing by multiple resource nodes processing the same resource command message in parallel.
1. A method, comprising: receiving, at a resource node, a resource command from a resource consumer; identifying, at the resource node, an urgency parameter or an importance parameter from the resource command; identifying, at the resource node, a resource node parameter configured to identify resources available to the resource node; determining, at the resource node, an order in which to process the resource command based at least in part on the urgency parameter, the importance parameter, the resource node parameter, or a combination thereof. 2. The method of claim 1, further comprising: receiving, at the resource node, the resource command from the resource consumer as an IP address, a unicast message, or a multicast message. 3. The method of claim 1, further comprising: interpreting, at the resource node, the urgency parameter by determining direct or indirect urgency information from the resource command; or interpreting, at the resource node, the importance parameter by determining direct or indirect importance information from the resource command. 4. The method of claim 1, wherein the resource node parameter comprises loading information of the resource node, resource node capabilities, previous resource commands received by the resource node, number of resource commands in a command queue at the resource node, or a combination thereof. 5. The method of claim 1, further comprising: autonomously determining, at the resource node, to discard the resource command based at least in part on the resource node parameter. 6. The method of claim 5, further comprising: autonomously determining, at the resource node, to discard the resource command based at least in part on the resource node being fully loaded, on a command queue being full, or on resource node resources being reserved. 7. The method of claim 1, further comprising: determining, at the resource node, to delay processing the resource command. 8. The method of claim 1, further comprising: placing, at the resource node, the resource command in a command queue for processing based at least in part on the order. 9. An article of manufacture, comprising: a non-transitory computer-readable medium; and instructions within the computer-readable medium that, when executed, cause a resource node to: identify urgency information or importance information from a resource command received from a resource consumer; gather resource node information; determine an order in which to process the resource command based at least in part on the urgency information, the importance information, the resource node information, or a combination thereof. 10. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: receive the resource command from the resource consumer as an IP address, a unicast message, or a multicast message. 11. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: identify the urgency information by determining direct or indirect urgency information from the resource command; or identify the importance information by determining direct or indirect importance information from the resource command. 12. The article of manufacture of claim 9, wherein the resource node parameter comprises loading information of the resource node, resource node capabilities, previous resource commands received by the resource node, number of resource commands in a command queue at the resource node, or a combination thereof. 13. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: autonomously determine to discard the resource command based at least in part on the resource node information. 14. The article of manufacture of claim 13, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: autonomously determine to discard the resource command based at least in part on the resource node being fully loaded, on a command queue being full, or on resource node resources being reserved. 15. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: determine to delay processing the resource command. 16. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: place the resource command in a command queue for processing based at least in part on the order. 17. A resource node, comprising: a memory configured to store a command queue and resource node data; a processing unit configure to: receive a resource command from a resource consumer requesting at least one of a plurality of resources; identify urgency information or importance information from the resource command; determine an order in which to process the resource command based at least in part on the urgency information, the importance information, the resource node data, or a combination thereof. 18. The resource node of claim 17, wherein the resource node data comprises loading information for the resource node, resource node capabilities, previous resource commands received by the resource node, a number of resource commands contained in the command queue, or a combination thereof. 19. The resource node of claim 17, wherein the processing unit is further configured to: autonomously determine to discard the resource command based at least in part on the resource node data. 20. The resource node of claim 17, wherein the processing unit is further configured to: autonomously determine to discard the resource command based at least in part on the resource node being fully loaded, on the command queue being full, or on resource node resources being reserved.
Resource command messages comprise commands and command urgency or importance information that is interpreted by a resource device and is coupled with information relating to the resource device to determine when to process the command within the resource command message. Resource devices comprising a plurality of resource nodes provide increased performance, responsiveness, and load balancing by multiple resource nodes processing the same resource command message in parallel.1. A method, comprising: receiving, at a resource node, a resource command from a resource consumer; identifying, at the resource node, an urgency parameter or an importance parameter from the resource command; identifying, at the resource node, a resource node parameter configured to identify resources available to the resource node; determining, at the resource node, an order in which to process the resource command based at least in part on the urgency parameter, the importance parameter, the resource node parameter, or a combination thereof. 2. The method of claim 1, further comprising: receiving, at the resource node, the resource command from the resource consumer as an IP address, a unicast message, or a multicast message. 3. The method of claim 1, further comprising: interpreting, at the resource node, the urgency parameter by determining direct or indirect urgency information from the resource command; or interpreting, at the resource node, the importance parameter by determining direct or indirect importance information from the resource command. 4. The method of claim 1, wherein the resource node parameter comprises loading information of the resource node, resource node capabilities, previous resource commands received by the resource node, number of resource commands in a command queue at the resource node, or a combination thereof. 5. The method of claim 1, further comprising: autonomously determining, at the resource node, to discard the resource command based at least in part on the resource node parameter. 6. The method of claim 5, further comprising: autonomously determining, at the resource node, to discard the resource command based at least in part on the resource node being fully loaded, on a command queue being full, or on resource node resources being reserved. 7. The method of claim 1, further comprising: determining, at the resource node, to delay processing the resource command. 8. The method of claim 1, further comprising: placing, at the resource node, the resource command in a command queue for processing based at least in part on the order. 9. An article of manufacture, comprising: a non-transitory computer-readable medium; and instructions within the computer-readable medium that, when executed, cause a resource node to: identify urgency information or importance information from a resource command received from a resource consumer; gather resource node information; determine an order in which to process the resource command based at least in part on the urgency information, the importance information, the resource node information, or a combination thereof. 10. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: receive the resource command from the resource consumer as an IP address, a unicast message, or a multicast message. 11. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: identify the urgency information by determining direct or indirect urgency information from the resource command; or identify the importance information by determining direct or indirect importance information from the resource command. 12. The article of manufacture of claim 9, wherein the resource node parameter comprises loading information of the resource node, resource node capabilities, previous resource commands received by the resource node, number of resource commands in a command queue at the resource node, or a combination thereof. 13. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: autonomously determine to discard the resource command based at least in part on the resource node information. 14. The article of manufacture of claim 13, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: autonomously determine to discard the resource command based at least in part on the resource node being fully loaded, on a command queue being full, or on resource node resources being reserved. 15. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: determine to delay processing the resource command. 16. The article of manufacture of claim 9, wherein the instructions within the computer-readable medium, when executed, further cause the resource node to: place the resource command in a command queue for processing based at least in part on the order. 17. A resource node, comprising: a memory configured to store a command queue and resource node data; a processing unit configure to: receive a resource command from a resource consumer requesting at least one of a plurality of resources; identify urgency information or importance information from the resource command; determine an order in which to process the resource command based at least in part on the urgency information, the importance information, the resource node data, or a combination thereof. 18. The resource node of claim 17, wherein the resource node data comprises loading information for the resource node, resource node capabilities, previous resource commands received by the resource node, a number of resource commands contained in the command queue, or a combination thereof. 19. The resource node of claim 17, wherein the processing unit is further configured to: autonomously determine to discard the resource command based at least in part on the resource node data. 20. The resource node of claim 17, wherein the processing unit is further configured to: autonomously determine to discard the resource command based at least in part on the resource node being fully loaded, on the command queue being full, or on resource node resources being reserved.
2,400
8,526
8,526
15,090,057
2,447
A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified. The master service orchestrator also causes a software defined network controller to retrieve the cloud services archive file, to extract a cloud network configuration template and to configure layer 1 through layer 3 virtual network functions and to set up routes between them. Additionally, the master service orchestrator causes an application controller to retrieve the cloud services archive file, to extract a deployment orchestration plan and to configure and start layer 4 through layer 7 application components and bring them to a state of operational readiness.
1. A model-driven system for deploying a virtualized service in a cloud infrastructure, comprising: an order repository data store containing a cloud services archive file describing the virtualized service and generated by a cloud service designer tool, the cloud services archive file including an order ID associating it with the virtualized service; a master service orchestrator comprising: a cloud platform orchestrator interface for transmitting cloud resource configuration instructions including the order ID to a cloud platform orchestrator to cause the cloud platform orchestrator to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud resource configuration template from the cloud services archive file and to create cloud resources at appropriate data centers as specified by the cloud resource configuration template; a software defined network controller interface for transmitting cloud network configuration instructions including the order ID to a software defined network controller to cause the software defined network controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud network configuration template from the cloud services archive file and to configure layer 1 through layer 3 virtual network functions and to set up routes between the cloud resources as specified by the cloud network configuration template; and an application controller interface for transmitting deployment orchestration instructions including the order ID to an application controller to cause the application controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a deployment orchestration plan from the cloud services archive file and to configure layer 4 through layer 7 application components as specified by the deployment orchestration plan and to start the application components and bring them to a state of operational readiness. 2. The deployment system of claim 1, further comprising: a runtime inventory data store comprising an interface with the master service orchestrator for receiving an application dependency graph generated by the cloud service designer tool and describing the virtualized service. 3. The deployment system of claim 2, wherein the runtime inventory data store further comprises an interface with the cloud platform orchestrator for confirming the availability of cloud resources at appropriate data centers as specified by the cloud resource configuration template, and for updating the application dependency graph with states after creating the cloud resources. 4. The deployment system of claim 2, wherein the runtime inventory data store further comprises an interface with the software defined network controller for confirming the availability of networking resources as specified by the cloud network configuration template, and for updating the application dependency graph with cloud network states after configuring the layer 1 through layer 3 virtual network functions. 5. The deployment system of claim 2, wherein the runtime inventory data store further comprises an interface with the application controller for transmitting the application dependency graph, and for updating the application dependency graph with cloud network states after configuring and starting layer 4 through layer 7 application components. 6. The deployment system of claim 5, wherein the deployment orchestration instructions further cause the application controller to determine dependency relationships among the layer 4 through layer 7 application components from the application dependency graph, and to configure the layer 4 through layer 7 application components in a sequence based on the dependency relationships. 7. The deployment system of claim 1, wherein the cloud resource configuration instructions cause the cloud platform orchestrator to create the cloud resources at appropriate data centers by creating virtual machines of required processing and memory capacity, assigning vNIC and local VLAN IDs to the virtual machines and connecting the VLANS to a local data center switch. 8. The deployment system of claim 1, wherein the cloud network configuration instructions further cause the software defined network controller to configure bandwidth, latency and class of service characteristics as specified by the cloud network configuration template on the routes set up between the cloud resources. 9. The deployment system of claim 1, wherein the order repository data store further comprises an interface with the cloud service designer tool for receiving a cloud services archive file containing the topology model artifacts. 10. The deployment system of claim 1, wherein the cloud service designer tool utilizes a TOSCA™ topology and orchestration specification, the cloud resource configuration template is a YANG™ file created from output of the cloud service designer tool, and the cloud network configuration template is a HEAT™ file created from output of the cloud service designer tool. 11. A method for deploying a virtualized service in a cloud infrastructure, comprising: generating a cloud services archive file describing topology and network requirements of the virtualized service; storing the services archive file in an order repository data store with an order ID associating the services archive file with the virtualized service; and by a master service orchestrator: transmitting cloud resource configuration instructions including the order ID to cause a cloud platform orchestrator to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud resource configuration template from the cloud services archive file and to create cloud resources at appropriate data centers as specified by the cloud resource configuration template; transmitting cloud network configuration instructions including the order ID to cause a software defined network controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud network configuration template from the cloud services archive file and to configure layer 1 through layer 3 virtual network functions and to set up routes between the cloud resources as specified by the cloud network configuration template; and transmitting deployment orchestration instructions including the order ID to cause an application controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a deployment orchestration plan from the cloud services archive file and to configure layer 4 through layer 7 application components as specified by the deployment orchestration plan and to start the application components. 12. The method of claim 11, further comprising: by the master service orchestrator: extracting an application dependency graph from the cloud services archive file; and transmitting the application dependency graph to a runtime inventory data store. 13. The method of claim 12, further comprising: confirming by the runtime inventory data store to the cloud platform orchestrator, the availability of cloud resources at appropriate data centers as specified by the cloud resource configuration template; and updating the application dependency graph with states after creating the cloud resources based on information received from the cloud platform orchestrator. 14. The method of claim 12, further comprising: confirming by the runtime inventory data store to the software defined network controller, the availability of networking resources as specified by the cloud network configuration template; and updating the application dependency graph with cloud network states after configuring the layer 1 through layer 3 virtual network functions based on information received from the software defined network controller. 15. The method of claim 12, transmitting by the runtime inventory data store to the application controller, the application dependency graph; and updating the application dependency graph with cloud network states after configuring and starting layer 4 through layer 7 application components based on information received from the application controller. 16. A computer-readable storage device having stored thereon computer readable instructions for deploying a virtualized service in a cloud infrastructure, wherein execution of the computer readable instructions by a processor causes the processor to perform operations comprising: receiving from a service design and composition tool, a cloud services archive file describing topology and network requirements of the virtualized service; storing the services archive file in an order repository data store with an order ID associating the services archive file with the virtualized service; transmitting cloud resource configuration instructions including the order ID to cause a cloud platform orchestrator to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud resource configuration template from the cloud services archive file and to create cloud resources at appropriate data centers as specified by the cloud resource configuration template; transmitting cloud network configuration instructions including the order ID to cause a software defined network controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud network configuration template from the cloud services archive file and to configure layer 1 through layer 3 virtual network functions and to set up routes between the cloud resources as specified by the cloud network configuration template; and transmitting deployment orchestration instructions including the order ID to cause an application controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a deployment orchestration plan from the cloud services archive file and to configure layer 4 through layer 7 application components as specified by the deployment orchestration plan and to start the application components. 17. The computer-readable storage device of claim 16, wherein the operations further comprise: by the master service orchestrator: extracting an application dependency graph from the cloud services archive file; and transmitting the application dependency graph to a runtime inventory data store. 18. The computer-readable storage device of claim 17, wherein the operations further comprise: confirming by the runtime inventory data store to the cloud platform orchestrator, the availability of cloud resources at appropriate data centers as specified by the cloud resource configuration template; and updating the application dependency graph with states after creating the cloud resources based on information received from the cloud platform orchestrator. 19. The computer-readable storage device of claim 17, wherein the operations further comprise: confirming by the runtime inventory data store to the software defined network controller, the availability of networking resources as specified by the cloud network configuration template; and updating the application dependency graph with cloud network states after configuring the layer 1 through layer 3 virtual network functions based on information received from the software defined network controller. 20. The computer-readable storage device of claim 17, wherein the operations further comprise: transmitting by the runtime inventory data store to the application controller, the application dependency graph; and updating the application dependency graph with cloud network states after configuring and starting layer 4 through layer 7 application components based on information received from the application controller.
A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified. The master service orchestrator also causes a software defined network controller to retrieve the cloud services archive file, to extract a cloud network configuration template and to configure layer 1 through layer 3 virtual network functions and to set up routes between them. Additionally, the master service orchestrator causes an application controller to retrieve the cloud services archive file, to extract a deployment orchestration plan and to configure and start layer 4 through layer 7 application components and bring them to a state of operational readiness.1. A model-driven system for deploying a virtualized service in a cloud infrastructure, comprising: an order repository data store containing a cloud services archive file describing the virtualized service and generated by a cloud service designer tool, the cloud services archive file including an order ID associating it with the virtualized service; a master service orchestrator comprising: a cloud platform orchestrator interface for transmitting cloud resource configuration instructions including the order ID to a cloud platform orchestrator to cause the cloud platform orchestrator to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud resource configuration template from the cloud services archive file and to create cloud resources at appropriate data centers as specified by the cloud resource configuration template; a software defined network controller interface for transmitting cloud network configuration instructions including the order ID to a software defined network controller to cause the software defined network controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud network configuration template from the cloud services archive file and to configure layer 1 through layer 3 virtual network functions and to set up routes between the cloud resources as specified by the cloud network configuration template; and an application controller interface for transmitting deployment orchestration instructions including the order ID to an application controller to cause the application controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a deployment orchestration plan from the cloud services archive file and to configure layer 4 through layer 7 application components as specified by the deployment orchestration plan and to start the application components and bring them to a state of operational readiness. 2. The deployment system of claim 1, further comprising: a runtime inventory data store comprising an interface with the master service orchestrator for receiving an application dependency graph generated by the cloud service designer tool and describing the virtualized service. 3. The deployment system of claim 2, wherein the runtime inventory data store further comprises an interface with the cloud platform orchestrator for confirming the availability of cloud resources at appropriate data centers as specified by the cloud resource configuration template, and for updating the application dependency graph with states after creating the cloud resources. 4. The deployment system of claim 2, wherein the runtime inventory data store further comprises an interface with the software defined network controller for confirming the availability of networking resources as specified by the cloud network configuration template, and for updating the application dependency graph with cloud network states after configuring the layer 1 through layer 3 virtual network functions. 5. The deployment system of claim 2, wherein the runtime inventory data store further comprises an interface with the application controller for transmitting the application dependency graph, and for updating the application dependency graph with cloud network states after configuring and starting layer 4 through layer 7 application components. 6. The deployment system of claim 5, wherein the deployment orchestration instructions further cause the application controller to determine dependency relationships among the layer 4 through layer 7 application components from the application dependency graph, and to configure the layer 4 through layer 7 application components in a sequence based on the dependency relationships. 7. The deployment system of claim 1, wherein the cloud resource configuration instructions cause the cloud platform orchestrator to create the cloud resources at appropriate data centers by creating virtual machines of required processing and memory capacity, assigning vNIC and local VLAN IDs to the virtual machines and connecting the VLANS to a local data center switch. 8. The deployment system of claim 1, wherein the cloud network configuration instructions further cause the software defined network controller to configure bandwidth, latency and class of service characteristics as specified by the cloud network configuration template on the routes set up between the cloud resources. 9. The deployment system of claim 1, wherein the order repository data store further comprises an interface with the cloud service designer tool for receiving a cloud services archive file containing the topology model artifacts. 10. The deployment system of claim 1, wherein the cloud service designer tool utilizes a TOSCA™ topology and orchestration specification, the cloud resource configuration template is a YANG™ file created from output of the cloud service designer tool, and the cloud network configuration template is a HEAT™ file created from output of the cloud service designer tool. 11. A method for deploying a virtualized service in a cloud infrastructure, comprising: generating a cloud services archive file describing topology and network requirements of the virtualized service; storing the services archive file in an order repository data store with an order ID associating the services archive file with the virtualized service; and by a master service orchestrator: transmitting cloud resource configuration instructions including the order ID to cause a cloud platform orchestrator to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud resource configuration template from the cloud services archive file and to create cloud resources at appropriate data centers as specified by the cloud resource configuration template; transmitting cloud network configuration instructions including the order ID to cause a software defined network controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud network configuration template from the cloud services archive file and to configure layer 1 through layer 3 virtual network functions and to set up routes between the cloud resources as specified by the cloud network configuration template; and transmitting deployment orchestration instructions including the order ID to cause an application controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a deployment orchestration plan from the cloud services archive file and to configure layer 4 through layer 7 application components as specified by the deployment orchestration plan and to start the application components. 12. The method of claim 11, further comprising: by the master service orchestrator: extracting an application dependency graph from the cloud services archive file; and transmitting the application dependency graph to a runtime inventory data store. 13. The method of claim 12, further comprising: confirming by the runtime inventory data store to the cloud platform orchestrator, the availability of cloud resources at appropriate data centers as specified by the cloud resource configuration template; and updating the application dependency graph with states after creating the cloud resources based on information received from the cloud platform orchestrator. 14. The method of claim 12, further comprising: confirming by the runtime inventory data store to the software defined network controller, the availability of networking resources as specified by the cloud network configuration template; and updating the application dependency graph with cloud network states after configuring the layer 1 through layer 3 virtual network functions based on information received from the software defined network controller. 15. The method of claim 12, transmitting by the runtime inventory data store to the application controller, the application dependency graph; and updating the application dependency graph with cloud network states after configuring and starting layer 4 through layer 7 application components based on information received from the application controller. 16. A computer-readable storage device having stored thereon computer readable instructions for deploying a virtualized service in a cloud infrastructure, wherein execution of the computer readable instructions by a processor causes the processor to perform operations comprising: receiving from a service design and composition tool, a cloud services archive file describing topology and network requirements of the virtualized service; storing the services archive file in an order repository data store with an order ID associating the services archive file with the virtualized service; transmitting cloud resource configuration instructions including the order ID to cause a cloud platform orchestrator to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud resource configuration template from the cloud services archive file and to create cloud resources at appropriate data centers as specified by the cloud resource configuration template; transmitting cloud network configuration instructions including the order ID to cause a software defined network controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a cloud network configuration template from the cloud services archive file and to configure layer 1 through layer 3 virtual network functions and to set up routes between the cloud resources as specified by the cloud network configuration template; and transmitting deployment orchestration instructions including the order ID to cause an application controller to retrieve the cloud services archive file from the order repository data store using the order ID, to extract a deployment orchestration plan from the cloud services archive file and to configure layer 4 through layer 7 application components as specified by the deployment orchestration plan and to start the application components. 17. The computer-readable storage device of claim 16, wherein the operations further comprise: by the master service orchestrator: extracting an application dependency graph from the cloud services archive file; and transmitting the application dependency graph to a runtime inventory data store. 18. The computer-readable storage device of claim 17, wherein the operations further comprise: confirming by the runtime inventory data store to the cloud platform orchestrator, the availability of cloud resources at appropriate data centers as specified by the cloud resource configuration template; and updating the application dependency graph with states after creating the cloud resources based on information received from the cloud platform orchestrator. 19. The computer-readable storage device of claim 17, wherein the operations further comprise: confirming by the runtime inventory data store to the software defined network controller, the availability of networking resources as specified by the cloud network configuration template; and updating the application dependency graph with cloud network states after configuring the layer 1 through layer 3 virtual network functions based on information received from the software defined network controller. 20. The computer-readable storage device of claim 17, wherein the operations further comprise: transmitting by the runtime inventory data store to the application controller, the application dependency graph; and updating the application dependency graph with cloud network states after configuring and starting layer 4 through layer 7 application components based on information received from the application controller.
2,400
8,527
8,527
15,348,438
2,482
The present invention is directed to a method of integrating information, including real-time information, into a virtual thematic environment using a computer system, including accessing the stored information from a database or downloading the real-time information from a source external to the thematic environment; inserting the real-time information into the thematic environment; and displaying the information to a user within the thematic environment. In one embodiment, the computer system is connected to a holographic projection system such that the images from the thematic environment can be projected as holographic projections. The computer system includes an interactive software application platform having at least one thematic/publishing logic module which contains thematic environment rules; at least one digital content library module which provides content management on the thematic environment; and at least one quantum imaging environment (QIE) module which interprets content such that the content is manipulated and accessed by any device.
1.-28. (canceled) 29. A method of providing a virtual thematic environment, comprising: retrieving information for utilization with a three-dimensional virtual thematic environment, from external sources over the internet, said information including a real-world geographic location of a user within said three-dimensional virtual thematic environment; and integrating said information into the three-dimensional virtual thematic environment, such that the three-dimensional virtual thematic environment includes said real-world geographic location displayed to the user as said three-dimensional virtual thematic environment; wherein the user interacts with the three-dimensional virtual thematic environment as a simulated real-world interaction, depending on the user's geographical three-dimensional movement through the three-dimensional virtual thematic environment. 30. The method according to claim 29, further comprising: requesting updates on the information in the virtual thematic environment at predetermined intervals; and automatically updating the information in the virtual thematic environment when updates are received. 31. The method according to claim 29, wherein said information includes real-time information. 32. The method according to claim 29, wherein said information on the virtual thematic environment is displayed to the user such that the user can access and change said information to another virtual thematic environment, using a selection mechanism. 33. The method according to claim 29, further comprising: providing at least one of a voice recognition system, a synthetic smell system, a weather system, or a GPS system. 34. The method according to claim 29, further comprising: displaying said information to a user in a mini-application within the virtual thematic environment.
The present invention is directed to a method of integrating information, including real-time information, into a virtual thematic environment using a computer system, including accessing the stored information from a database or downloading the real-time information from a source external to the thematic environment; inserting the real-time information into the thematic environment; and displaying the information to a user within the thematic environment. In one embodiment, the computer system is connected to a holographic projection system such that the images from the thematic environment can be projected as holographic projections. The computer system includes an interactive software application platform having at least one thematic/publishing logic module which contains thematic environment rules; at least one digital content library module which provides content management on the thematic environment; and at least one quantum imaging environment (QIE) module which interprets content such that the content is manipulated and accessed by any device.1.-28. (canceled) 29. A method of providing a virtual thematic environment, comprising: retrieving information for utilization with a three-dimensional virtual thematic environment, from external sources over the internet, said information including a real-world geographic location of a user within said three-dimensional virtual thematic environment; and integrating said information into the three-dimensional virtual thematic environment, such that the three-dimensional virtual thematic environment includes said real-world geographic location displayed to the user as said three-dimensional virtual thematic environment; wherein the user interacts with the three-dimensional virtual thematic environment as a simulated real-world interaction, depending on the user's geographical three-dimensional movement through the three-dimensional virtual thematic environment. 30. The method according to claim 29, further comprising: requesting updates on the information in the virtual thematic environment at predetermined intervals; and automatically updating the information in the virtual thematic environment when updates are received. 31. The method according to claim 29, wherein said information includes real-time information. 32. The method according to claim 29, wherein said information on the virtual thematic environment is displayed to the user such that the user can access and change said information to another virtual thematic environment, using a selection mechanism. 33. The method according to claim 29, further comprising: providing at least one of a voice recognition system, a synthetic smell system, a weather system, or a GPS system. 34. The method according to claim 29, further comprising: displaying said information to a user in a mini-application within the virtual thematic environment.
2,400
8,528
8,528
15,057,474
2,435
A computing platform of a vehicle may receive a request, from a mobile application accessing a secure vehicle function, to create a secure tunnel between the computing platform and the mobile device; retrieve an application certificate from the mobile application; and validate the creation of the secure tunnel using the application certificate and a module certificate from a local policy table of the computing platform. A mobile device, connected to a computing platform of a vehicle may execute a mobile application requiring a secure vehicle function; send a request to create a secure tunnel with the computing platform responsive to access of by the mobile application of the secure vehicle function; and send to the computing platform an application certificate corresponding to the mobile application to validate creation of the secure tunnel.
1. A system comprising: a computing platform of a vehicle programmed to receive a request, from a mobile device executing a mobile application accessing a secure function, to create a secure tunnel between the computing platform and the mobile device; retrieve an application certificate from the mobile application; and validate creation of the secure tunnel using the application certificate and a module certificate stored to a local policy table of the computing platform. 2. The system of claim 1, wherein the secure function includes access to an audio or video vehicle function of the computing platform. 3. The system of claim 1, wherein the secure function includes one or more of access to vehicle diagnostics, access to writing of information to the vehicle, or access to personally-identifiable information. 4. The system of claim 1, wherein the secure function includes authentication for one or more of mobile payment, autonomous driving, unlocking the vehicle, starting the vehicle, ride sharing, micro-rental, and access to personalization settings for a user of the mobile device. 5. The system of claim 1, the application certificate is keyed to an application identifier of the mobile application and the computing platform is further programmed to validate that the application certificate is keyed to the application identifier and is unexpired. 6. The system of claim 1, wherein the computing platform is further programmed to validate the module certificate as being keyed to the computing platform and unexpired. 7. The system of claim 1, wherein the computing platform is further programmed to, responsive to occurrence of expiration of the module certificate corresponding to the computing platform, send an application usage update message to the mobile device configured to cause the mobile device to request a policy table update from a remote server, the policy table update including a new module certificate. 8. The system of claim 1, wherein the computing platform is further programmed to provide the mobile application with access to vehicle functions for which the mobile application is authorized in accordance with application permissions in the local policy table. 9. The system of claim 1, wherein the computing platform is further programmed to terminate the mobile application responsive to failing to validate creation of the secure tunnel. 10. The system of claim 1, wherein the computing platform is further programmed to refuse the mobile application access to the secure function responsive to failing to validate creation of the secure tunnel. 11. A system comprising: a mobile device, connected to a computing platform of a vehicle, programmed to execute a mobile application requiring a secure function; send a request to create a secure tunnel with the computing platform responsive to access of by the mobile application of the secure function; and send to the computing platform an application certificate corresponding to the mobile application to validate creation of the secure tunnel. 12. The system of claim 11, wherein the secure function includes audio and video features of the computing platform. 13. The system of claim 11, wherein the secure function includes one or more of access to vehicle diagnostics, access to writing of information to the vehicle, or access to personally-identifiable information. 14. The system of claim 11, wherein the mobile device is further programmed to: send a certificate request for the application certificate to a remote server, the request including an application identifier of the mobile application and a name of the mobile application; receive a certificate response from the remote server, the certificate response including an encrypted blob containing the application certificate; and utilize a decryption library of the mobile device to decrypt the application certificate using a secret key. 15. The system of claim 11, wherein the mobile device is further programmed to maintain the application certificate in a storage of the mobile device in encrypted form. 16. The system of claim 11, wherein and application certificate is specified as expiring after a plurality of days, and the mobile device is further programmed to request an updated application certificate daily. 17. A method comprising: sending, by a mobile device connected to a computing platform, a request to create a secure tunnel with the computing platform to execute a mobile application requiring a secure function; and receiving validation of the secure tunnel with the computing platform performed using an application certificate stored to the mobile device and a module certificate stored to a local policy table of the computing platform. 18. The method of claim 17, wherein the secure function includes an audio or video feature of the computing platform. 19. The method of claim 17, wherein the secure function includes one or more of access to vehicle diagnostics, access to writing of information to the computing platform, or access to personally-identifiable information. 20. The method of claim 17, wherein the secure function includes authentication for one or more of mobile payment, autonomous driving, vehicle unlocking, vehicle starting, ride sharing, micro-rental, and access to personalization settings for a user of the mobile device. 21. The method of claim 17, wherein the application certificate is keyed to an application identifier of the mobile application, and further comprising sending the application certificate to the computing platform for validation of the application identifier and that the application certificate has not expired. 22. The method of claim 17, further comprising: sending a certificate request for the application certificate to a remote server, the request including an application identifier of the mobile application and a name of the mobile application; receiving a certificate response from the remote server, the certificate response including an encrypted blob containing the application certificate; and utilizing a decryption library of the mobile device to decrypt the application certificate using a secret key. 23. The method of claim 22, further comprising maintaining the application certificate in a storage of the mobile device in encrypted form.
A computing platform of a vehicle may receive a request, from a mobile application accessing a secure vehicle function, to create a secure tunnel between the computing platform and the mobile device; retrieve an application certificate from the mobile application; and validate the creation of the secure tunnel using the application certificate and a module certificate from a local policy table of the computing platform. A mobile device, connected to a computing platform of a vehicle may execute a mobile application requiring a secure vehicle function; send a request to create a secure tunnel with the computing platform responsive to access of by the mobile application of the secure vehicle function; and send to the computing platform an application certificate corresponding to the mobile application to validate creation of the secure tunnel.1. A system comprising: a computing platform of a vehicle programmed to receive a request, from a mobile device executing a mobile application accessing a secure function, to create a secure tunnel between the computing platform and the mobile device; retrieve an application certificate from the mobile application; and validate creation of the secure tunnel using the application certificate and a module certificate stored to a local policy table of the computing platform. 2. The system of claim 1, wherein the secure function includes access to an audio or video vehicle function of the computing platform. 3. The system of claim 1, wherein the secure function includes one or more of access to vehicle diagnostics, access to writing of information to the vehicle, or access to personally-identifiable information. 4. The system of claim 1, wherein the secure function includes authentication for one or more of mobile payment, autonomous driving, unlocking the vehicle, starting the vehicle, ride sharing, micro-rental, and access to personalization settings for a user of the mobile device. 5. The system of claim 1, the application certificate is keyed to an application identifier of the mobile application and the computing platform is further programmed to validate that the application certificate is keyed to the application identifier and is unexpired. 6. The system of claim 1, wherein the computing platform is further programmed to validate the module certificate as being keyed to the computing platform and unexpired. 7. The system of claim 1, wherein the computing platform is further programmed to, responsive to occurrence of expiration of the module certificate corresponding to the computing platform, send an application usage update message to the mobile device configured to cause the mobile device to request a policy table update from a remote server, the policy table update including a new module certificate. 8. The system of claim 1, wherein the computing platform is further programmed to provide the mobile application with access to vehicle functions for which the mobile application is authorized in accordance with application permissions in the local policy table. 9. The system of claim 1, wherein the computing platform is further programmed to terminate the mobile application responsive to failing to validate creation of the secure tunnel. 10. The system of claim 1, wherein the computing platform is further programmed to refuse the mobile application access to the secure function responsive to failing to validate creation of the secure tunnel. 11. A system comprising: a mobile device, connected to a computing platform of a vehicle, programmed to execute a mobile application requiring a secure function; send a request to create a secure tunnel with the computing platform responsive to access of by the mobile application of the secure function; and send to the computing platform an application certificate corresponding to the mobile application to validate creation of the secure tunnel. 12. The system of claim 11, wherein the secure function includes audio and video features of the computing platform. 13. The system of claim 11, wherein the secure function includes one or more of access to vehicle diagnostics, access to writing of information to the vehicle, or access to personally-identifiable information. 14. The system of claim 11, wherein the mobile device is further programmed to: send a certificate request for the application certificate to a remote server, the request including an application identifier of the mobile application and a name of the mobile application; receive a certificate response from the remote server, the certificate response including an encrypted blob containing the application certificate; and utilize a decryption library of the mobile device to decrypt the application certificate using a secret key. 15. The system of claim 11, wherein the mobile device is further programmed to maintain the application certificate in a storage of the mobile device in encrypted form. 16. The system of claim 11, wherein and application certificate is specified as expiring after a plurality of days, and the mobile device is further programmed to request an updated application certificate daily. 17. A method comprising: sending, by a mobile device connected to a computing platform, a request to create a secure tunnel with the computing platform to execute a mobile application requiring a secure function; and receiving validation of the secure tunnel with the computing platform performed using an application certificate stored to the mobile device and a module certificate stored to a local policy table of the computing platform. 18. The method of claim 17, wherein the secure function includes an audio or video feature of the computing platform. 19. The method of claim 17, wherein the secure function includes one or more of access to vehicle diagnostics, access to writing of information to the computing platform, or access to personally-identifiable information. 20. The method of claim 17, wherein the secure function includes authentication for one or more of mobile payment, autonomous driving, vehicle unlocking, vehicle starting, ride sharing, micro-rental, and access to personalization settings for a user of the mobile device. 21. The method of claim 17, wherein the application certificate is keyed to an application identifier of the mobile application, and further comprising sending the application certificate to the computing platform for validation of the application identifier and that the application certificate has not expired. 22. The method of claim 17, further comprising: sending a certificate request for the application certificate to a remote server, the request including an application identifier of the mobile application and a name of the mobile application; receiving a certificate response from the remote server, the certificate response including an encrypted blob containing the application certificate; and utilizing a decryption library of the mobile device to decrypt the application certificate using a secret key. 23. The method of claim 22, further comprising maintaining the application certificate in a storage of the mobile device in encrypted form.
2,400
8,529
8,529
15,280,954
2,495
Examples relate to emulating network traffic. In one example, a computing device may receive malware data specifying a malware feature; emulate a plurality of host computing devices; generate benign network traffic for each of the plurality of host computing devices; for a particular host device of the plurality of host devices, generate malicious network traffic based on the malware data; and cause transmission of the benign network traffic and the malicious network traffic.
1. A non-transitory machine-readable storage medium encoded with instructions executable by a hardware processor of a computing device for emulating network traffic, the machine-readable storage medium comprising instructions to cause the hardware processor to: receive malware data specifying a malware feature; emulate a plurality of host computing devices; generate benign network traffic for each of the plurality of host computing devices; for a particular host device of the plurality of host devices, generate malicious network traffic based on the malware data; and cause transmission of the benign network traffic and the malicious network traffic. 2. The storage medium of claim 1, wherein: the benign network traffic is generated according to a benign traffic model; and the malicious network traffic is generated according to a malicious traffic model. 3. The storage medium of claim 2, wherein: the benign traffic model is based on previously recorded benign network traffic. the malicious traffic model is based on previously recorded malicious activity. 4. The storage medium of claim 1, wherein: transmission of the benign network traffic is performed according to a benign traffic transmission model; and transmission of the malicious network traffic is performed according to a malicious traffic transmission model. 5. The storage medium of claim 4, wherein: the benign traffic transmission model is based on a transmission pattern of previously recorded benign network traffic; and the malicious traffic transmission model is based on a transmission pattern of previously recorded malicious network traffic. 6. The storage medium of claim 1, wherein the malware data includes parameters specifying: a number of the plurality of host computing devices for which malicious network traffic is generated; a network traffic volume for at least one of the benign network traffic or the malicious network traffic; and transmission data indicating a manner in which at least one of the benign network traffic or the malicious network traffic is transmitted. 7. The storage medium of claim 1, wherein: the malware feature includes a domain generation algorithm; and the malicious network traffic is generated using the domain generation algorithm. 8. A computing device for emulating network traffic, the computing device comprising: a hardware processor; and a data storage device storing instructions that, when executed by the hardware processor, cause the hardware processor to: receive malware data specifying a malware feature; emulate a plurality of host computing devices; generate benign network traffic for each of the plurality of host computing devices; for a particular host device of the plurality of host computing devices, generate malicious network traffic based on the malware data; determine, using the malware data, a transmission model for transmitting at least one of the benign network traffic or the malicious network traffic; and cause transmission of the benign network traffic and the malicious network traffic. 9. The computing device of claim 8, wherein: the benign network traffic is generated according to a benign traffic model; and the malicious network traffic is generated according to a malicious traffic model. 10. The computing device of claim 9, wherein: the benign traffic model is based on previously recorded benign network traffic; and the malicious traffic model is based on previously recorded malicious activity. 11. The computing device of claim 8, wherein the transmission model is a benign traffic transmission model for transmission of the benign network traffic, and wherein the instructions further cause the hardware processor to: determine, using the malware data, a malicious traffic transmission model for transmission of the malicious network traffic; and cause transmission of the malicious network traffic using the malicious traffic transmission model. 12. The computing device of claim 11, wherein: the benign traffic transmission model is based on a transmission pattern of previously recorded benign network traffic; and the malicious traffic transmission model is based on a transmission pattern of previously recorded malicious network traffic. 13. The computing device of claim 8, wherein the malware data includes parameters specifying: a number of the plurality of host computing devices for which malicious network traffic is generated; and a network traffic volume for at least one of the benign network traffic or the malicious network traffic. 14. The computing device of claim 8, wherein: the malware feature includes data exfiltration; and the transmission model causes transmission of the malicious network traffic in multiple bursts over time. 15. A method for emulating network traffic, implemented by a hardware processor, the method comprising: receiving malware data specifying a malware feature; emulating a plurality of host computing devices; generating benign network traffic for each of the plurality of host devices; for a particular host device of the plurality of host devices, generating malicious network traffic using a malicious traffic model that is based on the malware data; and causing transmission of the benign network traffic and the malicious network traffic. 16. The method of claim 15, wherein the benign network traffic is generated according to a benign traffic model. 17. The method of claim 16, wherein: the benign traffic model is based on previously recorded benign network traffic, the malicious traffic model is based on previously recorded malicious activity. 18. The method of claim 15, wherein: transmission of the benign network traffic is performed according to a benign traffic transmission model; and transmission of the malicious network traffic is performed according to a malicious traffic transmission model. 19. The method of claim 18, wherein: the benign traffic transmission model is based on a transmission pattern of previously recorded benign network traffic; and the malicious traffic transmission model is based on a transmission pattern of previously recorded malicious network traffic. 20. The method of claim 15, wherein the malware data includes parameters specifying: a number of the plurality of host computing devices for which malicious network traffic is generated; a network traffic volume for at least one of the benign network traffic or the malicious network traffic; and transmission data indicating a manner in which at least one of the benign network traffic or the malicious network traffic is transmitted.
Examples relate to emulating network traffic. In one example, a computing device may receive malware data specifying a malware feature; emulate a plurality of host computing devices; generate benign network traffic for each of the plurality of host computing devices; for a particular host device of the plurality of host devices, generate malicious network traffic based on the malware data; and cause transmission of the benign network traffic and the malicious network traffic.1. A non-transitory machine-readable storage medium encoded with instructions executable by a hardware processor of a computing device for emulating network traffic, the machine-readable storage medium comprising instructions to cause the hardware processor to: receive malware data specifying a malware feature; emulate a plurality of host computing devices; generate benign network traffic for each of the plurality of host computing devices; for a particular host device of the plurality of host devices, generate malicious network traffic based on the malware data; and cause transmission of the benign network traffic and the malicious network traffic. 2. The storage medium of claim 1, wherein: the benign network traffic is generated according to a benign traffic model; and the malicious network traffic is generated according to a malicious traffic model. 3. The storage medium of claim 2, wherein: the benign traffic model is based on previously recorded benign network traffic. the malicious traffic model is based on previously recorded malicious activity. 4. The storage medium of claim 1, wherein: transmission of the benign network traffic is performed according to a benign traffic transmission model; and transmission of the malicious network traffic is performed according to a malicious traffic transmission model. 5. The storage medium of claim 4, wherein: the benign traffic transmission model is based on a transmission pattern of previously recorded benign network traffic; and the malicious traffic transmission model is based on a transmission pattern of previously recorded malicious network traffic. 6. The storage medium of claim 1, wherein the malware data includes parameters specifying: a number of the plurality of host computing devices for which malicious network traffic is generated; a network traffic volume for at least one of the benign network traffic or the malicious network traffic; and transmission data indicating a manner in which at least one of the benign network traffic or the malicious network traffic is transmitted. 7. The storage medium of claim 1, wherein: the malware feature includes a domain generation algorithm; and the malicious network traffic is generated using the domain generation algorithm. 8. A computing device for emulating network traffic, the computing device comprising: a hardware processor; and a data storage device storing instructions that, when executed by the hardware processor, cause the hardware processor to: receive malware data specifying a malware feature; emulate a plurality of host computing devices; generate benign network traffic for each of the plurality of host computing devices; for a particular host device of the plurality of host computing devices, generate malicious network traffic based on the malware data; determine, using the malware data, a transmission model for transmitting at least one of the benign network traffic or the malicious network traffic; and cause transmission of the benign network traffic and the malicious network traffic. 9. The computing device of claim 8, wherein: the benign network traffic is generated according to a benign traffic model; and the malicious network traffic is generated according to a malicious traffic model. 10. The computing device of claim 9, wherein: the benign traffic model is based on previously recorded benign network traffic; and the malicious traffic model is based on previously recorded malicious activity. 11. The computing device of claim 8, wherein the transmission model is a benign traffic transmission model for transmission of the benign network traffic, and wherein the instructions further cause the hardware processor to: determine, using the malware data, a malicious traffic transmission model for transmission of the malicious network traffic; and cause transmission of the malicious network traffic using the malicious traffic transmission model. 12. The computing device of claim 11, wherein: the benign traffic transmission model is based on a transmission pattern of previously recorded benign network traffic; and the malicious traffic transmission model is based on a transmission pattern of previously recorded malicious network traffic. 13. The computing device of claim 8, wherein the malware data includes parameters specifying: a number of the plurality of host computing devices for which malicious network traffic is generated; and a network traffic volume for at least one of the benign network traffic or the malicious network traffic. 14. The computing device of claim 8, wherein: the malware feature includes data exfiltration; and the transmission model causes transmission of the malicious network traffic in multiple bursts over time. 15. A method for emulating network traffic, implemented by a hardware processor, the method comprising: receiving malware data specifying a malware feature; emulating a plurality of host computing devices; generating benign network traffic for each of the plurality of host devices; for a particular host device of the plurality of host devices, generating malicious network traffic using a malicious traffic model that is based on the malware data; and causing transmission of the benign network traffic and the malicious network traffic. 16. The method of claim 15, wherein the benign network traffic is generated according to a benign traffic model. 17. The method of claim 16, wherein: the benign traffic model is based on previously recorded benign network traffic, the malicious traffic model is based on previously recorded malicious activity. 18. The method of claim 15, wherein: transmission of the benign network traffic is performed according to a benign traffic transmission model; and transmission of the malicious network traffic is performed according to a malicious traffic transmission model. 19. The method of claim 18, wherein: the benign traffic transmission model is based on a transmission pattern of previously recorded benign network traffic; and the malicious traffic transmission model is based on a transmission pattern of previously recorded malicious network traffic. 20. The method of claim 15, wherein the malware data includes parameters specifying: a number of the plurality of host computing devices for which malicious network traffic is generated; a network traffic volume for at least one of the benign network traffic or the malicious network traffic; and transmission data indicating a manner in which at least one of the benign network traffic or the malicious network traffic is transmitted.
2,400
8,530
8,530
15,129,372
2,474
Techniques for coordinated application of wireless network selection and traffic routing rules are described. In one embodiment, for example, user equipment (UE) may comprise at least on radio frequency (RF) transceiver, at least one RF antenna, and logic at least a portion of which is in hardware, the logic to process a received radio resource control (RRC) message comprising radio access network (RAN) assistance information, evaluate a threshold condition of an access network discovery and selection function (ANDSF) management object (MO) routing policy based on an access threshold comprised in the RAN assistance information and a corresponding measurement, and apply the ANDSF MO routing policy to route internet protocol (IP) traffic based on the evaluation of the threshold condition. Other embodiments are described and claimed.
1. User equipment (UE), comprising: at least one radio frequency (RF) transceiver; at least one RF antenna; and logic, at least a portion of which is in hardware, the logic to process a received radio resource control (RRC) message comprising radio access network (RAN) assistance information, evaluate a threshold condition of an access network discovery and selection function (ANDSF) management object (MO) routing policy based on an access threshold comprised in the RAN assistance information and a corresponding measurement, and apply the ANDSF MO routing policy to route internet protocol (IP) traffic based on the evaluation of the threshold condition. 2. The UE of claim 1, the logic to evaluate an offload preference indicator (OPI) condition of the ANDSF MO routing policy based on an OPI comprised in the RAN assistance information and apply the ANDSF MO routing policy to route the IP traffic based on the evaluation of the OPI condition and the evaluation of the threshold condition. 3. The UE of claim 1, the ANDSF MO routing policy to comprise an inter-system routing policy (ISRP). 4. The UE of claim 1, the ANDSF MO routing policy to comprise an inter-access point name routing policy (TARP). 5. The UE of claim 1, the access threshold to comprise a reference signal received power (RSRP) threshold. 6. The UE of claim 1, the access threshold to comprise a reference signal received quality (RSRQ) threshold. 7. The UE of claim 1, the access threshold to comprise a basic service set (BSS) load threshold or a backhaul threshold. 8. The UE of claim 1, the logic to ignore one or more RAN rules in conjunction with applying the ANDSF MO routing policy. 9. The UE of claim 1, comprising: at least one memory unit; and a touchscreen display. 10. At least one non-transitory computer-readable storage medium comprising a set of instructions that, in response to being executed at user equipment (UE), cause the UE to: configure an access network discovery and selection function (ANDSF) management object (MO) with an inter-system routing policy (ISRP) of a serving public land mobile network (PLMN) of the UE; process received radio access network (RAN) assistance information comprising one or more access thresholds; and route internet protocol (IP) traffic across multiple radio access interfaces in accordance with the ISRP by evaluating one or more threshold conditions of the ISRP based on the one or more access thresholds. 11. The at least one non-transitory computer-readable storage medium of claim 10, comprising instructions that, in response to being executed at the UE, cause the UE to configure the ANDSF MO based on ANDSF information originating from an ANDSF server for the serving PLMN. 12. The at least one non-transitory computer-readable storage medium of claim 10, the multiple radio access interfaces to include a 3rd Generation Partnership Project (3GPP) radio access interface and a wireless local area network (WLAN) radio access interface. 13. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more reference signal received power (RSRP) thresholds. 14. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more reference signal received quality (RSRQ) thresholds. 15. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more basic service set (BSS) load thresholds. 16. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more backhaul thresholds. 17. The at least one non-transitory computer-readable storage medium of claim 10, comprising instructions that, in response to being executed at the UE, cause the UE to route the IP traffic across the multiple radio access interfaces according to the ISRP by evaluating the one or more threshold conditions of the ISRP based on the one or more access thresholds and evaluating an offload preference indicator (OPI) condition of the ISRP based on an OPI comprised in the RAN assistance information. 18. An apparatus, comprising: logic, at least a portion of which is in hardware, the logic to process radio resource control (RRC) information associated with a serving cell of user equipment (UE), the RRC information to comprise radio access network (RAN) assistance information including one or more access thresholds, the logic to configure a routing policy of an access network discovery and selection function (ANDSF) management object (MO) for the UE and determine a procedure for handling one or more internet protocol (IP) traffic flows based on the routing policy by identifying a corresponding measurement for at least one access threshold and comparing the at least one access threshold to its corresponding measurement. 19. The apparatus of claim 18, the one or more access thresholds to include one or more reference signal received power (RSRP) thresholds. 20. The apparatus of claim 18, the one or more access thresholds to include one or more reference signal received quality (RSRQ) thresholds. 21. The apparatus of claim 18, the one or more access thresholds to include one or more basic service set (BSS) load thresholds. 22. The apparatus of claim 18, the one or more access thresholds to include one or more backhaul thresholds. 23. The apparatus of claim 18, the determined procedure to comprise routing IP traffic across multiple packet data network (PDN) connections. 24. The apparatus of claim 18, the determined procedure to comprise non-seamlessly offloading IP traffic to a wireless local area network (WLAN). 25. The apparatus of claim 18, the logic to configure the routing policy based on ANDSF information received via an S14 interface. 26. At least one non-transitory computer-readable storage medium comprising a set of instructions that, in response to being executed on a computing device, cause the computing device to: process received device capability information for user equipment (UE) to determine whether the UE supports use of radio access network (RAN) thresholds in access network discovery and selection function (ANDSF) routing policies; and in response to a determination that the UE supports use of RAN thresholds in ANDSF routing policies, configure an ANDSF management object (MO) for the UE with an ANDSF routing policy that includes one or more RAN threshold-based ANDSF rules. 27. The at least one non-transitory computer-readable storage medium of claim 26, comprising instructions that, in response to being executed on the computing device, cause the computing device to configure the ANDSF MO for the UE with an ANDSF routing policy that does not include any RAN threshold-based ANDSF rules in response to a determination that the UE does not support use of RAN thresholds in ANDSF routing policies. 28. The at least one non-transitory computer-readable storage medium of claim 26, comprising instructions that, in response to being executed on the computing device, cause the computing device to set a parameter within the ANDSF MO for the UE to indicate whether a home operator for the UE prefers visited public land mobile network (V-PLMN) RAN thresholds. 29. The at least one non-transitory computer-readable storage medium of claim 26, the ANDSF routing policy to comprise an inter-system routing policy (ISRP). 30. The at least one non-transitory computer-readable storage medium of claim 26, the ANDSF routing policy to comprise an inter-access point name routing policy (IARP).
Techniques for coordinated application of wireless network selection and traffic routing rules are described. In one embodiment, for example, user equipment (UE) may comprise at least on radio frequency (RF) transceiver, at least one RF antenna, and logic at least a portion of which is in hardware, the logic to process a received radio resource control (RRC) message comprising radio access network (RAN) assistance information, evaluate a threshold condition of an access network discovery and selection function (ANDSF) management object (MO) routing policy based on an access threshold comprised in the RAN assistance information and a corresponding measurement, and apply the ANDSF MO routing policy to route internet protocol (IP) traffic based on the evaluation of the threshold condition. Other embodiments are described and claimed.1. User equipment (UE), comprising: at least one radio frequency (RF) transceiver; at least one RF antenna; and logic, at least a portion of which is in hardware, the logic to process a received radio resource control (RRC) message comprising radio access network (RAN) assistance information, evaluate a threshold condition of an access network discovery and selection function (ANDSF) management object (MO) routing policy based on an access threshold comprised in the RAN assistance information and a corresponding measurement, and apply the ANDSF MO routing policy to route internet protocol (IP) traffic based on the evaluation of the threshold condition. 2. The UE of claim 1, the logic to evaluate an offload preference indicator (OPI) condition of the ANDSF MO routing policy based on an OPI comprised in the RAN assistance information and apply the ANDSF MO routing policy to route the IP traffic based on the evaluation of the OPI condition and the evaluation of the threshold condition. 3. The UE of claim 1, the ANDSF MO routing policy to comprise an inter-system routing policy (ISRP). 4. The UE of claim 1, the ANDSF MO routing policy to comprise an inter-access point name routing policy (TARP). 5. The UE of claim 1, the access threshold to comprise a reference signal received power (RSRP) threshold. 6. The UE of claim 1, the access threshold to comprise a reference signal received quality (RSRQ) threshold. 7. The UE of claim 1, the access threshold to comprise a basic service set (BSS) load threshold or a backhaul threshold. 8. The UE of claim 1, the logic to ignore one or more RAN rules in conjunction with applying the ANDSF MO routing policy. 9. The UE of claim 1, comprising: at least one memory unit; and a touchscreen display. 10. At least one non-transitory computer-readable storage medium comprising a set of instructions that, in response to being executed at user equipment (UE), cause the UE to: configure an access network discovery and selection function (ANDSF) management object (MO) with an inter-system routing policy (ISRP) of a serving public land mobile network (PLMN) of the UE; process received radio access network (RAN) assistance information comprising one or more access thresholds; and route internet protocol (IP) traffic across multiple radio access interfaces in accordance with the ISRP by evaluating one or more threshold conditions of the ISRP based on the one or more access thresholds. 11. The at least one non-transitory computer-readable storage medium of claim 10, comprising instructions that, in response to being executed at the UE, cause the UE to configure the ANDSF MO based on ANDSF information originating from an ANDSF server for the serving PLMN. 12. The at least one non-transitory computer-readable storage medium of claim 10, the multiple radio access interfaces to include a 3rd Generation Partnership Project (3GPP) radio access interface and a wireless local area network (WLAN) radio access interface. 13. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more reference signal received power (RSRP) thresholds. 14. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more reference signal received quality (RSRQ) thresholds. 15. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more basic service set (BSS) load thresholds. 16. The at least one non-transitory computer-readable storage medium of claim 10, the one or more access thresholds to include one or more backhaul thresholds. 17. The at least one non-transitory computer-readable storage medium of claim 10, comprising instructions that, in response to being executed at the UE, cause the UE to route the IP traffic across the multiple radio access interfaces according to the ISRP by evaluating the one or more threshold conditions of the ISRP based on the one or more access thresholds and evaluating an offload preference indicator (OPI) condition of the ISRP based on an OPI comprised in the RAN assistance information. 18. An apparatus, comprising: logic, at least a portion of which is in hardware, the logic to process radio resource control (RRC) information associated with a serving cell of user equipment (UE), the RRC information to comprise radio access network (RAN) assistance information including one or more access thresholds, the logic to configure a routing policy of an access network discovery and selection function (ANDSF) management object (MO) for the UE and determine a procedure for handling one or more internet protocol (IP) traffic flows based on the routing policy by identifying a corresponding measurement for at least one access threshold and comparing the at least one access threshold to its corresponding measurement. 19. The apparatus of claim 18, the one or more access thresholds to include one or more reference signal received power (RSRP) thresholds. 20. The apparatus of claim 18, the one or more access thresholds to include one or more reference signal received quality (RSRQ) thresholds. 21. The apparatus of claim 18, the one or more access thresholds to include one or more basic service set (BSS) load thresholds. 22. The apparatus of claim 18, the one or more access thresholds to include one or more backhaul thresholds. 23. The apparatus of claim 18, the determined procedure to comprise routing IP traffic across multiple packet data network (PDN) connections. 24. The apparatus of claim 18, the determined procedure to comprise non-seamlessly offloading IP traffic to a wireless local area network (WLAN). 25. The apparatus of claim 18, the logic to configure the routing policy based on ANDSF information received via an S14 interface. 26. At least one non-transitory computer-readable storage medium comprising a set of instructions that, in response to being executed on a computing device, cause the computing device to: process received device capability information for user equipment (UE) to determine whether the UE supports use of radio access network (RAN) thresholds in access network discovery and selection function (ANDSF) routing policies; and in response to a determination that the UE supports use of RAN thresholds in ANDSF routing policies, configure an ANDSF management object (MO) for the UE with an ANDSF routing policy that includes one or more RAN threshold-based ANDSF rules. 27. The at least one non-transitory computer-readable storage medium of claim 26, comprising instructions that, in response to being executed on the computing device, cause the computing device to configure the ANDSF MO for the UE with an ANDSF routing policy that does not include any RAN threshold-based ANDSF rules in response to a determination that the UE does not support use of RAN thresholds in ANDSF routing policies. 28. The at least one non-transitory computer-readable storage medium of claim 26, comprising instructions that, in response to being executed on the computing device, cause the computing device to set a parameter within the ANDSF MO for the UE to indicate whether a home operator for the UE prefers visited public land mobile network (V-PLMN) RAN thresholds. 29. The at least one non-transitory computer-readable storage medium of claim 26, the ANDSF routing policy to comprise an inter-system routing policy (ISRP). 30. The at least one non-transitory computer-readable storage medium of claim 26, the ANDSF routing policy to comprise an inter-access point name routing policy (IARP).
2,400
8,531
8,531
15,432,848
2,485
An example device for filtering a decoded block of video data includes one or more processing units configured to construct a plurality of filters for classes of blocks of a current picture of video data. To construct the plurality of filters for each of the classes, the processing units are configured to determine a value of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of the class, and in response to the fixed filter being used to predict the set of filter coefficients, determine an index value into a set of fixed filters and predict the set of filter coefficients of the class using a fixed filter of the set of fixed filters identified by the index value.
1. A method of filtering a decoded block of video data, the method comprising: constructing a plurality of filters for classes of blocks of a current picture of video data, wherein constructing the plurality of filters comprises, for each of the classes: determining whether a fixed filter is used to predict a set of filter coefficients of the class; and in response to determining that the fixed filter is used to predict the set of filter coefficients, determining an index value into a set of fixed filters of the class and predicting the set of filter coefficients of the class using the fixed filter of the set of fixed filters identified by the index value; decoding a current block of a current picture of the video data; determining a class for the current block; selecting a filter of the plurality of filters that corresponds to the class for the current block; and filtering at least one pixel of the current block using the selected filter. 2. The method of claim 1, wherein determining, for each of the classes, whether the fixed filter is used to predict the set of filter coefficients comprises determining, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 3. The method of claim 1, wherein constructing the plurality of filters further comprises, for each of the classes that the fixed filter is used to predict the set of filter coefficients: determining offset values to be applied to the predicted set of filter coefficients of the class; and applying the offset values to the predicted set of filter coefficients of the class to construct the filter for the class. 4. The method of claim 1, wherein constructing the plurality of filters further comprises determining a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 5. The method of claim 4, further comprising, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, preventing determination of the index value representing the fixed filter of the one or more fixed filters. 6. The method of claim 4, further comprising, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 7. The method of claim 4, further comprising, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, determining index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted. 8. The method of claim 4, further comprising, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 9. The method of claim 4, further comprising, when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters: determining which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters; and for each of the sets of filter coefficients that are predicted from one or more of the fixed filters, determining the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted. 10. The method of claim 1, further comprising encoding the current block prior to decoding the current block. 11. The method of claim 1, further comprising determining that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter, and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter. 12. The method of claim 1, the method being executable on a wireless communication device, wherein the device comprises: a memory configured to store the video data; a processor configured to execute instructions to process the video data stored in the memory; and a receiver configured to receive the video data and store the video data to the memory. 13. The method of claim 12, wherein the wireless communication device is a cellular telephone and the video data is received by a receiver and modulated according to a cellular communication standard. 14. A device for filtering a decoded block of video data, the device comprising: a memory configured to store the video data; and one or more processing units implemented in circuitry configured to: construct a plurality of filters for classes of blocks of a current picture of video data, wherein to construct the plurality of filters for each of the classes, the one or more processing units are configured to: determine whether a fixed filter is used to predict a set of filter coefficients of the class; and in response to determining that the fixed filter is used to predict the set of filter coefficients, determine an index value into a set of fixed filters of the class and predict the set of filter coefficients of the class using the fixed filter of the set of fixed filters identified by the index value; decode a current block of a current picture of the video data; determine a class for the current block; select a filter of the plurality of filters that corresponds to the class for the current block; and filter at least one pixel of the current block using the selected filter. 15. The device of claim 14, wherein to determine, for each of the classes, whether the fixed filter is used to predict the set of filter coefficients, the one or more processing units are configured to determine, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 16. The device of claim 14, wherein to construct the plurality of filters, the one or more processing units are configured to: determine offset values to be applied to the predicted set of filter coefficients of the class; and apply the offset values to the predicted set of filter coefficients of the class to construct the filter for the class. 17. The device of claim 14, wherein to construct the plurality of filters, the one or more processing units are further configured to determine a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 18. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent determination of the index value representing a fixed filter of the one or more fixed filters. 19. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 20. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, determine index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted. 21. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 22. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters: determine which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters; and for each of the sets of filter coefficients that are predicted from one or more of the fixed filters, determine the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted. 23. The device of claim 14, wherein the one or more processing units are further configured to determine that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter. 24. The device of claim 14, wherein the device is a wireless communication device, further comprising: a receiver configured to receive video data including the current picture. 25. The device of claim 24, wherein the wireless communication device is a cellular telephone and the video data is received by the receiver and modulated according to a cellular communication standard. 26. A device for filtering a decoded block of video data, the device comprising: means for constructing a plurality of filters for classes of blocks of a current picture of video data, wherein the means for constructing the plurality of filters comprises: means for determining whether a fixed filter is used to predict a set of filter coefficients of each of the classes; and means for determining an index value into a set of fixed filters and means for predicting the set of filter coefficients of the class using the fixed filter of the set of fixed filters of the class identified by the index value in response to determining that the fixed filter is used to predict the set of filter coefficients; means for decoding a current block of a current picture of the video data; means for determining a class for the current block; means for selecting a filter of the plurality of filters that corresponds to the class for the current block; and means for filtering at least one pixel of the current block using the selected filter. 27. The device of claim 26, wherein the means for determining whether the fixed filter is used to predict the set of filter coefficients of each of the classes comprises means for determining, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 28. The device of claim 26, wherein the means for constructing the plurality of filters further comprises: means for determining offset values to be applied to the predicted set of filter coefficients for each of the classes that the flag indicates that the fixed filter is used to predict the set of filter coefficients; and means for applying the offset values to the predicted set of filter coefficients of the class to construct the filter for each of the classes that the flag indicates that the fixed filter is used to predict the set of filter coefficients. 29. The device of claim 26, wherein the means for constructing the plurality of filters further comprises means for determining a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 30. The device of claim 29, further comprising means for preventing determination of the index value representing a fixed filter of the one or more fixed filters when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters. 31. The device of claim 29, further comprising means for preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters. 32. The device of claim 29, further comprising means for determining index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters. 33. The device of claim 29, further comprising means for preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters. 34. The device of claim 29, further comprising: means for determining which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters; and means for determining the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted for each of the sets of filter coefficients that are predicted from one or more of the fixed filters. 35. The device of claim 26, further comprising means for encoding the current block prior to decoding the current block. 36. The device of claim 26, further comprising means for determining that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter, and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter. 37. A computer-readable storage medium having stored therein instructions that, when executed, cause a processor to: construct a plurality of filters for classes of blocks of a current picture of video data, wherein the instructions that cause the processor to construct the plurality of filters comprise instructions that cause the processor to, for each of the classes: determine whether a fixed filter is used to predict a set of filter coefficients of the class; and in response to determining that the fixed filter is used to predict the set of filter coefficients, determine an index value into a set of fixed filters of the class and predict the set of filter coefficients of the class using the fixed filter of the set of fixed filters identified by the index value; decode a current block of a current picture of the video data; determine a class for the current block; select a filter of the plurality of filters that corresponds to the class for the current block; and filter at least one pixel of the current block using the selected filter. 38. The computer-readable storage medium of claim 37, wherein the instructions that cause the processor to determine, for each of the classes, whether the fixed filter is used to predict the set of filter coefficients comprise instructions that cause the processor to determine, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 39. The computer-readable storage medium of claim 37, wherein the instructions that cause the processor to construct the plurality of filters further comprise instructions that cause the processor to, for each of the classes that the fixed filter is used to predict the set of filter coefficients: determine offset values to be applied to the predicted set of filter coefficients of the class; and apply the offset values to the predicted set of filter coefficients of the class to construct the filter for the class. 40. The computer-readable storage medium of claim 37, wherein the instructions that cause the processor to construct the plurality of filters further comprise instructions that cause the processor to determine a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 41. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent determination of the index value representing a fixed filter of the one or more fixed filters. 42. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 43. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, determine index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted. 44. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that all of the sets of filter coefficients for any of the classes are predicted from at least one of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 45. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters: determine which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters; and for each of the sets of filter coefficients that are predicted from one or more of the fixed filters, determine the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted. 46. The computer-readable storage medium of claim 37, further comprising instructions that cause the processor to encode the current block prior to decoding the current block. 47. The computer-readable storage medium of claim 37, further comprising instructions that cause the processor to determine that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter, and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter.
An example device for filtering a decoded block of video data includes one or more processing units configured to construct a plurality of filters for classes of blocks of a current picture of video data. To construct the plurality of filters for each of the classes, the processing units are configured to determine a value of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of the class, and in response to the fixed filter being used to predict the set of filter coefficients, determine an index value into a set of fixed filters and predict the set of filter coefficients of the class using a fixed filter of the set of fixed filters identified by the index value.1. A method of filtering a decoded block of video data, the method comprising: constructing a plurality of filters for classes of blocks of a current picture of video data, wherein constructing the plurality of filters comprises, for each of the classes: determining whether a fixed filter is used to predict a set of filter coefficients of the class; and in response to determining that the fixed filter is used to predict the set of filter coefficients, determining an index value into a set of fixed filters of the class and predicting the set of filter coefficients of the class using the fixed filter of the set of fixed filters identified by the index value; decoding a current block of a current picture of the video data; determining a class for the current block; selecting a filter of the plurality of filters that corresponds to the class for the current block; and filtering at least one pixel of the current block using the selected filter. 2. The method of claim 1, wherein determining, for each of the classes, whether the fixed filter is used to predict the set of filter coefficients comprises determining, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 3. The method of claim 1, wherein constructing the plurality of filters further comprises, for each of the classes that the fixed filter is used to predict the set of filter coefficients: determining offset values to be applied to the predicted set of filter coefficients of the class; and applying the offset values to the predicted set of filter coefficients of the class to construct the filter for the class. 4. The method of claim 1, wherein constructing the plurality of filters further comprises determining a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 5. The method of claim 4, further comprising, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, preventing determination of the index value representing the fixed filter of the one or more fixed filters. 6. The method of claim 4, further comprising, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 7. The method of claim 4, further comprising, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, determining index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted. 8. The method of claim 4, further comprising, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 9. The method of claim 4, further comprising, when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters: determining which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters; and for each of the sets of filter coefficients that are predicted from one or more of the fixed filters, determining the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted. 10. The method of claim 1, further comprising encoding the current block prior to decoding the current block. 11. The method of claim 1, further comprising determining that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter, and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter. 12. The method of claim 1, the method being executable on a wireless communication device, wherein the device comprises: a memory configured to store the video data; a processor configured to execute instructions to process the video data stored in the memory; and a receiver configured to receive the video data and store the video data to the memory. 13. The method of claim 12, wherein the wireless communication device is a cellular telephone and the video data is received by a receiver and modulated according to a cellular communication standard. 14. A device for filtering a decoded block of video data, the device comprising: a memory configured to store the video data; and one or more processing units implemented in circuitry configured to: construct a plurality of filters for classes of blocks of a current picture of video data, wherein to construct the plurality of filters for each of the classes, the one or more processing units are configured to: determine whether a fixed filter is used to predict a set of filter coefficients of the class; and in response to determining that the fixed filter is used to predict the set of filter coefficients, determine an index value into a set of fixed filters of the class and predict the set of filter coefficients of the class using the fixed filter of the set of fixed filters identified by the index value; decode a current block of a current picture of the video data; determine a class for the current block; select a filter of the plurality of filters that corresponds to the class for the current block; and filter at least one pixel of the current block using the selected filter. 15. The device of claim 14, wherein to determine, for each of the classes, whether the fixed filter is used to predict the set of filter coefficients, the one or more processing units are configured to determine, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 16. The device of claim 14, wherein to construct the plurality of filters, the one or more processing units are configured to: determine offset values to be applied to the predicted set of filter coefficients of the class; and apply the offset values to the predicted set of filter coefficients of the class to construct the filter for the class. 17. The device of claim 14, wherein to construct the plurality of filters, the one or more processing units are further configured to determine a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 18. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent determination of the index value representing a fixed filter of the one or more fixed filters. 19. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 20. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, determine index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted. 21. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 22. The device of claim 17, wherein the one or more processing units are further configured to, when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters: determine which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters; and for each of the sets of filter coefficients that are predicted from one or more of the fixed filters, determine the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted. 23. The device of claim 14, wherein the one or more processing units are further configured to determine that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter. 24. The device of claim 14, wherein the device is a wireless communication device, further comprising: a receiver configured to receive video data including the current picture. 25. The device of claim 24, wherein the wireless communication device is a cellular telephone and the video data is received by the receiver and modulated according to a cellular communication standard. 26. A device for filtering a decoded block of video data, the device comprising: means for constructing a plurality of filters for classes of blocks of a current picture of video data, wherein the means for constructing the plurality of filters comprises: means for determining whether a fixed filter is used to predict a set of filter coefficients of each of the classes; and means for determining an index value into a set of fixed filters and means for predicting the set of filter coefficients of the class using the fixed filter of the set of fixed filters of the class identified by the index value in response to determining that the fixed filter is used to predict the set of filter coefficients; means for decoding a current block of a current picture of the video data; means for determining a class for the current block; means for selecting a filter of the plurality of filters that corresponds to the class for the current block; and means for filtering at least one pixel of the current block using the selected filter. 27. The device of claim 26, wherein the means for determining whether the fixed filter is used to predict the set of filter coefficients of each of the classes comprises means for determining, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 28. The device of claim 26, wherein the means for constructing the plurality of filters further comprises: means for determining offset values to be applied to the predicted set of filter coefficients for each of the classes that the flag indicates that the fixed filter is used to predict the set of filter coefficients; and means for applying the offset values to the predicted set of filter coefficients of the class to construct the filter for each of the classes that the flag indicates that the fixed filter is used to predict the set of filter coefficients. 29. The device of claim 26, wherein the means for constructing the plurality of filters further comprises means for determining a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 30. The device of claim 29, further comprising means for preventing determination of the index value representing a fixed filter of the one or more fixed filters when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters. 31. The device of claim 29, further comprising means for preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters. 32. The device of claim 29, further comprising means for determining index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters. 33. The device of claim 29, further comprising means for preventing coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters. 34. The device of claim 29, further comprising: means for determining which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters; and means for determining the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted for each of the sets of filter coefficients that are predicted from one or more of the fixed filters. 35. The device of claim 26, further comprising means for encoding the current block prior to decoding the current block. 36. The device of claim 26, further comprising means for determining that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter, and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter. 37. A computer-readable storage medium having stored therein instructions that, when executed, cause a processor to: construct a plurality of filters for classes of blocks of a current picture of video data, wherein the instructions that cause the processor to construct the plurality of filters comprise instructions that cause the processor to, for each of the classes: determine whether a fixed filter is used to predict a set of filter coefficients of the class; and in response to determining that the fixed filter is used to predict the set of filter coefficients, determine an index value into a set of fixed filters of the class and predict the set of filter coefficients of the class using the fixed filter of the set of fixed filters identified by the index value; decode a current block of a current picture of the video data; determine a class for the current block; select a filter of the plurality of filters that corresponds to the class for the current block; and filter at least one pixel of the current block using the selected filter. 38. The computer-readable storage medium of claim 37, wherein the instructions that cause the processor to determine, for each of the classes, whether the fixed filter is used to predict the set of filter coefficients comprise instructions that cause the processor to determine, for each of the classes, a value of a flag that indicates whether the fixed filter is used to predict the set of filter coefficients for the class. 39. The computer-readable storage medium of claim 37, wherein the instructions that cause the processor to construct the plurality of filters further comprise instructions that cause the processor to, for each of the classes that the fixed filter is used to predict the set of filter coefficients: determine offset values to be applied to the predicted set of filter coefficients of the class; and apply the offset values to the predicted set of filter coefficients of the class to construct the filter for the class. 40. The computer-readable storage medium of claim 37, wherein the instructions that cause the processor to construct the plurality of filters further comprise instructions that cause the processor to determine a value representing one of: that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters; that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters; or that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters and the remaining sets of filter coefficients are not predicted from any of the fixed filters. 41. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent determination of the index value representing a fixed filter of the one or more fixed filters. 42. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that none of the sets of filter coefficients for any of the classes are predicted from any of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 43. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that all of the sets of filter coefficients for all of the classes are predicted from at least one of the fixed filters, determine index values for each of the classes representing the one of the fixed filters from which the set of filter coefficients for the corresponding class is predicted. 44. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that all of the sets of filter coefficients for any of the classes are predicted from at least one of the fixed filters, prevent coding of a flag that indicates whether a fixed filter is used to predict a set of filter coefficients of each class. 45. The computer-readable storage medium of claim 40, further comprising instructions that cause the processor to, when the value represents that some of the sets of filter coefficients of the classes are predicted from one or more of the fixed filters: determine which of the classes correspond to sets of filter coefficients that are predicted from one or more of the fixed filters; and for each of the sets of filter coefficients that are predicted from one or more of the fixed filters, determine the index value representing the fixed filter of the one or more fixed filters from which the corresponding set of filter coefficients is predicted. 46. The computer-readable storage medium of claim 37, further comprising instructions that cause the processor to encode the current block prior to decoding the current block. 47. The computer-readable storage medium of claim 37, further comprising instructions that cause the processor to determine that a common set of differences between filter coefficients and the fixed filter for at least a first class and a second class of the classes are the same, that the first class is predicted from a first fixed filter, and that the second class is predicted from a second fixed filter, the second fixed filter being different than the first fixed filter.
2,400
8,532
8,532
15,603,272
2,416
The present disclosure relates to a pre-5th-generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system such as a long term evolution (LTE). A method by a first base station (BS) in a cooperative communication system includes performing a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and at least one second BS; determining a first internet protocol (IP) packet received by the at least one second BS; and performing an IP packet transfer operation with the data GW and the at least one second BS based on whether at least one IP packet, of which a sequence number (SN) is less than a SN of the first IP packet, is buffered.
1. A method by a first base station (BS) in a cooperative communication system, the method comprising: performing a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and at least one second BS; determining a first internet protocol (IP) packet received by the at least one second BS; and performing an IP packet transfer operation with the data GW and the at least one second BS based on whether at least one IP packet, of which a sequence number (SN) is less than a SN of the first IP packet, is buffered. 2. The method of claim 1, wherein performing the IP packet transfer operation comprises: if the at least one IP packet, of which the SN is less than the SN of the first IP packet, is buffered, transmitting, to at least one of the at least one second BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet. 3. The method of claim 1, wherein performing the MAC SDU synchronization process comprises: receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet that is transferred through a data bearer that is mapped to an IP packet flow, and a BS identifier of the at least one second BS; and one of: determining that a MAC SDU SN allocated to a MAC SDU, which transfers the first IP packet, is identical to a SN that the data GW allocates for the IP packet based on the control information, or determining a MAC SDU SN of a MAC SDU, in which the first IP packet is included, based on the control information, and transmitting, to the at least one second BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and the determined MAC SDU SN. 4. The method of claim 1, wherein performing the MAC SDU synchronization process comprises: receiving, from the at least one second BS, at least one of an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet; and one of: determining a MAC SDU SN that is allocated to a MAC SDU that transfers an IP packet of which a SN is the SN of the IP packet, and transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the MAC SDU SN, or transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer. 5. The method of claim 1, wherein performing the MAC SDU synchronization process comprises: receiving an IP packet, and a SN that the data GW allocates for the IP packet from the data GW; receiving, from the at least one second BS, an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the at least one second receives from the data GW; and determining a SN, which is received from the at least one second BS, as a MAC SDU SN allocated to a MAC SDU, which transfers a first IP packet of the data bearer in the at least one second BS. 6. A method by a second base station (BS) in a cooperative communication system, the method comprising: performing a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and a first BS; and performing an internet protocol (IP) packet transfer operation with the first BS and the data GW based on whether at least one IP packet of which a sequence number (SN) is less than a SN of a first IP packet received by the second BS is buffered in the first BS. 7. The method of claim 6, wherein performing the IP packet transfer operation comprises: if the at least one IP packet of which the SN is less than the SN of the first IP packet is buffered in the first BS, receiving, from the first BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet. 8. The method of claim 6, wherein performing the MAC SDU synchronization process comprises: receiving, from the data GW, control information including an IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, or receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, and receiving, from the first BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and a MAC SDU SN, wherein the MAC SDU SN is a MAC SDU SN that the first BS allocates to a MAC SDU in which the first IP packet is included based on the control information. 9. The method of claim 6, wherein performing the MAC SDU synchronization process comprises: transmitting, to the first BS, at least one of an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet; and one of: receiving, from the first BS, the identifier of the MS, the flow identifier, and a MAC SDU SN, or receiving, from the first BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer, and allocating a SN that follows the SN included in the header of the last IP packet that is transmitted for the data bearer to a first IP packet that is received from the data GW for the data bearer, wherein the MAC SDU SN is a MAC SDU SN, which the first BS determines as a MAC SDU SN allocated to a MAC SDU, that transfers an IP packet with a SN of the IP packet. 10. The method of claim 6, wherein performing the MAC SDU synchronization process comprises: receiving an IP packet and a SN that the data GW allocates for the IP packet from the data GW; and transmitting, to the first BS, an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the second BS receives from the data GW. 11. A first base station (BS) in a cooperative communication system, the first BS comprising: a transceiver configured to perform a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and at least one second BS; and a controller configured to determine a first internet protocol (IP) packet received by the at least one second BS, wherein the transceiver is further configured to perform an IP packet transfer operation with the data GW and the at least one second BS based on whether at least one IP packet, of which a sequence number (SN) is less than a SN of the first IP packet, is buffered. 12. The first BS of claim 11, wherein the IP packet transfer operation comprises: an operation of transmitting, to at least one of the at least one second BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet if the at least one IP packet of which the SN is less than the SN of the first IP packet is buffered. 13. The first BS of claim 11, wherein the MAC SDU synchronization process comprises: an operation of receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet that is transferred through a data bearer that is mapped to an IP packet flow, and a BS identifier of the at least one second BS, and an operation of: determining that a MAC SDU SN allocated to a MAC SDU which transfers the first IP packet is identical to a SN that the data GW allocates for the IP packet based on the control information, or determining a MAC SDU SN of a MAC SDU in which the first IP packet is included based on the control information, and transmitting, to the at least one second BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and the determined MAC SDU SN. 14. The first BS of claim 11, wherein the MAC SDU synchronization process comprises: an operation of receiving, from the at least one second BS, at least one of an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet, and an operation of: determining a MAC SDU SN that is allocated to a MAC SDU that transfers an IP packet of which a SN is the SN of the IP packet, and transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the MAC SDU SN, or transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer. 15. The first BS of claim 11, wherein the MAC SDU synchronization process comprises: an operation of receiving an IP packet, and a SN that the data GW allocates for the IP packet from the data GW, an operation of receiving, from the at least one second BS, an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the at least one second receives from the data GW, and an operation of determining a SN, which is received from the at least one second BS, as a MAC SDU SN allocated to a MAC SDU, which transfers a first IP packet of the data bearer in the at least one second BS. 16. A second base station (BS) in a cooperative communication system, the second BS comprising: a transceiver configured to perform a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and a first BS, and to perform an internet protocol (IP) packet transfer operation with the first BS and the data GW based on whether at least one IP packet of which a sequence number (SN) is less than a SN of a first IP packet received by the second BS is buffered in the first BS. 17. The second BS of claim 16, wherein the IP packet transfer operation comprises: an operation of receiving, from the first BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet if the at least one IP packet of which the SN is less than the SN of the first IP packet is buffered in the first BS. 18. The second BS of claim 16, wherein the MAC SDU synchronization process comprises: an operation of receiving, from the data GW, control information including an IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, or receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, and receiving, from the first BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and a MAC SDU SN, wherein the MAC SDU SN is a MAC SDU SN that the first BS allocates to a MAC SDU in which the first IP packet is included based on the control information. 19. The second BS of claim 16, wherein the MAC SDU synchronization process comprises: an operation of transmitting, to the first BS, at least one of an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet; and an operation of: receiving, from the first BS, the identifier of the MS, the flow identifier, and a MAC SDU SN, or receiving, from the first BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer, and allocating a SN that follows the SN included in the header of the last IP packet that is transmitted for the data bearer to a first IP packet that is received from the data GW for the data bearer, wherein the MAC SDU SN is a MAC SDU SN, which the first BS determines as a MAC SDU SN allocated to a MAC SDU, that transfers an IP packet with a SN of the IP packet. 20. The second BS of claim 16, wherein the MAC SDU synchronization process comprises: an operation of receiving an IP packet and a SN that the data GW allocates for the IP packet from the data GW, and an operation of transmitting, to the first BS, an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the second BS receives from the data GW.
The present disclosure relates to a pre-5th-generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system such as a long term evolution (LTE). A method by a first base station (BS) in a cooperative communication system includes performing a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and at least one second BS; determining a first internet protocol (IP) packet received by the at least one second BS; and performing an IP packet transfer operation with the data GW and the at least one second BS based on whether at least one IP packet, of which a sequence number (SN) is less than a SN of the first IP packet, is buffered.1. A method by a first base station (BS) in a cooperative communication system, the method comprising: performing a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and at least one second BS; determining a first internet protocol (IP) packet received by the at least one second BS; and performing an IP packet transfer operation with the data GW and the at least one second BS based on whether at least one IP packet, of which a sequence number (SN) is less than a SN of the first IP packet, is buffered. 2. The method of claim 1, wherein performing the IP packet transfer operation comprises: if the at least one IP packet, of which the SN is less than the SN of the first IP packet, is buffered, transmitting, to at least one of the at least one second BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet. 3. The method of claim 1, wherein performing the MAC SDU synchronization process comprises: receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet that is transferred through a data bearer that is mapped to an IP packet flow, and a BS identifier of the at least one second BS; and one of: determining that a MAC SDU SN allocated to a MAC SDU, which transfers the first IP packet, is identical to a SN that the data GW allocates for the IP packet based on the control information, or determining a MAC SDU SN of a MAC SDU, in which the first IP packet is included, based on the control information, and transmitting, to the at least one second BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and the determined MAC SDU SN. 4. The method of claim 1, wherein performing the MAC SDU synchronization process comprises: receiving, from the at least one second BS, at least one of an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet; and one of: determining a MAC SDU SN that is allocated to a MAC SDU that transfers an IP packet of which a SN is the SN of the IP packet, and transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the MAC SDU SN, or transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer. 5. The method of claim 1, wherein performing the MAC SDU synchronization process comprises: receiving an IP packet, and a SN that the data GW allocates for the IP packet from the data GW; receiving, from the at least one second BS, an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the at least one second receives from the data GW; and determining a SN, which is received from the at least one second BS, as a MAC SDU SN allocated to a MAC SDU, which transfers a first IP packet of the data bearer in the at least one second BS. 6. A method by a second base station (BS) in a cooperative communication system, the method comprising: performing a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and a first BS; and performing an internet protocol (IP) packet transfer operation with the first BS and the data GW based on whether at least one IP packet of which a sequence number (SN) is less than a SN of a first IP packet received by the second BS is buffered in the first BS. 7. The method of claim 6, wherein performing the IP packet transfer operation comprises: if the at least one IP packet of which the SN is less than the SN of the first IP packet is buffered in the first BS, receiving, from the first BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet. 8. The method of claim 6, wherein performing the MAC SDU synchronization process comprises: receiving, from the data GW, control information including an IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, or receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, and receiving, from the first BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and a MAC SDU SN, wherein the MAC SDU SN is a MAC SDU SN that the first BS allocates to a MAC SDU in which the first IP packet is included based on the control information. 9. The method of claim 6, wherein performing the MAC SDU synchronization process comprises: transmitting, to the first BS, at least one of an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet; and one of: receiving, from the first BS, the identifier of the MS, the flow identifier, and a MAC SDU SN, or receiving, from the first BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer, and allocating a SN that follows the SN included in the header of the last IP packet that is transmitted for the data bearer to a first IP packet that is received from the data GW for the data bearer, wherein the MAC SDU SN is a MAC SDU SN, which the first BS determines as a MAC SDU SN allocated to a MAC SDU, that transfers an IP packet with a SN of the IP packet. 10. The method of claim 6, wherein performing the MAC SDU synchronization process comprises: receiving an IP packet and a SN that the data GW allocates for the IP packet from the data GW; and transmitting, to the first BS, an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the second BS receives from the data GW. 11. A first base station (BS) in a cooperative communication system, the first BS comprising: a transceiver configured to perform a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and at least one second BS; and a controller configured to determine a first internet protocol (IP) packet received by the at least one second BS, wherein the transceiver is further configured to perform an IP packet transfer operation with the data GW and the at least one second BS based on whether at least one IP packet, of which a sequence number (SN) is less than a SN of the first IP packet, is buffered. 12. The first BS of claim 11, wherein the IP packet transfer operation comprises: an operation of transmitting, to at least one of the at least one second BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet if the at least one IP packet of which the SN is less than the SN of the first IP packet is buffered. 13. The first BS of claim 11, wherein the MAC SDU synchronization process comprises: an operation of receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet that is transferred through a data bearer that is mapped to an IP packet flow, and a BS identifier of the at least one second BS, and an operation of: determining that a MAC SDU SN allocated to a MAC SDU which transfers the first IP packet is identical to a SN that the data GW allocates for the IP packet based on the control information, or determining a MAC SDU SN of a MAC SDU in which the first IP packet is included based on the control information, and transmitting, to the at least one second BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and the determined MAC SDU SN. 14. The first BS of claim 11, wherein the MAC SDU synchronization process comprises: an operation of receiving, from the at least one second BS, at least one of an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet, and an operation of: determining a MAC SDU SN that is allocated to a MAC SDU that transfers an IP packet of which a SN is the SN of the IP packet, and transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the MAC SDU SN, or transmitting, to the at least one second BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer. 15. The first BS of claim 11, wherein the MAC SDU synchronization process comprises: an operation of receiving an IP packet, and a SN that the data GW allocates for the IP packet from the data GW, an operation of receiving, from the at least one second BS, an identifier of a mobile station (MS) to which the first BS and the at least one second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the at least one second receives from the data GW, and an operation of determining a SN, which is received from the at least one second BS, as a MAC SDU SN allocated to a MAC SDU, which transfers a first IP packet of the data bearer in the at least one second BS. 16. A second base station (BS) in a cooperative communication system, the second BS comprising: a transceiver configured to perform a medium access control service data unit (MAC SDU) synchronization process with a data gate way (GW) and a first BS, and to perform an internet protocol (IP) packet transfer operation with the first BS and the data GW based on whether at least one IP packet of which a sequence number (SN) is less than a SN of a first IP packet received by the second BS is buffered in the first BS. 17. The second BS of claim 16, wherein the IP packet transfer operation comprises: an operation of receiving, from the first BS and the data GW, at least one of an identifier of a mobile station (MS) that receives the at least one IP packet of which the SN is less than the SN of the first IP packet, a flow identifier of an IP packet flow through which the at least one IP packet of which the SN is less than the SN of the first IP packet is transferred, the at least one IP packet of which the SN is less than the SN of the first IP packet, and information related to the at least one IP packet of which the SN is less than the SN of the first IP packet if the at least one IP packet of which the SN is less than the SN of the first IP packet is buffered in the first BS. 18. The second BS of claim 16, wherein the MAC SDU synchronization process comprises: an operation of receiving, from the data GW, control information including an IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, or receiving, from the data GW, control information including an IP packet, a SN of the IP packet, an identifier indicating that the IP packet is a first IP packet of a data bearer that is mapped to an IP packet flow, and a BS identifier of the second BS, and receiving, from the first BS, an identifier of a mobile station (MS) that receives the first IP packet, a flow identifier of an IP packet flow that is mapped to the data bearer, and a MAC SDU SN, wherein the MAC SDU SN is a MAC SDU SN that the first BS allocates to a MAC SDU in which the first IP packet is included based on the control information. 19. The second BS of claim 16, wherein the MAC SDU synchronization process comprises: an operation of transmitting, to the first BS, at least one of an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, a SN included in a header of a last IP packet that is transmitted for the data bearer, and a SN of an IP packet; and an operation of: receiving, from the first BS, the identifier of the MS, the flow identifier, and a MAC SDU SN, or receiving, from the first BS, the identifier of the MS, the flow identifier, and the SN included in the header of the last IP packet that is transmitted for the data bearer, and allocating a SN that follows the SN included in the header of the last IP packet that is transmitted for the data bearer to a first IP packet that is received from the data GW for the data bearer, wherein the MAC SDU SN is a MAC SDU SN, which the first BS determines as a MAC SDU SN allocated to a MAC SDU, that transfers an IP packet with a SN of the IP packet. 20. The second BS of claim 16, wherein the MAC SDU synchronization process comprises: an operation of receiving an IP packet and a SN that the data GW allocates for the IP packet from the data GW, and an operation of transmitting, to the first BS, an identifier of a mobile station (MS) to which the first BS and the second BS provide a service, a flow identifier of a data bearer that is mapped to an IP packet flow, and a SN of a first IP packet that the second BS receives from the data GW.
2,400
8,533
8,533
15,762,159
2,466
A method performed by a wireless device for handling two or more beamformed communication links initialized with one or more network nodes in a wireless communications network is provided. The wireless device determines at least one compatibility state for the two or more beamformed communication links based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links or not. The wireless device transmits information indicating the at least one determined compatibility state for the two or more beamformed communication links to at least one of the one or more network nodes. A wireless device as well as a network node and method of operation thereof are also disclosed.
1. A method performed by a wireless device for handling two or more beamformed communication links initialized with one or more network nodes in a wireless communications network, comprising: determining at least one compatibility state for the two or more beamformed communication links based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links from the one or more network nodes or not; and transmitting information indicating the at least one determined compatibility state for the two or more beamformed communication links to at least one of the one or more network nodes. 2. The method according to claim 1, further comprising: de-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 3. The method according to claim 2, further comprising selecting the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 4. The method according to claim 2, further comprising: re-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 5. The method according to claim 1, wherein the one or more current radio signal characteristics based on which the wireless device determines the at least one compatibility state is one or more of: a timing mismatch between the signals of the transmission beams of the two or more beamformed communication links; a frequency-offset mismatch between the signals of the transmission beams of the two or more beamformed communication links; the difference in propagation path loss between the signals of the transmission beams of the two or more beamformed communication links; the difference in received signal strength between the signals of the transmission beams of the two or more beamformed communication links; a difference in receiver algorithms are determined to be used for the signals of the transmission beams of the two or more beamformed communication links; and different physical radio resources are determined to be used for the signals of the transmission beams of the two or more beamformed communication links. 6. The method according to claim 1, wherein the transmitting is part of a periodical transmission to at least one of the one or more network nodes comprising the at least one compatibility state for the two or more beamformed communication links. 7. The method according to claim 1, wherein the transmitting is triggered by detecting a change in the at least one compatibility state when determining the at least one compatibility state for the two or more beamformed communication links. 8. A wireless device for handling two or more beamformed communication links initialized with one or more network nodes in a wireless communications network, wherein the wireless device is configured to: determine at least one compatibility state for the two or more beamformed communication links based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links from the one or more network nodes or not, and to transmit information indicating the at least one determined compatibility state for the two or more beamformed communication links to at least one of the one or more network nodes. 9. The wireless device according to claim 8, further configured to de-active one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 10. The wireless device according to claim 9, further configured to select the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 11. The wireless device according to claim 9, further configured to re-activate one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 12. The wireless device according to claim 8, wherein the one or more current radio signal characteristics based on which the wireless device determines the at least one compatibility state is one or more of: a timing mismatch between the signals of the transmission beams of the two or more beamformed communication links; a frequency-offset mismatch between the signals of the transmission beams of the two or more beamformed communication links; the difference in propagation path loss between the signals of the transmission beams of the two or more beamformed communication links; the difference in received signal strength between the signals of the transmission beams of the two or more beamformed communication links; a difference in receiver algorithms are determined to be used for the signals of the transmission beams of the two or more beamformed communication links; and different physical radio resources are determined to be used for the signals of the transmission beams of the two or more beamformed communication links. 13. The wireless device according to claim 8, further configured to transmit the information indicating the at least one determined compatibility state for the two or more beamformed communication links as part of a periodical transmission to at least one of the one or more network nodes. 14. The wireless device according to claim 8, wherein the transmission of the information indicating the at least one determined compatibility state for the two or more beamformed communication links is triggered in the wireless device by detecting a change in the at least one compatibility state when determining the at least one compatibility state for the two or more beamformed communication links. 15. A method performed by a network node for handling two or more beamformed communication links initialized with a wireless device in a wireless communications network, comprising: receiving information indicating at least one compatibility state for the two or more beamformed communication links with the wireless device that is based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links or not; and determining to use one or more of the two or more beamformed communication links based on the at least one compatibility state. 16. The method according to claim 15, further comprising: de-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links. 17. The method according to claim 16, further comprising selecting the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 18. The method according to claim 16, further comprising: re-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links. 19. A network node for handling two or more beamformed communication links initialized with a wireless device in a wireless communications network, wherein the network node is configured to: receive information indicating at least one compatibility state for the two or more beamformed communication links with the wireless device that is based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links or not, and determine to use one or more of the two or more beamformed communication links based on the at least one compatibility state. 20. The network node according to claim 19, further configured to: de-activate one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links. 21. The network node according to claim 20, further configured to select the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 22. The network node according to claim 20, further configured to: re-activate one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links. 23-24. (canceled)
A method performed by a wireless device for handling two or more beamformed communication links initialized with one or more network nodes in a wireless communications network is provided. The wireless device determines at least one compatibility state for the two or more beamformed communication links based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links or not. The wireless device transmits information indicating the at least one determined compatibility state for the two or more beamformed communication links to at least one of the one or more network nodes. A wireless device as well as a network node and method of operation thereof are also disclosed.1. A method performed by a wireless device for handling two or more beamformed communication links initialized with one or more network nodes in a wireless communications network, comprising: determining at least one compatibility state for the two or more beamformed communication links based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links from the one or more network nodes or not; and transmitting information indicating the at least one determined compatibility state for the two or more beamformed communication links to at least one of the one or more network nodes. 2. The method according to claim 1, further comprising: de-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 3. The method according to claim 2, further comprising selecting the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 4. The method according to claim 2, further comprising: re-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 5. The method according to claim 1, wherein the one or more current radio signal characteristics based on which the wireless device determines the at least one compatibility state is one or more of: a timing mismatch between the signals of the transmission beams of the two or more beamformed communication links; a frequency-offset mismatch between the signals of the transmission beams of the two or more beamformed communication links; the difference in propagation path loss between the signals of the transmission beams of the two or more beamformed communication links; the difference in received signal strength between the signals of the transmission beams of the two or more beamformed communication links; a difference in receiver algorithms are determined to be used for the signals of the transmission beams of the two or more beamformed communication links; and different physical radio resources are determined to be used for the signals of the transmission beams of the two or more beamformed communication links. 6. The method according to claim 1, wherein the transmitting is part of a periodical transmission to at least one of the one or more network nodes comprising the at least one compatibility state for the two or more beamformed communication links. 7. The method according to claim 1, wherein the transmitting is triggered by detecting a change in the at least one compatibility state when determining the at least one compatibility state for the two or more beamformed communication links. 8. A wireless device for handling two or more beamformed communication links initialized with one or more network nodes in a wireless communications network, wherein the wireless device is configured to: determine at least one compatibility state for the two or more beamformed communication links based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links from the one or more network nodes or not, and to transmit information indicating the at least one determined compatibility state for the two or more beamformed communication links to at least one of the one or more network nodes. 9. The wireless device according to claim 8, further configured to de-active one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 10. The wireless device according to claim 9, further configured to select the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 11. The wireless device according to claim 9, further configured to re-activate one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links from the one or more network nodes. 12. The wireless device according to claim 8, wherein the one or more current radio signal characteristics based on which the wireless device determines the at least one compatibility state is one or more of: a timing mismatch between the signals of the transmission beams of the two or more beamformed communication links; a frequency-offset mismatch between the signals of the transmission beams of the two or more beamformed communication links; the difference in propagation path loss between the signals of the transmission beams of the two or more beamformed communication links; the difference in received signal strength between the signals of the transmission beams of the two or more beamformed communication links; a difference in receiver algorithms are determined to be used for the signals of the transmission beams of the two or more beamformed communication links; and different physical radio resources are determined to be used for the signals of the transmission beams of the two or more beamformed communication links. 13. The wireless device according to claim 8, further configured to transmit the information indicating the at least one determined compatibility state for the two or more beamformed communication links as part of a periodical transmission to at least one of the one or more network nodes. 14. The wireless device according to claim 8, wherein the transmission of the information indicating the at least one determined compatibility state for the two or more beamformed communication links is triggered in the wireless device by detecting a change in the at least one compatibility state when determining the at least one compatibility state for the two or more beamformed communication links. 15. A method performed by a network node for handling two or more beamformed communication links initialized with a wireless device in a wireless communications network, comprising: receiving information indicating at least one compatibility state for the two or more beamformed communication links with the wireless device that is based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links or not; and determining to use one or more of the two or more beamformed communication links based on the at least one compatibility state. 16. The method according to claim 15, further comprising: de-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links. 17. The method according to claim 16, further comprising selecting the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 18. The method according to claim 16, further comprising: re-activating one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links. 19. A network node for handling two or more beamformed communication links initialized with a wireless device in a wireless communications network, wherein the network node is configured to: receive information indicating at least one compatibility state for the two or more beamformed communication links with the wireless device that is based on one or more current radio signal characteristics at the wireless device for the two or more beamformed communication links, wherein the at least one compatibility state indicates if the wireless device currently is able to simultaneously receive transmission beams of the two or more beamformed communication links or not, and determine to use one or more of the two or more beamformed communication links based on the at least one compatibility state. 20. The network node according to claim 19, further configured to: de-activate one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is not able to simultaneously receive the transmission beams of two or more beamformed communication links. 21. The network node according to claim 20, further configured to select the one or more of the two or more beamformed communication links to be de-activated based on: a configured priority of the two or more beamformed communication links; a quality indicator of the two or more beamformed communication links; or the order in which the two or more beamformed communication links were activated. 22. The network node according to claim 20, further configured to: re-activate one or more of the two or more beamformed communication links in case the at least one compatibility state indicates that the wireless device is able to simultaneously receive the transmission beams of two or more beamformed communication links. 23-24. (canceled)
2,400
8,534
8,534
15,496,254
2,424
Apparatus and methods to implement a technique for using a second display with a network-enabled television. In one implementation, this feature allows the user to conveniently register and manage their IPTV device directly from a second display device instead of going to a separate registration website. A typical current situation requires the user to either leave the living room for the PC which is inconvenient or perform the registration directly on the IPTV which often has a poor input interface. The second display could be a smart phone that can often be found beside the user, or a laptop or tablet PC, a desktop PC, or the like. After registration, certain convenient follow-up features can be implemented, such as directly selecting the device for browsing, or inheritance of configurations of other available devices for the newly-registered device.
1. A method of registering a content playback device using a second display, comprising: i. establishing a session between a second display and a first server, the session associated with a user account; ii. on a user interface of the second display, requesting registration information about the content playback device; iii. on a user interface of the second display, receiving registration information about the content playback device; iv. associating the content playback device with the user account; and v. causing the transmission of an authentication credential associated with the content playback device to the first server. 2. The method of claim 1, further comprising retrieving information about the registered content playback device from a second server. 3. The method of claim 1, further comprising receiving at least one additional datum associated with the content playback device. 4. The method of claim 3, wherein the additional datum is selected from the group consisting of: a MAC address, a serial number, a device code, and a registration code. 5. The method of claim 1, further comprising: i. receiving a broadcasted code from a content playback device; ii. requesting confirmation from a user that the content playback device is to be registered with the user account; and iii. responsive to a positive confirmation that the content playback device is to be registered with the user account, then performing the requesting and receiving registration information steps. 6. The method of claim 1, further comprising selecting the content playback device for browsing content items from a service provider through a proxy server. 7. The method of claim 1, further comprising inheriting at least one registration setting and associating the inherited registration setting with the content playback device, the registration setting inherited from another content playback device. 8. The method of claim 1, wherein the session established is on a registration portal. 9. The method of claim 1, wherein the content playback device is an IPTV or a digital video recorder. 10. The method of claim 1, wherein the second display is a tablet computer, a smart phone, a laptop computer, a desktop computer, an internet appliance, or a computing device with internet access. 11. The method of claim 4, wherein the additional datum is a registration code, and wherein the registration code is received by the content playback device by a server. 12. The method of claim 1, wherein the registration information is received by the content playback device by a server. 13. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 1. 14. A method of registering a content playback device using a second display, comprising: i. establishing a session between a second display and a first server, the session associated with a user account; ii. receiving registration information about a content playback device; iii. associating the content playback device with the user account; and iv. receiving an authentication credential associated with the content playback device. 15. The method of claim 14, wherein the establishing, the receiving registration information, the associating, and the receiving an authentication credential is performed by a proxy server. 16. The method of claim 14, further comprising affiliating the user account and content playback device with a service provider, the affiliating including transmitting to the service provider at least one user account identifier and the authentication credential. 17. The method of claim 16, wherein the affiliating further comprises receiving an inputted code and transmitting the received code to a service provider, such that the service provider transmits a user token and an affiliation token to a server, the tokens to be associated with the user account. 18. The method of claim 14, further comprising unaffiliating the content playback device from a service provider, the unaffiliating including transmitting to the service provider at least one user account identifier and the authentication credential. 19. The method of claim 14, further comprising receiving at least one additional datum about the content playback device. 20. The method of claim 19, wherein the additional datum is selected from the group consisting of: a MAC address, a serial number, a device code, and a registration code. 21. The method of claim 14, wherein the receiving registration information further comprises receiving previously-entered registration information associated with the user account. 22. The method of claim 14, wherein the session established is on a registration portal. 23. The method of claim 14, wherein the registration information is received by the content playback device from the first server. 24. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 14.
Apparatus and methods to implement a technique for using a second display with a network-enabled television. In one implementation, this feature allows the user to conveniently register and manage their IPTV device directly from a second display device instead of going to a separate registration website. A typical current situation requires the user to either leave the living room for the PC which is inconvenient or perform the registration directly on the IPTV which often has a poor input interface. The second display could be a smart phone that can often be found beside the user, or a laptop or tablet PC, a desktop PC, or the like. After registration, certain convenient follow-up features can be implemented, such as directly selecting the device for browsing, or inheritance of configurations of other available devices for the newly-registered device.1. A method of registering a content playback device using a second display, comprising: i. establishing a session between a second display and a first server, the session associated with a user account; ii. on a user interface of the second display, requesting registration information about the content playback device; iii. on a user interface of the second display, receiving registration information about the content playback device; iv. associating the content playback device with the user account; and v. causing the transmission of an authentication credential associated with the content playback device to the first server. 2. The method of claim 1, further comprising retrieving information about the registered content playback device from a second server. 3. The method of claim 1, further comprising receiving at least one additional datum associated with the content playback device. 4. The method of claim 3, wherein the additional datum is selected from the group consisting of: a MAC address, a serial number, a device code, and a registration code. 5. The method of claim 1, further comprising: i. receiving a broadcasted code from a content playback device; ii. requesting confirmation from a user that the content playback device is to be registered with the user account; and iii. responsive to a positive confirmation that the content playback device is to be registered with the user account, then performing the requesting and receiving registration information steps. 6. The method of claim 1, further comprising selecting the content playback device for browsing content items from a service provider through a proxy server. 7. The method of claim 1, further comprising inheriting at least one registration setting and associating the inherited registration setting with the content playback device, the registration setting inherited from another content playback device. 8. The method of claim 1, wherein the session established is on a registration portal. 9. The method of claim 1, wherein the content playback device is an IPTV or a digital video recorder. 10. The method of claim 1, wherein the second display is a tablet computer, a smart phone, a laptop computer, a desktop computer, an internet appliance, or a computing device with internet access. 11. The method of claim 4, wherein the additional datum is a registration code, and wherein the registration code is received by the content playback device by a server. 12. The method of claim 1, wherein the registration information is received by the content playback device by a server. 13. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 1. 14. A method of registering a content playback device using a second display, comprising: i. establishing a session between a second display and a first server, the session associated with a user account; ii. receiving registration information about a content playback device; iii. associating the content playback device with the user account; and iv. receiving an authentication credential associated with the content playback device. 15. The method of claim 14, wherein the establishing, the receiving registration information, the associating, and the receiving an authentication credential is performed by a proxy server. 16. The method of claim 14, further comprising affiliating the user account and content playback device with a service provider, the affiliating including transmitting to the service provider at least one user account identifier and the authentication credential. 17. The method of claim 16, wherein the affiliating further comprises receiving an inputted code and transmitting the received code to a service provider, such that the service provider transmits a user token and an affiliation token to a server, the tokens to be associated with the user account. 18. The method of claim 14, further comprising unaffiliating the content playback device from a service provider, the unaffiliating including transmitting to the service provider at least one user account identifier and the authentication credential. 19. The method of claim 14, further comprising receiving at least one additional datum about the content playback device. 20. The method of claim 19, wherein the additional datum is selected from the group consisting of: a MAC address, a serial number, a device code, and a registration code. 21. The method of claim 14, wherein the receiving registration information further comprises receiving previously-entered registration information associated with the user account. 22. The method of claim 14, wherein the session established is on a registration portal. 23. The method of claim 14, wherein the registration information is received by the content playback device from the first server. 24. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 14.
2,400
8,535
8,535
14,475,875
2,459
A system, method and computer program product for composing persistent object instances that link resources across multiple, disparate systems. An example method includes associating resources with namespace-URLs and object instances. One of the namespace-URLs is designated as primary namespace-URL. A web-based object API is provided through which the object instance can be accessed. The web-based object API uses the primary namespace-URL as an identifier of the object instance.
1. A method for composing persistent object instances that link resources across multiple, disparate systems, the method comprising: associating each resource from a plurality of network-based resources with a namespace-URL, the namespace-URL including a namespace and a resource uniform resource locator (URL), the namespace identifying a class of the network-based resources the resource belongs to and the resource URL providing a web-based resource application programming interface (API) through which the resource can be accessed; associating the plurality of network-based resources with an object instance; designating only one of the namespace-URLs of the plurality of network-based resources associated with the object instance as a primary namespace-URL such that the primary namespace-URL is not designated as the primary namespace-URL for any other object instance; providing a web-based object API through which the object instance can be accessed, the web-based object API using the primary namespace-URL as an identifier of the object instance; and executing the web-based object API using a computer processor. 2. The method of claim 1, further comprising: assigning a unique hard-link to the object instance; and associating the hard-link to each resource utilized by the object instance such that each resource utilized by the object instance is associated to the same hard-link. 3. The method of claim 2, wherein the hard-link is a universally unique identifier (UUID). 4. The method of claim 1, further comprising returning a listing of the plurality of network-based resources associated with the object instance upon a call to the web-based object API, the call including the primary namespace-URL. 5. The method of claim 1, further comprising tagging at least one of the plurality of network-based resources with at least one tag such that resources with the same tag value define a set themselves and object instances associated with a resource with a given tag are implicitly linked to other resources with the same tag. 6. The method of claim 1, wherein associating the plurality of network-based resources with the object instance includes automatically associating at least one of the plurality of network-based resources to the object instance based on metadata describing the resource. 7. The method of claim 1, wherein associating the plurality of network-based resources with the object instance includes automatically associating at least one of the plurality of network-based resources to the object instance based on metadata describing the resource and a set of key-word search parameters of the metadata. 8. A system for composing persistent object instances that link resources across multiple, disparate systems, the method comprising: a database managed by a database management system (DBMS); a composition server configured to provide a web-based object API through which an object instance can be accessed, the web-based object API using a primary namespace-URL as an identifier of the object instance; and a computer processor configured to: associate in the database each resource from a plurality of network-based resources with a namespace-URL, the namespace-URL including a namespace and a resource uniform resource locator (URL), the namespace identifying a class of the network-based resources the resource belongs to and the resource URL providing a web-based resource application programming interface (API) through which the resource can be accessed; associate in the database the plurality of network-based resources with the object instance; and designate only one of the namespace-URLs of the plurality of network-based resources associated with the object instance as the primary namespace-URL such that the primary namespace-URL is not designated as the primary namespace-URL for any other object instance. 9. The system of claim 8, wherein the computer processor is further configured to: assign a unique hard-link to the object instance; and associate the hard-link to each resource utilized by the object instance such that each resource utilized by the object instance is associated to the same hard-link. 10. The system of claim 9, wherein the composition server is further configured to create, retrieve, update and delete the hard-link via the web-based object API. 11. The system of claim 8, wherein the composition server is further configured to return a listing of the plurality of network-based resources associated with the object instance upon a call to the web-based object API, the call including the primary namespace-URL. 12. The system of claim 8, wherein the computer processor is further configured to tag at least one of the plurality of network-based resources with at least one tag such that resources with the same tag value define a set themselves and object instances associated with a resource with a given tag are implicitly linked to other resources with the same tag. 13. The system of claim 8, wherein the computer processor is further configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource. 14. The system of claim 8, wherein the computer processor is further configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource and a set of key-word search parameters of the metadata. 15. A computer program product for composing persistent object instances that link resources across multiple, disparate systems, the computer program product comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to: associate each resource from a plurality of network-based resources with a namespace-URL, the namespace-URL including a namespace and a resource uniform resource locator (URL), the namespace identifying a class of the network-based resources the resource belongs to and the resource URL providing a web-based resource application programming interface (API) through which the resource can be accessed; associate the plurality of network-based resources with an object instance; designate only one of the namespace-URLs of the plurality of network-based resources associated with the object instance as a primary namespace-URL such that the primary namespace-URL is not designated as the primary namespace-URL for any other object instance; provide a web-based object API through which the object instance can be accessed, the web-based object API using the primary namespace-URL as an identifier of the object instance. 16. The computer program product of claim 15, further comprising computer readable program code configured to: assign a unique hard-link to the object instance; and associate the hard-link to each resource utilized by the object instance such that each resource utilized by the object instance is associated to the same hard-link. 17. The computer program product of claim 15, further comprising computer readable program code configured to return a listing of the plurality of network-based resources associated with the object instance upon a call to the web-based object API, the call including the primary namespace-URL. 18. The computer program product of claim 15, further comprising computer readable program code configured to tag at least one of the plurality of network-based resources with at least one tag such that resources with the same tag value define a set themselves and object instances associated with a resource with a given tag are implicitly linked to other resources with the same tag. 19. The computer program product of claim 15, wherein the computer readable program code configured to associating the plurality of network-based resources with the object instance includes computer readable program code configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource. 20. The computer program product of claim 15, wherein the computer readable program code configured to associating the plurality of network-based resources with the object instance includes computer readable program code configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource and a set of key-word search parameters of the metadata.
A system, method and computer program product for composing persistent object instances that link resources across multiple, disparate systems. An example method includes associating resources with namespace-URLs and object instances. One of the namespace-URLs is designated as primary namespace-URL. A web-based object API is provided through which the object instance can be accessed. The web-based object API uses the primary namespace-URL as an identifier of the object instance.1. A method for composing persistent object instances that link resources across multiple, disparate systems, the method comprising: associating each resource from a plurality of network-based resources with a namespace-URL, the namespace-URL including a namespace and a resource uniform resource locator (URL), the namespace identifying a class of the network-based resources the resource belongs to and the resource URL providing a web-based resource application programming interface (API) through which the resource can be accessed; associating the plurality of network-based resources with an object instance; designating only one of the namespace-URLs of the plurality of network-based resources associated with the object instance as a primary namespace-URL such that the primary namespace-URL is not designated as the primary namespace-URL for any other object instance; providing a web-based object API through which the object instance can be accessed, the web-based object API using the primary namespace-URL as an identifier of the object instance; and executing the web-based object API using a computer processor. 2. The method of claim 1, further comprising: assigning a unique hard-link to the object instance; and associating the hard-link to each resource utilized by the object instance such that each resource utilized by the object instance is associated to the same hard-link. 3. The method of claim 2, wherein the hard-link is a universally unique identifier (UUID). 4. The method of claim 1, further comprising returning a listing of the plurality of network-based resources associated with the object instance upon a call to the web-based object API, the call including the primary namespace-URL. 5. The method of claim 1, further comprising tagging at least one of the plurality of network-based resources with at least one tag such that resources with the same tag value define a set themselves and object instances associated with a resource with a given tag are implicitly linked to other resources with the same tag. 6. The method of claim 1, wherein associating the plurality of network-based resources with the object instance includes automatically associating at least one of the plurality of network-based resources to the object instance based on metadata describing the resource. 7. The method of claim 1, wherein associating the plurality of network-based resources with the object instance includes automatically associating at least one of the plurality of network-based resources to the object instance based on metadata describing the resource and a set of key-word search parameters of the metadata. 8. A system for composing persistent object instances that link resources across multiple, disparate systems, the method comprising: a database managed by a database management system (DBMS); a composition server configured to provide a web-based object API through which an object instance can be accessed, the web-based object API using a primary namespace-URL as an identifier of the object instance; and a computer processor configured to: associate in the database each resource from a plurality of network-based resources with a namespace-URL, the namespace-URL including a namespace and a resource uniform resource locator (URL), the namespace identifying a class of the network-based resources the resource belongs to and the resource URL providing a web-based resource application programming interface (API) through which the resource can be accessed; associate in the database the plurality of network-based resources with the object instance; and designate only one of the namespace-URLs of the plurality of network-based resources associated with the object instance as the primary namespace-URL such that the primary namespace-URL is not designated as the primary namespace-URL for any other object instance. 9. The system of claim 8, wherein the computer processor is further configured to: assign a unique hard-link to the object instance; and associate the hard-link to each resource utilized by the object instance such that each resource utilized by the object instance is associated to the same hard-link. 10. The system of claim 9, wherein the composition server is further configured to create, retrieve, update and delete the hard-link via the web-based object API. 11. The system of claim 8, wherein the composition server is further configured to return a listing of the plurality of network-based resources associated with the object instance upon a call to the web-based object API, the call including the primary namespace-URL. 12. The system of claim 8, wherein the computer processor is further configured to tag at least one of the plurality of network-based resources with at least one tag such that resources with the same tag value define a set themselves and object instances associated with a resource with a given tag are implicitly linked to other resources with the same tag. 13. The system of claim 8, wherein the computer processor is further configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource. 14. The system of claim 8, wherein the computer processor is further configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource and a set of key-word search parameters of the metadata. 15. A computer program product for composing persistent object instances that link resources across multiple, disparate systems, the computer program product comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured to: associate each resource from a plurality of network-based resources with a namespace-URL, the namespace-URL including a namespace and a resource uniform resource locator (URL), the namespace identifying a class of the network-based resources the resource belongs to and the resource URL providing a web-based resource application programming interface (API) through which the resource can be accessed; associate the plurality of network-based resources with an object instance; designate only one of the namespace-URLs of the plurality of network-based resources associated with the object instance as a primary namespace-URL such that the primary namespace-URL is not designated as the primary namespace-URL for any other object instance; provide a web-based object API through which the object instance can be accessed, the web-based object API using the primary namespace-URL as an identifier of the object instance. 16. The computer program product of claim 15, further comprising computer readable program code configured to: assign a unique hard-link to the object instance; and associate the hard-link to each resource utilized by the object instance such that each resource utilized by the object instance is associated to the same hard-link. 17. The computer program product of claim 15, further comprising computer readable program code configured to return a listing of the plurality of network-based resources associated with the object instance upon a call to the web-based object API, the call including the primary namespace-URL. 18. The computer program product of claim 15, further comprising computer readable program code configured to tag at least one of the plurality of network-based resources with at least one tag such that resources with the same tag value define a set themselves and object instances associated with a resource with a given tag are implicitly linked to other resources with the same tag. 19. The computer program product of claim 15, wherein the computer readable program code configured to associating the plurality of network-based resources with the object instance includes computer readable program code configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource. 20. The computer program product of claim 15, wherein the computer readable program code configured to associating the plurality of network-based resources with the object instance includes computer readable program code configured to automatically associate at least one of the plurality of network-based resources to the object instance based on metadata describing the resource and a set of key-word search parameters of the metadata.
2,400
8,536
8,536
15,345,042
2,484
In one aspect, an example method involves accessing first data representing a program schedule of a media program; making a determination that first text of the program schedule matches second text displayed by a teleprompter, where a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. An example non-transitory computer-readable medium and an example computing device, both related to the example method, are also disclosed herein.
1. A method comprising: accessing first data representing a program schedule of a media program; making a determination that first text of the program schedule is associated with second text displayed by a teleprompter, wherein a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. 2. The method of claim 1, wherein the determination is a first determination, the method further comprising: making a second determination that the recorded portion of the media program was recorded proximate the time when the second text was displayed, wherein responsive to at least the first determination comprises responsive to at least the first and second determinations. 3. The method of claim 1, further comprising: receiving, from the teleprompter, second data representing the second text; and making the determination based, at least in part, on the received second data. 4. The method of claim 1, wherein the teleprompter comprises a display component having an active line region, and wherein making the determination that first text of the program schedule is associated with second text displayed by the teleprompter comprises making a determination that first text of the program schedule is associated with second text displayed in the active line region of the display component. 5. The method of claim 1, wherein the determination is a first determination, the method further comprising: making a second determination that the teleprompter displayed multiple scrolling characters of text at a scrolling rate that satisfies one or more predetermined criterion; and making a third determination that at least a portion of the multiple scrolling characters of text are associated with the first text, wherein responsive to at least the first determination comprises responsive to at least the first, second, and third determinations. 6. The method of claim 5, further comprising: determining the scrolling rate; and making the second determination based, at least in part, on the determined scrolling rate. 7. The method of claim 5, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is less than 21 characters per second. 8. The method of claim 5, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is greater than 11 characters per second. 9. The method of claim 1, wherein the media program comprises multiple news stories, wherein the selected portion of the program schedule corresponds to a particular one of the multiple news stories, and wherein the recorded portion of the media program comprises an initial frame of the news story. 10. The method of claim 1, further comprising: receiving an indication of the selected portion of the program schedule; using the received indication and the stored data to select the recorded portion of the media program; and displaying at least a portion of the selected recorded portion of the media program. 11. A non-transitory computer-readable medium having instructions stored thereon that when executed cause performance of a set of acts comprising: accessing first data representing a program schedule of a media program; making a determination that first text of the program schedule is associated with second text displayed by a teleprompter, wherein a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. 12. The non-transitory computer-readable medium of claim 11, wherein the determination is a first determination, the acts further comprising: making a second determination that the teleprompter displayed multiple scrolling characters of text at a scrolling rate that satisfies one or more predetermined criterion; and making a third determination that at least a portion of the multiple scrolling characters of text are associated with the first text, wherein responsive to at least the first determination comprises responsive to at least the first, second, and third determinations. 13. The non-transitory computer-readable medium of claim 12, the acts further comprising: determining the scrolling rate; and making the second determination based, at least in part, on the determined scrolling rate. 14. The non-transitory computer-readable medium of claim 12, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is less than 21 characters per second. 15. The non-transitory computer-readable medium of claim 12, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is greater than 11 characters per second. 16. The non-transitory computer-readable medium of claim 11, the acts further comprising: receiving an indication of the selected portion of the program schedule; using the received indication and the stored data to select the recorded portion of the media program; and displaying at least a portion of the selected recorded portion of the media program. 17. A computing device comprising: a processor; a communication interface; and a non-transitory computer-readable medium having instructions stored thereon that when executed by the processor cause performance of a set of acts comprising: accessing, via the communication interface, first data representing a program schedule of a media program; making a determination that first text of the program schedule is associated with second text displayed by a teleprompter, wherein a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. 18. The computing device of claim 17, the acts further comprising: making a second determination that the teleprompter displayed multiple scrolling characters of text at a scrolling rate that satisfies one or more predetermined criterion; and making a third determination that at least a portion of the multiple scrolling characters of text are associated with the first text, wherein responsive to at least the first determination comprises responsive to at least the first, second, and third determinations. 19. The computing device of claim 18, the acts further comprising: determining the scrolling rate; and making the second determination based, at least in part, on the determined scrolling rate. 20. The computing device of claim 18, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is greater than 11 characters per second.
In one aspect, an example method involves accessing first data representing a program schedule of a media program; making a determination that first text of the program schedule matches second text displayed by a teleprompter, where a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. An example non-transitory computer-readable medium and an example computing device, both related to the example method, are also disclosed herein.1. A method comprising: accessing first data representing a program schedule of a media program; making a determination that first text of the program schedule is associated with second text displayed by a teleprompter, wherein a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. 2. The method of claim 1, wherein the determination is a first determination, the method further comprising: making a second determination that the recorded portion of the media program was recorded proximate the time when the second text was displayed, wherein responsive to at least the first determination comprises responsive to at least the first and second determinations. 3. The method of claim 1, further comprising: receiving, from the teleprompter, second data representing the second text; and making the determination based, at least in part, on the received second data. 4. The method of claim 1, wherein the teleprompter comprises a display component having an active line region, and wherein making the determination that first text of the program schedule is associated with second text displayed by the teleprompter comprises making a determination that first text of the program schedule is associated with second text displayed in the active line region of the display component. 5. The method of claim 1, wherein the determination is a first determination, the method further comprising: making a second determination that the teleprompter displayed multiple scrolling characters of text at a scrolling rate that satisfies one or more predetermined criterion; and making a third determination that at least a portion of the multiple scrolling characters of text are associated with the first text, wherein responsive to at least the first determination comprises responsive to at least the first, second, and third determinations. 6. The method of claim 5, further comprising: determining the scrolling rate; and making the second determination based, at least in part, on the determined scrolling rate. 7. The method of claim 5, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is less than 21 characters per second. 8. The method of claim 5, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is greater than 11 characters per second. 9. The method of claim 1, wherein the media program comprises multiple news stories, wherein the selected portion of the program schedule corresponds to a particular one of the multiple news stories, and wherein the recorded portion of the media program comprises an initial frame of the news story. 10. The method of claim 1, further comprising: receiving an indication of the selected portion of the program schedule; using the received indication and the stored data to select the recorded portion of the media program; and displaying at least a portion of the selected recorded portion of the media program. 11. A non-transitory computer-readable medium having instructions stored thereon that when executed cause performance of a set of acts comprising: accessing first data representing a program schedule of a media program; making a determination that first text of the program schedule is associated with second text displayed by a teleprompter, wherein a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. 12. The non-transitory computer-readable medium of claim 11, wherein the determination is a first determination, the acts further comprising: making a second determination that the teleprompter displayed multiple scrolling characters of text at a scrolling rate that satisfies one or more predetermined criterion; and making a third determination that at least a portion of the multiple scrolling characters of text are associated with the first text, wherein responsive to at least the first determination comprises responsive to at least the first, second, and third determinations. 13. The non-transitory computer-readable medium of claim 12, the acts further comprising: determining the scrolling rate; and making the second determination based, at least in part, on the determined scrolling rate. 14. The non-transitory computer-readable medium of claim 12, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is less than 21 characters per second. 15. The non-transitory computer-readable medium of claim 12, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is greater than 11 characters per second. 16. The non-transitory computer-readable medium of claim 11, the acts further comprising: receiving an indication of the selected portion of the program schedule; using the received indication and the stored data to select the recorded portion of the media program; and displaying at least a portion of the selected recorded portion of the media program. 17. A computing device comprising: a processor; a communication interface; and a non-transitory computer-readable medium having instructions stored thereon that when executed by the processor cause performance of a set of acts comprising: accessing, via the communication interface, first data representing a program schedule of a media program; making a determination that first text of the program schedule is associated with second text displayed by a teleprompter, wherein a portion of the media program was recorded proximate a time when the second text was displayed; using the first text of the program schedule as a basis to select a portion of the program schedule; and responsive to at least the determination, storing data indicative of a correlation between (i) the selected portion of the program schedule and (ii) the recorded portion of the media program. 18. The computing device of claim 17, the acts further comprising: making a second determination that the teleprompter displayed multiple scrolling characters of text at a scrolling rate that satisfies one or more predetermined criterion; and making a third determination that at least a portion of the multiple scrolling characters of text are associated with the first text, wherein responsive to at least the first determination comprises responsive to at least the first, second, and third determinations. 19. The computing device of claim 18, the acts further comprising: determining the scrolling rate; and making the second determination based, at least in part, on the determined scrolling rate. 20. The computing device of claim 18, wherein the one or more predetermined criterion comprises a criterion that the scrolling rate is greater than 11 characters per second.
2,400
8,537
8,537
14,568,081
2,483
A system for streaming multiple encodings of a source video stream is disclosed. A source video device system captures and/or receives source video comprising a plurality of source video frames. The source video device system encodes the source video frames into virtual frames, with each of the virtual frames being encoded using at least one different encoding parameter. The source video device system forms a container frame from the virtual frames and transmits the container frame over a network. In an example embodiment, the container frame comprises the virtual frames associated with a particular source frame and a container timestamp applicable to all of the virtual frames in the container frame.
1. A method for encoding source video, comprising: a computing system receiving a source frame of a source video; the computing system encoding the source frame to form a plurality of virtual frames, each of the plurality of virtual frames encoded using at least one different encoding parameter; and the computing system transmitting a container frame over a network, the container frame comprising the plurality of virtual frames and a container timestamp applicable to each of the plurality of virtual frames. 2. The method of claim 1 wherein each of the plurality of virtual frames comprises a virtual frame header comprising a delimiter that delimits each of virtual frames. 3. The method of claim 1, wherein the plurality of virtual frames are concatenated together in the container frame. 4. The method of claim 1, wherein the container frame comprises a container frame header, the container frame header comprising the container timestamp. 5. The method of claim 1, wherein the source frame comprises a source frame timestamp, the container frame timestamp being substantially the same as the source frame timestamp. 6. The method of claim 1, wherein the at least one different encoding parameter is selected from a group comprising: region of interest of the source frame; frame rate; video quality; compression ratio; quantization parameters; video resolution; compression technique; and encoding format. 7. The method of claim 1, wherein the computing system encoding the source frame comprises a video source device encoding the source frame, and wherein the computing system transmitting a container frame over a network comprises the video source device transmitting a container frame. 8. The method of claim 7, wherein the computing system transmitting a container frame over a network comprises transmitting a container frame over a network to a control server. 9. The method of claim 1, wherein the computing system transmitting a container frame over a network comprises the computing system transmitting a container frame comprising the plurality of virtual frames, at least one descriptor describing the plurality of virtual frames, and a container timestamp applicable to each of the plurality of virtual frames. 10. The method of claim 1, wherein the computing system encoding the source frame to form a plurality of virtual frames comprises the computing system encoding a first plurality of virtual frames corresponding to a first resolution and encoding a second plurality of virtual frames corresponding to a second resolution. 11. A method for streaming data, comprising: a control system receiving via a network from a video source system a description of a plurality of virtual streams the video source system is configured to provide, each of the plurality of the encodings comprising one or more of the virtual streams; the control system receiving from the video source system a data stream comprising a plurality of virtual streams; and the control system associating each of the received plurality of virtual streams with an encoding. 12. The method of claim 11, wherein the control system associating each of the received plurality of virtual streams with an encoding comprises the control system employing information in the received description to identify virtual streams associated with encodings. 13. The method of claim 11, further comprising the control system transmitting via the network to the video source system a request for a description of a plurality of virtual streams provided by the video source system. 14. The method of claim 11, wherein the control system receiving from the video source system device a description of a plurality of virtual streams comprises receiving a description comprising an identifier for each of the plurality of virtual streams. 15. The method of claim 11, wherein the control system receiving from the video source system device a description of a plurality of virtual streams comprises receiving a description comprising for each of the plurality of virtual streams an indication of an area of a source video that is encoded. 16. The method of claim 11, wherein the control system receiving from the video source system device a description of a plurality of virtual streams comprises receiving a description comprising encoding parameters for each of the plurality of virtual streams. 17. A method for streaming video data, comprising: receiving, at a server, client streaming parameters specifying characteristics of encodings to be sent to a client device; determining, at the server, at least a first encoding and a second encoding of a source frame satisfying the client streaming parameters, the first encoding and the second encoding encoded using at least one different encoding parameter; and transmitting, to the client from the server, at least the first encoding and the second encoding. 18. The method of claim 17, wherein the at least one different encoding parameter is selected from the group comprising: region of interest of the source frame; frame rate; video quality; compression ratio; quantization parameters; video resolution; compression technique; and encoding format. 19. The method of claim 17, wherein the first encoding is encoded using a first region of interest parameter and the second encoding is encoded using a second region of interest, the first region of interest being different than the second region of interest. 20. The method of claim 19, wherein the first region of interest is a subset of the second region of interest and the first encoding is encoded at a higher resolution than the second encoding. 21. The method of claim 17, further comprising: determining, at the server, at least a third encoding of the source frame satisfying the client streaming parameters, the third encoding encoded using at least one different encoding parameter than the first encoding and the second encoding; and transmitting, to the client from the server, at least the third encoding. 22. The method of claim 21, wherein the first encoding is encoded using parameters specifying a first region of interest and a first resolution, the second encoding is encoded using parameters specifying a second region of interest and a second resolution, and the third encoding is encoded using parameters specifying a third region of interest and a third resolution, wherein the first region of interest is different than the second region of interest and the third region of interest encompasses the first region of interest and the second region of interest, and wherein the first resolution and the second resolution are greater than the third resolution. 23. The method of claim 17, further comprising: receiving, at a server, second client streaming parameters specifying characteristics of encodings to be sent to a client device; determining, at the server, at least a third encoding of the source frame satisfying the second client streaming parameters; and transmitting, to the client from the server, at least the third encoding. 24. The method of claim 23, wherein the first encoding is encoded using parameters specifying a first region of interest and a first resolution, the second encoding is encoded using parameters specifying a second region of interest and a second resolution, and the third encoding is encoded using parameters specifying a third region of interest and a third resolution, wherein the first region of interest is different than the second region of interest and the third region of interest encompasses the first region of interest and the second region of interest, and wherein the first resolution and the second resolution are greater than the third resolution. 25. A method for displaying video data, comprising: a computing system receiving a plurality of encodings generated from a source video frame, the plurality of encodings comprising a first encoding of a first region of interest of the source video frame and a second encoding of a second region of interest of the source video frame, the first region of interest and the second region of interest being non-identical; and the computing system displaying on a monitor the first encoding and the second encoding. 26. The method of claim 25, wherein a computing system receiving a plurality of encodings generated from a source video frame comprises receiving a container frame comprising a plurality of virtual frames, each virtual frame corresponding to one of the plurality of encodings, and a container timestamp applicable to all of the virtual frames. 27. The method of claim 26, wherein the computing system displaying on a monitor the first encoding and the second encoding comprises displaying the first encoding and second encoding on adjacent portions of the monitor. 28. The method of claim 25, wherein the first region of interest and the second region of interest at least partially overlap. 29. The method of claim 28, wherein the first region of interest is a subset of the second region of interest and the first encoding is encoded at a higher resolution than the second encoding, and wherein the computing system displaying on a monitor the first encoding and the second encoding comprises displaying the first encoding and the second encoding simultaneously. 30. The method of claim 25, wherein the plurality of encodings further comprise a third encoding of a third region of interest of the source video frame, the third region of interest encompassing the first region of interest and the second region of interest, wherein the first encoding is encoded using a resolution less than resolutions employed to encode the first encoding and the second encoding, wherein the computing system displaying on a monitor the first encoding and the second encoding further comprises displaying the third encoding, the first encoding and the second encoding appearing over at least portions of the third encoding. 31. A display system, comprising: a receiver adapted to receive a plurality of container frames over a network, each container frame comprising a plurality of virtual frames and a container timestamp applicable to each of the plurality of virtual frames, and each of the plurality of virtual frames in each container frame being encoded from a source frame using at least one different encoding parameter; a processor adapted to associate a first selected frame of the received plurality of virtual frames within each container frame with a first encoding, and to reconstruct a first virtual stream of the first selected frames according to the container timestamps; and a monitor adapted to display the first virtual stream to a user. 32. The display system of claim 31, wherein: the processor is further adapted to associate a second selected frame of the received plurality of virtual frames within each container frame with a second encoding, and to reconstruct a second virtual stream of the second selected frames according to the container timestamps; and the monitor is adapted to display both the first virtual stream and the second virtual stream to a user. 33. A method for streaming video data, comprising: receiving, at a server, client streaming parameters specifying a desired region of interest of a source frame to be sent to a client device; determining, at the server, which one or more of a plurality of encodings of the source frame satisfy the client streaming parameters, where the each encoding of the source frame represents a different encoded region of interest of the source frame; and transmitting, to the client from the server, the one or more determined encodings. 34. The method of claim 33, wherein the one or more determined encodings comprise a first encoding and a second encoding, the method further comprising: combining, at the server, the first encoding and the second encoding to create a composite encoding corresponding to a portion of the desired region of interest, where the transmitting comprises the first encoding and second encoding in combined form. 35. The method of claim 34, wherein the region of interest of the first encoding and the region of interest of the second encoding at least partially overlap.
A system for streaming multiple encodings of a source video stream is disclosed. A source video device system captures and/or receives source video comprising a plurality of source video frames. The source video device system encodes the source video frames into virtual frames, with each of the virtual frames being encoded using at least one different encoding parameter. The source video device system forms a container frame from the virtual frames and transmits the container frame over a network. In an example embodiment, the container frame comprises the virtual frames associated with a particular source frame and a container timestamp applicable to all of the virtual frames in the container frame.1. A method for encoding source video, comprising: a computing system receiving a source frame of a source video; the computing system encoding the source frame to form a plurality of virtual frames, each of the plurality of virtual frames encoded using at least one different encoding parameter; and the computing system transmitting a container frame over a network, the container frame comprising the plurality of virtual frames and a container timestamp applicable to each of the plurality of virtual frames. 2. The method of claim 1 wherein each of the plurality of virtual frames comprises a virtual frame header comprising a delimiter that delimits each of virtual frames. 3. The method of claim 1, wherein the plurality of virtual frames are concatenated together in the container frame. 4. The method of claim 1, wherein the container frame comprises a container frame header, the container frame header comprising the container timestamp. 5. The method of claim 1, wherein the source frame comprises a source frame timestamp, the container frame timestamp being substantially the same as the source frame timestamp. 6. The method of claim 1, wherein the at least one different encoding parameter is selected from a group comprising: region of interest of the source frame; frame rate; video quality; compression ratio; quantization parameters; video resolution; compression technique; and encoding format. 7. The method of claim 1, wherein the computing system encoding the source frame comprises a video source device encoding the source frame, and wherein the computing system transmitting a container frame over a network comprises the video source device transmitting a container frame. 8. The method of claim 7, wherein the computing system transmitting a container frame over a network comprises transmitting a container frame over a network to a control server. 9. The method of claim 1, wherein the computing system transmitting a container frame over a network comprises the computing system transmitting a container frame comprising the plurality of virtual frames, at least one descriptor describing the plurality of virtual frames, and a container timestamp applicable to each of the plurality of virtual frames. 10. The method of claim 1, wherein the computing system encoding the source frame to form a plurality of virtual frames comprises the computing system encoding a first plurality of virtual frames corresponding to a first resolution and encoding a second plurality of virtual frames corresponding to a second resolution. 11. A method for streaming data, comprising: a control system receiving via a network from a video source system a description of a plurality of virtual streams the video source system is configured to provide, each of the plurality of the encodings comprising one or more of the virtual streams; the control system receiving from the video source system a data stream comprising a plurality of virtual streams; and the control system associating each of the received plurality of virtual streams with an encoding. 12. The method of claim 11, wherein the control system associating each of the received plurality of virtual streams with an encoding comprises the control system employing information in the received description to identify virtual streams associated with encodings. 13. The method of claim 11, further comprising the control system transmitting via the network to the video source system a request for a description of a plurality of virtual streams provided by the video source system. 14. The method of claim 11, wherein the control system receiving from the video source system device a description of a plurality of virtual streams comprises receiving a description comprising an identifier for each of the plurality of virtual streams. 15. The method of claim 11, wherein the control system receiving from the video source system device a description of a plurality of virtual streams comprises receiving a description comprising for each of the plurality of virtual streams an indication of an area of a source video that is encoded. 16. The method of claim 11, wherein the control system receiving from the video source system device a description of a plurality of virtual streams comprises receiving a description comprising encoding parameters for each of the plurality of virtual streams. 17. A method for streaming video data, comprising: receiving, at a server, client streaming parameters specifying characteristics of encodings to be sent to a client device; determining, at the server, at least a first encoding and a second encoding of a source frame satisfying the client streaming parameters, the first encoding and the second encoding encoded using at least one different encoding parameter; and transmitting, to the client from the server, at least the first encoding and the second encoding. 18. The method of claim 17, wherein the at least one different encoding parameter is selected from the group comprising: region of interest of the source frame; frame rate; video quality; compression ratio; quantization parameters; video resolution; compression technique; and encoding format. 19. The method of claim 17, wherein the first encoding is encoded using a first region of interest parameter and the second encoding is encoded using a second region of interest, the first region of interest being different than the second region of interest. 20. The method of claim 19, wherein the first region of interest is a subset of the second region of interest and the first encoding is encoded at a higher resolution than the second encoding. 21. The method of claim 17, further comprising: determining, at the server, at least a third encoding of the source frame satisfying the client streaming parameters, the third encoding encoded using at least one different encoding parameter than the first encoding and the second encoding; and transmitting, to the client from the server, at least the third encoding. 22. The method of claim 21, wherein the first encoding is encoded using parameters specifying a first region of interest and a first resolution, the second encoding is encoded using parameters specifying a second region of interest and a second resolution, and the third encoding is encoded using parameters specifying a third region of interest and a third resolution, wherein the first region of interest is different than the second region of interest and the third region of interest encompasses the first region of interest and the second region of interest, and wherein the first resolution and the second resolution are greater than the third resolution. 23. The method of claim 17, further comprising: receiving, at a server, second client streaming parameters specifying characteristics of encodings to be sent to a client device; determining, at the server, at least a third encoding of the source frame satisfying the second client streaming parameters; and transmitting, to the client from the server, at least the third encoding. 24. The method of claim 23, wherein the first encoding is encoded using parameters specifying a first region of interest and a first resolution, the second encoding is encoded using parameters specifying a second region of interest and a second resolution, and the third encoding is encoded using parameters specifying a third region of interest and a third resolution, wherein the first region of interest is different than the second region of interest and the third region of interest encompasses the first region of interest and the second region of interest, and wherein the first resolution and the second resolution are greater than the third resolution. 25. A method for displaying video data, comprising: a computing system receiving a plurality of encodings generated from a source video frame, the plurality of encodings comprising a first encoding of a first region of interest of the source video frame and a second encoding of a second region of interest of the source video frame, the first region of interest and the second region of interest being non-identical; and the computing system displaying on a monitor the first encoding and the second encoding. 26. The method of claim 25, wherein a computing system receiving a plurality of encodings generated from a source video frame comprises receiving a container frame comprising a plurality of virtual frames, each virtual frame corresponding to one of the plurality of encodings, and a container timestamp applicable to all of the virtual frames. 27. The method of claim 26, wherein the computing system displaying on a monitor the first encoding and the second encoding comprises displaying the first encoding and second encoding on adjacent portions of the monitor. 28. The method of claim 25, wherein the first region of interest and the second region of interest at least partially overlap. 29. The method of claim 28, wherein the first region of interest is a subset of the second region of interest and the first encoding is encoded at a higher resolution than the second encoding, and wherein the computing system displaying on a monitor the first encoding and the second encoding comprises displaying the first encoding and the second encoding simultaneously. 30. The method of claim 25, wherein the plurality of encodings further comprise a third encoding of a third region of interest of the source video frame, the third region of interest encompassing the first region of interest and the second region of interest, wherein the first encoding is encoded using a resolution less than resolutions employed to encode the first encoding and the second encoding, wherein the computing system displaying on a monitor the first encoding and the second encoding further comprises displaying the third encoding, the first encoding and the second encoding appearing over at least portions of the third encoding. 31. A display system, comprising: a receiver adapted to receive a plurality of container frames over a network, each container frame comprising a plurality of virtual frames and a container timestamp applicable to each of the plurality of virtual frames, and each of the plurality of virtual frames in each container frame being encoded from a source frame using at least one different encoding parameter; a processor adapted to associate a first selected frame of the received plurality of virtual frames within each container frame with a first encoding, and to reconstruct a first virtual stream of the first selected frames according to the container timestamps; and a monitor adapted to display the first virtual stream to a user. 32. The display system of claim 31, wherein: the processor is further adapted to associate a second selected frame of the received plurality of virtual frames within each container frame with a second encoding, and to reconstruct a second virtual stream of the second selected frames according to the container timestamps; and the monitor is adapted to display both the first virtual stream and the second virtual stream to a user. 33. A method for streaming video data, comprising: receiving, at a server, client streaming parameters specifying a desired region of interest of a source frame to be sent to a client device; determining, at the server, which one or more of a plurality of encodings of the source frame satisfy the client streaming parameters, where the each encoding of the source frame represents a different encoded region of interest of the source frame; and transmitting, to the client from the server, the one or more determined encodings. 34. The method of claim 33, wherein the one or more determined encodings comprise a first encoding and a second encoding, the method further comprising: combining, at the server, the first encoding and the second encoding to create a composite encoding corresponding to a portion of the desired region of interest, where the transmitting comprises the first encoding and second encoding in combined form. 35. The method of claim 34, wherein the region of interest of the first encoding and the region of interest of the second encoding at least partially overlap.
2,400
8,538
8,538
15,713,593
2,411
Networks that support 5G communication may support different numerologies across and even within a symbol, slot, or subframe. Sequences, such as reference signals or data scrambled with a scrambling code, may be transmitted on resources with such mixed numerologies. In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a user equipment. The UE may be configured to receive an indication of assigned resources for communicating with a base station. The UE may also be configured to determine a numerology associated with the assigned resources, and to determine one or more indices based on the numerology. The UE may also generate a sequence based on the one or more indices and communicate with the base station based on the sequence.
1. A method of wireless communication by a user equipment (UE), comprising: receiving an indication of assigned resources for communicating with a base station; determining a numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the assigned resources; determining one or more indices for the assigned resources based on the numerology; generating a sequence based on the one or more indices; and communicating with the base station based on the sequence. 2. The method of claim 1, wherein the indication comprises a downlink assignment and wherein communicating with the base station comprises receiving a downlink transmission based on the downlink assignment and performing at least one of channel estimation based on the sequence or decoding scrambled data received in the downlink transmission based on the sequence. 3. The method of claim 1, wherein the indication comprises an uplink grant and wherein communicating with the base station comprises at least one of transmitting a reference signal in an uplink transmission or scrambling data for the uplink transmission based on the sequence, the uplink transmission being based on the uplink grant. 4. The method of claim 1, further comprising receiving information indicating the numerology from the base station, wherein the information is received in a master information block (MIB), a system information block (SIB), or in radio resource control (RRC) signaling. 5. The method of claim 1, wherein determining the numerology comprises determining a first numerology associated with first assigned resources and determining a second numerology associated with second assigned resources, and wherein the first and second numerologies are different. 6. The method of claim 1, wherein determining the numerology comprises determining a plurality of reference numerologies for the assigned resources, and wherein determining the one or more indices comprises comparing portions of the assigned resources to corresponding reference numerologies in the plurality of numerologies. 7. The method of claim 1, wherein determining the one or more indices for the assigned resources comprises one or more of: determining a resource block (RB) index by matching a first RB location of a first RB associated with the assigned resources with a second RB location of a corresponding reference numerology, wherein the RB index is based on the second RB location within the corresponding reference numerology; determining a symbol index by matching a first symbol location of a first symbol associated with the assigned resources with a second symbol location of a corresponding reference numerology, wherein the symbol index is based on the second symbol location within the corresponding reference numerology; or determining a frequency subcarrier index by matching a first frequency subcarrier location associated with the assigned resources with a second frequency subcarrier location in a corresponding reference numerology, wherein the frequency subcarrier index is based on the second frequency subcarrier location within the corresponding reference numerology. 8. The method of claim 1, wherein determining the one or more indices for the assigned resources comprises comparing the assigned resources with an indexed time-frequency grid having a reference numerology and choosing a closest match. 9. The method of claim 1, wherein the determining the numerology comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of uplink (UL) resources or downlink (DL) resources in the assigned resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations. 10. A user equipment (UE) for wireless communication, comprising: a memory; and at least one processor coupled to the memory and configured to cause the UE to: receive an indication of assigned resources for communicating with a base station; determine a numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the assigned resources; determine one or more indices for the assigned resources based on the numerology; generate a sequence based on the one or more indices; and communicate with the base station based on the sequence. 11. The UE of claim 10, wherein the indication comprises a downlink assignment and wherein communicating with the base station comprises receiving a downlink transmission based on the downlink assignment and performing at least one of channel estimation based on the sequence or decoding scrambled data received in the downlink transmission based on the sequence. 12. The UE of claim 10, wherein the indication comprises an uplink grant and wherein communicating with the base station comprises at least one of transmitting a reference signal in an uplink transmission or scrambling data for the uplink transmission based on the sequence, the uplink transmission being based on the uplink grant. 13. The UE of claim 10, wherein the at least one processor is further configured to cause the UE to receive information indicating the numerology from the base station, wherein the information is received in a master information block (MIB), a system information block (SIB), or in radio resource control (RRC) signaling. 14. The UE of claim 10, wherein determining the numerology comprises determining a first numerology associated with first assigned resources and determining a second numerology associated with second assigned resources, and wherein the first and second numerologies are different. 15. The UE of claim 10, wherein determining the numerology comprises determining plurality of reference numerologies for the assigned resources, and wherein determining the one or more indices comprises comparing portions of the assigned resources to corresponding reference numerologies in the plurality of numerologies. 16. The UE of claim 10, wherein the determining the one or more indices for the assigned resources comprises one or more of: determining a resource block (RB) index by matching a first RB location of a first RB associated with the assigned resources with a second RB location of a corresponding reference numerology, wherein the RB index is based on the second RB location within the corresponding reference numerology; determining a symbol index by matching a first symbol location of a first symbol associated with the assigned resources with a second symbol location in a corresponding reference numerology, wherein the symbol index is based on the second symbol location within the corresponding reference numerology; or determining a frequency subcarrier index by matching a first frequency subcarrier location associated with the assigned resources with a second frequency subcarrier location in a corresponding reference numerology, wherein the frequency subcarrier index is based on the second frequency subcarrier location within the corresponding reference numerology. 17. The UE of claim 10, wherein determining the one or more indices for the assigned resources comprises comparing the assigned resources with an indexed time-frequency grid having a reference numerology and choosing a closest match. 18. The UE of claim 10, wherein the determining the numerology comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of a uplink (UL) resources or downlink (DL) resource in the assigned resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations. 19. A user equipment (UE), comprising: means for receiving an indication of assigned resources for communicating with a base station; means for determining a numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the assigned resources; means for determining one or more indices for the assigned resources based on the numerology; means for generating a sequence based on the one or more indices; and means for communicating with the base station based on the sequence. 20. The UE of claim 19, wherein the indication comprises a downlink assignment and wherein communicating with the base station comprises receiving a downlink transmission based on the downlink assignment and performing at least one of channel estimation based on the sequence or decoding scrambled data received in the downlink transmission based on the sequence. 21. The UE of claim 19, wherein the indication comprises an uplink grant and wherein communicating with the base station comprises at least one of transmitting a reference signal in an uplink transmission or scrambling data for the uplink transmission based on the sequence, the uplink transmission being based on the uplink grant. 22. The UE of claim 19, further comprising means for receiving information indicating the numerology from the base station, wherein the information is received in a master information block (MIB), a system information block (SIB), or in radio resource control (RRC) signaling. 23. The UE of claim 19, wherein determining the numerology comprises determining a first numerology associated with first assigned resources and determining a second numerology associated with second assigned resources, and wherein the first and second numerologies are different. 24. The UE of claim 19, wherein determining the numerology comprises determining plurality of reference numerologies for the assigned resources, and wherein determining the one or more indices comprises comparing portions of the assigned resources to corresponding reference numerologies in the plurality of numerologies. 25. The UE of claim 19, wherein the means for determining the one or more indices for the assigned resources is configured to: determine an RB index by matching a first RB location of a first RB associated with the assigned resources with a second RB location of a corresponding reference numerology, wherein the RB index is based on the second RB location within the corresponding reference numerology; determine a symbol index by matching a first symbol location of a first symbol associated with the assigned resources with a second symbol location in a corresponding reference numerology, wherein the symbol index is based on the second symbol location within the corresponding reference numerology; or determine a frequency subcarrier index by matching a first frequency subcarrier location associated with the assigned resources with a second frequency subcarrier location in a corresponding reference numerology, wherein the frequency subcarrier index is based on the second frequency subcarrier location within the corresponding reference numerology. 26. The UE of claim 19, wherein determining the one or more indices for the assigned resources comprises comparing the assigned resources with an indexed time-frequency grid having a reference numerology and choosing a closest match. 27. The UE of claim 19, wherein the determining the numerology comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of a uplink (UL) resources or downlink (DL) resources in the assigned resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations. 28. A base station for wireless communication, comprising: a memory; and at least one processor coupled to the memory and configured to cause the base station to: determine a numerology associated with a resource, assign the resource for use by a user equipment, signal the numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the resource, wherein the numerology is signaled in at least one of a master information block (MIB), a system information block (SIB), or radio resource control (RRC) signaling, and communicate with the user equipment over the assigned resource based on the numerology. 29. The base station of claim 28, wherein the at least one processor is configured to determine a first numerology for a first portion of the resource and a second numerology for a second portion of the resource and wherein signaling the numerology comprises signaling the first numerology and signaling the second numerology. 30. The base station of claim 28, wherein the determining the numerology associated with the resource comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of uplink (UL) resources or downlink (DL) resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations.
Networks that support 5G communication may support different numerologies across and even within a symbol, slot, or subframe. Sequences, such as reference signals or data scrambled with a scrambling code, may be transmitted on resources with such mixed numerologies. In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a user equipment. The UE may be configured to receive an indication of assigned resources for communicating with a base station. The UE may also be configured to determine a numerology associated with the assigned resources, and to determine one or more indices based on the numerology. The UE may also generate a sequence based on the one or more indices and communicate with the base station based on the sequence.1. A method of wireless communication by a user equipment (UE), comprising: receiving an indication of assigned resources for communicating with a base station; determining a numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the assigned resources; determining one or more indices for the assigned resources based on the numerology; generating a sequence based on the one or more indices; and communicating with the base station based on the sequence. 2. The method of claim 1, wherein the indication comprises a downlink assignment and wherein communicating with the base station comprises receiving a downlink transmission based on the downlink assignment and performing at least one of channel estimation based on the sequence or decoding scrambled data received in the downlink transmission based on the sequence. 3. The method of claim 1, wherein the indication comprises an uplink grant and wherein communicating with the base station comprises at least one of transmitting a reference signal in an uplink transmission or scrambling data for the uplink transmission based on the sequence, the uplink transmission being based on the uplink grant. 4. The method of claim 1, further comprising receiving information indicating the numerology from the base station, wherein the information is received in a master information block (MIB), a system information block (SIB), or in radio resource control (RRC) signaling. 5. The method of claim 1, wherein determining the numerology comprises determining a first numerology associated with first assigned resources and determining a second numerology associated with second assigned resources, and wherein the first and second numerologies are different. 6. The method of claim 1, wherein determining the numerology comprises determining a plurality of reference numerologies for the assigned resources, and wherein determining the one or more indices comprises comparing portions of the assigned resources to corresponding reference numerologies in the plurality of numerologies. 7. The method of claim 1, wherein determining the one or more indices for the assigned resources comprises one or more of: determining a resource block (RB) index by matching a first RB location of a first RB associated with the assigned resources with a second RB location of a corresponding reference numerology, wherein the RB index is based on the second RB location within the corresponding reference numerology; determining a symbol index by matching a first symbol location of a first symbol associated with the assigned resources with a second symbol location of a corresponding reference numerology, wherein the symbol index is based on the second symbol location within the corresponding reference numerology; or determining a frequency subcarrier index by matching a first frequency subcarrier location associated with the assigned resources with a second frequency subcarrier location in a corresponding reference numerology, wherein the frequency subcarrier index is based on the second frequency subcarrier location within the corresponding reference numerology. 8. The method of claim 1, wherein determining the one or more indices for the assigned resources comprises comparing the assigned resources with an indexed time-frequency grid having a reference numerology and choosing a closest match. 9. The method of claim 1, wherein the determining the numerology comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of uplink (UL) resources or downlink (DL) resources in the assigned resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations. 10. A user equipment (UE) for wireless communication, comprising: a memory; and at least one processor coupled to the memory and configured to cause the UE to: receive an indication of assigned resources for communicating with a base station; determine a numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the assigned resources; determine one or more indices for the assigned resources based on the numerology; generate a sequence based on the one or more indices; and communicate with the base station based on the sequence. 11. The UE of claim 10, wherein the indication comprises a downlink assignment and wherein communicating with the base station comprises receiving a downlink transmission based on the downlink assignment and performing at least one of channel estimation based on the sequence or decoding scrambled data received in the downlink transmission based on the sequence. 12. The UE of claim 10, wherein the indication comprises an uplink grant and wherein communicating with the base station comprises at least one of transmitting a reference signal in an uplink transmission or scrambling data for the uplink transmission based on the sequence, the uplink transmission being based on the uplink grant. 13. The UE of claim 10, wherein the at least one processor is further configured to cause the UE to receive information indicating the numerology from the base station, wherein the information is received in a master information block (MIB), a system information block (SIB), or in radio resource control (RRC) signaling. 14. The UE of claim 10, wherein determining the numerology comprises determining a first numerology associated with first assigned resources and determining a second numerology associated with second assigned resources, and wherein the first and second numerologies are different. 15. The UE of claim 10, wherein determining the numerology comprises determining plurality of reference numerologies for the assigned resources, and wherein determining the one or more indices comprises comparing portions of the assigned resources to corresponding reference numerologies in the plurality of numerologies. 16. The UE of claim 10, wherein the determining the one or more indices for the assigned resources comprises one or more of: determining a resource block (RB) index by matching a first RB location of a first RB associated with the assigned resources with a second RB location of a corresponding reference numerology, wherein the RB index is based on the second RB location within the corresponding reference numerology; determining a symbol index by matching a first symbol location of a first symbol associated with the assigned resources with a second symbol location in a corresponding reference numerology, wherein the symbol index is based on the second symbol location within the corresponding reference numerology; or determining a frequency subcarrier index by matching a first frequency subcarrier location associated with the assigned resources with a second frequency subcarrier location in a corresponding reference numerology, wherein the frequency subcarrier index is based on the second frequency subcarrier location within the corresponding reference numerology. 17. The UE of claim 10, wherein determining the one or more indices for the assigned resources comprises comparing the assigned resources with an indexed time-frequency grid having a reference numerology and choosing a closest match. 18. The UE of claim 10, wherein the determining the numerology comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of a uplink (UL) resources or downlink (DL) resource in the assigned resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations. 19. A user equipment (UE), comprising: means for receiving an indication of assigned resources for communicating with a base station; means for determining a numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the assigned resources; means for determining one or more indices for the assigned resources based on the numerology; means for generating a sequence based on the one or more indices; and means for communicating with the base station based on the sequence. 20. The UE of claim 19, wherein the indication comprises a downlink assignment and wherein communicating with the base station comprises receiving a downlink transmission based on the downlink assignment and performing at least one of channel estimation based on the sequence or decoding scrambled data received in the downlink transmission based on the sequence. 21. The UE of claim 19, wherein the indication comprises an uplink grant and wherein communicating with the base station comprises at least one of transmitting a reference signal in an uplink transmission or scrambling data for the uplink transmission based on the sequence, the uplink transmission being based on the uplink grant. 22. The UE of claim 19, further comprising means for receiving information indicating the numerology from the base station, wherein the information is received in a master information block (MIB), a system information block (SIB), or in radio resource control (RRC) signaling. 23. The UE of claim 19, wherein determining the numerology comprises determining a first numerology associated with first assigned resources and determining a second numerology associated with second assigned resources, and wherein the first and second numerologies are different. 24. The UE of claim 19, wherein determining the numerology comprises determining plurality of reference numerologies for the assigned resources, and wherein determining the one or more indices comprises comparing portions of the assigned resources to corresponding reference numerologies in the plurality of numerologies. 25. The UE of claim 19, wherein the means for determining the one or more indices for the assigned resources is configured to: determine an RB index by matching a first RB location of a first RB associated with the assigned resources with a second RB location of a corresponding reference numerology, wherein the RB index is based on the second RB location within the corresponding reference numerology; determine a symbol index by matching a first symbol location of a first symbol associated with the assigned resources with a second symbol location in a corresponding reference numerology, wherein the symbol index is based on the second symbol location within the corresponding reference numerology; or determine a frequency subcarrier index by matching a first frequency subcarrier location associated with the assigned resources with a second frequency subcarrier location in a corresponding reference numerology, wherein the frequency subcarrier index is based on the second frequency subcarrier location within the corresponding reference numerology. 26. The UE of claim 19, wherein determining the one or more indices for the assigned resources comprises comparing the assigned resources with an indexed time-frequency grid having a reference numerology and choosing a closest match. 27. The UE of claim 19, wherein the determining the numerology comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of a uplink (UL) resources or downlink (DL) resources in the assigned resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations. 28. A base station for wireless communication, comprising: a memory; and at least one processor coupled to the memory and configured to cause the base station to: determine a numerology associated with a resource, assign the resource for use by a user equipment, signal the numerology comprising at least one of a subcarrier spacing or a symbol duration associated with the resource, wherein the numerology is signaled in at least one of a master information block (MIB), a system information block (SIB), or radio resource control (RRC) signaling, and communicate with the user equipment over the assigned resource based on the numerology. 29. The base station of claim 28, wherein the at least one processor is configured to determine a first numerology for a first portion of the resource and a second numerology for a second portion of the resource and wherein signaling the numerology comprises signaling the first numerology and signaling the second numerology. 30. The base station of claim 28, wherein the determining the numerology associated with the resource comprises determining a subcarrier spacing and symbol duration associated with one of a plurality of uplink (UL) resources or downlink (DL) resources, wherein the one of the plurality of UL resources or DL resources comprises at least two different subcarrier spacings or symbol durations.
2,400
8,539
8,539
16,259,771
2,482
The present disclosure generally relates to creating and editing user avatars. In some examples, guidance is provided to a user while capturing image data for use in generating a user-specific avatar. In some examples, a user interface allows a user to intuitively customize a user avatar. In some examples, avatars are generated for a messaging session based on an avatar model for a user of the messaging application. In some examples, an avatar editing interface updates a user avatar in response to gestures and based on the type of gesture and the avatar feature that is selected for editing.
1. An electronic device, comprising: one or more cameras; a display; one or more processors; and memory storing one or more programs configured to be executed by the one or more processors, the one or more programs including instructions for: displaying a first user interface that includes instructions for capturing image data of a face of a user of the electronic device, wherein the first user interface includes a representation of a face in a respective region of the display; while displaying the first user interface, detecting the occurrence of a condition that corresponds to initiation of capturing image data of a user of the electronic device; in response to detecting the occurrence of the condition that corresponds to initiation of capturing image data of a user of the electronic device, displaying on the display a second user interface that includes: a representation of a face of the user that is based on image data of the face of the user captured by the one or more cameras of the electronic device, wherein the representation of the face of the user is displayed within the respective region of the display; and a progress indicator surrounding the representation of the face of the user; and while displaying the representation of the face of the user and the progress indicator, detecting movement of the face of the user and updating the representation of the face of the user based on the image data of the face of the user captured by the one or more cameras of the electronic device and indicating the amount of image data capture with the progress indicator. 2. The electronic device of claim 1, wherein detecting the occurrence of the condition that corresponds to initiation of capturing image data of the user occurs during a setup process for the electronic device. 3. The electronic device of claim 1, the one or more programs further including instructions for: prior to detecting the occurrence of the condition that corresponds to initiation of capturing image data of the face of the user, detecting successful authentication of the user, wherein the successful authentication of the user enables the electronic device to detect the occurrence of the condition that corresponds to initiation of capturing image data of the face of the user. 4. The electronic device of claim 1, the one or more programs further including instructions for: after detecting the occurrence of the condition that corresponds to initiating the capturing of the image data of the user, updating the second user interface to display a user interface for aligning the face of the user. 5. The electronic device of claim 4, wherein the user interface for aligning the face of the user includes instructions for centering the face of the user within the respective region of the display. 6. The electronic device of claim 4, wherein the user interface for aligning the face of the user includes instructions for adjusting a distance of the face of the user with respect to the one or more cameras of the electronic device. 7. The electronic device of claim 1, the one or more programs further including instructions for: capturing image data of the face of the user; and in accordance with a determination that the image data of the face of the user fails to meet a lighting criteria, displaying instructions for the user to change lighting for the field of view of the one or more cameras. 8. The electronic device of claim 1, wherein the condition that corresponds to initiation of capturing image data of the user of the electronic device includes a tap input on the display of the electronic device. 9. The electronic device of claim 1, wherein capturing image data of the user includes capturing depth data. 10. The electronic device of claim 1, wherein capturing image data of the user includes capturing visual data. 11. A non-transitory computer-readable storage medium storing one or more programs configured to be executed by one or more processors of an electronic device with a display and one or more cameras, the one or more programs including instructions for: displaying a first user interface that includes instructions for capturing image data of a face of a user of the electronic device, wherein the first user interface includes a representation of a face in a respective region of the display; while displaying the first user interface, detecting the occurrence of a condition that corresponds to initiation of capturing image data of a user of the electronic device; in response to detecting the occurrence of the condition that corresponds to initiation of capturing image data of a user of the electronic device, displaying on the display a second user interface that includes: a representation of a face of the user that is based on image data of the face of the user captured by the one or more cameras of the electronic device, wherein the representation of the face of the user is displayed within the respective region of the display; and a progress indicator surrounding the representation of the face of the user; and while displaying the representation of the face of the user and the progress indicator, detecting movement of the face of the user and updating the representation of the face of the user based on the image data of the face of the user captured by the one or more cameras of the electronic device and indicating the amount of image data capture with the progress indicator. 12. A method, comprising: at an electronic device with one or more cameras and a display: displaying a first user interface that includes instructions for capturing image data of a face of a user of the electronic device, wherein the first user interface includes a representation of a face in a respective region of the display; while displaying the first user interface, detecting the occurrence of a condition that corresponds to initiation of capturing image data of a user of the electronic device; in response to detecting the occurrence of the condition that corresponds to initiation of capturing image data of a user of the electronic device, displaying on the display a second user interface that includes: a representation of a face of the user that is based on image data of the face of the user captured by the one or more cameras of the electronic device, wherein the representation of the face of the user is displayed within the respective region of the display; and a progress indicator surrounding the representation of the face of the user; and while displaying the representation of the face of the user and the progress indicator, detecting movement of the face of the user and updating the representation of the face of the user based on the image data of the face of the user captured by the one or more cameras of the electronic device and indicating the amount of image data capture with the progress indicator.
The present disclosure generally relates to creating and editing user avatars. In some examples, guidance is provided to a user while capturing image data for use in generating a user-specific avatar. In some examples, a user interface allows a user to intuitively customize a user avatar. In some examples, avatars are generated for a messaging session based on an avatar model for a user of the messaging application. In some examples, an avatar editing interface updates a user avatar in response to gestures and based on the type of gesture and the avatar feature that is selected for editing.1. An electronic device, comprising: one or more cameras; a display; one or more processors; and memory storing one or more programs configured to be executed by the one or more processors, the one or more programs including instructions for: displaying a first user interface that includes instructions for capturing image data of a face of a user of the electronic device, wherein the first user interface includes a representation of a face in a respective region of the display; while displaying the first user interface, detecting the occurrence of a condition that corresponds to initiation of capturing image data of a user of the electronic device; in response to detecting the occurrence of the condition that corresponds to initiation of capturing image data of a user of the electronic device, displaying on the display a second user interface that includes: a representation of a face of the user that is based on image data of the face of the user captured by the one or more cameras of the electronic device, wherein the representation of the face of the user is displayed within the respective region of the display; and a progress indicator surrounding the representation of the face of the user; and while displaying the representation of the face of the user and the progress indicator, detecting movement of the face of the user and updating the representation of the face of the user based on the image data of the face of the user captured by the one or more cameras of the electronic device and indicating the amount of image data capture with the progress indicator. 2. The electronic device of claim 1, wherein detecting the occurrence of the condition that corresponds to initiation of capturing image data of the user occurs during a setup process for the electronic device. 3. The electronic device of claim 1, the one or more programs further including instructions for: prior to detecting the occurrence of the condition that corresponds to initiation of capturing image data of the face of the user, detecting successful authentication of the user, wherein the successful authentication of the user enables the electronic device to detect the occurrence of the condition that corresponds to initiation of capturing image data of the face of the user. 4. The electronic device of claim 1, the one or more programs further including instructions for: after detecting the occurrence of the condition that corresponds to initiating the capturing of the image data of the user, updating the second user interface to display a user interface for aligning the face of the user. 5. The electronic device of claim 4, wherein the user interface for aligning the face of the user includes instructions for centering the face of the user within the respective region of the display. 6. The electronic device of claim 4, wherein the user interface for aligning the face of the user includes instructions for adjusting a distance of the face of the user with respect to the one or more cameras of the electronic device. 7. The electronic device of claim 1, the one or more programs further including instructions for: capturing image data of the face of the user; and in accordance with a determination that the image data of the face of the user fails to meet a lighting criteria, displaying instructions for the user to change lighting for the field of view of the one or more cameras. 8. The electronic device of claim 1, wherein the condition that corresponds to initiation of capturing image data of the user of the electronic device includes a tap input on the display of the electronic device. 9. The electronic device of claim 1, wherein capturing image data of the user includes capturing depth data. 10. The electronic device of claim 1, wherein capturing image data of the user includes capturing visual data. 11. A non-transitory computer-readable storage medium storing one or more programs configured to be executed by one or more processors of an electronic device with a display and one or more cameras, the one or more programs including instructions for: displaying a first user interface that includes instructions for capturing image data of a face of a user of the electronic device, wherein the first user interface includes a representation of a face in a respective region of the display; while displaying the first user interface, detecting the occurrence of a condition that corresponds to initiation of capturing image data of a user of the electronic device; in response to detecting the occurrence of the condition that corresponds to initiation of capturing image data of a user of the electronic device, displaying on the display a second user interface that includes: a representation of a face of the user that is based on image data of the face of the user captured by the one or more cameras of the electronic device, wherein the representation of the face of the user is displayed within the respective region of the display; and a progress indicator surrounding the representation of the face of the user; and while displaying the representation of the face of the user and the progress indicator, detecting movement of the face of the user and updating the representation of the face of the user based on the image data of the face of the user captured by the one or more cameras of the electronic device and indicating the amount of image data capture with the progress indicator. 12. A method, comprising: at an electronic device with one or more cameras and a display: displaying a first user interface that includes instructions for capturing image data of a face of a user of the electronic device, wherein the first user interface includes a representation of a face in a respective region of the display; while displaying the first user interface, detecting the occurrence of a condition that corresponds to initiation of capturing image data of a user of the electronic device; in response to detecting the occurrence of the condition that corresponds to initiation of capturing image data of a user of the electronic device, displaying on the display a second user interface that includes: a representation of a face of the user that is based on image data of the face of the user captured by the one or more cameras of the electronic device, wherein the representation of the face of the user is displayed within the respective region of the display; and a progress indicator surrounding the representation of the face of the user; and while displaying the representation of the face of the user and the progress indicator, detecting movement of the face of the user and updating the representation of the face of the user based on the image data of the face of the user captured by the one or more cameras of the electronic device and indicating the amount of image data capture with the progress indicator.
2,400
8,540
8,540
14,423,360
2,415
A brokering service apparatus ( 400 ) and method therein ( 150 ) for assisting a first node ( 111 ) to roam in multiple mesh networks ( 100 ) are disclosed. The multiple mesh networks ( 100 ) comprises a first network ( 110 ) comprising a first node ( 111 ) and a gateway node ( 113 ) and a second network ( 120 ) comprising a gateway node ( 123 ). The multiple mesh networks ( 100 ) further comprises a mesh node ( 140, 141 ) which may belong to either the first network ( 110 ), the second network ( 120 ) or a third network ( 130 ). The brokering service apparatus receives a connection request associated with the first node 111 and the first network ( 110 ), the connection request is sent by the first node ( 111 ) via the mesh node ( 140 ). The brokering service identifies the first network ( 110 ) and data requirements for the first node ( 111 ) and negotiates a roaming contract between a first NMS ( 160 ) associated with the first network ( 110 ) and at least a second NMS ( 170 ) associated with the second network ( 120 ). When the roaming contract is established, the brokering service transmits a roaming accept message to at least the second NMS ( 170 ) of the second network ( 120 ).
1-20. (canceled) 21. A method for assisting a first node to roam in multiple mesh networks, wherein the multiple mesh networks comprise a first network comprising a first node and a gateway node and a second network comprising a gateway node, the multiple mesh networks further comprising a mesh node, wherein the mesh node belongs to either the first network, the second network or a third network, the method comprising: receiving a connection request associated with the first node and the first network, wherein the connection request is sent by the first node via the mesh node; identifying the first network and data requirements for the first node; negotiating a roaming contract between a first Network Management Service (NMS) associated with the first network and at least a second NMS associated with the second network; and upon establishment of the roaming contract, transmitting a roaming accept message to at least the second NMS of the second network. 22. The method of claim 21 wherein the mesh node belongs to the third network, and wherein negotiating a roaming contract comprises negotiating a roaming contract between the first NMS and a third NMS associated with the third network, and, upon establishment of the roaming contract between the first NMS and the third NMS, transmitting a roaming accept message to the third NMS of the third network. 23. The method of claim 21, wherein negotiating a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises evaluating and comparing roaming costs for the second network. 24. The method of claim 21, wherein negotiating a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises evaluating and comparing Radio Access Technologies (RATs) employed in radio communications links between network nodes and respective traffic loads for the second network. 25. The method of claim 21, wherein negotiating a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises evaluating and comparing metrics for the first network and/or the second network. 26. The method of claim 25, wherein the metrics comprises Air-Time Link Metrics, which are measures of accumulated utilization of transmission medium for the first network and/or the second network. 27. The method of claim 25, wherein the metrics comprises a number of intermediate network nodes needed to be passed for the first node before reaching the gateway node of the first network and/or the gateway node of the second network. 28. The method of claim 25, wherein the metrics comprises loads and frequency bands of the first network and/or the second network. 29. The method of claim 25, wherein evaluating and comparing metrics for the first network and/or the second network is further based on an amount of data to be transmitted from the first node. 30. The method of claim 20, wherein the roaming accept message comprises a public key obtained from the first network for the first node. 31. A brokering service apparatus for assisting a first node to roam in multiple mesh networks, wherein the multiple mesh networks comprises a first network comprising a first node and a gateway node and a second network comprising a gateway node, the multiple mesh networks further comprising a mesh node, wherein the mesh node belongs to either the first network, the second network or a third network, and wherein the brokering service apparatus is configured to: receive a connection request associated with the first node and the first network, wherein the connection request is sent by the first node via the mesh node; identify the first network and data requirements for the first node; negotiate a roaming contract between a first Network Management Service (NMS) associated with the first network and at least a second NMS associated with the second network; and upon establishment of the roaming contract, transmit a roaming accept message to at least the second NMS of the second network. 32. The brokering service apparatus of claim 31, wherein the mesh node belongs to the third network, and wherein the brokering service apparatus is configured to negotiate a roaming contract between the first NMS and a third NMS associated with the third network, and wherein the brokering service apparatus is configured to transmit a roaming accept message to the third NMS of the third network upon establishment of the roaming contract between the first NMS and the third NMS. 33. The brokering service apparatus of claim 31, wherein to negotiate a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises: to evaluate and compare roaming costs for the second network. 34. The brokering service apparatus of claim 31, wherein to negotiate a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises: to evaluate and compare Radio Access Technologies (RATs) employed in radio communications links between network nodes and respective traffic loads for the second network. 35. The brokering service apparatus of claim 31, wherein to negotiate a roaming contract between the first NMS the first network and at least the second NMS of the second network comprises: to evaluate and compare metrics for the first network and/or the second network. 36. The brokering service apparatus of claim 35, wherein the metrics comprises Air-Time Link Metrics, which are measures of accumulated utilization of transmission medium for the first network and/or the second network. 37. The brokering service apparatus of claim 35, wherein the metrics comprises a number of intermediate network nodes needed to be passed for the first node before reaching the gateway node of the first network and/or the gateway node of the second network. 38. The brokering service apparatus of claim 35, wherein the metrics comprises loads and frequency bands of the first network and/or the second network. 39. The brokering service apparatus of claim 35, wherein to evaluate and compare metrics for the first network and/or the second network is further based on amount of data to be transmitted from the first node. 40. The brokering service node of claim 31, wherein the roaming accept message comprises a public key obtained from the first network for the first node.
A brokering service apparatus ( 400 ) and method therein ( 150 ) for assisting a first node ( 111 ) to roam in multiple mesh networks ( 100 ) are disclosed. The multiple mesh networks ( 100 ) comprises a first network ( 110 ) comprising a first node ( 111 ) and a gateway node ( 113 ) and a second network ( 120 ) comprising a gateway node ( 123 ). The multiple mesh networks ( 100 ) further comprises a mesh node ( 140, 141 ) which may belong to either the first network ( 110 ), the second network ( 120 ) or a third network ( 130 ). The brokering service apparatus receives a connection request associated with the first node 111 and the first network ( 110 ), the connection request is sent by the first node ( 111 ) via the mesh node ( 140 ). The brokering service identifies the first network ( 110 ) and data requirements for the first node ( 111 ) and negotiates a roaming contract between a first NMS ( 160 ) associated with the first network ( 110 ) and at least a second NMS ( 170 ) associated with the second network ( 120 ). When the roaming contract is established, the brokering service transmits a roaming accept message to at least the second NMS ( 170 ) of the second network ( 120 ).1-20. (canceled) 21. A method for assisting a first node to roam in multiple mesh networks, wherein the multiple mesh networks comprise a first network comprising a first node and a gateway node and a second network comprising a gateway node, the multiple mesh networks further comprising a mesh node, wherein the mesh node belongs to either the first network, the second network or a third network, the method comprising: receiving a connection request associated with the first node and the first network, wherein the connection request is sent by the first node via the mesh node; identifying the first network and data requirements for the first node; negotiating a roaming contract between a first Network Management Service (NMS) associated with the first network and at least a second NMS associated with the second network; and upon establishment of the roaming contract, transmitting a roaming accept message to at least the second NMS of the second network. 22. The method of claim 21 wherein the mesh node belongs to the third network, and wherein negotiating a roaming contract comprises negotiating a roaming contract between the first NMS and a third NMS associated with the third network, and, upon establishment of the roaming contract between the first NMS and the third NMS, transmitting a roaming accept message to the third NMS of the third network. 23. The method of claim 21, wherein negotiating a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises evaluating and comparing roaming costs for the second network. 24. The method of claim 21, wherein negotiating a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises evaluating and comparing Radio Access Technologies (RATs) employed in radio communications links between network nodes and respective traffic loads for the second network. 25. The method of claim 21, wherein negotiating a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises evaluating and comparing metrics for the first network and/or the second network. 26. The method of claim 25, wherein the metrics comprises Air-Time Link Metrics, which are measures of accumulated utilization of transmission medium for the first network and/or the second network. 27. The method of claim 25, wherein the metrics comprises a number of intermediate network nodes needed to be passed for the first node before reaching the gateway node of the first network and/or the gateway node of the second network. 28. The method of claim 25, wherein the metrics comprises loads and frequency bands of the first network and/or the second network. 29. The method of claim 25, wherein evaluating and comparing metrics for the first network and/or the second network is further based on an amount of data to be transmitted from the first node. 30. The method of claim 20, wherein the roaming accept message comprises a public key obtained from the first network for the first node. 31. A brokering service apparatus for assisting a first node to roam in multiple mesh networks, wherein the multiple mesh networks comprises a first network comprising a first node and a gateway node and a second network comprising a gateway node, the multiple mesh networks further comprising a mesh node, wherein the mesh node belongs to either the first network, the second network or a third network, and wherein the brokering service apparatus is configured to: receive a connection request associated with the first node and the first network, wherein the connection request is sent by the first node via the mesh node; identify the first network and data requirements for the first node; negotiate a roaming contract between a first Network Management Service (NMS) associated with the first network and at least a second NMS associated with the second network; and upon establishment of the roaming contract, transmit a roaming accept message to at least the second NMS of the second network. 32. The brokering service apparatus of claim 31, wherein the mesh node belongs to the third network, and wherein the brokering service apparatus is configured to negotiate a roaming contract between the first NMS and a third NMS associated with the third network, and wherein the brokering service apparatus is configured to transmit a roaming accept message to the third NMS of the third network upon establishment of the roaming contract between the first NMS and the third NMS. 33. The brokering service apparatus of claim 31, wherein to negotiate a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises: to evaluate and compare roaming costs for the second network. 34. The brokering service apparatus of claim 31, wherein to negotiate a roaming contract between the first NMS of the first network and at least the second NMS of the second network comprises: to evaluate and compare Radio Access Technologies (RATs) employed in radio communications links between network nodes and respective traffic loads for the second network. 35. The brokering service apparatus of claim 31, wherein to negotiate a roaming contract between the first NMS the first network and at least the second NMS of the second network comprises: to evaluate and compare metrics for the first network and/or the second network. 36. The brokering service apparatus of claim 35, wherein the metrics comprises Air-Time Link Metrics, which are measures of accumulated utilization of transmission medium for the first network and/or the second network. 37. The brokering service apparatus of claim 35, wherein the metrics comprises a number of intermediate network nodes needed to be passed for the first node before reaching the gateway node of the first network and/or the gateway node of the second network. 38. The brokering service apparatus of claim 35, wherein the metrics comprises loads and frequency bands of the first network and/or the second network. 39. The brokering service apparatus of claim 35, wherein to evaluate and compare metrics for the first network and/or the second network is further based on amount of data to be transmitted from the first node. 40. The brokering service node of claim 31, wherein the roaming accept message comprises a public key obtained from the first network for the first node.
2,400
8,541
8,541
14,266,250
2,459
Method and apparatus for minimizing on-die memory in pull-mode switches. A disaggregated edge switch (DSW) includes a local communication interface including a plurality of outer ports configured to be coupled to a plurality of local hosts or servers via respective outer links, and a network interface configured to couple to at least one remote apparatus via a respective inner port and link. Data is transferred between the local hosts/servers using pull-mode transfers under which a receiver port “pulls” data from a local source port. The use of pull-mode data transfers between the local host/servers is managed by a scheduler so as to minimize the amount of buffers space for these local data transfers. Techniques are also disclosed for extending pull-mode data transfers using the Ethernet protocol over Ethernet links.
1. A method for transferring data between a plurality of servers and a disaggregated edge switch, comprising: communicatively coupling the plurality of servers to the disaggregated edge switch via respective local communication links between an outer port on the disaggregated switch and a communication port on each server, each outer port and each server communication port comprising a local port; and transferring data between the disaggregated edge switch and the plurality of servers using pull-mode data transfers under which data is pulled from a source local port by a destination local port and transferred over the local communication link between the source local port and the destination local port. 2. The method of claim 1, wherein at least a portion of the local communication links comprise Peripheral Component Interconnect Express (PCIe) links, and data is transferred between a server and the disaggregated switch using a PCIe pull model. 3. The method of claim 1, wherein at least a portion of the local communication links comprise Ethernet links, and data is transferred between a server and the disaggregated switch using a pull-model implemented over Ethernet. 4. The method of claim 1, further comprising implementing a transmit queuing model under which transmit queues for local traffic between the plurality of servers within the server chassis are segregated in a server on a per local destination port basis. 5. The method of claim 4, wherein the per local destination port transmit queue segregation comprises a first level of transmit queue segregation, further comprising implementing at least one additional level of transmit queue segregation for at least one local destination port in parallel with the per local destination port transmit queue segregation. 6. The method of claim 4, further comprising scheduling a pull-mode transfer of data from a server to the disaggregated edge switch only if the local destination port associated with the server is currently free or is assumed to be free once the data will reach the local destination port. 7. The method of claim 1, further comprising providing information to each server for which pull-mode data transfers are to be employed that the server is connected to a disaggregated edge switch that supports pull-mode data transfers. 8. The method of claim 1, wherein data to be transferred via an inner link to a remote server chassis or to a switch to which the disaggregated edge switch is coupled is transferred from a server using a push-mode data transfer between the server and disaggregated edge switch via the local communication link associated with the server. 9. The method of claim 1, further comprising implementing a pull-mode data transfer between the disaggregated edge switch and one of a switch or second disaggregated edge switch in a remote server chassis coupled to the disaggregated edge switch via an inner link. 10. The method of claim 9, wherein the pull-mode data transfer is implemented over an Ethernet link comprising the inner link through use of an extension to the Ethernet protocol. 11. The method of claim 1, further comprising scheduling incoming traffic received via an inner link from a source that is external to the server chassis to have precedence over local traffic between servers within the server chassis. 12. A disaggregated switch apparatus, comprising: a memory; a remote communication interface operatively coupled to the memory and including at least one inner port; a local communication interface operatively coupled to the memory and including a plurality of outer ports, each outer port configured to be communicatively coupled with a respective host via a local communication link; and circuitry and logic to, allocate a plurality of buffers in the memory, the buffers including a transmit buffer and receive buffer for each inner port and for each outer port; implement a pull-mode transfer of data from a buffer in the host to an outer port receive buffer allocated for the outer port to which the data is transferred from the host; and schedule transmission of data buffered in the outer transmit buffers to be transferred outbound from the outer ports. 13. The disaggregated switch apparatus of claim 12, wherein the local communication interface comprises a Peripheral Component Interconnect Express (PCIe) interface, and wherein the pull-mode transfer of data is implemented via a PCIe pull-mode data transfer. 14. The disaggregated switch apparatus of claim 12, wherein the local communication interface comprises an Ethernet interface, and wherein the pull-mode transfer of data is implemented via a pull-mode data transfer over Ethernet. 15. The disaggregated switch apparatus of claim 12, wherein the remote communication interface comprises an Ethernet interface. 16. The disaggregated switch apparatus of claim 15, wherein the Ethernet interface employs a Silicon Photonics (SiPh) physical layer. 17. The disaggregated switch apparatus of claim 12, wherein the circuitry and logic is further to: segregate the transmit buffers into a plurality of transmit queues; and implement a transmit queuing model under which transmit queues for local traffic between the plurality of hosts are segregated per outer port. 18. The disaggregated switch apparatus of claim 17, wherein the per outer port transmit queue segregation comprises a first level of transmit queue segregation, and where the circuitry and logic is further configured to implement at least one additional level of transmit queue segregation for at least one outer port in parallel with the per local destination port transmit queue segregation. 19. The disaggregated switch apparatus of claim 17, wherein the circuitry and logic is further configured to schedule a pull-mode transfer of data from a host to the disaggregated switch apparatus only if the outer port associated with the host is currently free or is assumed to be free once the data will reach the outer port. 20. The disaggregated switch apparatus of claim 12, further comprising logic and circuitry to implement a pull-mode data transfer between the apparatus and one of a remote apparatus when the remote apparatus is communicatively coupled to an inner port of the apparatus via an inner link. 21. The disaggregated switch apparatus of claim 20, wherein the pull mode data transfer is implemented over an Ethernet link comprising the inner link through use of an extension to the Ethernet protocol. 22. The disaggregated switch apparatus of claim 12, wherein the circuitry and logic is further configured to schedule incoming traffic received via an inner link from a remote source to have precedence over local traffic between hosts that is received at the outer ports. 23. An apparatus comprising: a server chassis; a plurality of servers, contained within the server chassis, each server including a communication interface including a local communication port comprising a local endpoint; and a disaggregated edge switch, including a plurality of outer ports and at least one inner port, each outer port communicatively coupled to a local communication port of respective server via a respective local communication link and comprising a local endpoint, each of the outer ports and the at least one inner port operatively coupled to memory on the disaggregated edge switch, the disaggregated edge switch further comprising circuitry and logic to transfer data between the disaggregated edge switch and the plurality of servers using pull-mode data transfers under which data is pulled from a source local endpoint by a local destination endpoint and transferred over the local communication link between the source local endpoint and the destination local endpoint. 24. The apparatus of claim 23, wherein a local communication link comprises a Peripheral Component Interconnect Express (PCIe) link, and wherein a pull-mode transfer of data between source and destination PCIe endpoints coupled via the PCIe link is implemented via a PCIe pull mode data transfer. 25. The apparatus of claim 23, wherein a local communication link comprises an Ethernet link, and wherein a pull-mode transfer of data between source and destination Ethernet endpoints coupled via the Ethernet link is implemented via a pull-mode data transfer over Ethernet. 26. The apparatus of claim 23, wherein the remote communication interface comprises an Ethernet interface that employs a Silicon Photonics (SiPh) physical layer 27. The apparatus of claim 23, wherein the circuitry and logic is further configured to: allocate a plurality of buffers in the memory, the buffers including a transmit buffer and receive buffer for each inner port and for each outer port; segregate the transmit buffers into a plurality of transmit queues; and implement a transmit queuing model under which transmit queues for local traffic between the plurality of servers are segregated per local destination port. 28. The apparatus of claim 27, wherein the per local destination port transmit queue segregation comprises a first level of transmit queue segregation, and where the circuitry and logic is further configured to implement at least one additional level of transmit queue segregation for at least one outer port in parallel with the per local destination port transmit queue segregation. 29. The apparatus of claim 28, wherein the circuitry and logic is further configured to schedule a pull-mode transfer of data from a host to the disaggregated switch apparatus only if the outer port associated with the host is currently free or is assumed to be free once the data will reach the outer port. 30. The apparatus of claim 23, further comprising logic and circuitry to implement a pull-mode data transfer between the apparatus and one of a remote apparatus when the remote apparatus is communicatively coupled to an inner port of the apparatus via an inner link.
Method and apparatus for minimizing on-die memory in pull-mode switches. A disaggregated edge switch (DSW) includes a local communication interface including a plurality of outer ports configured to be coupled to a plurality of local hosts or servers via respective outer links, and a network interface configured to couple to at least one remote apparatus via a respective inner port and link. Data is transferred between the local hosts/servers using pull-mode transfers under which a receiver port “pulls” data from a local source port. The use of pull-mode data transfers between the local host/servers is managed by a scheduler so as to minimize the amount of buffers space for these local data transfers. Techniques are also disclosed for extending pull-mode data transfers using the Ethernet protocol over Ethernet links.1. A method for transferring data between a plurality of servers and a disaggregated edge switch, comprising: communicatively coupling the plurality of servers to the disaggregated edge switch via respective local communication links between an outer port on the disaggregated switch and a communication port on each server, each outer port and each server communication port comprising a local port; and transferring data between the disaggregated edge switch and the plurality of servers using pull-mode data transfers under which data is pulled from a source local port by a destination local port and transferred over the local communication link between the source local port and the destination local port. 2. The method of claim 1, wherein at least a portion of the local communication links comprise Peripheral Component Interconnect Express (PCIe) links, and data is transferred between a server and the disaggregated switch using a PCIe pull model. 3. The method of claim 1, wherein at least a portion of the local communication links comprise Ethernet links, and data is transferred between a server and the disaggregated switch using a pull-model implemented over Ethernet. 4. The method of claim 1, further comprising implementing a transmit queuing model under which transmit queues for local traffic between the plurality of servers within the server chassis are segregated in a server on a per local destination port basis. 5. The method of claim 4, wherein the per local destination port transmit queue segregation comprises a first level of transmit queue segregation, further comprising implementing at least one additional level of transmit queue segregation for at least one local destination port in parallel with the per local destination port transmit queue segregation. 6. The method of claim 4, further comprising scheduling a pull-mode transfer of data from a server to the disaggregated edge switch only if the local destination port associated with the server is currently free or is assumed to be free once the data will reach the local destination port. 7. The method of claim 1, further comprising providing information to each server for which pull-mode data transfers are to be employed that the server is connected to a disaggregated edge switch that supports pull-mode data transfers. 8. The method of claim 1, wherein data to be transferred via an inner link to a remote server chassis or to a switch to which the disaggregated edge switch is coupled is transferred from a server using a push-mode data transfer between the server and disaggregated edge switch via the local communication link associated with the server. 9. The method of claim 1, further comprising implementing a pull-mode data transfer between the disaggregated edge switch and one of a switch or second disaggregated edge switch in a remote server chassis coupled to the disaggregated edge switch via an inner link. 10. The method of claim 9, wherein the pull-mode data transfer is implemented over an Ethernet link comprising the inner link through use of an extension to the Ethernet protocol. 11. The method of claim 1, further comprising scheduling incoming traffic received via an inner link from a source that is external to the server chassis to have precedence over local traffic between servers within the server chassis. 12. A disaggregated switch apparatus, comprising: a memory; a remote communication interface operatively coupled to the memory and including at least one inner port; a local communication interface operatively coupled to the memory and including a plurality of outer ports, each outer port configured to be communicatively coupled with a respective host via a local communication link; and circuitry and logic to, allocate a plurality of buffers in the memory, the buffers including a transmit buffer and receive buffer for each inner port and for each outer port; implement a pull-mode transfer of data from a buffer in the host to an outer port receive buffer allocated for the outer port to which the data is transferred from the host; and schedule transmission of data buffered in the outer transmit buffers to be transferred outbound from the outer ports. 13. The disaggregated switch apparatus of claim 12, wherein the local communication interface comprises a Peripheral Component Interconnect Express (PCIe) interface, and wherein the pull-mode transfer of data is implemented via a PCIe pull-mode data transfer. 14. The disaggregated switch apparatus of claim 12, wherein the local communication interface comprises an Ethernet interface, and wherein the pull-mode transfer of data is implemented via a pull-mode data transfer over Ethernet. 15. The disaggregated switch apparatus of claim 12, wherein the remote communication interface comprises an Ethernet interface. 16. The disaggregated switch apparatus of claim 15, wherein the Ethernet interface employs a Silicon Photonics (SiPh) physical layer. 17. The disaggregated switch apparatus of claim 12, wherein the circuitry and logic is further to: segregate the transmit buffers into a plurality of transmit queues; and implement a transmit queuing model under which transmit queues for local traffic between the plurality of hosts are segregated per outer port. 18. The disaggregated switch apparatus of claim 17, wherein the per outer port transmit queue segregation comprises a first level of transmit queue segregation, and where the circuitry and logic is further configured to implement at least one additional level of transmit queue segregation for at least one outer port in parallel with the per local destination port transmit queue segregation. 19. The disaggregated switch apparatus of claim 17, wherein the circuitry and logic is further configured to schedule a pull-mode transfer of data from a host to the disaggregated switch apparatus only if the outer port associated with the host is currently free or is assumed to be free once the data will reach the outer port. 20. The disaggregated switch apparatus of claim 12, further comprising logic and circuitry to implement a pull-mode data transfer between the apparatus and one of a remote apparatus when the remote apparatus is communicatively coupled to an inner port of the apparatus via an inner link. 21. The disaggregated switch apparatus of claim 20, wherein the pull mode data transfer is implemented over an Ethernet link comprising the inner link through use of an extension to the Ethernet protocol. 22. The disaggregated switch apparatus of claim 12, wherein the circuitry and logic is further configured to schedule incoming traffic received via an inner link from a remote source to have precedence over local traffic between hosts that is received at the outer ports. 23. An apparatus comprising: a server chassis; a plurality of servers, contained within the server chassis, each server including a communication interface including a local communication port comprising a local endpoint; and a disaggregated edge switch, including a plurality of outer ports and at least one inner port, each outer port communicatively coupled to a local communication port of respective server via a respective local communication link and comprising a local endpoint, each of the outer ports and the at least one inner port operatively coupled to memory on the disaggregated edge switch, the disaggregated edge switch further comprising circuitry and logic to transfer data between the disaggregated edge switch and the plurality of servers using pull-mode data transfers under which data is pulled from a source local endpoint by a local destination endpoint and transferred over the local communication link between the source local endpoint and the destination local endpoint. 24. The apparatus of claim 23, wherein a local communication link comprises a Peripheral Component Interconnect Express (PCIe) link, and wherein a pull-mode transfer of data between source and destination PCIe endpoints coupled via the PCIe link is implemented via a PCIe pull mode data transfer. 25. The apparatus of claim 23, wherein a local communication link comprises an Ethernet link, and wherein a pull-mode transfer of data between source and destination Ethernet endpoints coupled via the Ethernet link is implemented via a pull-mode data transfer over Ethernet. 26. The apparatus of claim 23, wherein the remote communication interface comprises an Ethernet interface that employs a Silicon Photonics (SiPh) physical layer 27. The apparatus of claim 23, wherein the circuitry and logic is further configured to: allocate a plurality of buffers in the memory, the buffers including a transmit buffer and receive buffer for each inner port and for each outer port; segregate the transmit buffers into a plurality of transmit queues; and implement a transmit queuing model under which transmit queues for local traffic between the plurality of servers are segregated per local destination port. 28. The apparatus of claim 27, wherein the per local destination port transmit queue segregation comprises a first level of transmit queue segregation, and where the circuitry and logic is further configured to implement at least one additional level of transmit queue segregation for at least one outer port in parallel with the per local destination port transmit queue segregation. 29. The apparatus of claim 28, wherein the circuitry and logic is further configured to schedule a pull-mode transfer of data from a host to the disaggregated switch apparatus only if the outer port associated with the host is currently free or is assumed to be free once the data will reach the outer port. 30. The apparatus of claim 23, further comprising logic and circuitry to implement a pull-mode data transfer between the apparatus and one of a remote apparatus when the remote apparatus is communicatively coupled to an inner port of the apparatus via an inner link.
2,400
8,542
8,542
15,152,967
2,426
According to one configuration, a content management resource receives feedback indicating playback commands applied to different portions of a given content stream (such as video content) played back by multiple viewers. The feedback can include video playback commands (such as fast forward commands, rewind commands, play commands, etc.) applied by the multiple users to the different portions of the given content stream. The content management resource aggregates the feedback to produce playback control information indicating playback commands applied by users of the multiple playback devices to the different portions of the given content stream. The content management resource uses the playback control information (aggregated feedback) to produce via timing information, locations of desirable segments and/or undesirable segments in the given stream as indicated by the previously applied commands. The content management resource inserts the aggregated feedback into the content metadata. Future user's playback devices are able to utilize the metadata to skip or otherwise control playback of (un)desirable sections of content.
1. A method comprising: via computer processor hardware, performing operations of: receiving feedback indicating playback commands applied to different portions of given streaming content played back by each of multiple playback devices in a network environment; and utilizing the received feedback to determine viewing interest with respect to the different portions of the given streaming content amongst the users. 2. The method as in claim 1, wherein receiving the feedback includes: receiving notification of playback commands applied by each of the multiple users to the different portions of the given streaming content. 3. The method as in claim 1, wherein utilizing the received feedback to identify viewing interest with respect to the different portions includes: identifying undesirable portions of the given streaming content as first portions of the given streaming content to which the users commonly applied fast forward playback commands. 4. The method as in claim 1, wherein utilizing the received feedback to identify viewing interest with respect to the different portions includes: identifying desirable portions of the given streaming content as second portions of the given streaming content to which the users commonly applied rewind playback commands. 5. The method as in claim 1, wherein utilizing the received feedback includes: subsequent to receiving the feedback, distributing playback control information to a user of a respective playback device operated to play back the given streaming content, the playback control information being an aggregate of the received feedback, the playback control information notifying the user of the respective playback device of commonly skipped portions of the given streaming content by the users of the multiple playback devices. 6. The method as in claim 1, wherein utilizing the received feedback further comprises: producing a progress playback guide for display to the user of a respective playback device playing back an instance of the given streaming content, the progress playback guide representing the different portions of the given streaming content, the progress playback guide indicating a current playback location of the given streaming content and which portions of the given streaming content were commonly skipped by the users as indicated by the received feedback. 7. The method as in claim 1, wherein receiving the feedback includes: receiving first feedback, the first feedback received from a first playback device playing back a first instance of the given streaming content, the first feedback indicating that a user of the first playback device inputted a respective command to skip playback of a particular portion of the given streaming content; and receiving second feedback, the second feedback received from a second playback device playing back a second instance of the given streaming content, the second feedback indicating that a user of the second playback device inputted a respective command to skip playback of the particular portion of the given streaming content. 8. The method as in claim 7 further comprising: analyzing the received feedback; and in response to detecting that a threshold number of users above a threshold value generated respective commands to skip playback of a particular portion of the given streaming content, producing playback control information to indicate that the particular portion of the given streaming content was a commonly skipped portion of the given streaming content by the threshold number of users. 9. The method as in claim 1, wherein utilizing the received feedback to determine viewing interest with respect to the different portions of the given content further comprises: utilizing the received feedback to identify a portion of the given streaming content allocated as an advertisement timeslot; and producing timing information indicating a location of the advertisement timeslot in the given streaming content. 10. The method as in claim 9 further comprising: utilizing the timing information to control an ability of a respective user to apply playback control commands to the instance of playing back the given streaming content. 11. The method as in claim 10, wherein utilizing the timing information to control the ability of the respective user to apply playback control commands further comprises: disabling use of the playback control commands during the advertisement timeslot in the given streaming content; and enabling use of the playback control commands during non-advertisement timeslots in the given streaming content. 12. The method as in claim 1 further comprising: monitoring playback of an instance of the given streaming content on a display screen; and providing notification to a user viewing the display screen that a first portion of content currently played back on the display screen is determined to be undesirable by other viewers as indicated by the received feedback. 13. The method as in claim 12 further comprising: in response to receiving input from the user viewing the display screen to skip the first portion of content currently played back on the display screen, initiating playback of a second portion of the given content on the display screen, the second portion following the first portion. 14. The method as in claim 1 further comprising: producing a progress playback guide for display to the user of a respective playback device playing back an instance of the given streaming content, the progress playback guide representing the different portions of the given streaming content, the progress playback bar indicating a current playback location of the given content by the respective playback device and viewing desirability ratings of the different portions as identified from the received feedback. 15. The method as in claim 1, wherein the given streaming content is video data viewed subsequent to collection and processing of the received feedback. 16. A method comprising: via computer processor hardware, performing operations of: producing playback control information from playback commands applied to different portions of given content played back by each of multiple playback devices; utilizing the playback control information to produce timing information indicating a set of the different portions of the given content to which the playback commands were applied during playback by the multiple playback devices; and utilizing the timing information to control subsequent playback of the given content. 17. The method as in claim 16, wherein the playback commands are fast forward commands applied by users of the multiple playback devices to skip playback of the different portions in the set; and wherein the timing information indicates time slots in which the users applied commands to skip playback of the different portions in the set. 18. The method as in claim 17, wherein utilizing the timing information to control subsequent playback of the given content includes: preventing a subsequent user playing back the given content from skipping playback of the different portions of the given content in the set as specified by the time slots. 19. The method as in claim 16, wherein utilizing the timing information to control subsequent playback of the given content further comprises: during the subsequent playback of the given content: disabling execution of the playback control commands during the timeslots as specified by the timing information; and enabling execution of the playback control commands outside of the timeslots as specified by the timing information. 20. The method as in claim 16 further comprising: upon subsequent playback of the given content, automatically skipping playback of the different portions in the set as specified by the time slots to reduce a duration of time to playback the given content. 21. A system comprising: computer processor hardware; computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by the computer processor hardware, cause the computer processor hardware to: receive feedback indicating playback commands applied to different portions of a given video content played back by each of multiple playback devices in a network environment; and utilize the received feedback to determine viewing interest with respect to the different portions of the given video content amongst the users. 22. The system as in claim 21, wherein the feedback indicates times when playback commands are applied by each of the multiple users to the different portions of the given video content. 23. The system as in claim 21, wherein the received feedback indicates undesirable portions of the given video content as first portions of the given video content to which the users commonly applied fast forward playback commands. 24. The system as in claim 23, wherein the computer processor hardware is further operable to: identify desirable portions of the given video content as second portions of the given video content to which the users commonly applied rewind playback commands to replay a respective portion of the given video content. 25. The system as in claim 21, wherein the computer processor hardware is further operable to: subsequent to receiving the feedback, distribute playback control information to a user of a respective playback device operated to play back the given video content, the playback control information derived from the received feedback, the playback control information notifying the user of the respective playback device of commonly skipped portions of the given video content by the users of the multiple playback devices. 26. The system as in claim 21, wherein the computer processor hardware is further operable to: produce a progress playback guide for display to the user of a respective playback device playing back a copy of the given streaming content, the progress playback guide representing the different portions of the given video content, the progress playback bar indicating a current playback location of the given video content and which portions of the given video content were commonly skipped by the users as indicated by the received feedback. 27. The system as in claim 21, wherein the feedback includes first feedback and second feedback; the first feedback received from a first playback device playing back a first instance of the given streaming content, the first feedback indicating that a user of the first playback device inputted a respective command to skip playback of a particular portion of the given video content; and the second feedback received from a second playback device playing back a second instance of the given video content, the second feedback indicating that a user of the second playback device inputted a respective command to skip playback of the particular portion of the given video content. 28. The system as in claim 27, wherein the computer processor hardware is further operable to: analyze the received feedback; and in response to detecting that a threshold number of users above a threshold value generated respective commands to skip playback of a particular portion of the given video content, produce the playback control information to indicate that the particular portion of the given video content was a commonly skipped portion of the given video content by the threshold number of users. 29. The system as in claim 21, wherein the computer processor hardware is further operable to: utilize the received feedback to identify a portion of the given video content allocated as an advertisement timeslot; and produce timing information indicating a location of the advertisement timeslot in the given video content. 30. The system as in claim 29, wherein the computer processor hardware is further operable to: distribute the timing information to control an ability of a respective user to apply playback control commands to the given video content. 31. The system as in claim 30, wherein the timing information indicates to: disable use of the playback control commands during the advertisement timeslot in the given video content; and enable use of the playback control commands during non-advertisement timeslots in the given video content. 32. The system as in claim 21, wherein the computer processor hardware is further operable to: monitor playback of the given content on a display screen; and provide notification to a user viewing the display screen that a first portion of content currently played back on the display screen is determined to be undesirable by other viewers as indicated by the received feedback. 33. Non-transitory computer-readable storage media having instructions stored thereon, the instructions, when carried out by computer processor hardware, cause the computer processor hardware to: receive feedback indicating playback commands applied to different portions of given content played back by each of multiple playback devices in a network environment; and utilize the received feedback to determine viewing interest with respect to the different portions of the given content amongst the users.
According to one configuration, a content management resource receives feedback indicating playback commands applied to different portions of a given content stream (such as video content) played back by multiple viewers. The feedback can include video playback commands (such as fast forward commands, rewind commands, play commands, etc.) applied by the multiple users to the different portions of the given content stream. The content management resource aggregates the feedback to produce playback control information indicating playback commands applied by users of the multiple playback devices to the different portions of the given content stream. The content management resource uses the playback control information (aggregated feedback) to produce via timing information, locations of desirable segments and/or undesirable segments in the given stream as indicated by the previously applied commands. The content management resource inserts the aggregated feedback into the content metadata. Future user's playback devices are able to utilize the metadata to skip or otherwise control playback of (un)desirable sections of content.1. A method comprising: via computer processor hardware, performing operations of: receiving feedback indicating playback commands applied to different portions of given streaming content played back by each of multiple playback devices in a network environment; and utilizing the received feedback to determine viewing interest with respect to the different portions of the given streaming content amongst the users. 2. The method as in claim 1, wherein receiving the feedback includes: receiving notification of playback commands applied by each of the multiple users to the different portions of the given streaming content. 3. The method as in claim 1, wherein utilizing the received feedback to identify viewing interest with respect to the different portions includes: identifying undesirable portions of the given streaming content as first portions of the given streaming content to which the users commonly applied fast forward playback commands. 4. The method as in claim 1, wherein utilizing the received feedback to identify viewing interest with respect to the different portions includes: identifying desirable portions of the given streaming content as second portions of the given streaming content to which the users commonly applied rewind playback commands. 5. The method as in claim 1, wherein utilizing the received feedback includes: subsequent to receiving the feedback, distributing playback control information to a user of a respective playback device operated to play back the given streaming content, the playback control information being an aggregate of the received feedback, the playback control information notifying the user of the respective playback device of commonly skipped portions of the given streaming content by the users of the multiple playback devices. 6. The method as in claim 1, wherein utilizing the received feedback further comprises: producing a progress playback guide for display to the user of a respective playback device playing back an instance of the given streaming content, the progress playback guide representing the different portions of the given streaming content, the progress playback guide indicating a current playback location of the given streaming content and which portions of the given streaming content were commonly skipped by the users as indicated by the received feedback. 7. The method as in claim 1, wherein receiving the feedback includes: receiving first feedback, the first feedback received from a first playback device playing back a first instance of the given streaming content, the first feedback indicating that a user of the first playback device inputted a respective command to skip playback of a particular portion of the given streaming content; and receiving second feedback, the second feedback received from a second playback device playing back a second instance of the given streaming content, the second feedback indicating that a user of the second playback device inputted a respective command to skip playback of the particular portion of the given streaming content. 8. The method as in claim 7 further comprising: analyzing the received feedback; and in response to detecting that a threshold number of users above a threshold value generated respective commands to skip playback of a particular portion of the given streaming content, producing playback control information to indicate that the particular portion of the given streaming content was a commonly skipped portion of the given streaming content by the threshold number of users. 9. The method as in claim 1, wherein utilizing the received feedback to determine viewing interest with respect to the different portions of the given content further comprises: utilizing the received feedback to identify a portion of the given streaming content allocated as an advertisement timeslot; and producing timing information indicating a location of the advertisement timeslot in the given streaming content. 10. The method as in claim 9 further comprising: utilizing the timing information to control an ability of a respective user to apply playback control commands to the instance of playing back the given streaming content. 11. The method as in claim 10, wherein utilizing the timing information to control the ability of the respective user to apply playback control commands further comprises: disabling use of the playback control commands during the advertisement timeslot in the given streaming content; and enabling use of the playback control commands during non-advertisement timeslots in the given streaming content. 12. The method as in claim 1 further comprising: monitoring playback of an instance of the given streaming content on a display screen; and providing notification to a user viewing the display screen that a first portion of content currently played back on the display screen is determined to be undesirable by other viewers as indicated by the received feedback. 13. The method as in claim 12 further comprising: in response to receiving input from the user viewing the display screen to skip the first portion of content currently played back on the display screen, initiating playback of a second portion of the given content on the display screen, the second portion following the first portion. 14. The method as in claim 1 further comprising: producing a progress playback guide for display to the user of a respective playback device playing back an instance of the given streaming content, the progress playback guide representing the different portions of the given streaming content, the progress playback bar indicating a current playback location of the given content by the respective playback device and viewing desirability ratings of the different portions as identified from the received feedback. 15. The method as in claim 1, wherein the given streaming content is video data viewed subsequent to collection and processing of the received feedback. 16. A method comprising: via computer processor hardware, performing operations of: producing playback control information from playback commands applied to different portions of given content played back by each of multiple playback devices; utilizing the playback control information to produce timing information indicating a set of the different portions of the given content to which the playback commands were applied during playback by the multiple playback devices; and utilizing the timing information to control subsequent playback of the given content. 17. The method as in claim 16, wherein the playback commands are fast forward commands applied by users of the multiple playback devices to skip playback of the different portions in the set; and wherein the timing information indicates time slots in which the users applied commands to skip playback of the different portions in the set. 18. The method as in claim 17, wherein utilizing the timing information to control subsequent playback of the given content includes: preventing a subsequent user playing back the given content from skipping playback of the different portions of the given content in the set as specified by the time slots. 19. The method as in claim 16, wherein utilizing the timing information to control subsequent playback of the given content further comprises: during the subsequent playback of the given content: disabling execution of the playback control commands during the timeslots as specified by the timing information; and enabling execution of the playback control commands outside of the timeslots as specified by the timing information. 20. The method as in claim 16 further comprising: upon subsequent playback of the given content, automatically skipping playback of the different portions in the set as specified by the time slots to reduce a duration of time to playback the given content. 21. A system comprising: computer processor hardware; computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by the computer processor hardware, cause the computer processor hardware to: receive feedback indicating playback commands applied to different portions of a given video content played back by each of multiple playback devices in a network environment; and utilize the received feedback to determine viewing interest with respect to the different portions of the given video content amongst the users. 22. The system as in claim 21, wherein the feedback indicates times when playback commands are applied by each of the multiple users to the different portions of the given video content. 23. The system as in claim 21, wherein the received feedback indicates undesirable portions of the given video content as first portions of the given video content to which the users commonly applied fast forward playback commands. 24. The system as in claim 23, wherein the computer processor hardware is further operable to: identify desirable portions of the given video content as second portions of the given video content to which the users commonly applied rewind playback commands to replay a respective portion of the given video content. 25. The system as in claim 21, wherein the computer processor hardware is further operable to: subsequent to receiving the feedback, distribute playback control information to a user of a respective playback device operated to play back the given video content, the playback control information derived from the received feedback, the playback control information notifying the user of the respective playback device of commonly skipped portions of the given video content by the users of the multiple playback devices. 26. The system as in claim 21, wherein the computer processor hardware is further operable to: produce a progress playback guide for display to the user of a respective playback device playing back a copy of the given streaming content, the progress playback guide representing the different portions of the given video content, the progress playback bar indicating a current playback location of the given video content and which portions of the given video content were commonly skipped by the users as indicated by the received feedback. 27. The system as in claim 21, wherein the feedback includes first feedback and second feedback; the first feedback received from a first playback device playing back a first instance of the given streaming content, the first feedback indicating that a user of the first playback device inputted a respective command to skip playback of a particular portion of the given video content; and the second feedback received from a second playback device playing back a second instance of the given video content, the second feedback indicating that a user of the second playback device inputted a respective command to skip playback of the particular portion of the given video content. 28. The system as in claim 27, wherein the computer processor hardware is further operable to: analyze the received feedback; and in response to detecting that a threshold number of users above a threshold value generated respective commands to skip playback of a particular portion of the given video content, produce the playback control information to indicate that the particular portion of the given video content was a commonly skipped portion of the given video content by the threshold number of users. 29. The system as in claim 21, wherein the computer processor hardware is further operable to: utilize the received feedback to identify a portion of the given video content allocated as an advertisement timeslot; and produce timing information indicating a location of the advertisement timeslot in the given video content. 30. The system as in claim 29, wherein the computer processor hardware is further operable to: distribute the timing information to control an ability of a respective user to apply playback control commands to the given video content. 31. The system as in claim 30, wherein the timing information indicates to: disable use of the playback control commands during the advertisement timeslot in the given video content; and enable use of the playback control commands during non-advertisement timeslots in the given video content. 32. The system as in claim 21, wherein the computer processor hardware is further operable to: monitor playback of the given content on a display screen; and provide notification to a user viewing the display screen that a first portion of content currently played back on the display screen is determined to be undesirable by other viewers as indicated by the received feedback. 33. Non-transitory computer-readable storage media having instructions stored thereon, the instructions, when carried out by computer processor hardware, cause the computer processor hardware to: receive feedback indicating playback commands applied to different portions of given content played back by each of multiple playback devices in a network environment; and utilize the received feedback to determine viewing interest with respect to the different portions of the given content amongst the users.
2,400
8,543
8,543
15,187,180
2,461
A system, method and computer program product for content delivery of services in a mobile telecommunication network on the basis of predictions of user and network needs. The method includes collecting and receiving information of the use of services in the network, and analyzing network behavior on the basis of the information received. The traffic load in the network is continuously monitored in real-time by estimating the traffic load locations in the network and the network capacity needs for delivering the services. The analysis is used for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network. The network behavior is controlled based on the selections and decisions of the analysis by sending requests to network components for network configuration.
1. A method of content delivery of services in a mobile telecommunication network on the basis of predictions of user and network needs, the method comprising the steps of: collecting and receiving information of the use of services in the network, analyzing network behavior on the basis of the information received by continuously monitoring the traffic load in the network in real-time and by estimating the traffic load locations in the network and the network capacity needs for delivering the services, additionally analyzing the network behavior analysis for selecting caches in the network to support the estimated traffic load locations in the network, whereby the network behavior is controlled by sending content of services to the selected caches in the network, preprocessing the data content of the service to be delivered by creating several quality versions of the service and sending selected quality versions of the service to selected caches in the network, using the analysis for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network, controlling the network behavior based on the selections and decisions of the analysis by sending requests to network components for network configuration. 2. The method of claim 1, wherein the network behavior analysis is additionally performed on previous information of the use of services in the network. 3. The method of claim 1 wherein the network behavior analysis is performed in real-time of by noting unusual actions or departures from normal operation or the use of services in the network and by reacting with modifying the decisions and selections to be performed. 4. The method of claim 1 wherein slow or failing components are noted as unusual actions reacted to by modifying the decisions and selections to be performed. 5. The method of claim 1 wherein the service to be delivered is customized as a mashup service by combining content from different sources as tv, social media, and/or other mashup feed based on user desires. 6. The method of claim 1 further comprising selecting a quality version of the service to be delivered for supporting the needed network capacity on the basis of the analysis. 7. The method of claim 1 wherein the data preprocessing includes individually tailoring the Quality Of Service (QoS) versions for the users on the basis of Quality Of Service (QoS) preferences, user profiles, device properties of the end user device, and/or contracts. 8. The method of claim 1 the information of the use of services in the network includes network information of times and locations for traffic loads and peaks, congestion, and traffic patterns based on previous information. 9. The method of claim 1 wherein the information of the use of services by users include usage and location of mobile terminals as well as information of Quality Of Service (QoS) preferences. 10. The method of claim 1 wherein the information of the use of services includes mash-up information about applications, type of service, trends of service usage, equipment information of user terminals, connected service providers, user profiles and content information. 11. The method of claim 1 wherein the monitoring of the traffic load includes estimation of both location and time for traffic loads for the service to be delivered and consumed. 12. The method of claim 1 wherein the network behavior is further controlled by defining routing, delay, throughput, latency, packet loss and signal to noise ratio of the service to be delivered. 13. The method of claim 1 wherein the network behavior is further controlled by prioritizing given users with respect to delivery of content or the Quality Of Service (QoS) of the content to be delivered. 14. The method of claim 1 wherein the optimal network configuration includes decisions with respect to data encoding, signal coding, bandwidth, cell size, routing, bit rate, frequency reuse, antenna configuration and/or spectrum sharing which parameters are included in the requests sent to network components for network configuration. 15. The method of claim 1 wherein the network elements to be controlled include the caches and/or proxy caches for storing content of services to be delivered. 16. The method of claim 1 wherein the optimal network configuration includes decisions with respect to data offloading to extended networks. 17. A system for content delivery of services in a mobile telecommunication network, the system comprising: a server of a mobile operator comprising at least the following components: an optimization device for collecting and receiving information of the use of services in the network and for analyzing network behavior on the basis of the information received and collected by estimating the traffic load locations in the network and the capacity needs for delivering the services, means for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network, a network control unit for controlling the network behavior based on the selections and decisions made and with means for sending requests to network components for network configuration, and that the system further comprises: selected caches and/or proxy caches in the network for content delivery of the services, and a service provider for preprocessing the data content of the service to be delivered by creating several quality versions of the service and sending selected quality versions of the service to selected caches in the network. 18. The system of claim 17 wherein the service provider provides the service and sends the information of the use of services to the optimization device. 19. The system of claim 17 wherein the optimization device for collecting and receiving information further comprises means for selecting a quality version of the service to be delivered and consumed for supporting the needed network capacity on the basis of the analysis. 20. The system of claim 17 further comprising an extended network as a part of the telecommunication network for content offloading. 21. The system of claim 20 wherein the extended network is a Wifi network. 22. A non-transitory computer program storage medium to be used for delivering content of services in a telecommunications network, the storage medium having a computer program stored thereon which when executed by a processor causes the processor to: receive information of the use of services in the network, analyze network behavior on the basis of the information received by monitoring the traffic load in the network by estimating the traffic load locations in the network and the network capacity needs for delivering the services, and additionally analyze the network behavior analysis for selecting caches in the network to support the estimated traffic load locations in the network, whereby the network behavior is controlled by sending content of services to the selected caches in the network, define quality versions of the service content to be delivered for supporting the needed network capacity on the basis of the analysis, use the analysis for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network, controlling the network behavior based on the selections and decisions of the analysis by sending requests to network components for network configuration.
A system, method and computer program product for content delivery of services in a mobile telecommunication network on the basis of predictions of user and network needs. The method includes collecting and receiving information of the use of services in the network, and analyzing network behavior on the basis of the information received. The traffic load in the network is continuously monitored in real-time by estimating the traffic load locations in the network and the network capacity needs for delivering the services. The analysis is used for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network. The network behavior is controlled based on the selections and decisions of the analysis by sending requests to network components for network configuration.1. A method of content delivery of services in a mobile telecommunication network on the basis of predictions of user and network needs, the method comprising the steps of: collecting and receiving information of the use of services in the network, analyzing network behavior on the basis of the information received by continuously monitoring the traffic load in the network in real-time and by estimating the traffic load locations in the network and the network capacity needs for delivering the services, additionally analyzing the network behavior analysis for selecting caches in the network to support the estimated traffic load locations in the network, whereby the network behavior is controlled by sending content of services to the selected caches in the network, preprocessing the data content of the service to be delivered by creating several quality versions of the service and sending selected quality versions of the service to selected caches in the network, using the analysis for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network, controlling the network behavior based on the selections and decisions of the analysis by sending requests to network components for network configuration. 2. The method of claim 1, wherein the network behavior analysis is additionally performed on previous information of the use of services in the network. 3. The method of claim 1 wherein the network behavior analysis is performed in real-time of by noting unusual actions or departures from normal operation or the use of services in the network and by reacting with modifying the decisions and selections to be performed. 4. The method of claim 1 wherein slow or failing components are noted as unusual actions reacted to by modifying the decisions and selections to be performed. 5. The method of claim 1 wherein the service to be delivered is customized as a mashup service by combining content from different sources as tv, social media, and/or other mashup feed based on user desires. 6. The method of claim 1 further comprising selecting a quality version of the service to be delivered for supporting the needed network capacity on the basis of the analysis. 7. The method of claim 1 wherein the data preprocessing includes individually tailoring the Quality Of Service (QoS) versions for the users on the basis of Quality Of Service (QoS) preferences, user profiles, device properties of the end user device, and/or contracts. 8. The method of claim 1 the information of the use of services in the network includes network information of times and locations for traffic loads and peaks, congestion, and traffic patterns based on previous information. 9. The method of claim 1 wherein the information of the use of services by users include usage and location of mobile terminals as well as information of Quality Of Service (QoS) preferences. 10. The method of claim 1 wherein the information of the use of services includes mash-up information about applications, type of service, trends of service usage, equipment information of user terminals, connected service providers, user profiles and content information. 11. The method of claim 1 wherein the monitoring of the traffic load includes estimation of both location and time for traffic loads for the service to be delivered and consumed. 12. The method of claim 1 wherein the network behavior is further controlled by defining routing, delay, throughput, latency, packet loss and signal to noise ratio of the service to be delivered. 13. The method of claim 1 wherein the network behavior is further controlled by prioritizing given users with respect to delivery of content or the Quality Of Service (QoS) of the content to be delivered. 14. The method of claim 1 wherein the optimal network configuration includes decisions with respect to data encoding, signal coding, bandwidth, cell size, routing, bit rate, frequency reuse, antenna configuration and/or spectrum sharing which parameters are included in the requests sent to network components for network configuration. 15. The method of claim 1 wherein the network elements to be controlled include the caches and/or proxy caches for storing content of services to be delivered. 16. The method of claim 1 wherein the optimal network configuration includes decisions with respect to data offloading to extended networks. 17. A system for content delivery of services in a mobile telecommunication network, the system comprising: a server of a mobile operator comprising at least the following components: an optimization device for collecting and receiving information of the use of services in the network and for analyzing network behavior on the basis of the information received and collected by estimating the traffic load locations in the network and the capacity needs for delivering the services, means for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network, a network control unit for controlling the network behavior based on the selections and decisions made and with means for sending requests to network components for network configuration, and that the system further comprises: selected caches and/or proxy caches in the network for content delivery of the services, and a service provider for preprocessing the data content of the service to be delivered by creating several quality versions of the service and sending selected quality versions of the service to selected caches in the network. 18. The system of claim 17 wherein the service provider provides the service and sends the information of the use of services to the optimization device. 19. The system of claim 17 wherein the optimization device for collecting and receiving information further comprises means for selecting a quality version of the service to be delivered and consumed for supporting the needed network capacity on the basis of the analysis. 20. The system of claim 17 further comprising an extended network as a part of the telecommunication network for content offloading. 21. The system of claim 20 wherein the extended network is a Wifi network. 22. A non-transitory computer program storage medium to be used for delivering content of services in a telecommunications network, the storage medium having a computer program stored thereon which when executed by a processor causes the processor to: receive information of the use of services in the network, analyze network behavior on the basis of the information received by monitoring the traffic load in the network by estimating the traffic load locations in the network and the network capacity needs for delivering the services, and additionally analyze the network behavior analysis for selecting caches in the network to support the estimated traffic load locations in the network, whereby the network behavior is controlled by sending content of services to the selected caches in the network, define quality versions of the service content to be delivered for supporting the needed network capacity on the basis of the analysis, use the analysis for deciding the optimal network configuration to be used for supporting the estimated traffic load locations in the network, controlling the network behavior based on the selections and decisions of the analysis by sending requests to network components for network configuration.
2,400
8,544
8,544
15,824,035
2,468
A cellular communication system and method for delivering information, e.g., data and/or control-signaling, to a user equipment (UE) from a neighboring node are disclosed. The cellular communication system includes a first node configured to transmit information in one or more Multicast Broadcast Single Frequency Network (MBSFN) subframes over a radio frequency (RF) link between the first node and the UE, while the UE is being served by a second node. The first node can use a network-defined, dedicated portion of the MBSFN subframe for this purpose. Instead of only allowing the second node to send data/signaling messages to the UE, the disclosed techniques allow neighboring nodes to also deliver information to the UE. In particular, the neighboring nodes can transmit data and/or control-signaling to the UE using MBSFN subframes in order to minimize signaling overhead and signaling delay.
1. A cellular communication system, comprising: a plurality of nodes communicatively coupled via a backhaul network, where a first node of the plurality of nodes is configured to transmit information to a user equipment (UE) being served by a second node, the information being transmitted by unicast message in a Multicast Broadcast Single Frequency Network (MBSFN) subframe or portion thereof reserved only for data transmitted by the first node, the information including control information or unicast data for the UE. 2. The cellular communication system of claim 1, further comprising: the second node configured to select the first node based upon predetermined criteria and transfer UE-specific signaling information to the first node as a result of the first node being selected. 3. The cellular communication system of claim 2, wherein the predetermined criteria include one or more measurement reports from the UE. 4. The cellular communication system of claim 1, wherein the first node is configured to transmit UE-specific information in a first MBSFN subframe, and the second node is configured to not transmit in the first MBSFN subframe. 5. The cellular communication system of claim 4, wherein the second node is configured to transmit in a second MBSFN subframe and the first node is configured to not transmit in the second MBSFN subframe. 6. The cellular communication system of claim 1, wherein the MBSFN subframe is split into a plurality of carrier sub-bands each having a different frequency band and the first node is configured to transmit the information in a first carrier sub-band, and the second node is configured to not transmit in the first carrier sub-band during the MBSFN subframe. 7. The cellular communication system of claim 6, wherein the first node is configured to not transmit in the second carrier sub-band during the MBSFN subframe. 8. The cellular communication system of claim 1, wherein the MBSFN subframe is split into a plurality of time slots, and the first node is configured to transmit the information in the first time slot, and the second node is configured to not transmit in the first time slot. 9. The cellular communication system of claim 8, wherein the second node is configured to transmit in the second time slot, and the first node is configured to not transmit in the second time slot. 10. The cellular communication system of claim 1, wherein the first node is assigned a first spreading code and the second node is assigned a second spreading code different from the first spreading code, and the first node is configured to spread first information using the first spreading code, whereby producing spread first information, and to transmit the spread first information in the MBSFN subframe, and the second node is configured to spread second information using the second spreading code, whereby producing second spread information, and to transmit the spread second information in the MBSFN subframe. 11. A method of transmitting information in a cellular communication system, comprising: transmitting information from a first node to a user equipment (UE) being served by a second node, the information being transmitted by unicast message in a Multicast Broadcast Single Frequency Network (MBSFN) subframe or portion thereof reserved only for data transmitted by the first node, the information including control information or unicast data for the UE. 12. The method of claim 11, further comprising: providing services to the UE from the second node; selecting the first node based upon predetermined criteria; and transferring UE-specific signaling information from the second node to the first node as a result of the first node being selected. 13. The method of claim 12, wherein the predetermined criteria include one or more measurement reports from the UE. 14. The method of claim 11, wherein the first node is configured to transmit UE-specific information in a first MBSFN subframe, and the second node is configured to not transmit in the first MBSFN subframe. 15. The method of claim 14, wherein the second node is configured to transmit in a second MBSFN subframe and the first node is configured to not transmit in the second MBSFN subframe. 16. The method of claim 11, wherein the MBSFN subframe is split into a plurality of carrier sub-bands each having a different frequency band and the first node is configured to transmit the information only in the first MBSFN sub-band, and the second node is configured to not transmit in the first carrier sub-band during the MBSFN subframe. 17. The method of claim 11, wherein the MBSFN subframe is split into a plurality of time slots, and the first node is configured to transmit the information in the first time slot, and the second node is configured to not transmit in the first time slot. 18. The method of claim 17, wherein the second node is configured to transmit in the second time slot, and the first node is configured to not transmit in the second time slot. 19. The method of claim 11, wherein the first node is assigned a first spreading code and the second node is assigned a second spreading code different from the first spreading code, and the first node is configured to spread first information using the first spreading code, whereby producing spread first information, and to transmit the spread first information in the MBSFN subframe, and the second node is configured to spread second information using the second spreading code, whereby producing second spread information, and to transmit the spread second information in the MBSFN subframe. 20. A first node comprising: a transmitter configured to transmit information to a user equipment (UE) being served by a second node, the information being transmitted by unicast message in a Multicast Broadcast Single Frequency Network (MBSFN) subframe or portion thereof reserved only for data transmitted by the first node, the information including control information or unicast data for the UE.
A cellular communication system and method for delivering information, e.g., data and/or control-signaling, to a user equipment (UE) from a neighboring node are disclosed. The cellular communication system includes a first node configured to transmit information in one or more Multicast Broadcast Single Frequency Network (MBSFN) subframes over a radio frequency (RF) link between the first node and the UE, while the UE is being served by a second node. The first node can use a network-defined, dedicated portion of the MBSFN subframe for this purpose. Instead of only allowing the second node to send data/signaling messages to the UE, the disclosed techniques allow neighboring nodes to also deliver information to the UE. In particular, the neighboring nodes can transmit data and/or control-signaling to the UE using MBSFN subframes in order to minimize signaling overhead and signaling delay.1. A cellular communication system, comprising: a plurality of nodes communicatively coupled via a backhaul network, where a first node of the plurality of nodes is configured to transmit information to a user equipment (UE) being served by a second node, the information being transmitted by unicast message in a Multicast Broadcast Single Frequency Network (MBSFN) subframe or portion thereof reserved only for data transmitted by the first node, the information including control information or unicast data for the UE. 2. The cellular communication system of claim 1, further comprising: the second node configured to select the first node based upon predetermined criteria and transfer UE-specific signaling information to the first node as a result of the first node being selected. 3. The cellular communication system of claim 2, wherein the predetermined criteria include one or more measurement reports from the UE. 4. The cellular communication system of claim 1, wherein the first node is configured to transmit UE-specific information in a first MBSFN subframe, and the second node is configured to not transmit in the first MBSFN subframe. 5. The cellular communication system of claim 4, wherein the second node is configured to transmit in a second MBSFN subframe and the first node is configured to not transmit in the second MBSFN subframe. 6. The cellular communication system of claim 1, wherein the MBSFN subframe is split into a plurality of carrier sub-bands each having a different frequency band and the first node is configured to transmit the information in a first carrier sub-band, and the second node is configured to not transmit in the first carrier sub-band during the MBSFN subframe. 7. The cellular communication system of claim 6, wherein the first node is configured to not transmit in the second carrier sub-band during the MBSFN subframe. 8. The cellular communication system of claim 1, wherein the MBSFN subframe is split into a plurality of time slots, and the first node is configured to transmit the information in the first time slot, and the second node is configured to not transmit in the first time slot. 9. The cellular communication system of claim 8, wherein the second node is configured to transmit in the second time slot, and the first node is configured to not transmit in the second time slot. 10. The cellular communication system of claim 1, wherein the first node is assigned a first spreading code and the second node is assigned a second spreading code different from the first spreading code, and the first node is configured to spread first information using the first spreading code, whereby producing spread first information, and to transmit the spread first information in the MBSFN subframe, and the second node is configured to spread second information using the second spreading code, whereby producing second spread information, and to transmit the spread second information in the MBSFN subframe. 11. A method of transmitting information in a cellular communication system, comprising: transmitting information from a first node to a user equipment (UE) being served by a second node, the information being transmitted by unicast message in a Multicast Broadcast Single Frequency Network (MBSFN) subframe or portion thereof reserved only for data transmitted by the first node, the information including control information or unicast data for the UE. 12. The method of claim 11, further comprising: providing services to the UE from the second node; selecting the first node based upon predetermined criteria; and transferring UE-specific signaling information from the second node to the first node as a result of the first node being selected. 13. The method of claim 12, wherein the predetermined criteria include one or more measurement reports from the UE. 14. The method of claim 11, wherein the first node is configured to transmit UE-specific information in a first MBSFN subframe, and the second node is configured to not transmit in the first MBSFN subframe. 15. The method of claim 14, wherein the second node is configured to transmit in a second MBSFN subframe and the first node is configured to not transmit in the second MBSFN subframe. 16. The method of claim 11, wherein the MBSFN subframe is split into a plurality of carrier sub-bands each having a different frequency band and the first node is configured to transmit the information only in the first MBSFN sub-band, and the second node is configured to not transmit in the first carrier sub-band during the MBSFN subframe. 17. The method of claim 11, wherein the MBSFN subframe is split into a plurality of time slots, and the first node is configured to transmit the information in the first time slot, and the second node is configured to not transmit in the first time slot. 18. The method of claim 17, wherein the second node is configured to transmit in the second time slot, and the first node is configured to not transmit in the second time slot. 19. The method of claim 11, wherein the first node is assigned a first spreading code and the second node is assigned a second spreading code different from the first spreading code, and the first node is configured to spread first information using the first spreading code, whereby producing spread first information, and to transmit the spread first information in the MBSFN subframe, and the second node is configured to spread second information using the second spreading code, whereby producing second spread information, and to transmit the spread second information in the MBSFN subframe. 20. A first node comprising: a transmitter configured to transmit information to a user equipment (UE) being served by a second node, the information being transmitted by unicast message in a Multicast Broadcast Single Frequency Network (MBSFN) subframe or portion thereof reserved only for data transmitted by the first node, the information including control information or unicast data for the UE.
2,400
8,545
8,545
15,396,317
2,452
Generation of filtering rules for incoming messages can be activated by a user through a gesture-based input. When the user activates filtering rule generation, the message management service can cause a user device to display a prompt requesting additional data to be used to generate the filtering rule. The gesture can be a swipe and hold gesture, where the swipe is associated with an action (archiving, deleting, deferring, or adding the message to a list), and the swipe and hold action can activate filtering rule generation associated with the action.
1-20. (canceled) 21. A method comprising: detecting, at a computer device, a gesture input corresponding to an action to be performed on at least one message for a user, wherein the gesture input includes a hold portion and a transverse portion; analyzing, by the computer device, the gesture input to identify the action to be performed on the at least one message, wherein the action to be performed is identified based on a length and a direction associated with the transverse portion; displaying, by the computer device, based on the analysis, a list of selectable options related to the action; receiving, by the computer device, data indicating a selection of a selectable option in the list of selectable options, the selection associated with the at least one message; and sending the data indicating the selection associated with the at least one message from the computer device to a computing system of a message management service, to define a rule based on the selection indicated by the data and based on the action, wherein the rule indicates a new action to be performed on future messages satisfying the rule. 22. The method of claim 21, further comprising: receiving a second message; determining that the second message is associated with the rule; and applying an action associated with the rule to the second message. 23. The method of claim 21, wherein the action includes at least one of archiving, moving, or deleting the second message. 24. The method of claim 21, wherein analyzing the gesture input to identify the action to be performed further comprises: identifying a first set of actions associated with the transverse portion; and identifying a second set of actions associated with the hold portion based on the first set of actions. 25. The method of claim 24, wherein the set of second actions includes creating a rule based on the first set of actions for the selected content item. 26. The method of claim 24, wherein identifying a first set of actions associated with the transverse portion further comprises: determining a length and direction associated with the transverse portion; and identifying the first set of actions based on the length and direction. 27. The method of claim 21, wherein analyzing the gesture input to identify the action to be performed further comprises: determining a time associated with the hold portion; comparing the time associated with the hold portion to a threshold value; and selecting the action to be performed from the first set of actions where the time is less than the threshold value and selecting the action to be performed from the second set of actions where the time is greater than the threshold value. 28. A computer system comprising: one or more processors; and a non-transitory computer-readable medium including one or more sequences of instructions that, when executed by the one or more processors, cause the processors to perform operations comprising: detecting a gesture input corresponding to an action to be performed on at least one message for a user, wherein the gesture input includes a hold portion and a transverse portion; analyzing the gesture input to identify the action to be performed on the at least one message, wherein the action to be performed is identified based on a length and a direction associated with the transverse portion; displaying based on the analysis, a list of selectable options related to the action; receiving data indicating a selection of a selectable option in the list of selectable options, the selection associated with the at least one message; and sending the data indicating the selection associated with the at least one message to a computing system of a message management service, to define a rule based on the selection indicated by the data and based on the action, wherein the rule indicates a new action to be performed on future messages satisfying the rule. 29. The computer system of claim 28, wherein the operations further comprises: receiving a second message; determining that the second message is associated with the rule; and applying an action associated with the rule to the second message. 30. The computer system of claim 28, wherein the action includes at least one of archiving, moving, or deleting the second message. 31. The computer system of claim 28, wherein analyzing the gesture input to identify the action to be performed further comprises: identifying a first set of actions associated with the transverse portion; and identifying a second set of actions associated with the hold portion based on the first set of actions. 32. The computer system of claim 31, wherein the set of second actions includes creating a rule based on the first set of actions for the selected content item. 33. The computer system of claim 31, wherein identifying a first set of actions associated with the transverse portion further comprises: determining a length and direction associated with the transverse portion; and identifying the first set of actions based on the length and direction. 34. The computer system of claim 21, wherein analyzing the gesture input to identify the action to be performed further comprises: determining a time associated with the hold portion; comparing the time associated with the hold portion to a threshold value; and selecting the action to be performed from the first set of actions where the time is less than the threshold value and selecting the action to be performed from the second set of actions where the time is greater than the threshold value. 35. A non-transitory computer-readable medium including one or more sequences of instructions that, when executed by one or more processors, cause the processors to perform operations comprising: detecting a gesture input corresponding to an action to be performed on at least one message for a user, wherein the gesture input includes a hold portion and a transverse portion; analyzing the gesture input to identify the action to be performed on the at least one message, wherein the action to be performed is identified based on a length and a direction associated with the transverse portion; displaying based on the analysis, a list of selectable options related to the action; receiving data indicating a selection of a selectable option in the list of selectable options, the selection associated with the at least one message; and sending the data indicating the selection associated with the at least one message to a computing system of a message management service, to define a rule based on the selection indicated by the data and based on the action, wherein the rule indicates a new action to be performed on future messages satisfying the rule. 36. The non-transitory computer-readable medium of claim 35, wherein the operations further comprises: receiving a second message; determining that the second message is associated with the rule; and applying an action associated with the rule to the second message. 37. The non-transitory computer-readable medium of claim 35, wherein the action includes at least one of archiving, moving, or deleting the second message. 38. The non-transitory computer-readable medium of claim 35, wherein analyzing the gesture input to identify the action to be performed further comprises: identifying a first set of actions associated with the transverse portion; and identifying a second set of actions associated with the hold portion based on the first set of actions. 39. The non-transitory computer-readable medium of claim 38, wherein the set of second actions includes creating a rule based on the first set of actions for the selected content item. 40. The non-transitory computer-readable medium of claim 38, wherein identifying a first set of actions associated with the transverse portion further comprises: determining a length and direction associated with the transverse portion; and identifying the first set of actions based on the length and direction. 41. The non-transitory computer-readable medium of claim 35, wherein analyzing the gesture input to identify the action to be performed further comprises: determining a time associated with the hold portion; comparing the time associated with the hold portion to a threshold value; and selecting the action to be performed from the first set of actions where the time is less than the threshold value and selecting the action to be performed from the second set of actions where the time is greater than the threshold value.
Generation of filtering rules for incoming messages can be activated by a user through a gesture-based input. When the user activates filtering rule generation, the message management service can cause a user device to display a prompt requesting additional data to be used to generate the filtering rule. The gesture can be a swipe and hold gesture, where the swipe is associated with an action (archiving, deleting, deferring, or adding the message to a list), and the swipe and hold action can activate filtering rule generation associated with the action.1-20. (canceled) 21. A method comprising: detecting, at a computer device, a gesture input corresponding to an action to be performed on at least one message for a user, wherein the gesture input includes a hold portion and a transverse portion; analyzing, by the computer device, the gesture input to identify the action to be performed on the at least one message, wherein the action to be performed is identified based on a length and a direction associated with the transverse portion; displaying, by the computer device, based on the analysis, a list of selectable options related to the action; receiving, by the computer device, data indicating a selection of a selectable option in the list of selectable options, the selection associated with the at least one message; and sending the data indicating the selection associated with the at least one message from the computer device to a computing system of a message management service, to define a rule based on the selection indicated by the data and based on the action, wherein the rule indicates a new action to be performed on future messages satisfying the rule. 22. The method of claim 21, further comprising: receiving a second message; determining that the second message is associated with the rule; and applying an action associated with the rule to the second message. 23. The method of claim 21, wherein the action includes at least one of archiving, moving, or deleting the second message. 24. The method of claim 21, wherein analyzing the gesture input to identify the action to be performed further comprises: identifying a first set of actions associated with the transverse portion; and identifying a second set of actions associated with the hold portion based on the first set of actions. 25. The method of claim 24, wherein the set of second actions includes creating a rule based on the first set of actions for the selected content item. 26. The method of claim 24, wherein identifying a first set of actions associated with the transverse portion further comprises: determining a length and direction associated with the transverse portion; and identifying the first set of actions based on the length and direction. 27. The method of claim 21, wherein analyzing the gesture input to identify the action to be performed further comprises: determining a time associated with the hold portion; comparing the time associated with the hold portion to a threshold value; and selecting the action to be performed from the first set of actions where the time is less than the threshold value and selecting the action to be performed from the second set of actions where the time is greater than the threshold value. 28. A computer system comprising: one or more processors; and a non-transitory computer-readable medium including one or more sequences of instructions that, when executed by the one or more processors, cause the processors to perform operations comprising: detecting a gesture input corresponding to an action to be performed on at least one message for a user, wherein the gesture input includes a hold portion and a transverse portion; analyzing the gesture input to identify the action to be performed on the at least one message, wherein the action to be performed is identified based on a length and a direction associated with the transverse portion; displaying based on the analysis, a list of selectable options related to the action; receiving data indicating a selection of a selectable option in the list of selectable options, the selection associated with the at least one message; and sending the data indicating the selection associated with the at least one message to a computing system of a message management service, to define a rule based on the selection indicated by the data and based on the action, wherein the rule indicates a new action to be performed on future messages satisfying the rule. 29. The computer system of claim 28, wherein the operations further comprises: receiving a second message; determining that the second message is associated with the rule; and applying an action associated with the rule to the second message. 30. The computer system of claim 28, wherein the action includes at least one of archiving, moving, or deleting the second message. 31. The computer system of claim 28, wherein analyzing the gesture input to identify the action to be performed further comprises: identifying a first set of actions associated with the transverse portion; and identifying a second set of actions associated with the hold portion based on the first set of actions. 32. The computer system of claim 31, wherein the set of second actions includes creating a rule based on the first set of actions for the selected content item. 33. The computer system of claim 31, wherein identifying a first set of actions associated with the transverse portion further comprises: determining a length and direction associated with the transverse portion; and identifying the first set of actions based on the length and direction. 34. The computer system of claim 21, wherein analyzing the gesture input to identify the action to be performed further comprises: determining a time associated with the hold portion; comparing the time associated with the hold portion to a threshold value; and selecting the action to be performed from the first set of actions where the time is less than the threshold value and selecting the action to be performed from the second set of actions where the time is greater than the threshold value. 35. A non-transitory computer-readable medium including one or more sequences of instructions that, when executed by one or more processors, cause the processors to perform operations comprising: detecting a gesture input corresponding to an action to be performed on at least one message for a user, wherein the gesture input includes a hold portion and a transverse portion; analyzing the gesture input to identify the action to be performed on the at least one message, wherein the action to be performed is identified based on a length and a direction associated with the transverse portion; displaying based on the analysis, a list of selectable options related to the action; receiving data indicating a selection of a selectable option in the list of selectable options, the selection associated with the at least one message; and sending the data indicating the selection associated with the at least one message to a computing system of a message management service, to define a rule based on the selection indicated by the data and based on the action, wherein the rule indicates a new action to be performed on future messages satisfying the rule. 36. The non-transitory computer-readable medium of claim 35, wherein the operations further comprises: receiving a second message; determining that the second message is associated with the rule; and applying an action associated with the rule to the second message. 37. The non-transitory computer-readable medium of claim 35, wherein the action includes at least one of archiving, moving, or deleting the second message. 38. The non-transitory computer-readable medium of claim 35, wherein analyzing the gesture input to identify the action to be performed further comprises: identifying a first set of actions associated with the transverse portion; and identifying a second set of actions associated with the hold portion based on the first set of actions. 39. The non-transitory computer-readable medium of claim 38, wherein the set of second actions includes creating a rule based on the first set of actions for the selected content item. 40. The non-transitory computer-readable medium of claim 38, wherein identifying a first set of actions associated with the transverse portion further comprises: determining a length and direction associated with the transverse portion; and identifying the first set of actions based on the length and direction. 41. The non-transitory computer-readable medium of claim 35, wherein analyzing the gesture input to identify the action to be performed further comprises: determining a time associated with the hold portion; comparing the time associated with the hold portion to a threshold value; and selecting the action to be performed from the first set of actions where the time is less than the threshold value and selecting the action to be performed from the second set of actions where the time is greater than the threshold value.
2,400
8,546
8,546
15,665,135
2,415
For a managed network, some embodiments provide a method for a set of service nodes in an active-active service node cluster in conjunction with a host computer hosting a destination data compute node (DCN) to improve the efficiency of directing a return data message to a service node storing state information for the flow to which the data message belongs. A primary service node in some embodiments receives a data message in a particular data message flow addressed to a destination DCN, performs a service on the data message and forwards the data message, along with information identifying the primary service node, to a host computer on which the destination DCN executes. The host computer generates an entry in a reverse forwarding table including identifying information for the particular data message flow and the primary service node to use to forward data messages in the particular data message flow to the primary service node.
1. For a cluster of service nodes that perform a service for different message flows, a method comprising: at a particular service node that is a primary service node for a particular data message flow that is addressed to a destination data compute node (DCN), receiving a data message of the particular data message flow; performing the service on the data message; and forwarding the data message along with information identifying the primary service node to a host computer on which the destination compute node executes for the host computer to use to forward return data messages to the primary service node. 2. The method of claim 1, wherein forwarding the data message comprises encapsulating the data message for delivery to a tunnel endpoint executing on the host computer. 3. The method of claim 2, wherein the information identifying the primary service node is included in an outer header of the encapsulated data message. 4. The method of claim 1 further comprising maintaining session state information for the particular data message flow at the primary service node. 5. The method of claim 4 further comprising: at the primary service node, identifying a secondary service node for the particular data message flow; and sending the session state information to the secondary service node. 6. The method of claim 5, wherein identifying a secondary service node comprises computing a consistent hash of at least one value in the header field of data messages in the particular data message flow to identify the secondary service node. 7. The method of claim 6, wherein the identification is also based on a service cluster membership. 8. The method of claim 7, wherein the received data message is a first data message in the particular data message flow and the service cluster membership is a current service cluster membership. 9. The method of claim 5, wherein information identifying the secondary service node is also forwarded with the data message to the host computer on which the destination compute node executes for the host to use to forward return data messages to the secondary service node if the primary service node is unavailable. 10. The method of claim 9, wherein the information identifying the primary service node and the information identifying the secondary service node are included in an outer header of the encapsulated data message. 11. The method of claim 1, wherein the host computer generates an entry in a reverse forwarding table including identifying information for the particular data message flow and the primary service node to use to forward data messages in the particular data message flow to the primary service node. 12. The method of claim 11 wherein a hypervisor executing on the host computer intercepts return data messages from the destination DCN and uses the entry for the particular data message flow in the reverse forwarding table to forward the data message to the primary service node. 13. A non-transitory machine readable medium storing a program to be executed by a set of processing units of a particular service node that is a primary service node for a particular data message flow that is addressed to a destination data compute node (DCN), the particular service node in a cluster of service nodes that perform a service for different message flows, the program comprising sets of instructions for: receiving a data message of the particular data message flow; performing the service on the data message; and forwarding the data message along with information identifying the primary service node to a host computer on which the destination compute node executes for the host computer to use to forward return data messages to the primary service node. 14. The non-transitory machine readable medium of claim 13, wherein the set of instructions for forwarding the data message comprises a set of instructions for encapsulating the data message for delivery to a tunnel endpoint executing on the host computer. 15. The non-transitory machine readable medium of claim 14, wherein the information identifying the primary service node is included in an outer header of the encapsulated data message. 16. The non-transitory machine readable medium of claim 13 further comprising a set of instructions for maintaining session state information for the particular data message flow at the primary service node. 17. The non-transitory machine readable medium of claim 16 further comprising sets of instructions for: identifying a secondary service node for the particular data message flow; and sending the session state information to the secondary service node, wherein the set of instructions for forwarding the data message further comprises a set of instructions for including information identifying the secondary service node for the host computer to use to forward return data messages to the secondary service node if the primary service node is unavailable. 18. The non-transitory machine readable medium of claim 17, wherein the set of instructions for identifying a secondary service node comprises a set of instructions for computing a consistent hash of at least one value in the header field of data messages in the particular data message flow to identify the secondary service node based on a service cluster membership. 19. The non-transitory machine readable medium of claim 13, wherein the host computer generates an entry in a reverse forwarding table including identifying information for the particular data message flow and the primary service node to use to forward data messages in the particular data message flow to the primary service node. 20. The non-transitory machine readable medium of claim 19 wherein a hypervisor executing on the host computer intercepts return data messages from the destination DCN and uses the entry for the particular data message flow in the reverse forwarding table to forward the data message to the primary service node.
For a managed network, some embodiments provide a method for a set of service nodes in an active-active service node cluster in conjunction with a host computer hosting a destination data compute node (DCN) to improve the efficiency of directing a return data message to a service node storing state information for the flow to which the data message belongs. A primary service node in some embodiments receives a data message in a particular data message flow addressed to a destination DCN, performs a service on the data message and forwards the data message, along with information identifying the primary service node, to a host computer on which the destination DCN executes. The host computer generates an entry in a reverse forwarding table including identifying information for the particular data message flow and the primary service node to use to forward data messages in the particular data message flow to the primary service node.1. For a cluster of service nodes that perform a service for different message flows, a method comprising: at a particular service node that is a primary service node for a particular data message flow that is addressed to a destination data compute node (DCN), receiving a data message of the particular data message flow; performing the service on the data message; and forwarding the data message along with information identifying the primary service node to a host computer on which the destination compute node executes for the host computer to use to forward return data messages to the primary service node. 2. The method of claim 1, wherein forwarding the data message comprises encapsulating the data message for delivery to a tunnel endpoint executing on the host computer. 3. The method of claim 2, wherein the information identifying the primary service node is included in an outer header of the encapsulated data message. 4. The method of claim 1 further comprising maintaining session state information for the particular data message flow at the primary service node. 5. The method of claim 4 further comprising: at the primary service node, identifying a secondary service node for the particular data message flow; and sending the session state information to the secondary service node. 6. The method of claim 5, wherein identifying a secondary service node comprises computing a consistent hash of at least one value in the header field of data messages in the particular data message flow to identify the secondary service node. 7. The method of claim 6, wherein the identification is also based on a service cluster membership. 8. The method of claim 7, wherein the received data message is a first data message in the particular data message flow and the service cluster membership is a current service cluster membership. 9. The method of claim 5, wherein information identifying the secondary service node is also forwarded with the data message to the host computer on which the destination compute node executes for the host to use to forward return data messages to the secondary service node if the primary service node is unavailable. 10. The method of claim 9, wherein the information identifying the primary service node and the information identifying the secondary service node are included in an outer header of the encapsulated data message. 11. The method of claim 1, wherein the host computer generates an entry in a reverse forwarding table including identifying information for the particular data message flow and the primary service node to use to forward data messages in the particular data message flow to the primary service node. 12. The method of claim 11 wherein a hypervisor executing on the host computer intercepts return data messages from the destination DCN and uses the entry for the particular data message flow in the reverse forwarding table to forward the data message to the primary service node. 13. A non-transitory machine readable medium storing a program to be executed by a set of processing units of a particular service node that is a primary service node for a particular data message flow that is addressed to a destination data compute node (DCN), the particular service node in a cluster of service nodes that perform a service for different message flows, the program comprising sets of instructions for: receiving a data message of the particular data message flow; performing the service on the data message; and forwarding the data message along with information identifying the primary service node to a host computer on which the destination compute node executes for the host computer to use to forward return data messages to the primary service node. 14. The non-transitory machine readable medium of claim 13, wherein the set of instructions for forwarding the data message comprises a set of instructions for encapsulating the data message for delivery to a tunnel endpoint executing on the host computer. 15. The non-transitory machine readable medium of claim 14, wherein the information identifying the primary service node is included in an outer header of the encapsulated data message. 16. The non-transitory machine readable medium of claim 13 further comprising a set of instructions for maintaining session state information for the particular data message flow at the primary service node. 17. The non-transitory machine readable medium of claim 16 further comprising sets of instructions for: identifying a secondary service node for the particular data message flow; and sending the session state information to the secondary service node, wherein the set of instructions for forwarding the data message further comprises a set of instructions for including information identifying the secondary service node for the host computer to use to forward return data messages to the secondary service node if the primary service node is unavailable. 18. The non-transitory machine readable medium of claim 17, wherein the set of instructions for identifying a secondary service node comprises a set of instructions for computing a consistent hash of at least one value in the header field of data messages in the particular data message flow to identify the secondary service node based on a service cluster membership. 19. The non-transitory machine readable medium of claim 13, wherein the host computer generates an entry in a reverse forwarding table including identifying information for the particular data message flow and the primary service node to use to forward data messages in the particular data message flow to the primary service node. 20. The non-transitory machine readable medium of claim 19 wherein a hypervisor executing on the host computer intercepts return data messages from the destination DCN and uses the entry for the particular data message flow in the reverse forwarding table to forward the data message to the primary service node.
2,400
8,547
8,547
15,248,048
2,488
A method of monitoring and verifying weather information using a weather condition detection system of a vehicle is provided. The method includes receiving weather information by a computing device within the vehicle. The weather information is verified locally at the vehicle using the computing device. Verifying the weather information includes optically verifying the weather information using a vehicle video system of the vehicle comprising a camera.
1. A method of monitoring and verifying weather information using a weather condition detection system of a vehicle, the method comprising: receiving weather information by a computing device within the vehicle; and verifying the weather information locally at the vehicle using the computing device, wherein verifying the weather information includes optically verifying the weather information using a vehicle video system of the vehicle comprising a camera. 2. The method of claim 1 comprising receiving the weather information from an external weather information providing system, the weather information being externally provided weather information. 3. The method of claim 2 further comprising connecting a communications module of the vehicle to the external weather information providing system. 4. The method of claim 1 comprising receiving internally provided weather information by the computing device from the vehicle video system. 5. The method of claim 4, wherein the internally provided weather information includes an image of a weather event. 6. The method of claim 1, determining an initial weather significance level by the computing device using the weather information. 7. The method of claim 6 further comprising activating the vehicle video system only if the initial weather significance level is at least a predetermined initial weather significance level. 8. The method of claim 7 further comprising determining an actual weather significance level using image data provided by the camera. 9. The method of claim 8 further comprising the vehicle performing a vehicle function only if the actual weather significance level is at least a predetermined actual weather significance level. 10. The method of claim 1, wherein the weather information is provided by a sensor of the vehicle other than the camera. 11. A method of providing a weather notification to a vehicle user of a vehicle based on locally provided weather information by the vehicle, the method comprising: receiving locally provided weather information by a computing device in the vehicle, the locally provided weather information comprising image data of a weather event provided using a vehicle video system of the vehicle; and sending the weather notification to the vehicle user based on the locally provided weather information. 12. The method of claim 11, wherein the weather notification is sent by the vehicle. 13. The method of claim 11, wherein the weather information comprises one or more of weather event type information and weather severity information. 14. The method of claim 13 further comprising: receiving externally provided weather information by the computing device from an external weather providing system; and verifying the externally provided weather information using the locally provided weather information and the computing device. 15. The method of claim 14 further comprising connecting a communications module of the vehicle to the external weather information providing system. 16. The method of claim 14 further comprising determining an initial weather significance level by the computing device using the externally provided weather information. 17. A vehicle comprising a weather condition detection system, the vehicle comprising: a communications module that connects to an external weather information providing system using a communications network; a vehicle video system comprising a camera at the vehicle that generates locally provided weather information comprising image data; and a computing module that receives externally provided weather information from the external weather information providing system and the locally provided weather information from the vehicle video system, the computing module including logic that verifies the externally provided weather information using the image data. 18. The vehicle of claim 17, wherein the computing module determines an initial weather significance level using the externally provided weather information. 19. The vehicle of claim 18, wherein the computing module activates the vehicle video system only if the initial weather significance level is at least a predetermined initial weather significance level. 20. The vehicle of claim 18, wherein the computing module determines an actual weather significance level using the image data provided by the camera.
A method of monitoring and verifying weather information using a weather condition detection system of a vehicle is provided. The method includes receiving weather information by a computing device within the vehicle. The weather information is verified locally at the vehicle using the computing device. Verifying the weather information includes optically verifying the weather information using a vehicle video system of the vehicle comprising a camera.1. A method of monitoring and verifying weather information using a weather condition detection system of a vehicle, the method comprising: receiving weather information by a computing device within the vehicle; and verifying the weather information locally at the vehicle using the computing device, wherein verifying the weather information includes optically verifying the weather information using a vehicle video system of the vehicle comprising a camera. 2. The method of claim 1 comprising receiving the weather information from an external weather information providing system, the weather information being externally provided weather information. 3. The method of claim 2 further comprising connecting a communications module of the vehicle to the external weather information providing system. 4. The method of claim 1 comprising receiving internally provided weather information by the computing device from the vehicle video system. 5. The method of claim 4, wherein the internally provided weather information includes an image of a weather event. 6. The method of claim 1, determining an initial weather significance level by the computing device using the weather information. 7. The method of claim 6 further comprising activating the vehicle video system only if the initial weather significance level is at least a predetermined initial weather significance level. 8. The method of claim 7 further comprising determining an actual weather significance level using image data provided by the camera. 9. The method of claim 8 further comprising the vehicle performing a vehicle function only if the actual weather significance level is at least a predetermined actual weather significance level. 10. The method of claim 1, wherein the weather information is provided by a sensor of the vehicle other than the camera. 11. A method of providing a weather notification to a vehicle user of a vehicle based on locally provided weather information by the vehicle, the method comprising: receiving locally provided weather information by a computing device in the vehicle, the locally provided weather information comprising image data of a weather event provided using a vehicle video system of the vehicle; and sending the weather notification to the vehicle user based on the locally provided weather information. 12. The method of claim 11, wherein the weather notification is sent by the vehicle. 13. The method of claim 11, wherein the weather information comprises one or more of weather event type information and weather severity information. 14. The method of claim 13 further comprising: receiving externally provided weather information by the computing device from an external weather providing system; and verifying the externally provided weather information using the locally provided weather information and the computing device. 15. The method of claim 14 further comprising connecting a communications module of the vehicle to the external weather information providing system. 16. The method of claim 14 further comprising determining an initial weather significance level by the computing device using the externally provided weather information. 17. A vehicle comprising a weather condition detection system, the vehicle comprising: a communications module that connects to an external weather information providing system using a communications network; a vehicle video system comprising a camera at the vehicle that generates locally provided weather information comprising image data; and a computing module that receives externally provided weather information from the external weather information providing system and the locally provided weather information from the vehicle video system, the computing module including logic that verifies the externally provided weather information using the image data. 18. The vehicle of claim 17, wherein the computing module determines an initial weather significance level using the externally provided weather information. 19. The vehicle of claim 18, wherein the computing module activates the vehicle video system only if the initial weather significance level is at least a predetermined initial weather significance level. 20. The vehicle of claim 18, wherein the computing module determines an actual weather significance level using the image data provided by the camera.
2,400
8,548
8,548
13,630,535
2,477
A User Equipment (UE) in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme receives Downlink Control Information (DCI) including CoMP control information, determines a starting position of a data channel on wireless resources, based on starting position information of a data channel included in the CoMP control information and used in each of a plurality of cells, and receives data from the plurality of cells starting from the determined starting position.
1. A method for receiving data by a User Equipment (UE) in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the method comprising: receiving Downlink Control Information (DCI) including CoMP control information; determining a starting position of a data channel on wireless resources based on starting position information included in the CoMP control information and used in each of a plurality of cells; and receiving data from the plurality of cells starting from the determined starting position. 2. The method of claim 1, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 3. The method of claim 1, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 4. The method of claim 1, wherein the starting position information of a data channel used in each of the plurality of cells includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 5. The method of claim 1, further comprising: when a Carrier Indicator Field (CIF), indicated by a carrier to be used by the UE among a plurality of carriers, is included in the DCI, determining the starting position of a data channel on wireless resources based on the CIF instead of the CoMP control information, and wherein determining the starting position of a data channel on wireless resources based on the CIF comprises determining the starting position of a data channel on wireless resources, based on at least one of CRS resource information indicated by the CIF, MBSFN subframe information indicated by the CIF, and starting position information of a data channel indicated by the CIF and used in each of the plurality of cells. 6. A method for transmitting data by an enhanced Node B (eNB) in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the method comprising: generating CoMP control information including starting position information of a data channel on wireless resources used in each of a plurality of cells; transmitting the CoMP control information and Downlink Control Information (DCI) to a User Equipment (UE); and transmitting data to the UE starting from a starting position of a data channel on wireless resources. 7. The method of claim 6, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 8. The method of claim 6, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 9. The method of claim 6, wherein the starting position information of a data channel used in each of the plurality of cells, includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 10. The method of claim 6, wherein the DCI further includes a Carrier Indicator Field (CIF) indicating a carrier to be used by the UE among a plurality of carriers, and wherein the CIF indicates at least one of CRS resource information, MBSFN subframe information, and the starting position information of a data channel used in each of the plurality of cells. 11. A User Equipment (UE) apparatus in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the UE apparatus comprising: a reception unit configured to receive Downlink Control Information (DCI) including CoMP control information; and a controller configured to determine a starting position of a data channel on wireless resources based on starting position information included in the CoMP control information and used in each of a plurality of cells, and control the reception unit to receive data from the plurality of cells starting from the determined starting position. 12. The UE apparatus of claim 11, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 13. The UE apparatus of claim 11, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 14. The UE apparatus of claim 11, wherein the starting position information of a data channel used in each of the plurality of cells, includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 15. The UE apparatus of claim 11, wherein when a Carrier Indicator Field (CIF) indicating a carrier to be used by the UE among a plurality of carriers is included in the DCI, the controller determines a starting position of a data channel on wireless resources based on the CIF instead of the CoMP control information, and wherein the controller determines the starting position of a data channel on wireless resources, based on at least one of CRS resource information indicated by the CIF, MBSFN subframe information indicated by the CIF, and the starting position information of a data channel indicated by the CIF and used in each of the plurality of cells. 16. An enhanced Node B (eNB) apparatus in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the eNB apparatus comprising: a transmission unit; and a controller for generating CoMP control information including starting position information of a data channel used in each of a plurality of cells, and controlling the transmission unit to transmit the CoMP control information and Downlink Control Information (DCI) to a User Equipment (UE) and to transmit data to the UE starting from a starting position of a data channel on wireless resources. 17. The eNB apparatus of claim 16, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 18. The eNB apparatus of claim 16, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 19. The eNB apparatus of claim 16, wherein the starting position information of a data channel used in each of the plurality of cells, includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 20. The eNB apparatus of claim 16, wherein the DCI further includes a Carrier Indicator Field (CIF) indicating a carrier to be used by the UE among a plurality of carriers, and wherein the CIF indicates at least one of CRS resource information, MBSFN subframe information, and the starting position information of a data channel used in each of the plurality of cells.
A User Equipment (UE) in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme receives Downlink Control Information (DCI) including CoMP control information, determines a starting position of a data channel on wireless resources, based on starting position information of a data channel included in the CoMP control information and used in each of a plurality of cells, and receives data from the plurality of cells starting from the determined starting position.1. A method for receiving data by a User Equipment (UE) in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the method comprising: receiving Downlink Control Information (DCI) including CoMP control information; determining a starting position of a data channel on wireless resources based on starting position information included in the CoMP control information and used in each of a plurality of cells; and receiving data from the plurality of cells starting from the determined starting position. 2. The method of claim 1, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 3. The method of claim 1, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 4. The method of claim 1, wherein the starting position information of a data channel used in each of the plurality of cells includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 5. The method of claim 1, further comprising: when a Carrier Indicator Field (CIF), indicated by a carrier to be used by the UE among a plurality of carriers, is included in the DCI, determining the starting position of a data channel on wireless resources based on the CIF instead of the CoMP control information, and wherein determining the starting position of a data channel on wireless resources based on the CIF comprises determining the starting position of a data channel on wireless resources, based on at least one of CRS resource information indicated by the CIF, MBSFN subframe information indicated by the CIF, and starting position information of a data channel indicated by the CIF and used in each of the plurality of cells. 6. A method for transmitting data by an enhanced Node B (eNB) in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the method comprising: generating CoMP control information including starting position information of a data channel on wireless resources used in each of a plurality of cells; transmitting the CoMP control information and Downlink Control Information (DCI) to a User Equipment (UE); and transmitting data to the UE starting from a starting position of a data channel on wireless resources. 7. The method of claim 6, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 8. The method of claim 6, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 9. The method of claim 6, wherein the starting position information of a data channel used in each of the plurality of cells, includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 10. The method of claim 6, wherein the DCI further includes a Carrier Indicator Field (CIF) indicating a carrier to be used by the UE among a plurality of carriers, and wherein the CIF indicates at least one of CRS resource information, MBSFN subframe information, and the starting position information of a data channel used in each of the plurality of cells. 11. A User Equipment (UE) apparatus in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the UE apparatus comprising: a reception unit configured to receive Downlink Control Information (DCI) including CoMP control information; and a controller configured to determine a starting position of a data channel on wireless resources based on starting position information included in the CoMP control information and used in each of a plurality of cells, and control the reception unit to receive data from the plurality of cells starting from the determined starting position. 12. The UE apparatus of claim 11, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 13. The UE apparatus of claim 11, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 14. The UE apparatus of claim 11, wherein the starting position information of a data channel used in each of the plurality of cells, includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 15. The UE apparatus of claim 11, wherein when a Carrier Indicator Field (CIF) indicating a carrier to be used by the UE among a plurality of carriers is included in the DCI, the controller determines a starting position of a data channel on wireless resources based on the CIF instead of the CoMP control information, and wherein the controller determines the starting position of a data channel on wireless resources, based on at least one of CRS resource information indicated by the CIF, MBSFN subframe information indicated by the CIF, and the starting position information of a data channel indicated by the CIF and used in each of the plurality of cells. 16. An enhanced Node B (eNB) apparatus in a wireless communication system using a Coordinated Multi-Point transmission/reception (CoMP) scheme, the eNB apparatus comprising: a transmission unit; and a controller for generating CoMP control information including starting position information of a data channel used in each of a plurality of cells, and controlling the transmission unit to transmit the CoMP control information and Downlink Control Information (DCI) to a User Equipment (UE) and to transmit data to the UE starting from a starting position of a data channel on wireless resources. 17. The eNB apparatus of claim 16, wherein the CoMP control information further includes at least one of Cell-specific Reference Signal (CRS) resource information corresponding to each of the plurality of cells and Multicast Broadcast Single Frequency Network (MBSFN) subframe configuration information corresponding to each of the plurality of cells, and wherein the CRS resource information corresponding to each of the plurality of cells includes information about a number of CRS antenna ports used in each of the plurality of cells and information about a CRS frequency domain offset. 18. The eNB apparatus of claim 16, wherein the CoMP control information includes index information corresponding to at least one of the starting position information of a data channel used in each of the plurality of cells, CRS resource information corresponding to each of the plurality of cells, and MBSFN subframe information corresponding to each of the plurality of cells. 19. The eNB apparatus of claim 16, wherein the starting position information of a data channel used in each of the plurality of cells, includes size information of a control region determined by a Physical Control Format Indicator CHannel (PCFICH) used in each of the plurality of cells. 20. The eNB apparatus of claim 16, wherein the DCI further includes a Carrier Indicator Field (CIF) indicating a carrier to be used by the UE among a plurality of carriers, and wherein the CIF indicates at least one of CRS resource information, MBSFN subframe information, and the starting position information of a data channel used in each of the plurality of cells.
2,400
8,549
8,549
14,533,954
2,465
Aspects of the disclosure provide for a thin control channel structure that can be utilized to enable multiplexing of two or more data transmission formats. For example, a thin control channel may carry information that enables ongoing transmissions utilizing a first, relatively long transmission time interval (TTI) to be punctured, and during the punctured portion of the long TTI, a transmission utilizing a second, relatively short TTI may be inserted. This puncturing is enabled by virtue of a thin channel structure wherein a control channel can carry scheduling information, grants, etc., informing receiving devices of the puncturing that is occurring or will occur. Furthermore, the thin control channel can be utilized to carry other control information, not being limited to puncturing information. Other aspects, embodiments, and features are also claimed and described.
1. A method of wireless communication, comprising: receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); receiving the first user data on the downlink data channel utilizing the first TTI; and receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 2. The method of claim 1, further comprising: processing the first user data, while ignoring a portion of the first user data as indicated by the received control information. 3. The method of claim 2, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 4. A method of wireless communication operable at a user equipment (UE), comprising: receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and receiving second user data on the downlink data channel utilizing the second TTI. 5. The method of claim 4, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 6. A method of wireless communication, comprising: receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); transmitting the user data on the uplink data channel utilizing the first TTI; receiving an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and modifying the transmission of the user data according to the uplink grant modification. 7. The method of claim 6, wherein the modifying of the transmission of the user data comprises puncturing the user data. 8. The method of claim 6, wherein the modifying of the transmission of the user data comprises modifying a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 9. A method of wireless communication operable at a user equipment (UE), comprising: receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); transmitting a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and transmitting the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 10. The method of claim 9, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 11. The method of claim 9, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 12. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to receive the first user data on the downlink data channel utilizing the first TTI; and utilize the transceiver to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 13. The UE of claim 12, wherein the at least one processor is further configured to process the first user data, while ignoring a portion of the first user data as indicated by the received control information. 14. The UE of claim 13, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 15. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and utilize the transceiver to receive second user data on the downlink data channel utilizing the second TTI. 16. The UE of claim 15, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 17. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to transmit the user data on the uplink data channel utilizing the first TTI; utilize the transceiver to receive an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and modify the transmission of the user data according to the uplink grant modification. 18. The UE of claim 17, wherein the at least one processor, being configured to modify the transmission of the user data, is further configured to puncture the user data. 19. The UE of claim 17, wherein the at least one processor, being configured to modify the transmission of the user data, is further configured to modify a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 20. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to transmit a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; utilize the transceiver to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and utilize the transceiver to transmit the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 21. The UE of claim 20, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 22. The UE of claim 20, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 23. A user equipment (UE) configured for wireless communication, comprising: means for receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); means for receiving the first user data on the downlink data channel utilizing the first TTI; and means for receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 24. The UE of claim 23, further comprising: means for processing the first user data, while ignoring a portion of the first user data as indicated by the received control information. 25. The UE of claim 24, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 26. A user equipment (UE) configured for wireless communication, comprising: means for receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); means for receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and means for receiving second user data on the downlink data channel utilizing the second TTI. 27. The UE of claim 26, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 28. A user equipment (UE) configured for wireless communication, comprising: means for receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); means for transmitting the user data on the uplink data channel utilizing the first TTI; means for receiving an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and means for modifying the transmission of the user data according to the uplink grant modification. 29. The UE of claim 28, wherein the means for modifying the transmission of the user data is further configured for puncturing the user data. 30. The UE of claim 28, wherein the means for modifying the transmission of the user data is further configured for modifying a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 31. A user equipment (UE) configured for wireless communication, comprising: means for receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); means for transmitting a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; means for receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and means for transmitting the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 32. The UE of claim 31, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 33. The UE of claim 31, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 34. A computer-readable medium storing computer-executable code, comprising: instructions for causing a computer to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to receive the first user data on the downlink data channel utilizing the first TTI; and instructions for causing a computer to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 35. The computer-readable medium of claim 34, further comprising: instructions for causing a computer to process the first user data, while ignoring a portion of the first user data as indicated by the received control information. 36. The computer-readable medium of claim 35, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 37. A method of wireless communication operable at a user equipment (UE), comprising: instructions for causing a computer to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and instructions for causing a computer to receive second user data on the downlink data channel utilizing the second TTI. 38. The computer-readable medium of claim 37, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 39. A method of wireless communication, comprising: instructions for causing a computer to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to transmit the user data on the uplink data channel utilizing the first TTI; instructions for causing a computer to receive an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and instructions for causing a computer to modify the transmission of the user data according to the uplink grant modification. 40. The computer-readable medium of claim 39, wherein the instructions for causing a computer to modify the transmission of the user data are further configured for puncturing the user data. 41. The computer-readable medium of claim 39, wherein the instructions for causing a computer to modify the transmission of the user data are further configured for modifying a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 42. A method of wireless communication operable at a user equipment (UE), comprising: instructions for causing a computer to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to transmit a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; instructions for causing a computer to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and instructions for causing a computer to transmit the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 43. The computer-readable medium of claim 42, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 44. The computer-readable medium of claim 42, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE.
Aspects of the disclosure provide for a thin control channel structure that can be utilized to enable multiplexing of two or more data transmission formats. For example, a thin control channel may carry information that enables ongoing transmissions utilizing a first, relatively long transmission time interval (TTI) to be punctured, and during the punctured portion of the long TTI, a transmission utilizing a second, relatively short TTI may be inserted. This puncturing is enabled by virtue of a thin channel structure wherein a control channel can carry scheduling information, grants, etc., informing receiving devices of the puncturing that is occurring or will occur. Furthermore, the thin control channel can be utilized to carry other control information, not being limited to puncturing information. Other aspects, embodiments, and features are also claimed and described.1. A method of wireless communication, comprising: receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); receiving the first user data on the downlink data channel utilizing the first TTI; and receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 2. The method of claim 1, further comprising: processing the first user data, while ignoring a portion of the first user data as indicated by the received control information. 3. The method of claim 2, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 4. A method of wireless communication operable at a user equipment (UE), comprising: receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and receiving second user data on the downlink data channel utilizing the second TTI. 5. The method of claim 4, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 6. A method of wireless communication, comprising: receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); transmitting the user data on the uplink data channel utilizing the first TTI; receiving an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and modifying the transmission of the user data according to the uplink grant modification. 7. The method of claim 6, wherein the modifying of the transmission of the user data comprises puncturing the user data. 8. The method of claim 6, wherein the modifying of the transmission of the user data comprises modifying a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 9. A method of wireless communication operable at a user equipment (UE), comprising: receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); transmitting a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and transmitting the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 10. The method of claim 9, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 11. The method of claim 9, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 12. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to receive the first user data on the downlink data channel utilizing the first TTI; and utilize the transceiver to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 13. The UE of claim 12, wherein the at least one processor is further configured to process the first user data, while ignoring a portion of the first user data as indicated by the received control information. 14. The UE of claim 13, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 15. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and utilize the transceiver to receive second user data on the downlink data channel utilizing the second TTI. 16. The UE of claim 15, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 17. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to transmit the user data on the uplink data channel utilizing the first TTI; utilize the transceiver to receive an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and modify the transmission of the user data according to the uplink grant modification. 18. The UE of claim 17, wherein the at least one processor, being configured to modify the transmission of the user data, is further configured to puncture the user data. 19. The UE of claim 17, wherein the at least one processor, being configured to modify the transmission of the user data, is further configured to modify a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 20. A user equipment (UE) configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to transmit a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; utilize the transceiver to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and utilize the transceiver to transmit the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 21. The UE of claim 20, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 22. The UE of claim 20, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 23. A user equipment (UE) configured for wireless communication, comprising: means for receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); means for receiving the first user data on the downlink data channel utilizing the first TTI; and means for receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 24. The UE of claim 23, further comprising: means for processing the first user data, while ignoring a portion of the first user data as indicated by the received control information. 25. The UE of claim 24, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 26. A user equipment (UE) configured for wireless communication, comprising: means for receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); means for receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and means for receiving second user data on the downlink data channel utilizing the second TTI. 27. The UE of claim 26, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 28. A user equipment (UE) configured for wireless communication, comprising: means for receiving a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); means for transmitting the user data on the uplink data channel utilizing the first TTI; means for receiving an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and means for modifying the transmission of the user data according to the uplink grant modification. 29. The UE of claim 28, wherein the means for modifying the transmission of the user data is further configured for puncturing the user data. 30. The UE of claim 28, wherein the means for modifying the transmission of the user data is further configured for modifying a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 31. A user equipment (UE) configured for wireless communication, comprising: means for receiving a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); means for transmitting a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; means for receiving control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and means for transmitting the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 32. The UE of claim 31, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 33. The UE of claim 31, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 34. A computer-readable medium storing computer-executable code, comprising: instructions for causing a computer to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for receiving first user data on a downlink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to receive the first user data on the downlink data channel utilizing the first TTI; and instructions for causing a computer to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the receiving of the first user data, the control information being configured to modify processing of the downlink data channel. 35. The computer-readable medium of claim 34, further comprising: instructions for causing a computer to process the first user data, while ignoring a portion of the first user data as indicated by the received control information. 36. The computer-readable medium of claim 35, wherein the ignored portion of the first user data corresponds to the second TTI during which the control information is received. 37. A method of wireless communication operable at a user equipment (UE), comprising: instructions for causing a computer to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on a downlink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during transmission of the first user data on the downlink data channel, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and instructions for causing a computer to receive second user data on the downlink data channel utilizing the second TTI. 38. The computer-readable medium of claim 37, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE. 39. A method of wireless communication, comprising: instructions for causing a computer to receive a resource assignment on a downlink assignment channel, the resource assignment comprising a grant of time-frequency resources for transmitting user data on an uplink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to transmit the user data on the uplink data channel utilizing the first TTI; instructions for causing a computer to receive an uplink grant modification on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the uplink grant modification comprising information indicating that the grant of time-frequency resources is modified, and identifying time-frequency resources during which to modify the transmission of the user data; and instructions for causing a computer to modify the transmission of the user data according to the uplink grant modification. 40. The computer-readable medium of claim 39, wherein the instructions for causing a computer to modify the transmission of the user data are further configured for puncturing the user data. 41. The computer-readable medium of claim 39, wherein the instructions for causing a computer to modify the transmission of the user data are further configured for modifying a rate matching algorithm to account for data losses in accordance with the modified transmission of the user data. 42. A method of wireless communication operable at a user equipment (UE), comprising: instructions for causing a computer to receive a first resource assignment on a downlink assignment channel, the first resource assignment comprising a grant of time-frequency resources corresponding to first user data on an uplink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to transmit a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; instructions for causing a computer to receive control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI, the control information comprising a grant of time-frequency resources corresponding to second user data on the downlink data channel utilizing the second TTI; and instructions for causing a computer to transmit the second user data on the uplink channel utilizing the second TTI in accordance with the granted time-frequency resources. 43. The computer-readable medium of claim 42, wherein the scheduling request is transmitted on the uplink feedback channel utilizing the second TTI. 44. The computer-readable medium of claim 42, wherein the first resource assignment is configured to grant time-frequency resources to a set of one or more subordinate entities not including the UE.
2,400
8,550
8,550
16,011,333
2,476
Certain aspects involve a wideband remote unit. The wideband remote unit can include one or more antennas and an analog-to-digital converter (“ADC”). The antenna can receive wideband signals. The wideband signals can include an uplink RF signal and a leaked downlink RF signal. The uplink RF signal can have an uplink signal power at or near a noise level. The leaked downlink RF signal can have a downlink signal power greater than the uplink signal power. The ADC can convert the received wideband signals to digital RF signals representing the uplink signal and the downlink signal. The wideband remote unit can transmit the digital RF signals to a unit of a DAS that is in communication with a base station.
1. A wideband remote unit of a digital antenna system, the remote unit comprising: a downlink path, wherein the wideband remote unit is configured to wirelessly transmit a downlink RF signal received from a base station via a unit of the distributive antenna system in communication with the base station; and an wideband uplink path that transmits in the uplink direction to the unit of the distributive antenna system a signal comprising a digital representation of an uplink RF signal wirelessly received from a user by the wideband remote unit and a digital representation of a leaked downlink RF signal, wherein the leaked downlink RF signal includes signal power from the downlink RF signal that has leaked into the uplink path. 2. The remote unit of claim 1, further comprising: a converter in the wideband uplink path that receives both the uplink RF signal and the leaked downlink RF signal, wherein the converter generates the signal comprising the digital representation of the uplink RF signal and the digital representation of the leaked downlink RF signal by processing both the uplink RF signal and the leaked downlink RF signal. 3. The remote unit of claim 2, wherein the converter is configured with a dynamic range suitable to digitize both the uplink RF signal and the leaked downlink RF signal. 4. The remote unit of claim 2, wherein an uplink signal power of the uplink RF signal has a thermal noise level associated with the wideband remote unit, wherein the converter comprises an analog-to-digital converter, wherein a dynamic range of the converter is a function of a dynamic range of the analog-to-digital converter, wherein the minimum value of the dynamic range of the converter corresponds to the thermal noise level and the maximum value of the dynamic range of the converter corresponds to a downlink signal power of the downlink RF signal. 5. The remote unit of claim 2, wherein the converter comprises at least one analog-to-digital converter configured with a sampling rate corresponding to a maximum RF frequency of the composite uplink signal and the data rate for the digital communication link. 6. The remote unit of claim 1, further comprising a splitter-combiner configured to couple to an antenna; wherein an output of the downlink path is coupled to the splitter-combiner; wherein an input of the uplink path is coupled to the splitter-combiner; and wherein the leaked downlink RF signal is leaked into the uplink path via the splitter-combiner. 7. A distributed antenna system comprising: a first unit of the distributed antenna system in communication with a base station; a second unit of the distributed antenna system in communication with the first unit, the second unit comprising: a downlink path, wherein the wideband remote unit is configured to wirelessly transmit a downlink RF signal received from the base station via the first unit of the distributive antenna system; and an wideband uplink path that transmits in the uplink direction to the unit of the distributive antenna system a signal comprising a digital representation of an uplink RF signal wirelessly received from a user by the wideband remote unit and a digital representation of a leaked downlink RF signal, wherein the leaked downlink RF signal includes signal power from the downlink RF signal that has leaked into the uplink path. 8. The distributed antenna system of claim 7, wherein the second unit further comprises a splitter-combiner configured to couple to an antenna; wherein an output of the downlink path is coupled to the splitter-combiner; wherein an input of the uplink path is coupled to the splitter-combiner; and wherein the leaked downlink RF signal enters the uplink path via the splitter-combiner. 9. The distributed antenna system of claim 7, wherein the second unit further comprises: a converter in the wideband uplink path that receives both the uplink RF signal and the leaked downlink RF signal, wherein the converter generates the signal comprising the digital representation of the uplink RF signal and the digital representation of the leaked downlink RF signal by processing both the uplink RF signal and the leaked downlink RF signal. 10. The distributed antenna system of claim 9, wherein the converter is configured with a dynamic range suitable to digitize both the uplink RF signal and the leaked downlink RF signal 11. The distributed antenna system of claim 9, wherein the dynamic range of the converter is based on a data rate for a digital communication link between the first unit and the second unit. 12. The distributed antenna system of claim 9, wherein an uplink signal power of the uplink RF signal has a thermal noise level associated with the wideband remote unit, wherein the converter comprises an analog-to-digital converter, wherein a dynamic range of the converter is a function of a dynamic range of the analog-to-digital converter, wherein the minimum value of the dynamic range of the converter corresponds to the thermal noise level and the maximum value of the dynamic range of the converter corresponds to a downlink signal power of the downlink RF signal. 13. The distributed antenna system of claim 12, wherein the analog-to-digital converter has a sampling rate corresponding to a maximum RF frequency of the wideband composite uplink signal and the data rate for the digital communication link. 14. The distributed antenna system of claim 7, wherein the first unit comprises a non-duplexer isolation sub-system configured to mitigate the representation of the leaked downlink RF signal. 15. The distributed antenna system of claim 7, wherein the first unit is configured to mitigate representation of the leaked downlink RF signal by at least one of: filtering the representation of the leaked downlink RF signal from the wideband composite uplink signal; cancelling the representation of the leaked downlink RF signal from the wideband composite uplink signal; or attenuating the representation of the leaked downlink RF signal. 16. The distributed antenna system of claim 7, wherein the first unit is configured to mitigate the representation of the leaked downlink RF signal by: correlating a downlink signal traversing the downlink path with a signal component traversing the uplink path; generating a cancellation signal corresponding to the representation of the leaked downlink RF signal based on correlating the downlink signal traversing the downlink path with the signal component traversing the uplink path; and combining the cancellation signal with a combined uplink signal generated from the representation of the uplink RF signal. 17. The distributed antenna system of claim 7, wherein the downlink RF signal comprises a first multiple-input, multiple-output data stream received from the first unit, wherein the distributed antenna system further comprises: a third unit configured to: wirelessly transmit an additional downlink RF signal comprising a second multiple-input, multiple-output data stream, wherein an additional leaked downlink RF signal is obtained from the additional downlink RF signal wirelessly transmitted by the third unit, and transmit a third digital RF signal to the first unit, wherein the third digital RF signal is generated from the additional leaked downlink RF signal, wherein the first unit is further configured to mitigate the third digital RF signal. 18. A method for a wideband remote unit of a digital antenna system, the method comprising: wirelessly transmitting a downlink RF signal from a downlink path of a remote antenna unit, wherein the downlink RF signal is received from a base station via a unit of the distributive antenna system in communication with the base station; transmitting in an uplink direction to the unit of the distributive antenna system a signal comprising a digital representation of an uplink RF signal wirelessly received from a user by the wideband remote unit and a digital representation of a leaked downlink RF signal, wherein the leaked downlink RF signal includes signal power from the downlink RF signal that has leaked into the uplink path. 19. The method of claim 18, further comprising: with a converter in the wideband uplink path that receives both the uplink RF signal and the leaked downlink RF signal, generating the signal comprising the digital representation of the uplink RF signal and the digital representation of the leaked downlink RF signal by processing both the uplink RF signal and the leaked downlink RF signal; wherein the converter is configured with a dynamic range suitable to digitize both the uplink RF signal and the leaked downlink RF signal 20. The method of claim 18, further comprising: mitigating the representation of the leaked downlink RF signal at the unit, wherein mitigating the representation of the leaked downlink RF signal comprises at least one of: filtering the representation of the leaked downlink RF signal from the wideband composite uplink signal; cancelling the representation of the leaked downlink RF signal from the wideband composite uplink signal; or attenuating the representation of the leaked downlink RF signal.
Certain aspects involve a wideband remote unit. The wideband remote unit can include one or more antennas and an analog-to-digital converter (“ADC”). The antenna can receive wideband signals. The wideband signals can include an uplink RF signal and a leaked downlink RF signal. The uplink RF signal can have an uplink signal power at or near a noise level. The leaked downlink RF signal can have a downlink signal power greater than the uplink signal power. The ADC can convert the received wideband signals to digital RF signals representing the uplink signal and the downlink signal. The wideband remote unit can transmit the digital RF signals to a unit of a DAS that is in communication with a base station.1. A wideband remote unit of a digital antenna system, the remote unit comprising: a downlink path, wherein the wideband remote unit is configured to wirelessly transmit a downlink RF signal received from a base station via a unit of the distributive antenna system in communication with the base station; and an wideband uplink path that transmits in the uplink direction to the unit of the distributive antenna system a signal comprising a digital representation of an uplink RF signal wirelessly received from a user by the wideband remote unit and a digital representation of a leaked downlink RF signal, wherein the leaked downlink RF signal includes signal power from the downlink RF signal that has leaked into the uplink path. 2. The remote unit of claim 1, further comprising: a converter in the wideband uplink path that receives both the uplink RF signal and the leaked downlink RF signal, wherein the converter generates the signal comprising the digital representation of the uplink RF signal and the digital representation of the leaked downlink RF signal by processing both the uplink RF signal and the leaked downlink RF signal. 3. The remote unit of claim 2, wherein the converter is configured with a dynamic range suitable to digitize both the uplink RF signal and the leaked downlink RF signal. 4. The remote unit of claim 2, wherein an uplink signal power of the uplink RF signal has a thermal noise level associated with the wideband remote unit, wherein the converter comprises an analog-to-digital converter, wherein a dynamic range of the converter is a function of a dynamic range of the analog-to-digital converter, wherein the minimum value of the dynamic range of the converter corresponds to the thermal noise level and the maximum value of the dynamic range of the converter corresponds to a downlink signal power of the downlink RF signal. 5. The remote unit of claim 2, wherein the converter comprises at least one analog-to-digital converter configured with a sampling rate corresponding to a maximum RF frequency of the composite uplink signal and the data rate for the digital communication link. 6. The remote unit of claim 1, further comprising a splitter-combiner configured to couple to an antenna; wherein an output of the downlink path is coupled to the splitter-combiner; wherein an input of the uplink path is coupled to the splitter-combiner; and wherein the leaked downlink RF signal is leaked into the uplink path via the splitter-combiner. 7. A distributed antenna system comprising: a first unit of the distributed antenna system in communication with a base station; a second unit of the distributed antenna system in communication with the first unit, the second unit comprising: a downlink path, wherein the wideband remote unit is configured to wirelessly transmit a downlink RF signal received from the base station via the first unit of the distributive antenna system; and an wideband uplink path that transmits in the uplink direction to the unit of the distributive antenna system a signal comprising a digital representation of an uplink RF signal wirelessly received from a user by the wideband remote unit and a digital representation of a leaked downlink RF signal, wherein the leaked downlink RF signal includes signal power from the downlink RF signal that has leaked into the uplink path. 8. The distributed antenna system of claim 7, wherein the second unit further comprises a splitter-combiner configured to couple to an antenna; wherein an output of the downlink path is coupled to the splitter-combiner; wherein an input of the uplink path is coupled to the splitter-combiner; and wherein the leaked downlink RF signal enters the uplink path via the splitter-combiner. 9. The distributed antenna system of claim 7, wherein the second unit further comprises: a converter in the wideband uplink path that receives both the uplink RF signal and the leaked downlink RF signal, wherein the converter generates the signal comprising the digital representation of the uplink RF signal and the digital representation of the leaked downlink RF signal by processing both the uplink RF signal and the leaked downlink RF signal. 10. The distributed antenna system of claim 9, wherein the converter is configured with a dynamic range suitable to digitize both the uplink RF signal and the leaked downlink RF signal 11. The distributed antenna system of claim 9, wherein the dynamic range of the converter is based on a data rate for a digital communication link between the first unit and the second unit. 12. The distributed antenna system of claim 9, wherein an uplink signal power of the uplink RF signal has a thermal noise level associated with the wideband remote unit, wherein the converter comprises an analog-to-digital converter, wherein a dynamic range of the converter is a function of a dynamic range of the analog-to-digital converter, wherein the minimum value of the dynamic range of the converter corresponds to the thermal noise level and the maximum value of the dynamic range of the converter corresponds to a downlink signal power of the downlink RF signal. 13. The distributed antenna system of claim 12, wherein the analog-to-digital converter has a sampling rate corresponding to a maximum RF frequency of the wideband composite uplink signal and the data rate for the digital communication link. 14. The distributed antenna system of claim 7, wherein the first unit comprises a non-duplexer isolation sub-system configured to mitigate the representation of the leaked downlink RF signal. 15. The distributed antenna system of claim 7, wherein the first unit is configured to mitigate representation of the leaked downlink RF signal by at least one of: filtering the representation of the leaked downlink RF signal from the wideband composite uplink signal; cancelling the representation of the leaked downlink RF signal from the wideband composite uplink signal; or attenuating the representation of the leaked downlink RF signal. 16. The distributed antenna system of claim 7, wherein the first unit is configured to mitigate the representation of the leaked downlink RF signal by: correlating a downlink signal traversing the downlink path with a signal component traversing the uplink path; generating a cancellation signal corresponding to the representation of the leaked downlink RF signal based on correlating the downlink signal traversing the downlink path with the signal component traversing the uplink path; and combining the cancellation signal with a combined uplink signal generated from the representation of the uplink RF signal. 17. The distributed antenna system of claim 7, wherein the downlink RF signal comprises a first multiple-input, multiple-output data stream received from the first unit, wherein the distributed antenna system further comprises: a third unit configured to: wirelessly transmit an additional downlink RF signal comprising a second multiple-input, multiple-output data stream, wherein an additional leaked downlink RF signal is obtained from the additional downlink RF signal wirelessly transmitted by the third unit, and transmit a third digital RF signal to the first unit, wherein the third digital RF signal is generated from the additional leaked downlink RF signal, wherein the first unit is further configured to mitigate the third digital RF signal. 18. A method for a wideband remote unit of a digital antenna system, the method comprising: wirelessly transmitting a downlink RF signal from a downlink path of a remote antenna unit, wherein the downlink RF signal is received from a base station via a unit of the distributive antenna system in communication with the base station; transmitting in an uplink direction to the unit of the distributive antenna system a signal comprising a digital representation of an uplink RF signal wirelessly received from a user by the wideband remote unit and a digital representation of a leaked downlink RF signal, wherein the leaked downlink RF signal includes signal power from the downlink RF signal that has leaked into the uplink path. 19. The method of claim 18, further comprising: with a converter in the wideband uplink path that receives both the uplink RF signal and the leaked downlink RF signal, generating the signal comprising the digital representation of the uplink RF signal and the digital representation of the leaked downlink RF signal by processing both the uplink RF signal and the leaked downlink RF signal; wherein the converter is configured with a dynamic range suitable to digitize both the uplink RF signal and the leaked downlink RF signal 20. The method of claim 18, further comprising: mitigating the representation of the leaked downlink RF signal at the unit, wherein mitigating the representation of the leaked downlink RF signal comprises at least one of: filtering the representation of the leaked downlink RF signal from the wideband composite uplink signal; cancelling the representation of the leaked downlink RF signal from the wideband composite uplink signal; or attenuating the representation of the leaked downlink RF signal.
2,400
8,551
8,551
15,533,081
2,457
The invention addresses method, apparatus, system and computer program product for controlling virtualized resources, comprising receiving a request to implement a network service at a network element, looking up key parameters of the network service, selecting at least one compute resource according to the network service, deploying at least one application as required to fulfill the network service, selecting at least one transport resource to interconnect the network element with the at least one application, instructing an access control conductor that a transport access manager has exclusive access to at least part of the network element's resources, and instructing the transport access manager to establish a transport path at the network element.
1.-20. (canceled) 21. A processor implemented method for controlling virtualized resources, comprising: receiving a request to implement a network service at a network element; looking up key parameters of the network service; selecting at least one compute resource according to the network service; deploying at least one application as required to fulfill the network service; selecting at least one transport resource to interconnect the network element with the at least one application; instructing an access control conductor that a transport access manager has exclusive access to at least part of the network element's resources; and instructing the transport access manager to establish a transport path at the network element. 22. The method according to claim 21, wherein the network functions virtualization orchestrator is a network orchestration part of a software defined networking system. 23. The method according to claim 21, wherein the access control conductor is configured to manage the competitive access of applications or controllers to transport resources of the same network elements. 24. The method according to claim 21, wherein the compute resources are virtual machines. 25. The method according to claim 21, wherein the transport access manager comprises a software defined networking transport controller. 26. The method according to claim 25, wherein the transport access manager further comprising an access control conductor configured to manage accessibility of control access to respective network elements. 27. The method according to claim 21, wherein the request is received from a high level entity, such as operations support system and a business support system. 28. An apparatus for controlling virtualized resources, comprising: at least one processor, and at least one memory for storing instructions to be executed by the processor, wherein the at least one memory and the instructions are configured to, with the at least one processor, cause the apparatus at least to perform receiving a request to implement a network service at a network element; looking up parameters of the network service; selecting at least one compute resource according to the network service; deploying at least one application as required to fulfill the network service; selecting at least one transport resource to interconnect the network element with the at least one application; instructing an access control conductor that a transport access manager has exclusive access to at least part of the network element's resources; and instructing the transport access manager to establish a transport path at the network element. 29. The apparatus according to claim 28, wherein the network functions virtualization orchestrator is a network orchestration part of a software defined networking system. 30. The apparatus according to claim 28, wherein the access control conductor is configured to manage the competitive access of applications or controllers to transport resources of the same network elements. 31. The apparatus according to claim 28, wherein the compute resources are virtual machines. 32. The apparatus according to claim 28, wherein the transport access manager comprises a software defined networking transport controller. 33. The apparatus according to claim 32, wherein the transport access manager further comprising an access control conductor configured to manage accessibility of control access to respective network elements. 34. The apparatus according to claim 28, wherein the request is received from a high level entity, such as operations support system and a business support system. 35. A computer program product embodied on a non-transitory computer-readable medium, said product comprising software code portions for performing the steps of claim 21 when the product is run on the computer.
The invention addresses method, apparatus, system and computer program product for controlling virtualized resources, comprising receiving a request to implement a network service at a network element, looking up key parameters of the network service, selecting at least one compute resource according to the network service, deploying at least one application as required to fulfill the network service, selecting at least one transport resource to interconnect the network element with the at least one application, instructing an access control conductor that a transport access manager has exclusive access to at least part of the network element's resources, and instructing the transport access manager to establish a transport path at the network element.1.-20. (canceled) 21. A processor implemented method for controlling virtualized resources, comprising: receiving a request to implement a network service at a network element; looking up key parameters of the network service; selecting at least one compute resource according to the network service; deploying at least one application as required to fulfill the network service; selecting at least one transport resource to interconnect the network element with the at least one application; instructing an access control conductor that a transport access manager has exclusive access to at least part of the network element's resources; and instructing the transport access manager to establish a transport path at the network element. 22. The method according to claim 21, wherein the network functions virtualization orchestrator is a network orchestration part of a software defined networking system. 23. The method according to claim 21, wherein the access control conductor is configured to manage the competitive access of applications or controllers to transport resources of the same network elements. 24. The method according to claim 21, wherein the compute resources are virtual machines. 25. The method according to claim 21, wherein the transport access manager comprises a software defined networking transport controller. 26. The method according to claim 25, wherein the transport access manager further comprising an access control conductor configured to manage accessibility of control access to respective network elements. 27. The method according to claim 21, wherein the request is received from a high level entity, such as operations support system and a business support system. 28. An apparatus for controlling virtualized resources, comprising: at least one processor, and at least one memory for storing instructions to be executed by the processor, wherein the at least one memory and the instructions are configured to, with the at least one processor, cause the apparatus at least to perform receiving a request to implement a network service at a network element; looking up parameters of the network service; selecting at least one compute resource according to the network service; deploying at least one application as required to fulfill the network service; selecting at least one transport resource to interconnect the network element with the at least one application; instructing an access control conductor that a transport access manager has exclusive access to at least part of the network element's resources; and instructing the transport access manager to establish a transport path at the network element. 29. The apparatus according to claim 28, wherein the network functions virtualization orchestrator is a network orchestration part of a software defined networking system. 30. The apparatus according to claim 28, wherein the access control conductor is configured to manage the competitive access of applications or controllers to transport resources of the same network elements. 31. The apparatus according to claim 28, wherein the compute resources are virtual machines. 32. The apparatus according to claim 28, wherein the transport access manager comprises a software defined networking transport controller. 33. The apparatus according to claim 32, wherein the transport access manager further comprising an access control conductor configured to manage accessibility of control access to respective network elements. 34. The apparatus according to claim 28, wherein the request is received from a high level entity, such as operations support system and a business support system. 35. A computer program product embodied on a non-transitory computer-readable medium, said product comprising software code portions for performing the steps of claim 21 when the product is run on the computer.
2,400
8,552
8,552
16,399,395
2,449
In one embodiment, a method includes receiving current session information associated with a first user from a beacon associated with a third-party content provider, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon, accessing session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon, selecting one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon, and sending a notification referencing the selected one or more second users to the first client system.
1. A method comprising, by one or more computing devices of an online social network: receiving, from a beacon associated with a third-party content provider, current session information associated with a first user, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon; accessing session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon; selecting one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon; and sending, to the first client system, a notification referencing the selected one or more second users. 2. The method of claim 1, wherein the notification comprises a suggestion for the first user to send a message to one or more of the selected second users. 3. The method of claim 1, further comprising: receiving, from the first client system of the first user, a message comprising a request to invite at least one of the selected one or more second users referenced in the notification to a geographic location associated with the third-party content provider; and sending, in response to the request, the message to a second client system of the at least one of the selected one or more second users. 4. The method of claim 3, further comprising: sending, to the first client system, updated geographic location information for the at least one of the selected one or more second users when a wireless communication session is established between the second client system and the beacon. 5. The method of claim 3, wherein the message further comprises a prompt for the at least one of the selected one or more second users to respond to the invitation from the first user. 6. The method of claim 3, wherein the message further comprises geographic location information associated with the third-party content provider. 7. The method of claim 3, wherein the message further comprises an identifier of at least one third user of the online social network, the at least one third user being associated with a respective third client system, wherein a wireless communication session is active between the beacon and the third client system. 8. The method of claim 1, wherein the selecting of the one or more second users is further based on: accessing a social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising: a first node corresponding to the first user, and a plurality of second nodes respectively corresponding to a plurality of second users associated with the online social network; and determining that each of the one or more second users corresponds to a second node that is connected to the first node in the social graph within a threshold degree of separation. 9. The method of claim 8, wherein the threshold degree of separation is one, two, three, or all. 10. The method of claim 8, wherein the selecting of one or more second users is further based on an affinity coefficient of at least one second node with respect to a third node in the social graph, the third node corresponding to the third-party content provider. 11. The method of claim 10, wherein the affinity coefficient is based on one or more edges connecting the at least one second node to the third node. 12. The method of claim 1, further comprising: determining that a second client system associated with each of the one or more second users has a geographic location within the threshold geographical distance of a particular geographic location of the beacon. 13. The method of claim 1, wherein the selecting of the one or more second users is further based on determining, for each of the one or more second users, a history of one or more prior wireless communications sessions established between the beacon and a second client system of the second user. 14. The method of claim 1, wherein the selecting of the one or more second users is further based on user preferences of the one or more second users. 15. The method of claim 14, wherein the user preferences of the one or more second users indicate a preference for a type of good or service, and wherein the third-party content provider is associated with the preferred type of good or service. 16. One or more computer-readable non-transitory storage media embodying software that is operable when executed to: receive, from a beacon associated with a third-party content provider, current session information associated with a first user, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon; access session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon; select one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon; and send, to the first client system, a notification referencing the selected one or more second users. 17. The media of claim 16, wherein the notification comprises a suggestion for the first user to send a message to one or more of the selected second users 18. The media of claim 16, wherein the software is further operable when executed to: receive, from the first client system of the first user, a message comprising a request to invite at least one of the selected one or more second users referenced in the notification to a geographic location associated with the third-party content provider; and send, in response to the request, the message to a second client system of the at least one of the selected one or more second users. 19. The media of claim 16, wherein the software is further operable when executed to send, to the first client system, updated geographic location information for the at least one of the selected one or more second users when a wireless communication session is established between the second client system and the beacon. 20. A system comprising: one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to: receive, from a beacon associated with a third-party content provider, current session information associated with a first user, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon; access session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon; select one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon; and send, to the first client system, a notification referencing the selected one or more second users.
In one embodiment, a method includes receiving current session information associated with a first user from a beacon associated with a third-party content provider, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon, accessing session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon, selecting one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon, and sending a notification referencing the selected one or more second users to the first client system.1. A method comprising, by one or more computing devices of an online social network: receiving, from a beacon associated with a third-party content provider, current session information associated with a first user, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon; accessing session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon; selecting one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon; and sending, to the first client system, a notification referencing the selected one or more second users. 2. The method of claim 1, wherein the notification comprises a suggestion for the first user to send a message to one or more of the selected second users. 3. The method of claim 1, further comprising: receiving, from the first client system of the first user, a message comprising a request to invite at least one of the selected one or more second users referenced in the notification to a geographic location associated with the third-party content provider; and sending, in response to the request, the message to a second client system of the at least one of the selected one or more second users. 4. The method of claim 3, further comprising: sending, to the first client system, updated geographic location information for the at least one of the selected one or more second users when a wireless communication session is established between the second client system and the beacon. 5. The method of claim 3, wherein the message further comprises a prompt for the at least one of the selected one or more second users to respond to the invitation from the first user. 6. The method of claim 3, wherein the message further comprises geographic location information associated with the third-party content provider. 7. The method of claim 3, wherein the message further comprises an identifier of at least one third user of the online social network, the at least one third user being associated with a respective third client system, wherein a wireless communication session is active between the beacon and the third client system. 8. The method of claim 1, wherein the selecting of the one or more second users is further based on: accessing a social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising: a first node corresponding to the first user, and a plurality of second nodes respectively corresponding to a plurality of second users associated with the online social network; and determining that each of the one or more second users corresponds to a second node that is connected to the first node in the social graph within a threshold degree of separation. 9. The method of claim 8, wherein the threshold degree of separation is one, two, three, or all. 10. The method of claim 8, wherein the selecting of one or more second users is further based on an affinity coefficient of at least one second node with respect to a third node in the social graph, the third node corresponding to the third-party content provider. 11. The method of claim 10, wherein the affinity coefficient is based on one or more edges connecting the at least one second node to the third node. 12. The method of claim 1, further comprising: determining that a second client system associated with each of the one or more second users has a geographic location within the threshold geographical distance of a particular geographic location of the beacon. 13. The method of claim 1, wherein the selecting of the one or more second users is further based on determining, for each of the one or more second users, a history of one or more prior wireless communications sessions established between the beacon and a second client system of the second user. 14. The method of claim 1, wherein the selecting of the one or more second users is further based on user preferences of the one or more second users. 15. The method of claim 14, wherein the user preferences of the one or more second users indicate a preference for a type of good or service, and wherein the third-party content provider is associated with the preferred type of good or service. 16. One or more computer-readable non-transitory storage media embodying software that is operable when executed to: receive, from a beacon associated with a third-party content provider, current session information associated with a first user, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon; access session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon; select one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon; and send, to the first client system, a notification referencing the selected one or more second users. 17. The media of claim 16, wherein the notification comprises a suggestion for the first user to send a message to one or more of the selected second users 18. The media of claim 16, wherein the software is further operable when executed to: receive, from the first client system of the first user, a message comprising a request to invite at least one of the selected one or more second users referenced in the notification to a geographic location associated with the third-party content provider; and send, in response to the request, the message to a second client system of the at least one of the selected one or more second users. 19. The media of claim 16, wherein the software is further operable when executed to send, to the first client system, updated geographic location information for the at least one of the selected one or more second users when a wireless communication session is established between the second client system and the beacon. 20. A system comprising: one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to: receive, from a beacon associated with a third-party content provider, current session information associated with a first user, wherein the current session information indicates that a first client system of the first user is in an active wireless communication session with the beacon; access session information associated with one or more second users, wherein each second user is within a threshold geographical distance of the beacon; select one or more of the one or more second users based on the accessed session information, wherein the accessed session information associated with each of the selected second users indicates that a second client system associated with the selected second user is not in a wireless communication session with the beacon; and send, to the first client system, a notification referencing the selected one or more second users.
2,400
8,553
8,553
14,697,587
2,485
Dissolution tester assembly that tests pharmaceutical tablets includes a frame that operatively supports a vessel having an interior into which a tablet is placed, a camera assembly supported by the frame and including a shaft having a hollow portion and an end that extends into the vessel interior, and an imaging system for imaging the tablet during the dissolution process to enable display of the images on a monitor. The imaging system includes a first camera positioned in the hollow portion of the shaft and oriented to image downward toward a bottom of the vessel, and/or a second camera positioned on the frame at a location directly below the vessel and oriented to image upward toward the bottom of the vessel. An attachment, such as a paddle for stirring or a basket for retaining the tablet, may be positioned at the end of the shaft in the vessel.
1. A dissolution tester, comprising: a frame that operatively supports a vessel having an interior into which a tablet is placed for testing dissolution of the tablet; a shaft having an end that extends into the interior of the vessel when the vessel is supported by said frame; and an integral imaging system having at least one of a first camera fixed to said frame in a position underneath the vessel when the vessel is supported by said frame and oriented to image upward toward a bottom of the vessel and a second camera in a hollow portion of said shaft and oriented to image downward toward a bottom of the vessel when supported by said frame. 2. The tester of claim 1, wherein said frame defines an air bath for said vessel. 3. The tester of claim 1, wherein said camera assembly further comprises a tube arranged in said hollow portion of said shaft, said second camera being mounted into said tube. 4. The tester of claim 3, further comprising a disk of transparent material arranged below said second camera. 5. The tester of claim 1, further comprising a control unit coupled to said imaging system for controlling imaging by said imaging system. 6. The tester of claim 5, wherein said control unit includes a recording unit that records images being obtained by said imaging system. 7. The tester of claim 1, further comprising a monitor coupled to said imaging system for displaying images obtained by said imaging system. 8. The tester of claim 1, wherein said frame is configured to operatively support a plurality of additional vessels each having an interior into which a tablet is placed for testing dissolution of the tablet, further comprising: a plurality of additional shafts each having an end that extends into the interior of a respective one of the additional vessels when the respective additional vessel is supported by said frame; and a plurality of additional integral imaging system having at least one of a first camera fixed to said frame in a position underneath a respective one of the additional vessels when supported by said frame and oriented to image upward toward a bottom of the respective vessel and a second camera in a hollow portion of said shaft and oriented to image downward toward a bottom of the respective vessel when supported by said frame. 9. The tester of claim 1, further comprising a paddle attached to the end of said shaft that extends into the interior of the vessel when the vessel is supported by said frame. 10. The tester of claim 1, further comprising a basket attached to the end of said shaft that extends into the interior of the vessel when the vessel is supported by said frame. 11. The tester of claim 10, wherein said basket comprises a head part attached to said shaft and a basket cage removably attached to the head part and defining an interior in which the tablet is positioned for dissolution testing. 12. The tester of claim 1, wherein said frame includes a bottom plate, further comprising a mount tube in which said first camera is housed, said mount tube being mounted to said bottom plate. 13. The tester of claim 12, further comprising a cap with a seal arranged over said first camera and a lens cover arranged over an imaging aperture of said first camera. 14. The tester of claim 1, further comprising: a temperature sensor configured to provide an indication of temperature inside the vessel; a heating system that heats the vessel when supported by said frame; and a control system coupled to said temperature sensor and said heating system and controls said heating system to regulate temperature inside the vessel. 15. A dissolution tester, comprising: a frame that operatively supports a vessel having an interior into which a tablet is placed for testing dissolution of the tablet; a camera assembly supported by said frame and including a shaft having an end that extends into the interior of the vessel when the vessel is supported by said frame; and an imaging system having first and second cameras that face one another in a vertical orientation to thereby image a tablet when present therebetween from two directions. 16. The tester of claim 15, wherein said first camera is positioned in a hollow portion of said shaft and oriented to image downward toward a bottom of the vessel when supported by said frame, and said second camera is positioned on said frame at a location that will be directly below the vessel when the vessel is supported by said frame and oriented to image upward toward the bottom of the vessel when supported by said frame, said camera assembly further comprising a tube arranged in said hollow portion of said shaft, said first camera being mounted into said tube. 17. The tester of claim 16, further comprising: a disk of transparent material arranged on said camera assembly below said first camera; a control system coupled to said first and second cameras for controlling imaging by said first and second cameras; a recording unit that records images being obtained by said first and second cameras; and a monitor coupled to said first and second cameras for displaying images obtained by said first and second cameras. 18. The tester of claim 16, further comprising an attachment attached to the end of said shaft that extends into the interior of the vessel when the vessel is supported by said frame, said attachment being selected from a paddle and a basket. 19. A dissolution testing assembly, comprising: a frame; a plurality of removable vessels supported by said frame, each of said vessels having an interior into which a tablet is placed for testing dissolution of the tablet; a plurality of camera assemblies supported by said frame, each of said camera assemblies including a shaft having a hollow portion and an attachment at an end of said shaft that extends into the interior of a respective one of said vessels when supported by said frame; and an imaging system including at least one of: a plurality of first cameras each positioned in said hollow portion of said shaft of a respective one of said camera assemblies and oriented to image downward toward a bottom of the respective one of said vessels when supported by said frame, and a plurality of second cameras each positioned on said frame at a location directly below the respective one of said vessels when supported by said frame and oriented to image upward toward the bottom of the respective one of said vessels when supported by said frame, whereby said first and second cameras operatively image tablets dissolving at the bottom of said vessels. 20. The testing assembly of claim 19, wherein said attachment is selected from a paddle and a basket.
Dissolution tester assembly that tests pharmaceutical tablets includes a frame that operatively supports a vessel having an interior into which a tablet is placed, a camera assembly supported by the frame and including a shaft having a hollow portion and an end that extends into the vessel interior, and an imaging system for imaging the tablet during the dissolution process to enable display of the images on a monitor. The imaging system includes a first camera positioned in the hollow portion of the shaft and oriented to image downward toward a bottom of the vessel, and/or a second camera positioned on the frame at a location directly below the vessel and oriented to image upward toward the bottom of the vessel. An attachment, such as a paddle for stirring or a basket for retaining the tablet, may be positioned at the end of the shaft in the vessel.1. A dissolution tester, comprising: a frame that operatively supports a vessel having an interior into which a tablet is placed for testing dissolution of the tablet; a shaft having an end that extends into the interior of the vessel when the vessel is supported by said frame; and an integral imaging system having at least one of a first camera fixed to said frame in a position underneath the vessel when the vessel is supported by said frame and oriented to image upward toward a bottom of the vessel and a second camera in a hollow portion of said shaft and oriented to image downward toward a bottom of the vessel when supported by said frame. 2. The tester of claim 1, wherein said frame defines an air bath for said vessel. 3. The tester of claim 1, wherein said camera assembly further comprises a tube arranged in said hollow portion of said shaft, said second camera being mounted into said tube. 4. The tester of claim 3, further comprising a disk of transparent material arranged below said second camera. 5. The tester of claim 1, further comprising a control unit coupled to said imaging system for controlling imaging by said imaging system. 6. The tester of claim 5, wherein said control unit includes a recording unit that records images being obtained by said imaging system. 7. The tester of claim 1, further comprising a monitor coupled to said imaging system for displaying images obtained by said imaging system. 8. The tester of claim 1, wherein said frame is configured to operatively support a plurality of additional vessels each having an interior into which a tablet is placed for testing dissolution of the tablet, further comprising: a plurality of additional shafts each having an end that extends into the interior of a respective one of the additional vessels when the respective additional vessel is supported by said frame; and a plurality of additional integral imaging system having at least one of a first camera fixed to said frame in a position underneath a respective one of the additional vessels when supported by said frame and oriented to image upward toward a bottom of the respective vessel and a second camera in a hollow portion of said shaft and oriented to image downward toward a bottom of the respective vessel when supported by said frame. 9. The tester of claim 1, further comprising a paddle attached to the end of said shaft that extends into the interior of the vessel when the vessel is supported by said frame. 10. The tester of claim 1, further comprising a basket attached to the end of said shaft that extends into the interior of the vessel when the vessel is supported by said frame. 11. The tester of claim 10, wherein said basket comprises a head part attached to said shaft and a basket cage removably attached to the head part and defining an interior in which the tablet is positioned for dissolution testing. 12. The tester of claim 1, wherein said frame includes a bottom plate, further comprising a mount tube in which said first camera is housed, said mount tube being mounted to said bottom plate. 13. The tester of claim 12, further comprising a cap with a seal arranged over said first camera and a lens cover arranged over an imaging aperture of said first camera. 14. The tester of claim 1, further comprising: a temperature sensor configured to provide an indication of temperature inside the vessel; a heating system that heats the vessel when supported by said frame; and a control system coupled to said temperature sensor and said heating system and controls said heating system to regulate temperature inside the vessel. 15. A dissolution tester, comprising: a frame that operatively supports a vessel having an interior into which a tablet is placed for testing dissolution of the tablet; a camera assembly supported by said frame and including a shaft having an end that extends into the interior of the vessel when the vessel is supported by said frame; and an imaging system having first and second cameras that face one another in a vertical orientation to thereby image a tablet when present therebetween from two directions. 16. The tester of claim 15, wherein said first camera is positioned in a hollow portion of said shaft and oriented to image downward toward a bottom of the vessel when supported by said frame, and said second camera is positioned on said frame at a location that will be directly below the vessel when the vessel is supported by said frame and oriented to image upward toward the bottom of the vessel when supported by said frame, said camera assembly further comprising a tube arranged in said hollow portion of said shaft, said first camera being mounted into said tube. 17. The tester of claim 16, further comprising: a disk of transparent material arranged on said camera assembly below said first camera; a control system coupled to said first and second cameras for controlling imaging by said first and second cameras; a recording unit that records images being obtained by said first and second cameras; and a monitor coupled to said first and second cameras for displaying images obtained by said first and second cameras. 18. The tester of claim 16, further comprising an attachment attached to the end of said shaft that extends into the interior of the vessel when the vessel is supported by said frame, said attachment being selected from a paddle and a basket. 19. A dissolution testing assembly, comprising: a frame; a plurality of removable vessels supported by said frame, each of said vessels having an interior into which a tablet is placed for testing dissolution of the tablet; a plurality of camera assemblies supported by said frame, each of said camera assemblies including a shaft having a hollow portion and an attachment at an end of said shaft that extends into the interior of a respective one of said vessels when supported by said frame; and an imaging system including at least one of: a plurality of first cameras each positioned in said hollow portion of said shaft of a respective one of said camera assemblies and oriented to image downward toward a bottom of the respective one of said vessels when supported by said frame, and a plurality of second cameras each positioned on said frame at a location directly below the respective one of said vessels when supported by said frame and oriented to image upward toward the bottom of the respective one of said vessels when supported by said frame, whereby said first and second cameras operatively image tablets dissolving at the bottom of said vessels. 20. The testing assembly of claim 19, wherein said attachment is selected from a paddle and a basket.
2,400
8,554
8,554
14,988,472
2,432
A credentialing system comprises an identity source storing identity attributes for users, identity wallets for users that enable access to the identity attributes in the identity source, and identity brokers for accessing the identity source on behalf of access control systems of organizations. This system can address both the data privacy and trust issues allowing a non-authoritative identity source in a distributed environment to be used for all identity purposes through the ability to broker the identity and attributes of the identity across any number of physical or logical credentials and across different organizations. The system further implements an identity score stored along with identity attributes. The score rates the strength of the identity from the global non-authoritative source.
1. A credentialing system, comprising: an identity source storing identity attributes for users; identity wallets for users that enable access to the identity attributes in the identity source; and identity brokers for accessing the identity source on behalf of access control systems of organizations. 2. The system according to claim 1, further comprising an identity score engine for generating an identity score for each of the users that rates the strength of the identity of the users embodied by the identity attributes stored in the identity source for each of the users. 3. The system according to claim 2, wherein the identity score is stored in the identity source. 4. The system according to claim 1, wherein the identity brokers access the identity score and will block access to users that have an inadequate identity score. 5. The system according to claim 1, wherein the identity brokers access the identity attributes based on authority granted via the identity wallets. 6. The system according to claim 1, wherein the identity source is distributed over multiple nodes. 7. The system according to claim 1, wherein the same identity source is utilized by multiple business and/or governmental entities. 8. The system according to claim 1, wherein the identity attributes are stored in a block chain. 9. The system according to claim 1, further comprising a biometric reader for providing access to the identity wallets. 10. The system according to claim 1, wherein the identity wallets are stored on mobile computing devices. 11. The system according to claim 1, wherein the identity brokers access the identity source on behalf of access control systems of organizations. 12. A credentialing method, comprising: storing identity attributes for users in an identity source accessible by multiple organizations; the users enabling access to the identity attributes in the identity source via identity wallets; and identity brokers accessing the identity source on behalf of access control systems of the organizations. 13. The method according to claim 12, further comprising generating an identity score for each of the users that rates the strength of the identity of the users embodied by the identity attributes stored in the identity source for each of the users. 14. The method according to claim 13, wherein the identity score is stored in the identity source. 15. The method according to claim 12, wherein the identity brokers access the identity attributes based on authority granted via the identity wallets of the users. 16. The method according to claim 12, wherein the identity source is distributed over multiple nodes. 17. The method according to claim 12, wherein the identity attributes are stored in a block chain. 18. The method according to claim 12, further comprising reading biometric features of the users to provide access to the identity wallets. 19. The method according to claim 12, wherein the identity wallets are stored on mobile computing devices. 20. The method according to claim 12, further comprising the identity brokers accessing the identity source on behalf of access control systems of organizations.
A credentialing system comprises an identity source storing identity attributes for users, identity wallets for users that enable access to the identity attributes in the identity source, and identity brokers for accessing the identity source on behalf of access control systems of organizations. This system can address both the data privacy and trust issues allowing a non-authoritative identity source in a distributed environment to be used for all identity purposes through the ability to broker the identity and attributes of the identity across any number of physical or logical credentials and across different organizations. The system further implements an identity score stored along with identity attributes. The score rates the strength of the identity from the global non-authoritative source.1. A credentialing system, comprising: an identity source storing identity attributes for users; identity wallets for users that enable access to the identity attributes in the identity source; and identity brokers for accessing the identity source on behalf of access control systems of organizations. 2. The system according to claim 1, further comprising an identity score engine for generating an identity score for each of the users that rates the strength of the identity of the users embodied by the identity attributes stored in the identity source for each of the users. 3. The system according to claim 2, wherein the identity score is stored in the identity source. 4. The system according to claim 1, wherein the identity brokers access the identity score and will block access to users that have an inadequate identity score. 5. The system according to claim 1, wherein the identity brokers access the identity attributes based on authority granted via the identity wallets. 6. The system according to claim 1, wherein the identity source is distributed over multiple nodes. 7. The system according to claim 1, wherein the same identity source is utilized by multiple business and/or governmental entities. 8. The system according to claim 1, wherein the identity attributes are stored in a block chain. 9. The system according to claim 1, further comprising a biometric reader for providing access to the identity wallets. 10. The system according to claim 1, wherein the identity wallets are stored on mobile computing devices. 11. The system according to claim 1, wherein the identity brokers access the identity source on behalf of access control systems of organizations. 12. A credentialing method, comprising: storing identity attributes for users in an identity source accessible by multiple organizations; the users enabling access to the identity attributes in the identity source via identity wallets; and identity brokers accessing the identity source on behalf of access control systems of the organizations. 13. The method according to claim 12, further comprising generating an identity score for each of the users that rates the strength of the identity of the users embodied by the identity attributes stored in the identity source for each of the users. 14. The method according to claim 13, wherein the identity score is stored in the identity source. 15. The method according to claim 12, wherein the identity brokers access the identity attributes based on authority granted via the identity wallets of the users. 16. The method according to claim 12, wherein the identity source is distributed over multiple nodes. 17. The method according to claim 12, wherein the identity attributes are stored in a block chain. 18. The method according to claim 12, further comprising reading biometric features of the users to provide access to the identity wallets. 19. The method according to claim 12, wherein the identity wallets are stored on mobile computing devices. 20. The method according to claim 12, further comprising the identity brokers accessing the identity source on behalf of access control systems of organizations.
2,400
8,555
8,555
15,634,501
2,413
A method and apparatus are disclosed for handling measurement in a wireless communication system. In one embodiment, the method includes the UE measuring a signal of a cell to derive information related to beamforming. The method further includes the UE providing the information to a network node, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold.
1. A method of a UE (User Equipment), comprising: measuring a signal of a cell to derive information related to beamforming; and providing the information to a network node, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 2. The method of claim 1, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 3. The method of claim 1, wherein the first threshold is configured by the network node. 4. The method of claim 1, wherein the signal comprises at least a synchronization signal. 5. The method of claim 1, wherein the signal comprises at least a reference signal. 6. A method of a UE (User Equipment), comprising: measuring a signal of a cell to derive information related to beamforming; and determining whether to select or reselect the cell to camp on based on at least the information, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 7. The method of claim 6, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 8. The method of claim 6, wherein the first threshold is configured by a network node. 9. The method of claim 6, wherein the signal comprises at least a synchronization signal. 10. The method of claim 6, wherein the signal comprises at least a reference signal. 11. A User Equipment (UE), comprising: a control circuit; a processor installed in the control circuit; and a memory installed in the control circuit and operatively coupled to the processor; wherein the processor is configured to execute a program code stored in the memory to: measuring a signal of a cell to derive information related to beamforming; and providing the information to a network node, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 12. The UE of claim 11, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 13. The method of claim 11, wherein the first threshold is configured by the network node. 14. The UE of claim 11, wherein the signal comprises at least a synchronization signal. 15. The UE of claim 11, wherein the signal comprises at least a reference signal. 16. A User Equipment (UE), comprising: a control circuit; a processor installed in the control circuit; and a memory installed in the control circuit and operatively coupled to the processor; wherein the processor is configured to execute a program code stored in the memory to: measuring a signal of a cell to derive information related to beamforming; and determining whether to select or reselect the cell to camp on based on at least the information, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 17. The UE of claim 16, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 18. The UE of claim 16, wherein the first threshold is configured by a network node. 19. The UE of claim 16, wherein the signal comprises at least a synchronization signal. 20. The UE of claim 16, wherein the signal comprises at least a reference signal.
A method and apparatus are disclosed for handling measurement in a wireless communication system. In one embodiment, the method includes the UE measuring a signal of a cell to derive information related to beamforming. The method further includes the UE providing the information to a network node, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold.1. A method of a UE (User Equipment), comprising: measuring a signal of a cell to derive information related to beamforming; and providing the information to a network node, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 2. The method of claim 1, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 3. The method of claim 1, wherein the first threshold is configured by the network node. 4. The method of claim 1, wherein the signal comprises at least a synchronization signal. 5. The method of claim 1, wherein the signal comprises at least a reference signal. 6. A method of a UE (User Equipment), comprising: measuring a signal of a cell to derive information related to beamforming; and determining whether to select or reselect the cell to camp on based on at least the information, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 7. The method of claim 6, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 8. The method of claim 6, wherein the first threshold is configured by a network node. 9. The method of claim 6, wherein the signal comprises at least a synchronization signal. 10. The method of claim 6, wherein the signal comprises at least a reference signal. 11. A User Equipment (UE), comprising: a control circuit; a processor installed in the control circuit; and a memory installed in the control circuit and operatively coupled to the processor; wherein the processor is configured to execute a program code stored in the memory to: measuring a signal of a cell to derive information related to beamforming; and providing the information to a network node, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 12. The UE of claim 11, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 13. The method of claim 11, wherein the first threshold is configured by the network node. 14. The UE of claim 11, wherein the signal comprises at least a synchronization signal. 15. The UE of claim 11, wherein the signal comprises at least a reference signal. 16. A User Equipment (UE), comprising: a control circuit; a processor installed in the control circuit; and a memory installed in the control circuit and operatively coupled to the processor; wherein the processor is configured to execute a program code stored in the memory to: measuring a signal of a cell to derive information related to beamforming; and determining whether to select or reselect the cell to camp on based on at least the information, wherein the information comprises at least an average or a summation of measurement results for a number of qualified beams of the cell, and wherein the number of qualified beams to derive the average or the summation is limited by a first threshold. 17. The UE of claim 16, wherein a beam is qualified if the measured result of the beam is better than a second threshold. 18. The UE of claim 16, wherein the first threshold is configured by a network node. 19. The UE of claim 16, wherein the signal comprises at least a synchronization signal. 20. The UE of claim 16, wherein the signal comprises at least a reference signal.
2,400
8,556
8,556
15,087,772
2,433
Disclosed is an electronic device, including a processor for running a plurality of applications in different security environments; a display unit for displaying the plurality of applications; an input device that operatively initiates an application to be run by the processor; wherein the processor operatively: detects initiation of the application; determines a security level for running the application; selects a security environment from a plurality of security environments based on the determined security level, the security environments providing different security levels; and runs the application in the selected security environment. Other aspects are described and claimed
1. An electronic device, comprising: a processor for running a plurality of applications in different security environments; a display unit for displaying the plurality of applications; an input device that operatively initiates an application to be run by the processor; wherein the processor operatively: detects initiation of the application; determines a security level for running the application; selects a security environment from a plurality of security environments based on the determined security level, the security environments providing different security levels; and runs the application in the selected security environment. 2. The electronic device of claim 1, wherein the processor is operable to acquire a security environment indication parameter in relation to the initiated application and the selected security environment is based on the acquired security environment indication parameter. 3. The electronic device of claim 1, wherein in a first security environment, the processor operatively: receives user security information from the input device; determines whether the received user security information matches with authorized user security information; and verifies a user identity if there is a match. 4. The electronic device of claim 1, wherein whilst the application is running in a first security environment, the processor operatively invokes a second security environment that provides a higher security level than that of the first security environment. 5. The electronic device of claim 4, wherein in the first security environment, the processor operatively: receives user security information via the input device; determine whether the received user security information matches with authorized user security information; and verifies a user identity if there is a match. 6. The electronic device of claim 5, further comprising a secure memory, wherein in response to verifying the user identity, the processor operatively: receives a write command; encrypts data corresponding to the write command; and writes the encrypted data to the secure memory. 7. The electronic device of claim 6, wherein in response to verifying the user identity, the processor further operatively: retrieves the encrypted data from the secure memory; decrypts the encrypted data; and displays the decrypted data. 8. The electronic device of claim 4, wherein the first security environment is a rich execution environment (REE) and the second security environment is a trusted execution environment (TEE). 9. A method, comprising: running a plurality of applications in different security environments on an electronic device; displaying the plurality of applications on the electronic device; initiating an application to be run on the electronic device; determining a security level for running the application; selecting a security environment from a plurality of security environments based on the determined security level, the security environments providing different security levels; and running the application in the selected security environment on the electronic device. 10. The method of claim 9, wherein the selecting the security environment comprises acquiring a security environment indication parameter in relation to the initiated application and selecting the security environment based on the acquired security environment indication parameter. 11. The method of claim 9, running the application in a first security environment on the electronic device comprises: receiving user security information; determining whether the received user security information matches with authorized user security information; and verifying a user identity if there is a match. 12. The method of claim 9, further comprising invoking a second security environment that provides a higher security level than that of a first security environment, whilst running the application in the first security environment on the electronic device. 13. The method of claim 12, wherein the running the application in the first security environment on the electronic device comprises: receiving user security information; determining whether the received user security information matches with authorized user security information; and verifying a user identity if there is a match. 14. The method of claim 13, wherein in response to verifying the user identity, the method further comprises: receiving a write command; encrypting data of the electronic device corresponding to the write command; and writing the encrypted data to a secure memory. 15. The method of claim 14, wherein in response to verifying the user identity, the method further comprises: retrieving the encrypted data from the secure memory; decrypting the encrypted data; and displaying the decrypted data from the electronic device. 16. The method of claim 12, wherein the first security environment is a rich execution environment (REE) and the second security environment is a trusted execution environment (TEE).
Disclosed is an electronic device, including a processor for running a plurality of applications in different security environments; a display unit for displaying the plurality of applications; an input device that operatively initiates an application to be run by the processor; wherein the processor operatively: detects initiation of the application; determines a security level for running the application; selects a security environment from a plurality of security environments based on the determined security level, the security environments providing different security levels; and runs the application in the selected security environment. Other aspects are described and claimed1. An electronic device, comprising: a processor for running a plurality of applications in different security environments; a display unit for displaying the plurality of applications; an input device that operatively initiates an application to be run by the processor; wherein the processor operatively: detects initiation of the application; determines a security level for running the application; selects a security environment from a plurality of security environments based on the determined security level, the security environments providing different security levels; and runs the application in the selected security environment. 2. The electronic device of claim 1, wherein the processor is operable to acquire a security environment indication parameter in relation to the initiated application and the selected security environment is based on the acquired security environment indication parameter. 3. The electronic device of claim 1, wherein in a first security environment, the processor operatively: receives user security information from the input device; determines whether the received user security information matches with authorized user security information; and verifies a user identity if there is a match. 4. The electronic device of claim 1, wherein whilst the application is running in a first security environment, the processor operatively invokes a second security environment that provides a higher security level than that of the first security environment. 5. The electronic device of claim 4, wherein in the first security environment, the processor operatively: receives user security information via the input device; determine whether the received user security information matches with authorized user security information; and verifies a user identity if there is a match. 6. The electronic device of claim 5, further comprising a secure memory, wherein in response to verifying the user identity, the processor operatively: receives a write command; encrypts data corresponding to the write command; and writes the encrypted data to the secure memory. 7. The electronic device of claim 6, wherein in response to verifying the user identity, the processor further operatively: retrieves the encrypted data from the secure memory; decrypts the encrypted data; and displays the decrypted data. 8. The electronic device of claim 4, wherein the first security environment is a rich execution environment (REE) and the second security environment is a trusted execution environment (TEE). 9. A method, comprising: running a plurality of applications in different security environments on an electronic device; displaying the plurality of applications on the electronic device; initiating an application to be run on the electronic device; determining a security level for running the application; selecting a security environment from a plurality of security environments based on the determined security level, the security environments providing different security levels; and running the application in the selected security environment on the electronic device. 10. The method of claim 9, wherein the selecting the security environment comprises acquiring a security environment indication parameter in relation to the initiated application and selecting the security environment based on the acquired security environment indication parameter. 11. The method of claim 9, running the application in a first security environment on the electronic device comprises: receiving user security information; determining whether the received user security information matches with authorized user security information; and verifying a user identity if there is a match. 12. The method of claim 9, further comprising invoking a second security environment that provides a higher security level than that of a first security environment, whilst running the application in the first security environment on the electronic device. 13. The method of claim 12, wherein the running the application in the first security environment on the electronic device comprises: receiving user security information; determining whether the received user security information matches with authorized user security information; and verifying a user identity if there is a match. 14. The method of claim 13, wherein in response to verifying the user identity, the method further comprises: receiving a write command; encrypting data of the electronic device corresponding to the write command; and writing the encrypted data to a secure memory. 15. The method of claim 14, wherein in response to verifying the user identity, the method further comprises: retrieving the encrypted data from the secure memory; decrypting the encrypted data; and displaying the decrypted data from the electronic device. 16. The method of claim 12, wherein the first security environment is a rich execution environment (REE) and the second security environment is a trusted execution environment (TEE).
2,400
8,557
8,557
14,320,581
2,431
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections.
1. A method of providing encryption services on a computer that executes a plurality of virtual machines (VMs), the method comprising: detecting an event on a particular VM; generating an encryption rule for encrypting data messages that are sent from the particular VM; and using the encryption rule to encrypt messages sent by the particular VM. 2. The method of claim 1, wherein generating the encryption rule comprises examining a plurality of encryption policies to determine whether an encryption rule needs to be specified for the detected event, wherein generating the encryption rule comprises generating the encryption rule based on the examination of the encryption policies. 3. The method of claim 1, wherein the event is a flow-based event. 4. The method of claim 1, wherein detecting the event comprises detecting an initiation of a flow between the particular VM and another VM. 5. The method of claim 1, wherein detecting the event comprises detecting existence of malware on the particular VM. 6. The method of claim 1, wherein detecting the event comprises detecting existence of malware on another VM. 7. The method of claim 1, wherein generating the encryption rule comprises forwarding the detected event to a set of controllers, said controller set determining whether an encryption rule needs to be specified for the detected event based on a set of encryption policies that are stored by the controller set, wherein generating the encryption rule comprises receiving the generated encryption rule from the controller set. 8. The method of claim 1, wherein generating the encryption rule comprises forwarding the detected event to a set of controllers, said controller set determining whether an encryption policy has to be provided to the computer to generate, at the computer, an encryption rule for the detected event. 9. The method of claim 1, wherein using the encryption rule comprises providing the encryption rule to an encryptor that intercepts data messages sent from the particular VM and encrypts the intercepted data messages based on the encryption rule. 10. The method of claim 9, wherein the encryption rule specifies an encryption key identifier that identifies an encryption key to use to encrypt the data messages, wherein the encryption key is also supplied to the encryptor, wherein before supplying the encryption key, the encryption key is retrieved from a key manager. 11. A non-transitory machine readable medium storing a program for providing encryption services on a computer that executes a plurality of virtual machines (VMs), the program comprising sets of instructions for: detecting an event on a particular VM; examining a plurality of encryption policies to determine whether an encryption rule needs to be specified for the detected event; and specifying the encryption rule based on the examination of the encryption policies, said encryption rule for encrypting messages sent by the particular VM. 12. The non-transitory machine readable medium of claim 11, wherein the program further comprises a set of instructions for using the encryption rule to encrypt messages sent by the particular VM. 13. The non-transitory machine readable medium of claim 11, wherein the event is a flow-based event. 14. The non-transitory machine readable medium of claim 11, wherein the set of instruction for detecting the event comprises a set of instructions for detecting an initiation of a flow between the particular VM and another machine. 15. The non-transitory machine readable medium of claim 11, wherein the set of instruction for detecting the event comprises a set of instructions for detecting existence of malware on the particular VM. 16. The non-transitory machine readable medium of claim 11, wherein the set of instruction for detecting the event comprises a set of instructions for detecting for existence of malware on another VM. 17. The non-transitory machine readable medium of claim 11, wherein the set of instruction for examining the set of encryption policies comprises a set of instructions for forwarding the detected event to a set of controllers, said controller set examining the set of encryption policies to determine whether an encryption rule needs to be specified for the detected event. 18. The non-transitory machine readable medium of claim 11, wherein the set of instruction for examining the set of encryption policies comprises a set of instructions for forwarding the detected event to a set of controllers, said controller set determining whether an encryption policy has to be provided to the computer to generate, at the computer, an encryption rule for the detected event.
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections.1. A method of providing encryption services on a computer that executes a plurality of virtual machines (VMs), the method comprising: detecting an event on a particular VM; generating an encryption rule for encrypting data messages that are sent from the particular VM; and using the encryption rule to encrypt messages sent by the particular VM. 2. The method of claim 1, wherein generating the encryption rule comprises examining a plurality of encryption policies to determine whether an encryption rule needs to be specified for the detected event, wherein generating the encryption rule comprises generating the encryption rule based on the examination of the encryption policies. 3. The method of claim 1, wherein the event is a flow-based event. 4. The method of claim 1, wherein detecting the event comprises detecting an initiation of a flow between the particular VM and another VM. 5. The method of claim 1, wherein detecting the event comprises detecting existence of malware on the particular VM. 6. The method of claim 1, wherein detecting the event comprises detecting existence of malware on another VM. 7. The method of claim 1, wherein generating the encryption rule comprises forwarding the detected event to a set of controllers, said controller set determining whether an encryption rule needs to be specified for the detected event based on a set of encryption policies that are stored by the controller set, wherein generating the encryption rule comprises receiving the generated encryption rule from the controller set. 8. The method of claim 1, wherein generating the encryption rule comprises forwarding the detected event to a set of controllers, said controller set determining whether an encryption policy has to be provided to the computer to generate, at the computer, an encryption rule for the detected event. 9. The method of claim 1, wherein using the encryption rule comprises providing the encryption rule to an encryptor that intercepts data messages sent from the particular VM and encrypts the intercepted data messages based on the encryption rule. 10. The method of claim 9, wherein the encryption rule specifies an encryption key identifier that identifies an encryption key to use to encrypt the data messages, wherein the encryption key is also supplied to the encryptor, wherein before supplying the encryption key, the encryption key is retrieved from a key manager. 11. A non-transitory machine readable medium storing a program for providing encryption services on a computer that executes a plurality of virtual machines (VMs), the program comprising sets of instructions for: detecting an event on a particular VM; examining a plurality of encryption policies to determine whether an encryption rule needs to be specified for the detected event; and specifying the encryption rule based on the examination of the encryption policies, said encryption rule for encrypting messages sent by the particular VM. 12. The non-transitory machine readable medium of claim 11, wherein the program further comprises a set of instructions for using the encryption rule to encrypt messages sent by the particular VM. 13. The non-transitory machine readable medium of claim 11, wherein the event is a flow-based event. 14. The non-transitory machine readable medium of claim 11, wherein the set of instruction for detecting the event comprises a set of instructions for detecting an initiation of a flow between the particular VM and another machine. 15. The non-transitory machine readable medium of claim 11, wherein the set of instruction for detecting the event comprises a set of instructions for detecting existence of malware on the particular VM. 16. The non-transitory machine readable medium of claim 11, wherein the set of instruction for detecting the event comprises a set of instructions for detecting for existence of malware on another VM. 17. The non-transitory machine readable medium of claim 11, wherein the set of instruction for examining the set of encryption policies comprises a set of instructions for forwarding the detected event to a set of controllers, said controller set examining the set of encryption policies to determine whether an encryption rule needs to be specified for the detected event. 18. The non-transitory machine readable medium of claim 11, wherein the set of instruction for examining the set of encryption policies comprises a set of instructions for forwarding the detected event to a set of controllers, said controller set determining whether an encryption policy has to be provided to the computer to generate, at the computer, an encryption rule for the detected event.
2,400
8,558
8,558
14,592,640
2,449
A user equipment is provided for providing content. The user equipment comprising at least one memory and at least one processing device. The at least one process is configured to receive a data stream over a network, the data stream comprising un-segmented media data for the content. The at least one process is also configured to identify segment boundaries in the un-segmented media data to identify segments and determine a segment number for each of the identified segments from a media presentation description (MPD) based on the segment boundaries. The at least one process is also configured to retrieve a uniform resource locator (URL) associated with each of a plurality of dynamic adaptive streaming over hypertext transfer protocol (DASH) segments based on the segment number for each of the plurality of DASH segments and provide the URL associated with each of the plurality of DASH segments to a client player.
1. A user equipment, comprising: at least one memory; and at least one processing device coupled to the at least one memory, the at least one processing device configured to: receive a data stream over a network, the data stream comprising un-segmented media data for the content; identify segment boundaries in the un-segmented media data to identify segments; determine a segment number for each of the identified segments from a media presentation description (MPD) based on the segment boundaries; retrieve a uniform resource locator (URL) associated with each of a plurality of dynamic adaptive streaming over hypertext transfer protocol (DASH) segments based on the segment number for each of the plurality of DASH segments; and provide the URL associated with each of the plurality of DASH segments to a client player. 2. The user equipment of claim 1, wherein the at least one processing device is further configured to: provide metadata for the URL associated with each of the plurality of DASH segments to the client player. 3. The user equipment of claim 1, wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: identify a segment index box in the un-segmented media data, the segment index box indicating a segment boundary. 4. The user equipment of claim 1, wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: identify a timestamp of a sample in the un-segmented media data; determine whether a start or end time of a segment matches the timestamp; and responsive to the start or end time of the segment matching the timestamp, identify the sample as a segment boundary. 5. The user equipment of claim 1, wherein the data stream is received in a plurality of fragments, wherein the sample is a first sample of a fragment, and wherein determining whether the start or end time of the segment matches the timestamp comprises the at least one processing device configured to: divide the start or end time by a duration of the segment. 6. The user equipment of claim 1, wherein the MPD indicates the start or end time of the segments. 7. The user equipment of claim 1, wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: identify a marker in a packet header of the un-segmented media data, the marker indicating a segment boundary. 8. The user equipment of claim 1, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: receive a quantity of fragments in the un-segmented media data; and identify a segment boundary based on the quantity of fragments. 9. The user equipment of claim 1, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: receive a duration for each segment; and identify a segment boundary based on the duration for the segment. 10. The user equipment of claim 3, wherein the segment index box indicates a beginning of a segment. 11. A method for managing content, the method comprising: receiving a data stream over a network, the data stream comprising un-segmented data for the content; identifying segment boundaries in the un-segmented media data to identify segments; determining a segment number for each of the identified segments from a media presentation description (MPD) based on the segment boundaries; retrieving a uniform resource locator (URL) associated with each of a plurality of dynamic adaptive streaming over hypertext transfer protocol (DASH) segments based on the segment number for each of the plurality of DASH segments; and providing the URL associated with each of the plurality of DASH segments to a client player. 12. The method of claim 11, further comprising: providing metadata for the URL associated with each of the plurality of DASH segments to the client player. 13. The method of claim 11, wherein identifying the segment boundaries in the un-segmented media data comprises: identifying a segment index box in the un-segmented media data, the segment index box indicating a segment boundary. 14. The method of claim 11, wherein identifying the segment boundaries in the un-segmented media data comprises: identifying a timestamp of a sample in the un-segmented media data; determining whether a start or end time of a segment matches the timestamp; and responsive to the start or end time of the segment matching the timestamp, identifying the sample as a segment boundary. 15. The method of claim 11, wherein the data stream is received in a plurality of fragments, wherein the sample is a first sample of a fragment, and wherein determining whether the start or end time of the segment matches the timestamp comprises: dividing the start or end time by a duration of the segment. 16. The method of claim 11, wherein the MPD indicates the start or end time of the segments. 17. The method of claim 11, wherein identifying the segment boundaries in the un-segmented media data comprises: identifying a marker in a packet header of the un-segmented media data, the marker indicating a segment boundary. 18. The method of claim 11, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises: receiving a quantity of fragments in the un-segmented media data; and identifying a segment boundary based on the quantity of fragments. 19. The method of claim 11, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises: receiving a duration for each segment; and identifying a segment boundary based on the duration for the segment. 20. The method of claim 13, wherein the segment index box indicates a beginning of a segment.
A user equipment is provided for providing content. The user equipment comprising at least one memory and at least one processing device. The at least one process is configured to receive a data stream over a network, the data stream comprising un-segmented media data for the content. The at least one process is also configured to identify segment boundaries in the un-segmented media data to identify segments and determine a segment number for each of the identified segments from a media presentation description (MPD) based on the segment boundaries. The at least one process is also configured to retrieve a uniform resource locator (URL) associated with each of a plurality of dynamic adaptive streaming over hypertext transfer protocol (DASH) segments based on the segment number for each of the plurality of DASH segments and provide the URL associated with each of the plurality of DASH segments to a client player.1. A user equipment, comprising: at least one memory; and at least one processing device coupled to the at least one memory, the at least one processing device configured to: receive a data stream over a network, the data stream comprising un-segmented media data for the content; identify segment boundaries in the un-segmented media data to identify segments; determine a segment number for each of the identified segments from a media presentation description (MPD) based on the segment boundaries; retrieve a uniform resource locator (URL) associated with each of a plurality of dynamic adaptive streaming over hypertext transfer protocol (DASH) segments based on the segment number for each of the plurality of DASH segments; and provide the URL associated with each of the plurality of DASH segments to a client player. 2. The user equipment of claim 1, wherein the at least one processing device is further configured to: provide metadata for the URL associated with each of the plurality of DASH segments to the client player. 3. The user equipment of claim 1, wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: identify a segment index box in the un-segmented media data, the segment index box indicating a segment boundary. 4. The user equipment of claim 1, wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: identify a timestamp of a sample in the un-segmented media data; determine whether a start or end time of a segment matches the timestamp; and responsive to the start or end time of the segment matching the timestamp, identify the sample as a segment boundary. 5. The user equipment of claim 1, wherein the data stream is received in a plurality of fragments, wherein the sample is a first sample of a fragment, and wherein determining whether the start or end time of the segment matches the timestamp comprises the at least one processing device configured to: divide the start or end time by a duration of the segment. 6. The user equipment of claim 1, wherein the MPD indicates the start or end time of the segments. 7. The user equipment of claim 1, wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: identify a marker in a packet header of the un-segmented media data, the marker indicating a segment boundary. 8. The user equipment of claim 1, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: receive a quantity of fragments in the un-segmented media data; and identify a segment boundary based on the quantity of fragments. 9. The user equipment of claim 1, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises the at least one processing device configured to: receive a duration for each segment; and identify a segment boundary based on the duration for the segment. 10. The user equipment of claim 3, wherein the segment index box indicates a beginning of a segment. 11. A method for managing content, the method comprising: receiving a data stream over a network, the data stream comprising un-segmented data for the content; identifying segment boundaries in the un-segmented media data to identify segments; determining a segment number for each of the identified segments from a media presentation description (MPD) based on the segment boundaries; retrieving a uniform resource locator (URL) associated with each of a plurality of dynamic adaptive streaming over hypertext transfer protocol (DASH) segments based on the segment number for each of the plurality of DASH segments; and providing the URL associated with each of the plurality of DASH segments to a client player. 12. The method of claim 11, further comprising: providing metadata for the URL associated with each of the plurality of DASH segments to the client player. 13. The method of claim 11, wherein identifying the segment boundaries in the un-segmented media data comprises: identifying a segment index box in the un-segmented media data, the segment index box indicating a segment boundary. 14. The method of claim 11, wherein identifying the segment boundaries in the un-segmented media data comprises: identifying a timestamp of a sample in the un-segmented media data; determining whether a start or end time of a segment matches the timestamp; and responsive to the start or end time of the segment matching the timestamp, identifying the sample as a segment boundary. 15. The method of claim 11, wherein the data stream is received in a plurality of fragments, wherein the sample is a first sample of a fragment, and wherein determining whether the start or end time of the segment matches the timestamp comprises: dividing the start or end time by a duration of the segment. 16. The method of claim 11, wherein the MPD indicates the start or end time of the segments. 17. The method of claim 11, wherein identifying the segment boundaries in the un-segmented media data comprises: identifying a marker in a packet header of the un-segmented media data, the marker indicating a segment boundary. 18. The method of claim 11, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises: receiving a quantity of fragments in the un-segmented media data; and identifying a segment boundary based on the quantity of fragments. 19. The method of claim 11, wherein the data stream is received in a plurality of fragments, and wherein identifying the segment boundaries in the un-segmented media data comprises: receiving a duration for each segment; and identifying a segment boundary based on the duration for the segment. 20. The method of claim 13, wherein the segment index box indicates a beginning of a segment.
2,400
8,559
8,559
14,477,247
2,469
A method and system for improving responsiveness in exchanging management and control frames in a wireless local area network are disclosed. An initiator sends a frame (action frame, management frame, CSI frame, control frame, or data frame) to a responder. Upon correctly receiving the frame, the responder sends a response frame to the initiator instead of directly sending an acknowledgement (ACK) packet. The responder preferably accesses the wireless medium to send the response frame in a short inter-frame spacing (SIFS). With this scheme, a long delay associated with having to contend for the wireless medium to send the response frame is avoided and therefore, the responsiveness and timeliness of the feedback mechanism is significantly enhanced. The response frame may be piggybacked on or aggregated with another packet.
1. A method for use in a first station (STA), the method comprising: transmitting, by the first STA, to a second STA, a channel state information (CSI) frame, wherein the CSI frame is an action no acknowledgement (No-ACK) frame; and receiving, by the first STA, from the second STA, a response frame that includes CSI feedback without receiving a separate acknowledgement (ACK) frame acknowledging receipt of the CSI frame. 2. The method of claim 1 wherein the response frame is received within a short inter-frame spacing (SIFS) of the CSI frame. 3. The method of claim 1 wherein the response frame is piggybacked on another frame or aggregated with another frame. 4. The method of claim 1 wherein the CSI frame includes a request identity number field to indicate a request identity number. 5. The method of claim 1 wherein the CSI frame includes a response time policy field to indicate whether the response frame is to be received immediately or within a predetermined time period. 6. The method of claim 1 wherein the CSI frame includes an aggregation policy field to indicate whether the response frame may be aggregated with at least one other frame. 7. The method of claim 6 wherein the aggregation policy field indicates that multiple packets should be received in a reduced inter-frame spacing (RIFS). 8. The method of claim 1 wherein the CSI frame includes a training request and the response frame is a sounding frame. 9. The method of claim 1 wherein the CSI feedback is used for at least one of transmit beam forming, calibration, and antenna selection. 10. The method of claim 1 wherein the CSI frame includes a modulation and coding scheme (MCS) request and the response frame includes an MCS feedback, and wherein the method further comprises generating a next frame based on the MCS feedback. 11. A station (STA) comprising: a transmitter configured to transmit a channel state information (CSI) frame to a second STA, wherein the CSI frame is an action no acknowledgement (No-ACK) frame; and a receiver configured to receive a response frame from the second STA, wherein the response frame includes CSI feedback and is received without receiving a separate acknowledgement (ACK) frame acknowledging receipt of the CSI frame. 12. The STA of claim 11 wherein the receiver is configured to receive the response frame within a short inter-frame spacing (SIFS) of the CSI frame. 13. The STA of claim 11 wherein the receiver is configured to receive the response frame piggybacked on another frame or aggregated with another frame. 14. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a request identity number field that indicates a request identity number. 15. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a response time policy field to indicate whether the response frame is to be received immediately or within a predetermined time period. 16. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including an aggregation policy field that indicates whether the response frame may be aggregated with another frame. 17. The STA of claim 16 wherein the aggregation policy field indicates that the STA should receive multiple packets in a reduced inter-frame spacing (RIFS). 18. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a training request and the receiver is configured to receive the response frame as a sounding frame. 19. The STA of claim 11 further comprising: a processor configured to use the CSI feedback for at least one of transmit beam forming, calibration, and antenna selection. 20. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a modulation and coding scheme (MCS) request and the receiver is configured to receive the response frame including an MCS feedback; and wherein the transmitter is configured to transmit a next frame based on the MCS feedback.
A method and system for improving responsiveness in exchanging management and control frames in a wireless local area network are disclosed. An initiator sends a frame (action frame, management frame, CSI frame, control frame, or data frame) to a responder. Upon correctly receiving the frame, the responder sends a response frame to the initiator instead of directly sending an acknowledgement (ACK) packet. The responder preferably accesses the wireless medium to send the response frame in a short inter-frame spacing (SIFS). With this scheme, a long delay associated with having to contend for the wireless medium to send the response frame is avoided and therefore, the responsiveness and timeliness of the feedback mechanism is significantly enhanced. The response frame may be piggybacked on or aggregated with another packet.1. A method for use in a first station (STA), the method comprising: transmitting, by the first STA, to a second STA, a channel state information (CSI) frame, wherein the CSI frame is an action no acknowledgement (No-ACK) frame; and receiving, by the first STA, from the second STA, a response frame that includes CSI feedback without receiving a separate acknowledgement (ACK) frame acknowledging receipt of the CSI frame. 2. The method of claim 1 wherein the response frame is received within a short inter-frame spacing (SIFS) of the CSI frame. 3. The method of claim 1 wherein the response frame is piggybacked on another frame or aggregated with another frame. 4. The method of claim 1 wherein the CSI frame includes a request identity number field to indicate a request identity number. 5. The method of claim 1 wherein the CSI frame includes a response time policy field to indicate whether the response frame is to be received immediately or within a predetermined time period. 6. The method of claim 1 wherein the CSI frame includes an aggregation policy field to indicate whether the response frame may be aggregated with at least one other frame. 7. The method of claim 6 wherein the aggregation policy field indicates that multiple packets should be received in a reduced inter-frame spacing (RIFS). 8. The method of claim 1 wherein the CSI frame includes a training request and the response frame is a sounding frame. 9. The method of claim 1 wherein the CSI feedback is used for at least one of transmit beam forming, calibration, and antenna selection. 10. The method of claim 1 wherein the CSI frame includes a modulation and coding scheme (MCS) request and the response frame includes an MCS feedback, and wherein the method further comprises generating a next frame based on the MCS feedback. 11. A station (STA) comprising: a transmitter configured to transmit a channel state information (CSI) frame to a second STA, wherein the CSI frame is an action no acknowledgement (No-ACK) frame; and a receiver configured to receive a response frame from the second STA, wherein the response frame includes CSI feedback and is received without receiving a separate acknowledgement (ACK) frame acknowledging receipt of the CSI frame. 12. The STA of claim 11 wherein the receiver is configured to receive the response frame within a short inter-frame spacing (SIFS) of the CSI frame. 13. The STA of claim 11 wherein the receiver is configured to receive the response frame piggybacked on another frame or aggregated with another frame. 14. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a request identity number field that indicates a request identity number. 15. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a response time policy field to indicate whether the response frame is to be received immediately or within a predetermined time period. 16. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including an aggregation policy field that indicates whether the response frame may be aggregated with another frame. 17. The STA of claim 16 wherein the aggregation policy field indicates that the STA should receive multiple packets in a reduced inter-frame spacing (RIFS). 18. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a training request and the receiver is configured to receive the response frame as a sounding frame. 19. The STA of claim 11 further comprising: a processor configured to use the CSI feedback for at least one of transmit beam forming, calibration, and antenna selection. 20. The STA of claim 11 wherein the transmitter is configured to transmit the CSI frame including a modulation and coding scheme (MCS) request and the receiver is configured to receive the response frame including an MCS feedback; and wherein the transmitter is configured to transmit a next frame based on the MCS feedback.
2,400
8,560
8,560
14,333,213
2,447
A resource management system and method for performing resource management operations in a distributed computer system uses predicted resource demands for a specified time in the future to change a resource management option of a resource management analysis algorithm prior to the specified time so that the resource management analysis algorithm can be executed in anticipation of the predicted resource demands at the specified time.
1. A method for performing resource management operations in a distributed computer system, the method comprising: analyzing resource demands of clients running in the distributed computer system to produce predicted resource demands for a specified time in the future; changing a resource management option of a resource management analysis algorithm from a first option setting to a second option setting at a first time prior to the specified time; and executing the resource management analysis algorithm with the second option setting in anticipation of the predicted resource demands at the specified time. 2. The method of claim 1, wherein the clients running in the distributed computer system are virtual machines and the resource demands are demands of virtualized resources. 3. The method of claim 1, wherein the analyzing the resource demands by the clients includes analyzing at least one of processor and memory demands of the clients running in the distributed computer system. 4. The method of claim 1, wherein the second option setting of the resource management option is more aggressive with respect to load balancing than the first option setting. 5. The method of claim 1, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting. 6. The method of claim 1, further comprising: changing the resource management option of the resource management analysis algorithm from the second option setting to a third option setting at a second time subsequent to the first time and prior to the specified time; and executing the resource management analysis algorithm with the third option setting. 7. The method of claim 6, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting and wherein the third option setting is less aggressive with respect to load balancing than the second option. 8. The method of claim 1, wherein the resource management option of the resource management analysis algorithm is related to an amount of computation that is performed by the resource management analysis algorithm to find a solution for load balancing. 9. The method of claim 1, wherein the resource management option of the resource management analysis algorithm is related to an ability of the resource management analysis algorithm to aggressively perform a load-balance analysis. 10. A computer-readable storage medium containing program instructions for performing resource management operations in a distributed computer system, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to perform steps comprising: analyzing resource demands of clients running in the distributed computer system to produce predicted resource demands for a specified time in the future; changing a resource management option of a resource management analysis algorithm from a first option setting to a second option setting at a first time prior to the specified time; and executing the resource management analysis algorithm with the second option setting in anticipation of the predicted resource demands at the specified time. 11. The computer-readable storage medium of claim 10, wherein the clients running in the distributed computer system are virtual machines and the resource demands are demands of virtualized resources. 12. The computer-readable storage medium of claim 10, wherein the analyzing the resource demands by the clients includes analyzing at least one of processor and memory demands of the clients running in the distributed computer system. 13. The computer-readable storage medium of claim 10, wherein the second option setting of the resource management option is more aggressive with respect to load balancing than the first option setting. 14. The computer-readable storage medium of claim 10, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting. 15. The computer-readable storage medium of claim 10, further comprising: changing the resource management option of the resource management analysis algorithm from the second option setting to a third option setting at a second time subsequent to the first time and prior to the specified time; and executing the resource management analysis algorithm with the third option setting. 16. The computer-readable storage medium of claim 15, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting and wherein the third option setting is less aggressive with respect to load balancing than the second option. 17. The computer-readable storage medium of claim 10, wherein the resource management option of the resource management analysis algorithm is related to an amount of computation that is performed by the resource management analysis algorithm to find a solution for load balancing. 18. A resource management system supported by hardware in a distributed computer system comprising: an analytics engine configured to analyze resource demands of clients running in the distributed computer system to produce predicted resource demands for a specified time in the future; an option setting unit configured to change a resource management option of a resource management analysis algorithm from a first option setting to a second option setting at a first time prior to the specified time; and a resource management module configured to execute the resource management analysis algorithm with the second option setting in anticipation of the predicted resource demands at the specified time. 19. The resource management system of claim 18, wherein the clients running in the distributed computer system are virtual machines and the resource demands are demands of virtualized resources. 20. The resource management system of claim 18, wherein the analytics engine is configured to analyze at least one of processor and memory demands of the clients running in the distributed computer system. 21. The resource management system of claim 18, wherein the second option setting of the resource management option is more aggressive with respect to load balancing management than the first option setting. 22. The resource management system of claim 18, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting. 23. The resource management system of claim 18, wherein the option setting unit is further configured to change the resource management option of the resource management analysis algorithm from the second option setting to a third option setting at a second time subsequent to the first time and prior to the specified time and wherein the resource management module is configured to execute the resource management analysis algorithm with the third option setting. 24. The resource management system of claim 23, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting and wherein the third option setting is less aggressive with respect to load balancing than the second option.
A resource management system and method for performing resource management operations in a distributed computer system uses predicted resource demands for a specified time in the future to change a resource management option of a resource management analysis algorithm prior to the specified time so that the resource management analysis algorithm can be executed in anticipation of the predicted resource demands at the specified time.1. A method for performing resource management operations in a distributed computer system, the method comprising: analyzing resource demands of clients running in the distributed computer system to produce predicted resource demands for a specified time in the future; changing a resource management option of a resource management analysis algorithm from a first option setting to a second option setting at a first time prior to the specified time; and executing the resource management analysis algorithm with the second option setting in anticipation of the predicted resource demands at the specified time. 2. The method of claim 1, wherein the clients running in the distributed computer system are virtual machines and the resource demands are demands of virtualized resources. 3. The method of claim 1, wherein the analyzing the resource demands by the clients includes analyzing at least one of processor and memory demands of the clients running in the distributed computer system. 4. The method of claim 1, wherein the second option setting of the resource management option is more aggressive with respect to load balancing than the first option setting. 5. The method of claim 1, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting. 6. The method of claim 1, further comprising: changing the resource management option of the resource management analysis algorithm from the second option setting to a third option setting at a second time subsequent to the first time and prior to the specified time; and executing the resource management analysis algorithm with the third option setting. 7. The method of claim 6, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting and wherein the third option setting is less aggressive with respect to load balancing than the second option. 8. The method of claim 1, wherein the resource management option of the resource management analysis algorithm is related to an amount of computation that is performed by the resource management analysis algorithm to find a solution for load balancing. 9. The method of claim 1, wherein the resource management option of the resource management analysis algorithm is related to an ability of the resource management analysis algorithm to aggressively perform a load-balance analysis. 10. A computer-readable storage medium containing program instructions for performing resource management operations in a distributed computer system, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to perform steps comprising: analyzing resource demands of clients running in the distributed computer system to produce predicted resource demands for a specified time in the future; changing a resource management option of a resource management analysis algorithm from a first option setting to a second option setting at a first time prior to the specified time; and executing the resource management analysis algorithm with the second option setting in anticipation of the predicted resource demands at the specified time. 11. The computer-readable storage medium of claim 10, wherein the clients running in the distributed computer system are virtual machines and the resource demands are demands of virtualized resources. 12. The computer-readable storage medium of claim 10, wherein the analyzing the resource demands by the clients includes analyzing at least one of processor and memory demands of the clients running in the distributed computer system. 13. The computer-readable storage medium of claim 10, wherein the second option setting of the resource management option is more aggressive with respect to load balancing than the first option setting. 14. The computer-readable storage medium of claim 10, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting. 15. The computer-readable storage medium of claim 10, further comprising: changing the resource management option of the resource management analysis algorithm from the second option setting to a third option setting at a second time subsequent to the first time and prior to the specified time; and executing the resource management analysis algorithm with the third option setting. 16. The computer-readable storage medium of claim 15, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting and wherein the third option setting is less aggressive with respect to load balancing than the second option. 17. The computer-readable storage medium of claim 10, wherein the resource management option of the resource management analysis algorithm is related to an amount of computation that is performed by the resource management analysis algorithm to find a solution for load balancing. 18. A resource management system supported by hardware in a distributed computer system comprising: an analytics engine configured to analyze resource demands of clients running in the distributed computer system to produce predicted resource demands for a specified time in the future; an option setting unit configured to change a resource management option of a resource management analysis algorithm from a first option setting to a second option setting at a first time prior to the specified time; and a resource management module configured to execute the resource management analysis algorithm with the second option setting in anticipation of the predicted resource demands at the specified time. 19. The resource management system of claim 18, wherein the clients running in the distributed computer system are virtual machines and the resource demands are demands of virtualized resources. 20. The resource management system of claim 18, wherein the analytics engine is configured to analyze at least one of processor and memory demands of the clients running in the distributed computer system. 21. The resource management system of claim 18, wherein the second option setting of the resource management option is more aggressive with respect to load balancing management than the first option setting. 22. The resource management system of claim 18, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting. 23. The resource management system of claim 18, wherein the option setting unit is further configured to change the resource management option of the resource management analysis algorithm from the second option setting to a third option setting at a second time subsequent to the first time and prior to the specified time and wherein the resource management module is configured to execute the resource management analysis algorithm with the third option setting. 24. The resource management system of claim 23, wherein the second option setting of the resource management option is less aggressive with respect to load balancing than the first option setting and wherein the third option setting is less aggressive with respect to load balancing than the second option.
2,400
8,561
8,561
15,527,123
2,468
A coded signal ( 356, 361, 362, 363 ) is received via a physical link ( 151 ) and decoded ( 322, 323, 324 ). A link loss of the physical link ( 151 ) is detected based on at least one of the coded signal ( 356, 361, 362, 363 ) and said decoding ( 322, 323, 324 ).
1-15. (canceled) 16. A method, comprising: receiving a coded signal via a physical link, decoding the coded signal to obtain a result signal, detecting a link loss of the physical link based on at least one of the coded signal and said decoding of the coded signal. 17. The method of claim 16, wherein the link loss of the physical link is detected based on a temporal evolution of the at least one of the coded signal and said decoding in a time interval having a duration in the range of 3-15 ms. 18. The method of claim 16, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal. 19. The method of claim 18, wherein the error signal is indicative of a number of adjacent erroneous symbols in the coded signal, wherein the method further comprises: executing a threshold comparison between the number of adjacent erroneous symbols and a predefined threshold, wherein the link loss is detected based on said executing of the threshold comparison. 20. The method of claim 18, wherein said decoding of the coded signal comprises a second-stage redundancy decoder operating based on the error signal. 21. The method of claim 16, wherein said decoding of the coded signal comprises a Viterbi decoder. 22. The method of claim 21, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal, wherein the method further comprises determining the error signal based on a difference between different Viterbi paths of the Viterbi decoder. 23. The method of claim 16, wherein said decoding of the coded signal comprises a Quadrature Amplitude Modulation, QAM, decoder. 24. The method of claim 23, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal, wherein the method further comprises: determining the error signal based on an Euclidean distance between a constellation point of a symbol of the coded signal and a constellation point of a predefined carrier. 25. The method of claim 16, wherein said decoding of the coded signal comprises a low-density parity check, LDPC, decoder. 26. The method of claim 25, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal, wherein the method further comprises determining the error signal based on a log-likelihood estimate between a constellation point of a symbol of the coded signal and a constellation point of a predefined carrier. 27. The method claim 16, wherein the coded signal is modulated using at least one carrier, wherein the link loss is detected based on the coded signal, wherein the method further comprises: measuring energy levels of a plurality of resource blocks of the coded signal, wherein the link loss is determined based on the measured energy levels. 28. The method of claim 27, further comprising: executing a threshold comparison between energy levels of the plurality of resource blocks and a predetermined threshold, wherein the link loss is determined based on said executing of the threshold comparison. 29. The method of claim 27, wherein the coded signal is modulated using a plurality of carriers, wherein the plurality of resources blocks are adjacent time samples of the coded signal or adjacent carriers of the coded signal. 30. The method of claim 16, wherein the result signal comprises a sequence of bits forming transmission frames, wherein the link loss of the physical link is further detected based on a checksum of at least one of the transmission frames. 31. The method of claim 16, wherein the physical link comprises a copper wire, wherein the method further comprises: in response to determining the link loss of the physical link, removing a Digital Subscriber Line channel implemented via the physical link from a Digital Subscriber Line vector engine calculation, the Digital Subscriber Line vector engine calculation removing far-end crosstalk between the physical link and a plurality of further physical links. 32. The method of claim 31, further comprising: retaining further Digital Subscriber Line channels implemented via the further physical links at the Digital Subscriber Line vector engine calculation. 33. The method of claim 16, wherein the link loss corresponds to the physical link being interrupted and prohibiting communication. 34. A device, comprising: a receiver configured to receive a coded signal via a physical link, a decoder configured to decode the coded signal to obtain a result signal, at least one processor configured to detect a link loss of the physical link based on at least one of the coded signal and said decoding of the coded signal. 35. The device of claim 34, wherein the device is configured to execute the method of claim 16.
A coded signal ( 356, 361, 362, 363 ) is received via a physical link ( 151 ) and decoded ( 322, 323, 324 ). A link loss of the physical link ( 151 ) is detected based on at least one of the coded signal ( 356, 361, 362, 363 ) and said decoding ( 322, 323, 324 ).1-15. (canceled) 16. A method, comprising: receiving a coded signal via a physical link, decoding the coded signal to obtain a result signal, detecting a link loss of the physical link based on at least one of the coded signal and said decoding of the coded signal. 17. The method of claim 16, wherein the link loss of the physical link is detected based on a temporal evolution of the at least one of the coded signal and said decoding in a time interval having a duration in the range of 3-15 ms. 18. The method of claim 16, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal. 19. The method of claim 18, wherein the error signal is indicative of a number of adjacent erroneous symbols in the coded signal, wherein the method further comprises: executing a threshold comparison between the number of adjacent erroneous symbols and a predefined threshold, wherein the link loss is detected based on said executing of the threshold comparison. 20. The method of claim 18, wherein said decoding of the coded signal comprises a second-stage redundancy decoder operating based on the error signal. 21. The method of claim 16, wherein said decoding of the coded signal comprises a Viterbi decoder. 22. The method of claim 21, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal, wherein the method further comprises determining the error signal based on a difference between different Viterbi paths of the Viterbi decoder. 23. The method of claim 16, wherein said decoding of the coded signal comprises a Quadrature Amplitude Modulation, QAM, decoder. 24. The method of claim 23, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal, wherein the method further comprises: determining the error signal based on an Euclidean distance between a constellation point of a symbol of the coded signal and a constellation point of a predefined carrier. 25. The method of claim 16, wherein said decoding of the coded signal comprises a low-density parity check, LDPC, decoder. 26. The method of claim 25, wherein the link loss is detected based on said decoding of the coded signal, wherein said decoding provides an error signal indicative of a presence of errors in said decoding, wherein the link loss is detected based on the error signal, wherein the method further comprises determining the error signal based on a log-likelihood estimate between a constellation point of a symbol of the coded signal and a constellation point of a predefined carrier. 27. The method claim 16, wherein the coded signal is modulated using at least one carrier, wherein the link loss is detected based on the coded signal, wherein the method further comprises: measuring energy levels of a plurality of resource blocks of the coded signal, wherein the link loss is determined based on the measured energy levels. 28. The method of claim 27, further comprising: executing a threshold comparison between energy levels of the plurality of resource blocks and a predetermined threshold, wherein the link loss is determined based on said executing of the threshold comparison. 29. The method of claim 27, wherein the coded signal is modulated using a plurality of carriers, wherein the plurality of resources blocks are adjacent time samples of the coded signal or adjacent carriers of the coded signal. 30. The method of claim 16, wherein the result signal comprises a sequence of bits forming transmission frames, wherein the link loss of the physical link is further detected based on a checksum of at least one of the transmission frames. 31. The method of claim 16, wherein the physical link comprises a copper wire, wherein the method further comprises: in response to determining the link loss of the physical link, removing a Digital Subscriber Line channel implemented via the physical link from a Digital Subscriber Line vector engine calculation, the Digital Subscriber Line vector engine calculation removing far-end crosstalk between the physical link and a plurality of further physical links. 32. The method of claim 31, further comprising: retaining further Digital Subscriber Line channels implemented via the further physical links at the Digital Subscriber Line vector engine calculation. 33. The method of claim 16, wherein the link loss corresponds to the physical link being interrupted and prohibiting communication. 34. A device, comprising: a receiver configured to receive a coded signal via a physical link, a decoder configured to decode the coded signal to obtain a result signal, at least one processor configured to detect a link loss of the physical link based on at least one of the coded signal and said decoding of the coded signal. 35. The device of claim 34, wherein the device is configured to execute the method of claim 16.
2,400
8,562
8,562
11,728,800
2,433
One embodiment of the present invention provides a system that facilitates fine-grain permission management and delegated policy administration. During operation, the system creates a permission associated with a resource. The system also creates an admin permission associated with the permission. Next, the system associates the admin permission with a user. Finally, the system performs an administrative action on the permission, wherein the administrative action is enabled by the admin permission.
1. A method for facilitating fine-grain permission management, the method comprising: creating a permission associated with a resource; creating an admin permission associated with the permission; associating the admin permission with a user; and performing an administrative action on the permission, wherein the administrative action is enabled by the admin permission. 2. The method of claim 1, wherein the permission can comprise a class, wherein the class can include: a second permission associated with the resource; multiple permissions associated with the resource; an authentication-test for the user; and a policy specification for the resource. 3. The method of claim 1, wherein the admin permission can comprise a class that specifies administrative actions on the permission that can be granted to the user. 4. The method of claim 3, wherein the permission can be a second admin permission. 5. The method of claim 1, wherein the administrative action can include: a modify action; a delete action; a grant action; and a revoke action. 6. The method of claim 1, wherein performing the administrative action involves: receiving the admin permission; receiving the permission; determining if the user is associated with the admin permission; if so, determining if the admin permission allows the user to perform the administrative action on the permission; and if so, performing the administrative action on the permission. 7. The method of claim 6, wherein receiving the permission involves receiving a target indicator, which specifies the resource that the permission is associated with. 8. The method of claim 7, wherein determining if the admin permission allows the user to perform the administrative action on the permission involves determining if the user is authorized to perform the administrative action on the permission for the resource. 9. The method of claim 1, wherein associating the admin permission with the user creates an association between a second admin permission and the user. 10. The method of claim 1, wherein the admin permission's association with the permission creates an association between the admin permission and a third permission. 11. The method of claim 1, wherein associating the admin permission with the user creates an association between the permission and the user. 12. The method of claim 1, wherein the permission and the admin permission are stored on a database. 13. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for facilitating fine-grain permission management, the method comprising: creating a permission associated with a resource; creating an admin permission associated with the permission; associating the admin permission with a user; and performing an administrative action on the permission, wherein the administrative action is enabled by the admin permission. 14. The computer-readable storage medium of claim 13, wherein the permission can comprise a class, wherein the class can include: a second permission associated with the resource; multiple permissions associated with the resource; an authentication-test for the user; and a policy specification for the resource. 15. The computer-readable storage medium of claim 13, wherein the admin permission can comprise a class that specifies administrative actions on the permission that can be granted to the user. 16. The computer-readable storage medium of claim 15, wherein the permission can be a second admin permission. 17. The computer-readable storage medium of claim 13, wherein the administrative action can include: a modify action; a delete action; a grant action; and a revoke action. 18. The computer-readable storage medium of claim 13, wherein performing the administrative action involves: receiving the admin permission; receiving the permission; determining if the user is associated with the admin permission; if so, determining if the admin permission allows the user to perform the administrative action on the permission; and if so, performing the administrative action on the permission. 19. The computer-readable storage medium of claim 18, wherein receiving the permission involves receiving a target indicator, which specifies the resource that the permission is associated with. 20. The computer-readable storage medium of claim 19, wherein determining if the admin permission allows the user to perform the administrative action on the permission involves determining if the user is authorized to perform the administrative action on the permission for the resource. 21. The computer-readable storage medium of claim 13, wherein associating the admin permission with the user creates an association between a second admin permission and the user. 22. The computer-readable storage medium of claim 13, wherein the admin permission's association with the permission creates an association between the admin permission and a third permission. 23. The computer-readable storage medium of claim 13, wherein associating the admin permission with the user creates an association between the permission and the user. 24. The computer-readable storage medium of claim 13, wherein the permission and the admin permission are stored on a database. 25. An apparatus that facilitates fine-grain permission management, comprising: a creation mechanism configured to create a permission associated with a resource; wherein the creation mechanism further is configured to create an admin permission associated with the permission; an association mechanism configured to associate the admin permission with a user; and an execution mechanism configured to perform an administrative action on the permission, wherein the administrative action is enabled by the admin permission.
One embodiment of the present invention provides a system that facilitates fine-grain permission management and delegated policy administration. During operation, the system creates a permission associated with a resource. The system also creates an admin permission associated with the permission. Next, the system associates the admin permission with a user. Finally, the system performs an administrative action on the permission, wherein the administrative action is enabled by the admin permission.1. A method for facilitating fine-grain permission management, the method comprising: creating a permission associated with a resource; creating an admin permission associated with the permission; associating the admin permission with a user; and performing an administrative action on the permission, wherein the administrative action is enabled by the admin permission. 2. The method of claim 1, wherein the permission can comprise a class, wherein the class can include: a second permission associated with the resource; multiple permissions associated with the resource; an authentication-test for the user; and a policy specification for the resource. 3. The method of claim 1, wherein the admin permission can comprise a class that specifies administrative actions on the permission that can be granted to the user. 4. The method of claim 3, wherein the permission can be a second admin permission. 5. The method of claim 1, wherein the administrative action can include: a modify action; a delete action; a grant action; and a revoke action. 6. The method of claim 1, wherein performing the administrative action involves: receiving the admin permission; receiving the permission; determining if the user is associated with the admin permission; if so, determining if the admin permission allows the user to perform the administrative action on the permission; and if so, performing the administrative action on the permission. 7. The method of claim 6, wherein receiving the permission involves receiving a target indicator, which specifies the resource that the permission is associated with. 8. The method of claim 7, wherein determining if the admin permission allows the user to perform the administrative action on the permission involves determining if the user is authorized to perform the administrative action on the permission for the resource. 9. The method of claim 1, wherein associating the admin permission with the user creates an association between a second admin permission and the user. 10. The method of claim 1, wherein the admin permission's association with the permission creates an association between the admin permission and a third permission. 11. The method of claim 1, wherein associating the admin permission with the user creates an association between the permission and the user. 12. The method of claim 1, wherein the permission and the admin permission are stored on a database. 13. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for facilitating fine-grain permission management, the method comprising: creating a permission associated with a resource; creating an admin permission associated with the permission; associating the admin permission with a user; and performing an administrative action on the permission, wherein the administrative action is enabled by the admin permission. 14. The computer-readable storage medium of claim 13, wherein the permission can comprise a class, wherein the class can include: a second permission associated with the resource; multiple permissions associated with the resource; an authentication-test for the user; and a policy specification for the resource. 15. The computer-readable storage medium of claim 13, wherein the admin permission can comprise a class that specifies administrative actions on the permission that can be granted to the user. 16. The computer-readable storage medium of claim 15, wherein the permission can be a second admin permission. 17. The computer-readable storage medium of claim 13, wherein the administrative action can include: a modify action; a delete action; a grant action; and a revoke action. 18. The computer-readable storage medium of claim 13, wherein performing the administrative action involves: receiving the admin permission; receiving the permission; determining if the user is associated with the admin permission; if so, determining if the admin permission allows the user to perform the administrative action on the permission; and if so, performing the administrative action on the permission. 19. The computer-readable storage medium of claim 18, wherein receiving the permission involves receiving a target indicator, which specifies the resource that the permission is associated with. 20. The computer-readable storage medium of claim 19, wherein determining if the admin permission allows the user to perform the administrative action on the permission involves determining if the user is authorized to perform the administrative action on the permission for the resource. 21. The computer-readable storage medium of claim 13, wherein associating the admin permission with the user creates an association between a second admin permission and the user. 22. The computer-readable storage medium of claim 13, wherein the admin permission's association with the permission creates an association between the admin permission and a third permission. 23. The computer-readable storage medium of claim 13, wherein associating the admin permission with the user creates an association between the permission and the user. 24. The computer-readable storage medium of claim 13, wherein the permission and the admin permission are stored on a database. 25. An apparatus that facilitates fine-grain permission management, comprising: a creation mechanism configured to create a permission associated with a resource; wherein the creation mechanism further is configured to create an admin permission associated with the permission; an association mechanism configured to associate the admin permission with a user; and an execution mechanism configured to perform an administrative action on the permission, wherein the administrative action is enabled by the admin permission.
2,400
8,563
8,563
15,446,717
2,491
A method of setting a surveillance camera includes the steps of recognizing a readable object in an image captured by the surveillance camera, updating a set value of one or more set items of the surveillance camera associated with the readable object, and transmitting the set value of an at least one set item to an external device in response to receiving a request therefrom.
1. A method of setting a surveillance camera, the method comprising: recognizing a readable object in an image captured by the surveillance camera; updating a set value of one or more set items of the surveillance camera associated with the readable object; and transmitting the set value of an at least one set item to an external device in response to receiving a request therefrom. 2. The method of claim 1, wherein the set value of the readable object is in a visually recognizable form. 3. The method of claim 2, wherein the one or more set items comprise at least one of: an address of the surveillance camera in a network; an account for establishing connection to the surveillance camera from the external device; a password for establishing connection to the surveillance camera from the external device; and installation information on the surveillance camera. 4. The method of claim 2, wherein the readable object comprises a quick response (QR) code. 5. The method of claim 1, further comprising checking whether the surveillance camera satisfies a first condition, wherein the step of recognizing the readable object is performed when the first condition is satisfied. 6. The method of claim 5, wherein the first condition comprises whether a time period from which the surveillance camera is powered on is within a first time range. 7. The method of claim 5, wherein the first condition comprises whether the set value of the one or more set items is initialized. 8. A method of controlling an installation of a surveillance camera, the method comprising: detecting the surveillance camera connected to a network; generating mapping data of the detected surveillance camera; sending a request for a set value of one or more set items of the detected surveillance camera to the detected surveillance camera; receiving the set value from the detected surveillance camera; and updating the mapping data of the detected surveillance camera based on the received set value. 9. The method of claim 8, wherein the one or more set items comprise: at least one of an address of the detected surveillance camera in the network; an account for establishing connection to the detected surveillance camera; a password for establishing connection to the detected surveillance camera; and installation information on the detected surveillance camera, the installation information on the detected surveillance camera is configured to be provided to a user based on the updated mapping data. 10. A surveillance camera system, comprising: at least one surveillance camera configured to: update a set value of one or more set items by reading a readable object in a captured image; and transmit the set value of the one or more set items to an external device in response to receiving a request for the set value therefrom; a user terminal configured to display the readable object on a display based on at least one of user's input and a surveillance camera database; and a surveillance camera management device configured to: send the request for the set value of the one or more set items to the at least one surveillance camera; and update mapping data of the at least one surveillance camera by receiving the set value from the at least one surveillance camera. 11. The surveillance camera system of claim 10, wherein the set value of the readable object is in a visually recognizable form. 12. The surveillance camera system of claim 11, wherein the one or more set items comprise: at least one of an address of the at least one surveillance camera in a network; an account for establishing connection to the at least one surveillance camera from the external device; a password for establishing connection to the at least one surveillance camera from the external device; and installation information on the at least one surveillance camera. 13. The surveillance camera system of claim 11, wherein the readable object comprises a quick response (QR) code. 14. The surveillance camera system of claim 10, wherein: the at least one surveillance camera is configured to determine whether the at least one surveillance camera satisfies a first condition; and the at least one surveillance camera is configured to recognize and read the readable object when the first condition is satisfied. 15. The surveillance camera system of claim 14, wherein the first condition is whether a time period from which the at least one surveillance camera is powered on is within a first time range. 16. The surveillance camera system of claim 14, wherein the first condition is whether the set value of the one or more set items is initialized. 17. The surveillance camera system of claim 10, further comprising a network design device configured to: set a connection relationship between the at least one surveillance camera and a network; and set a value of an at least one set item of the at least one surveillance camera according to a user's input. 18. The surveillance camera system of claim 17, wherein the network design device is configured to generate the surveillance camera database comprising the set value of the at least one set item of the at least one surveillance camera. 19. The surveillance camera system of claim 18, wherein the user terminal is configured to generate the readable object on the display based on at least one of the user's input and the surveillance camera database generated by the network design device. 20. The surveillance camera system of claim 12, wherein the installation information comprises global positioning system (GPS) information with respect to a location of the at least one surveillance camera.
A method of setting a surveillance camera includes the steps of recognizing a readable object in an image captured by the surveillance camera, updating a set value of one or more set items of the surveillance camera associated with the readable object, and transmitting the set value of an at least one set item to an external device in response to receiving a request therefrom.1. A method of setting a surveillance camera, the method comprising: recognizing a readable object in an image captured by the surveillance camera; updating a set value of one or more set items of the surveillance camera associated with the readable object; and transmitting the set value of an at least one set item to an external device in response to receiving a request therefrom. 2. The method of claim 1, wherein the set value of the readable object is in a visually recognizable form. 3. The method of claim 2, wherein the one or more set items comprise at least one of: an address of the surveillance camera in a network; an account for establishing connection to the surveillance camera from the external device; a password for establishing connection to the surveillance camera from the external device; and installation information on the surveillance camera. 4. The method of claim 2, wherein the readable object comprises a quick response (QR) code. 5. The method of claim 1, further comprising checking whether the surveillance camera satisfies a first condition, wherein the step of recognizing the readable object is performed when the first condition is satisfied. 6. The method of claim 5, wherein the first condition comprises whether a time period from which the surveillance camera is powered on is within a first time range. 7. The method of claim 5, wherein the first condition comprises whether the set value of the one or more set items is initialized. 8. A method of controlling an installation of a surveillance camera, the method comprising: detecting the surveillance camera connected to a network; generating mapping data of the detected surveillance camera; sending a request for a set value of one or more set items of the detected surveillance camera to the detected surveillance camera; receiving the set value from the detected surveillance camera; and updating the mapping data of the detected surveillance camera based on the received set value. 9. The method of claim 8, wherein the one or more set items comprise: at least one of an address of the detected surveillance camera in the network; an account for establishing connection to the detected surveillance camera; a password for establishing connection to the detected surveillance camera; and installation information on the detected surveillance camera, the installation information on the detected surveillance camera is configured to be provided to a user based on the updated mapping data. 10. A surveillance camera system, comprising: at least one surveillance camera configured to: update a set value of one or more set items by reading a readable object in a captured image; and transmit the set value of the one or more set items to an external device in response to receiving a request for the set value therefrom; a user terminal configured to display the readable object on a display based on at least one of user's input and a surveillance camera database; and a surveillance camera management device configured to: send the request for the set value of the one or more set items to the at least one surveillance camera; and update mapping data of the at least one surveillance camera by receiving the set value from the at least one surveillance camera. 11. The surveillance camera system of claim 10, wherein the set value of the readable object is in a visually recognizable form. 12. The surveillance camera system of claim 11, wherein the one or more set items comprise: at least one of an address of the at least one surveillance camera in a network; an account for establishing connection to the at least one surveillance camera from the external device; a password for establishing connection to the at least one surveillance camera from the external device; and installation information on the at least one surveillance camera. 13. The surveillance camera system of claim 11, wherein the readable object comprises a quick response (QR) code. 14. The surveillance camera system of claim 10, wherein: the at least one surveillance camera is configured to determine whether the at least one surveillance camera satisfies a first condition; and the at least one surveillance camera is configured to recognize and read the readable object when the first condition is satisfied. 15. The surveillance camera system of claim 14, wherein the first condition is whether a time period from which the at least one surveillance camera is powered on is within a first time range. 16. The surveillance camera system of claim 14, wherein the first condition is whether the set value of the one or more set items is initialized. 17. The surveillance camera system of claim 10, further comprising a network design device configured to: set a connection relationship between the at least one surveillance camera and a network; and set a value of an at least one set item of the at least one surveillance camera according to a user's input. 18. The surveillance camera system of claim 17, wherein the network design device is configured to generate the surveillance camera database comprising the set value of the at least one set item of the at least one surveillance camera. 19. The surveillance camera system of claim 18, wherein the user terminal is configured to generate the readable object on the display based on at least one of the user's input and the surveillance camera database generated by the network design device. 20. The surveillance camera system of claim 12, wherein the installation information comprises global positioning system (GPS) information with respect to a location of the at least one surveillance camera.
2,400
8,564
8,564
14,902,266
2,483
A method decoding a data values set includes: decoding a first portion of each data value from one or more data sets; decoding a second portion depending on integer bits of data values not fully encoded by the data sets, and, if a data value has not been fully decoded by first and second portions, decoding a remaining third portion of the data value; detecting, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and varying n for use in subsequent data values.
1. A data decoding method for decoding a set of data values, the method comprising the steps of: decoding a first portion of each data value from one or more data sets indicative of first portions of predetermined magnitude ranges and encoded to an input data stream using binary encoding; decoding a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, data defining the second portion being included in the input data stream and, if a data value has not been fully decoded by the respective first and second portions, decoding a remaining third portion of the data value from the input data stream; detecting, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and varying n for use in respect of subsequent data values according to the results of the detecting step. 2. A method according to claim 1, in which the varying step comprises increasing n in response to a detection of more than one detected instance of a data value for which a third portion has been encoded and would still have been required had a higher value of n been used. 3. A method according to claim 1, in which the step of varying n comprises: generating a cumulative count of the instances (i) and (ii); and deriving a value of n in dependence upon a quantised version of the cumulative count. 4. A method according to claim 1, in which the varying step is configured not to decrease n below a predetermined minimum value. 5. A method according to claim 1, in which the detecting step comprises detecting a total number of instances, in respect of that subset of data values, for which a second portion was encoded. 6. A method according to claim 5, in which the varying step comprises increasing the value of n if the number of instances of data values, for which a third portion has been encoded, exceeds a first predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 7. A method according to claim 6, in which the varying step comprises reducing the value of n if the number of instances of data values for which a second portion has been encoded and for which the data value was fully encoded by first and second portions, exceeds a second predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 8. A method according to claim 5, in which the varying step comprises increasing the value of n if the number of instances of data values, for which a third portion has been encoded and would still have been required had a higher value of n been used, exceeds a first predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 9. A method according to claim 8, in which the varying step comprises reducing the value of n if the number of instances of data values for which a second portion has been encoded, but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n, exceeds a second predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 10. A method according to claim 9, in which the first predetermined proportion is lower than the second predetermined proportion. 11. A method according to claim 10, in which the step of reducing the value of n comprises reducing n by 1, and the step of increasing the value of n comprises increasing n by 1. 12. A method according to claim 1, comprising generating, for each data value, respective complementary most-significant data portions and least-significant data portions, such that: the most-significant data portion of a data value represents a plurality of most significant bits of that value, the first data portion being derived from the most-significant data portion; and the least-significant data portion of that data value represents the remaining n least significant bits of that value and forms the second portion of that data value. 13. A method according to claim 1, in which the first portion of each data value represents one or more least significant bits of that data value. 14. A method according to claim 13, in which the second and third portions of a data value are encoded by a two-part variable length code such that the second portion represents a group of suffix bits and the third portion represents a unary-encoded prefix. 15. A method according to claim 13, in which the second data portion is decoded from the input data stream using arithmetic coding in which symbols representing the second data portion are encoded according to respective proportions of a coding value range, in which the respective proportions of the coding value range for each of the symbols that describe the second portion are of equal size. 16. A method according to claim 1, in which one of the data sets is a significance map indicative of positions, relative to an array of the data values, of most-significant data portions which are non-zero. 17. A method according to claim 1, in which the data sets comprise: a greater-than-one map indicative of positions, relative to the array of the values, of most-significant data portions which are greater than 1; and a greater-than-two map indicative of positions, relative to the array of the values, of most-significant data portions which are greater than 2. 18. A method according to claim 1, in which the set of data values comprises a sequence of frequency transformed image coefficients, or the non-zero constituents of that sequence or the non-zero constituents of that sequence where the magnitude of each data value has been reduced by 1. 19. A method according to claim 18, in which: the set of data values represent image data having an image data bit depth; and the method comprises setting an initial value of n in dependence upon the image data bit depth. 20. A method according to claim 18, comprising the step of setting an initial value of n in dependence upon one or more of: an encoding mode; a video data component to be encoded; a size of the subset of data values; and a picture type. 21. A data encoding method for encoding a set of data values, the method comprising the steps of: encoding a first portion of each data value by generating one or more data sets indicative of first portions of predetermined magnitude ranges and encoding the data sets to an output data stream using binary encoding; generating a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, and including data defining the second portion in the output data stream; detecting whether a data value has been fully encoded by the respective first and second portion, and if not, encoding a remaining third portion of the data value to the output data stream; detecting, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and varying n for use in respect of subsequent data values according to the results of the detecting step. 22. (canceled) 23. A data carrier storing image data encoded by the encoding method according to claim 21. 24. (canceled) 25. A non-transitory machine-readable storage medium including computer program instructions which when executed by a computer causes the computer to carry out the method of claim 1. 26. Data decoding apparatus for encoding a set of data values, the apparatus comprising: a first decoder configured to decode a first portion of each data value from one or more data sets indicative of first portions of predetermined magnitude ranges encoded an input data stream using binary encoding; a second decoder configured to decode a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, data defining the second portion being included in the input data stream and, if a data value has not been fully decoded by the respective first and second portions, to decode a remaining third portion of the data value from the input data stream; a second detector configured to detect, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and a processor configured to vary n for use in respect of subsequent data values according to the results of the detecting step. 27. Video data capture, transmission, display and/or storage apparatus comprising apparatus according to claim 26. 28. Data encoding apparatus configured to encode a set of data values, the apparatus comprising: an encoder configured to encode a first portion of each data value by generating one or more data sets indicative of first portions of predetermined magnitude ranges and to encode the data sets to an output data stream using binary encoding; a generator configured to generate a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, and to include data defining the second portion in the output data stream; a first detector configured to detect whether a data value has been fully encoded by the respective first and second portion, and if not, to encode a remaining third portion of the data value to the output data stream; a second detector configured to detect, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and a processor configured to vary n for use in respect of subsequent data values according to the detections by the second detector.
A method decoding a data values set includes: decoding a first portion of each data value from one or more data sets; decoding a second portion depending on integer bits of data values not fully encoded by the data sets, and, if a data value has not been fully decoded by first and second portions, decoding a remaining third portion of the data value; detecting, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and varying n for use in subsequent data values.1. A data decoding method for decoding a set of data values, the method comprising the steps of: decoding a first portion of each data value from one or more data sets indicative of first portions of predetermined magnitude ranges and encoded to an input data stream using binary encoding; decoding a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, data defining the second portion being included in the input data stream and, if a data value has not been fully decoded by the respective first and second portions, decoding a remaining third portion of the data value from the input data stream; detecting, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and varying n for use in respect of subsequent data values according to the results of the detecting step. 2. A method according to claim 1, in which the varying step comprises increasing n in response to a detection of more than one detected instance of a data value for which a third portion has been encoded and would still have been required had a higher value of n been used. 3. A method according to claim 1, in which the step of varying n comprises: generating a cumulative count of the instances (i) and (ii); and deriving a value of n in dependence upon a quantised version of the cumulative count. 4. A method according to claim 1, in which the varying step is configured not to decrease n below a predetermined minimum value. 5. A method according to claim 1, in which the detecting step comprises detecting a total number of instances, in respect of that subset of data values, for which a second portion was encoded. 6. A method according to claim 5, in which the varying step comprises increasing the value of n if the number of instances of data values, for which a third portion has been encoded, exceeds a first predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 7. A method according to claim 6, in which the varying step comprises reducing the value of n if the number of instances of data values for which a second portion has been encoded and for which the data value was fully encoded by first and second portions, exceeds a second predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 8. A method according to claim 5, in which the varying step comprises increasing the value of n if the number of instances of data values, for which a third portion has been encoded and would still have been required had a higher value of n been used, exceeds a first predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 9. A method according to claim 8, in which the varying step comprises reducing the value of n if the number of instances of data values for which a second portion has been encoded, but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n, exceeds a second predetermined proportion of the total number of instances, in respect of that subset of data values, for which a second portion was encoded. 10. A method according to claim 9, in which the first predetermined proportion is lower than the second predetermined proportion. 11. A method according to claim 10, in which the step of reducing the value of n comprises reducing n by 1, and the step of increasing the value of n comprises increasing n by 1. 12. A method according to claim 1, comprising generating, for each data value, respective complementary most-significant data portions and least-significant data portions, such that: the most-significant data portion of a data value represents a plurality of most significant bits of that value, the first data portion being derived from the most-significant data portion; and the least-significant data portion of that data value represents the remaining n least significant bits of that value and forms the second portion of that data value. 13. A method according to claim 1, in which the first portion of each data value represents one or more least significant bits of that data value. 14. A method according to claim 13, in which the second and third portions of a data value are encoded by a two-part variable length code such that the second portion represents a group of suffix bits and the third portion represents a unary-encoded prefix. 15. A method according to claim 13, in which the second data portion is decoded from the input data stream using arithmetic coding in which symbols representing the second data portion are encoded according to respective proportions of a coding value range, in which the respective proportions of the coding value range for each of the symbols that describe the second portion are of equal size. 16. A method according to claim 1, in which one of the data sets is a significance map indicative of positions, relative to an array of the data values, of most-significant data portions which are non-zero. 17. A method according to claim 1, in which the data sets comprise: a greater-than-one map indicative of positions, relative to the array of the values, of most-significant data portions which are greater than 1; and a greater-than-two map indicative of positions, relative to the array of the values, of most-significant data portions which are greater than 2. 18. A method according to claim 1, in which the set of data values comprises a sequence of frequency transformed image coefficients, or the non-zero constituents of that sequence or the non-zero constituents of that sequence where the magnitude of each data value has been reduced by 1. 19. A method according to claim 18, in which: the set of data values represent image data having an image data bit depth; and the method comprises setting an initial value of n in dependence upon the image data bit depth. 20. A method according to claim 18, comprising the step of setting an initial value of n in dependence upon one or more of: an encoding mode; a video data component to be encoded; a size of the subset of data values; and a picture type. 21. A data encoding method for encoding a set of data values, the method comprising the steps of: encoding a first portion of each data value by generating one or more data sets indicative of first portions of predetermined magnitude ranges and encoding the data sets to an output data stream using binary encoding; generating a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, and including data defining the second portion in the output data stream; detecting whether a data value has been fully encoded by the respective first and second portion, and if not, encoding a remaining third portion of the data value to the output data stream; detecting, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and varying n for use in respect of subsequent data values according to the results of the detecting step. 22. (canceled) 23. A data carrier storing image data encoded by the encoding method according to claim 21. 24. (canceled) 25. A non-transitory machine-readable storage medium including computer program instructions which when executed by a computer causes the computer to carry out the method of claim 1. 26. Data decoding apparatus for encoding a set of data values, the apparatus comprising: a first decoder configured to decode a first portion of each data value from one or more data sets indicative of first portions of predetermined magnitude ranges encoded an input data stream using binary encoding; a second decoder configured to decode a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, data defining the second portion being included in the input data stream and, if a data value has not been fully decoded by the respective first and second portions, to decode a remaining third portion of the data value from the input data stream; a second detector configured to detect, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and a processor configured to vary n for use in respect of subsequent data values according to the results of the detecting step. 27. Video data capture, transmission, display and/or storage apparatus comprising apparatus according to claim 26. 28. Data encoding apparatus configured to encode a set of data values, the apparatus comprising: an encoder configured to encode a first portion of each data value by generating one or more data sets indicative of first portions of predetermined magnitude ranges and to encode the data sets to an output data stream using binary encoding; a generator configured to generate a second portion of at least those data values not fully encoded by the data sets, the number of bits of the second portion depending upon a value n, where n is an integer, and to include data defining the second portion in the output data stream; a first detector configured to detect whether a data value has been fully encoded by the respective first and second portion, and if not, to encode a remaining third portion of the data value to the output data stream; a second detector configured to detect, for a subset of the data values, (i) instances of data values for which a third portion has been encoded and would still have been required had a higher value of n been used, and (ii) instances of data values for which a second portion has been encoded but the value of n was such that the data value could have been fully encoded by first and second portions using a lower value of n; and a processor configured to vary n for use in respect of subsequent data values according to the detections by the second detector.
2,400
8,565
8,565
15,500,557
2,487
A method and corresponding system for reconstructing the surface geometry of a three-dimensional object is disclosed. The system comprises a cluster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera, and a turntable operable to rotate incrementally. In operation, the turntable is rotated to first and second positions and two-dimensional and three-dimensional data sets are obtained using the two-dimensional high-resolution camera and the three-dimensional depth camera. Corresponding features from the two-dimensional data sets are identified and used to identify the same corresponding features in the three-dimensional data sets. The three-dimensional corresponding features are used to calculate a three-dimensional homography, which is used to align the three-dimensional data sets. Following alignment, a three-dimensional mesh is generated from the aligned data sets.
1. A system for reconstructing a three-dimensional object, comprising: a cluster of heterogeneous sensors, including a two-dimensional high-resolution sensor, a three-dimensional depth sensor and a projector; a turntable; and a calibration system, including a calibration module, a processor, a storage medium and mapping information. 2. The system of claim 1, wherein the two-dimensional high-resolution sensor includes a high-resolution RGB camera. 3. The system of claim 2, wherein the three-dimensional depth sensor includes a three-dimensional depth camera having a pixel resolution lower than the pixel resolution of the high-resolution RGB camera. 4. The system of claim 1, wherein the turntable is operable to rotate incrementally. 5. The system of claim 4, wherein the system is operable to obtain two-dimensional high resolution data and three-dimensional depth location data at each increment of turntable rotation and to process the data obtained at a current turntable location with data obtained at a previous turntable location using two-dimensional to two-dimensional correspondences of the high-resolution data sets and a three-dimensional homography operator to produce a mesh representing the geometry of the three-dimensional object. 6. A system for reconstructing a three-dimensional object, comprising: a cluster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera; and a turntable operable to rotate incrementally; wherein the system is operable to obtain two-dimensional high resolution data and three-dimensional depth location data at each increment of turntable rotation and to process the data obtained at a current turntable location with data obtained at a previous turntable location using two-dimensional to two-dimensional correspondences of the high-resolution data sets and a three-dimensional homography operator to produce a mesh representing the geometry of the three-dimensional object. 7. The system of claim 6, wherein the system is further operable to map the two-dimensional to two-dimensional correspondences of the high-resolution data sets onto an image plane of the depth camera using a multi-step two-dimensional homography. 8. The system of claim 7, wherein the multi-step two-dimensional homography includes mapping the two-dimensional to two-dimensional correspondences of the high-resolution data sets onto an induced plane to produce a set of induced coordinates, followed by mapping the set of induced coordinates onto the image plane of the depth camera. 9. The system of claim 7, wherein the system is further operable to extract depth information from the depth camera using a pixel to pixel mapping between the image plane of the depth camera and depth data corresponding to the pixel locations of the image plane of the depth camera. 10. The system of claim 9, wherein the system is operable to calculate a three-dimensional homography operator using the depth information extracted from a current and previous increment of the turntable and to align the depth information extracted from the current and previous increments of the turntable using the three-dimensional homography operator. 11. A method for reconstructing the surface geometry of a three-dimensional object, comprising the steps: providing a duster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera and a turntable operable to rotate incrementally; rotating the turntable to a first position and acquiring a first two-dimensional data set using the two-dimensional high-resolution camera and a first three-dimensional data set using the three-dimensional depth camera; rotating the turntable to a second position and acquiring a second two-dimensional data set using the two-dimensional high-resolution camera and a second three-dimensional data set using the three-dimensional depth camera; determining corresponding features between the first and second two-dimensional data sets to obtain a first set of high-resolution corresponding points; mapping the first set of high-resolution corresponding points onto an image plane of the depth camera and determining corresponding points between the first and second sets of depth data; and aligning the first and second sets of depth data using a three-dimensional homography obtained from the corresponding points between the first and second sets of depth data. 12. The method of claim 11, wherein a multi-step two-dimensional homography is used to map the first set of high-resolution corresponding points onto the image plane of the depth camera, the multi-step homography including the steps of mapping the two-dimensional to two-dimensional correspondences of the high-resolution data sets onto an induced plane to produce a set of induced coordinates and mapping the set of induced coordinates onto the image plane of the depth camera. 13. The method of claim 12, further comprising the step of extracting depth information from the depth camera using a pixel to pixel mapping between the image plane of the depth camera and depth data corresponding to the pixel locations of the image plane of the depth camera. 14. The method of claim 13, further comprising the steps of: determining a three-dimensional homography operator using the depth information extracted from a current and previous increment of the turntable; aligning the depth information extracted from the current and previous increments of the turntable using the three-dimensional homography operator; and generating a three-dimensional mesh from the aligned depth information. 15. The method of claim 14, further comprising the steps of: determining a modified set of two-dimensional coordinate points from the three-dimensional mesh using the pixel to pixel mapping between the image plane of the depth camera and depth data corresponding to the pixel locations of the image plane of the depth camera; mapping the modified set of two-dimensional coordinate points to a coordinate system representing an image plane of the high-resolution camera to obtain a mapped set of high-resolution data; rotating the turntable to a third position and acquiring a third two-dimensional data set using the two-dimensional high-resolution camera and a third three-dimensional data set using the three-dimensional depth camera; determining corresponding features between the mapped set of high-resolution data and the third two-dimensional data set to obtain a second set of high-resolution corresponding points; mapping the second set of high-resolution corresponding points onto an image plane of the depth camera and determining corresponding points between the three-dimensional mesh and the third set of depth data; aligning the three-dimensional mesh and the third set of depth data using a three-dimensional homography obtained from the corresponding points between the three-dimensional mesh and the third set of depth data; and generating an updated three-dimensional mesh using the aligned three-dimensional mesh and third set of depth data.
A method and corresponding system for reconstructing the surface geometry of a three-dimensional object is disclosed. The system comprises a cluster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera, and a turntable operable to rotate incrementally. In operation, the turntable is rotated to first and second positions and two-dimensional and three-dimensional data sets are obtained using the two-dimensional high-resolution camera and the three-dimensional depth camera. Corresponding features from the two-dimensional data sets are identified and used to identify the same corresponding features in the three-dimensional data sets. The three-dimensional corresponding features are used to calculate a three-dimensional homography, which is used to align the three-dimensional data sets. Following alignment, a three-dimensional mesh is generated from the aligned data sets.1. A system for reconstructing a three-dimensional object, comprising: a cluster of heterogeneous sensors, including a two-dimensional high-resolution sensor, a three-dimensional depth sensor and a projector; a turntable; and a calibration system, including a calibration module, a processor, a storage medium and mapping information. 2. The system of claim 1, wherein the two-dimensional high-resolution sensor includes a high-resolution RGB camera. 3. The system of claim 2, wherein the three-dimensional depth sensor includes a three-dimensional depth camera having a pixel resolution lower than the pixel resolution of the high-resolution RGB camera. 4. The system of claim 1, wherein the turntable is operable to rotate incrementally. 5. The system of claim 4, wherein the system is operable to obtain two-dimensional high resolution data and three-dimensional depth location data at each increment of turntable rotation and to process the data obtained at a current turntable location with data obtained at a previous turntable location using two-dimensional to two-dimensional correspondences of the high-resolution data sets and a three-dimensional homography operator to produce a mesh representing the geometry of the three-dimensional object. 6. A system for reconstructing a three-dimensional object, comprising: a cluster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera; and a turntable operable to rotate incrementally; wherein the system is operable to obtain two-dimensional high resolution data and three-dimensional depth location data at each increment of turntable rotation and to process the data obtained at a current turntable location with data obtained at a previous turntable location using two-dimensional to two-dimensional correspondences of the high-resolution data sets and a three-dimensional homography operator to produce a mesh representing the geometry of the three-dimensional object. 7. The system of claim 6, wherein the system is further operable to map the two-dimensional to two-dimensional correspondences of the high-resolution data sets onto an image plane of the depth camera using a multi-step two-dimensional homography. 8. The system of claim 7, wherein the multi-step two-dimensional homography includes mapping the two-dimensional to two-dimensional correspondences of the high-resolution data sets onto an induced plane to produce a set of induced coordinates, followed by mapping the set of induced coordinates onto the image plane of the depth camera. 9. The system of claim 7, wherein the system is further operable to extract depth information from the depth camera using a pixel to pixel mapping between the image plane of the depth camera and depth data corresponding to the pixel locations of the image plane of the depth camera. 10. The system of claim 9, wherein the system is operable to calculate a three-dimensional homography operator using the depth information extracted from a current and previous increment of the turntable and to align the depth information extracted from the current and previous increments of the turntable using the three-dimensional homography operator. 11. A method for reconstructing the surface geometry of a three-dimensional object, comprising the steps: providing a duster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera and a turntable operable to rotate incrementally; rotating the turntable to a first position and acquiring a first two-dimensional data set using the two-dimensional high-resolution camera and a first three-dimensional data set using the three-dimensional depth camera; rotating the turntable to a second position and acquiring a second two-dimensional data set using the two-dimensional high-resolution camera and a second three-dimensional data set using the three-dimensional depth camera; determining corresponding features between the first and second two-dimensional data sets to obtain a first set of high-resolution corresponding points; mapping the first set of high-resolution corresponding points onto an image plane of the depth camera and determining corresponding points between the first and second sets of depth data; and aligning the first and second sets of depth data using a three-dimensional homography obtained from the corresponding points between the first and second sets of depth data. 12. The method of claim 11, wherein a multi-step two-dimensional homography is used to map the first set of high-resolution corresponding points onto the image plane of the depth camera, the multi-step homography including the steps of mapping the two-dimensional to two-dimensional correspondences of the high-resolution data sets onto an induced plane to produce a set of induced coordinates and mapping the set of induced coordinates onto the image plane of the depth camera. 13. The method of claim 12, further comprising the step of extracting depth information from the depth camera using a pixel to pixel mapping between the image plane of the depth camera and depth data corresponding to the pixel locations of the image plane of the depth camera. 14. The method of claim 13, further comprising the steps of: determining a three-dimensional homography operator using the depth information extracted from a current and previous increment of the turntable; aligning the depth information extracted from the current and previous increments of the turntable using the three-dimensional homography operator; and generating a three-dimensional mesh from the aligned depth information. 15. The method of claim 14, further comprising the steps of: determining a modified set of two-dimensional coordinate points from the three-dimensional mesh using the pixel to pixel mapping between the image plane of the depth camera and depth data corresponding to the pixel locations of the image plane of the depth camera; mapping the modified set of two-dimensional coordinate points to a coordinate system representing an image plane of the high-resolution camera to obtain a mapped set of high-resolution data; rotating the turntable to a third position and acquiring a third two-dimensional data set using the two-dimensional high-resolution camera and a third three-dimensional data set using the three-dimensional depth camera; determining corresponding features between the mapped set of high-resolution data and the third two-dimensional data set to obtain a second set of high-resolution corresponding points; mapping the second set of high-resolution corresponding points onto an image plane of the depth camera and determining corresponding points between the three-dimensional mesh and the third set of depth data; aligning the three-dimensional mesh and the third set of depth data using a three-dimensional homography obtained from the corresponding points between the three-dimensional mesh and the third set of depth data; and generating an updated three-dimensional mesh using the aligned three-dimensional mesh and third set of depth data.
2,400
8,566
8,566
14,981,836
2,414
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes.
1-49. (canceled) 50. A network authentication apparatus comprising: circuitry configured to: receive a connection-request of a first entity, the connection-request initiating a connection that traverses a chain of entities of a network that end at a second entity of the network; and authenticate, at one entity of the entities, the connection-request based on an entity-pattern representing the chain of entities, wherein the chain of entities includes at least two entities. 51. The apparatus of claim 50, further comprising: a memory storing a table of entity-patterns, wherein the circuitry is configured to authenticate the received connection-request if an entity-pattern recorded in the received connection-request is found in the table of entity-patterns. 52. The apparatus of claim 50, wherein the circuitry is configured to perform one of a plurality of functions based on an entity-pattern recorded in the received connection-request. 53. A network authentication system comprising: a first entity and a second entity interconnected by a network, wherein the first entity is configured to transmit a connection-request, the connection request initiating a connection that traverses a chain of entities of the network that ends at the second entity, and the second entity is configured to authenticate a received connection-request based on an entity-pattern representing one chain of entities recorded in a received connection-request, wherein the one chain of entities includes at least two entities. 54. The system of claim 53, further comprising: a plurality of third entities interconnected by the network, wherein selected ones of the third entities form the chain of entities. 55. The network authentication system of claim 5 further comprising: means for generating the connection-request in a client. 56. A method for network authentication comprising: transmitting a connection-request from a first entity, the connection-request initiating a connection that traverses a chain of entities in a network that end at a second entity; and authenticating the connection-request at an entity in the network based on an entity-pattern representing the chain of entities, wherein the chain of entities includes at least two entities. 57. The method of claim 14 further comprising: receiving the connection-request at the entity; and authenticating the received connection-request if an entity-pattern recorded in the received connection-request is also recorded in the entity.
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes.1-49. (canceled) 50. A network authentication apparatus comprising: circuitry configured to: receive a connection-request of a first entity, the connection-request initiating a connection that traverses a chain of entities of a network that end at a second entity of the network; and authenticate, at one entity of the entities, the connection-request based on an entity-pattern representing the chain of entities, wherein the chain of entities includes at least two entities. 51. The apparatus of claim 50, further comprising: a memory storing a table of entity-patterns, wherein the circuitry is configured to authenticate the received connection-request if an entity-pattern recorded in the received connection-request is found in the table of entity-patterns. 52. The apparatus of claim 50, wherein the circuitry is configured to perform one of a plurality of functions based on an entity-pattern recorded in the received connection-request. 53. A network authentication system comprising: a first entity and a second entity interconnected by a network, wherein the first entity is configured to transmit a connection-request, the connection request initiating a connection that traverses a chain of entities of the network that ends at the second entity, and the second entity is configured to authenticate a received connection-request based on an entity-pattern representing one chain of entities recorded in a received connection-request, wherein the one chain of entities includes at least two entities. 54. The system of claim 53, further comprising: a plurality of third entities interconnected by the network, wherein selected ones of the third entities form the chain of entities. 55. The network authentication system of claim 5 further comprising: means for generating the connection-request in a client. 56. A method for network authentication comprising: transmitting a connection-request from a first entity, the connection-request initiating a connection that traverses a chain of entities in a network that end at a second entity; and authenticating the connection-request at an entity in the network based on an entity-pattern representing the chain of entities, wherein the chain of entities includes at least two entities. 57. The method of claim 14 further comprising: receiving the connection-request at the entity; and authenticating the received connection-request if an entity-pattern recorded in the received connection-request is also recorded in the entity.
2,400
8,567
8,567
14,726,228
2,439
Concepts and technologies are described herein for sharing encrypted data with enhanced security. In some configurations, an encryption key is generated from a password by the use of a password-based key generation technology. In addition, input data is encrypted using the encryption key. The encrypted data and the generated key may be then shared with a remote computer, such as a server. The encrypted data can then be decrypted at the remote computer by the use of the key. By the use of the technologies described herein, the contents of an encrypted file may be accessed at a remote computer without requiring a user to share the actual password.
1. A computer-implemented method, comprising: generating an encryption key based on a password; encrypting plain-text data to generate an output file including encrypted data, at a first computing device, using the encryption key to generate encrypted data; communicating the output file from the first computing device to a second computing device; and communicating the encryption key from the first computing device to the second computer, wherein the encryption key is configured to enable generation of the plain-text data from the output file. 2. The method of claim 1, further comprising decrypting the output file, at the second computing device, using the encryption key. 3. The method of claim 1, wherein the output file also includes unencrypted metadata, and wherein the method further comprises removing the unencrypted metadata from the output file. 4. The method of claim 1, wherein the output file also includes unencrypted metadata, and wherein the method further comprises removing the unencrypted metadata from the output file, wherein at least a part of the unencrypted metadata includes salt and describes one or more encryption algorithms. 5. The method of claim 1, wherein the output file also includes unencrypted metadata, and wherein the method further comprises removing unencrypted metadata from the output file, wherein at least a part of the unencrypted metadata describes one or more hash algorithms. 6. The method of claim 1, further comprising removing PBKD-specific metadata from the encryption key. 7. The method of claim 1, wherein the output file also includes a first set of metadata, further comprising: removing the first set of metadata from the output file, wherein at least a part of the first set of metadata describes one or more encryption algorithms; and removing a second set of metadata from the encryption key. 8. A computing device, comprising: a processor; a memory having computer-executable instructions stored thereupon which, when executed by a computing device, cause the computing device to generate an encryption key based on a password; encrypt data using the encryption key to generate encrypted data; cause a communication of the encrypted data from the computing device to a second computer; and cause a communication of the encryption key from the computing device to the second computer, wherein the encryption key is configured to enable generation of the data from the encrypted data. 9. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the second computer or another computing device to decrypt the encrypted data using the encryption key. 10. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein the metadata includes salt data. 11. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein at least a part of the metadata describes one or more encryption algorithms. 12. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein at least a part of the metadata describes one or more hash algorithms. 13. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove PBKD-specific metadata from the encryption key. 14. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to: remove a first set of metadata from the encrypted data, wherein at least a part of the first set of metadata describes one or more encryption algorithms; and remove a second set of metadata from the encryption key. 15. A computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by a computing device, cause the computing device to: generate an encryption key based on a password; encrypt data using the encryption key to generate encrypted data; cause a communication of the encrypted data from the computing device to a second computer; and cause a communication of the encryption key from the computing device to the second computer, wherein the encryption key is configured to enable generation of the data from the encrypted data. 16. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data. 17. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein at least a part of the metadata describes one or more encryption algorithms. 18. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove PBKD-specific metadata from the encryption key. 19. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to: remove metadata from the encrypted data, and remove PBKD-specific metadata from the key. 20. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove a set of metadata from the encrypted data, wherein at least a part of the set of metadata describes at least one encryption algorithm or at least one hash algorithm.
Concepts and technologies are described herein for sharing encrypted data with enhanced security. In some configurations, an encryption key is generated from a password by the use of a password-based key generation technology. In addition, input data is encrypted using the encryption key. The encrypted data and the generated key may be then shared with a remote computer, such as a server. The encrypted data can then be decrypted at the remote computer by the use of the key. By the use of the technologies described herein, the contents of an encrypted file may be accessed at a remote computer without requiring a user to share the actual password.1. A computer-implemented method, comprising: generating an encryption key based on a password; encrypting plain-text data to generate an output file including encrypted data, at a first computing device, using the encryption key to generate encrypted data; communicating the output file from the first computing device to a second computing device; and communicating the encryption key from the first computing device to the second computer, wherein the encryption key is configured to enable generation of the plain-text data from the output file. 2. The method of claim 1, further comprising decrypting the output file, at the second computing device, using the encryption key. 3. The method of claim 1, wherein the output file also includes unencrypted metadata, and wherein the method further comprises removing the unencrypted metadata from the output file. 4. The method of claim 1, wherein the output file also includes unencrypted metadata, and wherein the method further comprises removing the unencrypted metadata from the output file, wherein at least a part of the unencrypted metadata includes salt and describes one or more encryption algorithms. 5. The method of claim 1, wherein the output file also includes unencrypted metadata, and wherein the method further comprises removing unencrypted metadata from the output file, wherein at least a part of the unencrypted metadata describes one or more hash algorithms. 6. The method of claim 1, further comprising removing PBKD-specific metadata from the encryption key. 7. The method of claim 1, wherein the output file also includes a first set of metadata, further comprising: removing the first set of metadata from the output file, wherein at least a part of the first set of metadata describes one or more encryption algorithms; and removing a second set of metadata from the encryption key. 8. A computing device, comprising: a processor; a memory having computer-executable instructions stored thereupon which, when executed by a computing device, cause the computing device to generate an encryption key based on a password; encrypt data using the encryption key to generate encrypted data; cause a communication of the encrypted data from the computing device to a second computer; and cause a communication of the encryption key from the computing device to the second computer, wherein the encryption key is configured to enable generation of the data from the encrypted data. 9. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the second computer or another computing device to decrypt the encrypted data using the encryption key. 10. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein the metadata includes salt data. 11. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein at least a part of the metadata describes one or more encryption algorithms. 12. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein at least a part of the metadata describes one or more hash algorithms. 13. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to remove PBKD-specific metadata from the encryption key. 14. The computing device of claim 8, wherein the memory has further computer-executable instructions, which cause the computing device to: remove a first set of metadata from the encrypted data, wherein at least a part of the first set of metadata describes one or more encryption algorithms; and remove a second set of metadata from the encryption key. 15. A computer-readable storage medium having computer-executable instructions stored thereupon which, when executed by a computing device, cause the computing device to: generate an encryption key based on a password; encrypt data using the encryption key to generate encrypted data; cause a communication of the encrypted data from the computing device to a second computer; and cause a communication of the encryption key from the computing device to the second computer, wherein the encryption key is configured to enable generation of the data from the encrypted data. 16. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data. 17. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove metadata from the encrypted data, wherein at least a part of the metadata describes one or more encryption algorithms. 18. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove PBKD-specific metadata from the encryption key. 19. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to: remove metadata from the encrypted data, and remove PBKD-specific metadata from the key. 20. The computer-readable storage medium of claim 15, wherein the computer storage medium has further computer-executable instructions, which cause the computing device to remove a set of metadata from the encrypted data, wherein at least a part of the set of metadata describes at least one encryption algorithm or at least one hash algorithm.
2,400
8,568
8,568
15,665,120
2,491
Data storage operation commands are digitally signed to enhance data security in a distributed system. A data storage client and a compute-enabled data storage device may share access to a cryptographic key. The data storage client uses the cryptographic key to digitally sign commands transmitted to the data storage device, which can use its copy to verify a digital signature of a command before fulfilling the command. The storage device can also determine whether to perform a transformation, such that requests authenticated to a first identity might receive cleartext while a request authenticated to a second identity might receive ciphertext. The compute-enabled storage device can also receive unauthenticated calls and attempt to retrieve the appropriate key from a key management service or other such source.
1. A system comprising: a first computer, the first computer comprising at least one non-transitory computer-readable storage medium with instructions, which when performed by one or more processors, cause the first computer to at least: in response to receiving at least one command, store information associated with the at least command in a transaction log; request a digital signature corresponding to a cryptographic key; sign a portion of the transaction log with the digital signature; and transmit the signed portion of the transaction log and the digital signature to a second computer; and the second computer to read the transaction log using the digital signature. 2. The system of claim 1, wherein the instructions, when performed by the first computer, further cause the first computer to: fulfill the at least one command by: generating cleartext in response to decrypting ciphertext stored in the at least one non-transitory computer-readable storage medium, or generating the ciphertext by decrypting cleartext stored in the at least one non-transitory computer-readable storage medium. 3. The system of claim 1, wherein the instructions, when performed by the first computer, further cause the first computer to: obtain the digital signature; verify that the digital signature was generated based at least in part on the cryptographic key; and return no data, as part of fulfilling the at least one command, in response to at least one of the digital signature not being verified, a user identity associated with the at least one command not being authenticated, or the user identity determined to correspond to an unauthorized identity. 4. The system of claim 1, wherein the instructions, when performed by the first computer, further cause the first computer to: store a plurality of cryptographic keys capable of being used for at least one of encrypting or decrypting data stored on the first computer; and select, based at least in part on a corresponding user associated with the at least one command, the cryptographic key from a plurality of cryptographic keys stored by the first computer. 5. The system of claim 1, wherein the at least one command is received over a storage bus utilizing an embedded storage protocol. 6. A computer-implemented method comprising: in response to receiving at least one command by a first computer, storing information associated with the at least one command in a transaction log; requesting a digital signature corresponding to a cryptographic key; signing a portion of the transaction log with the digital signature; and transmitting the signed portion of the transaction log and the digital signature to a second computer, wherein the transaction log is to be read by the second computer using the digital signature. 7. The computer-implemented method of claim 6, further comprising: receiving the at least one command in the first computer over a storage bus utilizing an embedded storage protocol. 8. The computer-implemented method of claim 6, further comprising: fulfilling the at least one command using: (a) unencrypted data in response to determining that a user identity corresponding to the at least one command is of a first identity and (b) encrypted data in response to determining that the user identity is of a second identity. 9. The computer-implemented method of claim 6, further comprising: obtaining the cryptographic key from a key management system. 10. The computer-implemented method of claim 6, further comprising: utilizing a device-level address for fulfilling the at least one command, the device-level address specified by the at least one command. 11. The computer-implemented method of claim 6, wherein the first computer or the second computer comprise at least one of a solid state drive (SSD) or Serial ATA (SATA) drive. 12. The computer-implemented method of claim 6, further comprising: deriving the cryptographic key based at least in part on an associated cryptographic key for data affected by the at least one command. 13. The computer-implemented method of claim 6, further comprising: altering behavior of the first computer, in response to the at least one command and based at least in part upon analyzing content of the at least one command. 14. The computer-implemented method of claim 6, further comprising: obtaining a first cryptographic key to decrypt a portion of data in the first computer, the portion of data responsive to the at least one command; decrypting the portion of data to obtain a plaintext version of the portion; obtaining a new cryptographic key for encryption; encrypting the plaintext version to obtain encrypted output data; and performing the at least one command using the encrypted output data. 15. The computer-implemented method of claim 6, further comprising: receiving, from the second computer, an new command and a new digital signature, the new command involving at least a write operation to be performed by the first computer; verifying the new digital signature using the cryptographic key; and fulfill the new command at least in part by writing at least one of a new cleartext, decrypted using a respective cryptographic key, or a new ciphertext of data corresponding to the new command. 16. The computer-implemented method of claim 6, further comprising: receiving, from the second computer, a new command, the new command unassociated with the digital signature; and determining the new command to be associated with a user identity that is different from a user associated with the command. 17. A non-transitory computer-readable storage medium comprising instructions that, when executed by a processor of a first computer, cause the first computer to: in response to receiving at least one command by a first computer, storing information associated with the at least one command in a transaction log; request a digital signature corresponding to a cryptographic key; sign a portion of the transaction log with the digital signature; and transmit the signed portion of the transaction log and the digital signature to a second computer, wherein the transaction log is configured to be read by the second computer using the digital signature. 18. The non-transitory computer-readable storage medium of claim 17 comprising instructions that, when executed by the processor of the first computer, further cause the first computer to: fulfill the at least one command part by: generating cleartext in response to decrypting ciphertext stored in the non-transitory computer-readable storage medium, or generating the ciphertext by decrypting cleartext stored in the non-transitory computer-readable storage medium. 19. The non-transitory computer-readable storage medium of claim 17 comprising instructions that, when executed by the processor of the first computer, further cause the first computer to: obtain the digital signature; verify that the digital signature was generated based at least in part on the cryptographic key; and return no data, as part of fulfilling the at least one command, in response to at least one of the digital signature not being verified, a user identity associated with the at least one command not being authenticated, or the user identity determined to correspond to an unauthorized identity. 20. The non-transitory computer-readable storage medium of claim 17 comprising instructions that, when executed by the processor of the first computer, further cause the first computer to: derive the cryptographic key based at least in part on an associated cryptographic key for data affected by the at least one command.
Data storage operation commands are digitally signed to enhance data security in a distributed system. A data storage client and a compute-enabled data storage device may share access to a cryptographic key. The data storage client uses the cryptographic key to digitally sign commands transmitted to the data storage device, which can use its copy to verify a digital signature of a command before fulfilling the command. The storage device can also determine whether to perform a transformation, such that requests authenticated to a first identity might receive cleartext while a request authenticated to a second identity might receive ciphertext. The compute-enabled storage device can also receive unauthenticated calls and attempt to retrieve the appropriate key from a key management service or other such source.1. A system comprising: a first computer, the first computer comprising at least one non-transitory computer-readable storage medium with instructions, which when performed by one or more processors, cause the first computer to at least: in response to receiving at least one command, store information associated with the at least command in a transaction log; request a digital signature corresponding to a cryptographic key; sign a portion of the transaction log with the digital signature; and transmit the signed portion of the transaction log and the digital signature to a second computer; and the second computer to read the transaction log using the digital signature. 2. The system of claim 1, wherein the instructions, when performed by the first computer, further cause the first computer to: fulfill the at least one command by: generating cleartext in response to decrypting ciphertext stored in the at least one non-transitory computer-readable storage medium, or generating the ciphertext by decrypting cleartext stored in the at least one non-transitory computer-readable storage medium. 3. The system of claim 1, wherein the instructions, when performed by the first computer, further cause the first computer to: obtain the digital signature; verify that the digital signature was generated based at least in part on the cryptographic key; and return no data, as part of fulfilling the at least one command, in response to at least one of the digital signature not being verified, a user identity associated with the at least one command not being authenticated, or the user identity determined to correspond to an unauthorized identity. 4. The system of claim 1, wherein the instructions, when performed by the first computer, further cause the first computer to: store a plurality of cryptographic keys capable of being used for at least one of encrypting or decrypting data stored on the first computer; and select, based at least in part on a corresponding user associated with the at least one command, the cryptographic key from a plurality of cryptographic keys stored by the first computer. 5. The system of claim 1, wherein the at least one command is received over a storage bus utilizing an embedded storage protocol. 6. A computer-implemented method comprising: in response to receiving at least one command by a first computer, storing information associated with the at least one command in a transaction log; requesting a digital signature corresponding to a cryptographic key; signing a portion of the transaction log with the digital signature; and transmitting the signed portion of the transaction log and the digital signature to a second computer, wherein the transaction log is to be read by the second computer using the digital signature. 7. The computer-implemented method of claim 6, further comprising: receiving the at least one command in the first computer over a storage bus utilizing an embedded storage protocol. 8. The computer-implemented method of claim 6, further comprising: fulfilling the at least one command using: (a) unencrypted data in response to determining that a user identity corresponding to the at least one command is of a first identity and (b) encrypted data in response to determining that the user identity is of a second identity. 9. The computer-implemented method of claim 6, further comprising: obtaining the cryptographic key from a key management system. 10. The computer-implemented method of claim 6, further comprising: utilizing a device-level address for fulfilling the at least one command, the device-level address specified by the at least one command. 11. The computer-implemented method of claim 6, wherein the first computer or the second computer comprise at least one of a solid state drive (SSD) or Serial ATA (SATA) drive. 12. The computer-implemented method of claim 6, further comprising: deriving the cryptographic key based at least in part on an associated cryptographic key for data affected by the at least one command. 13. The computer-implemented method of claim 6, further comprising: altering behavior of the first computer, in response to the at least one command and based at least in part upon analyzing content of the at least one command. 14. The computer-implemented method of claim 6, further comprising: obtaining a first cryptographic key to decrypt a portion of data in the first computer, the portion of data responsive to the at least one command; decrypting the portion of data to obtain a plaintext version of the portion; obtaining a new cryptographic key for encryption; encrypting the plaintext version to obtain encrypted output data; and performing the at least one command using the encrypted output data. 15. The computer-implemented method of claim 6, further comprising: receiving, from the second computer, an new command and a new digital signature, the new command involving at least a write operation to be performed by the first computer; verifying the new digital signature using the cryptographic key; and fulfill the new command at least in part by writing at least one of a new cleartext, decrypted using a respective cryptographic key, or a new ciphertext of data corresponding to the new command. 16. The computer-implemented method of claim 6, further comprising: receiving, from the second computer, a new command, the new command unassociated with the digital signature; and determining the new command to be associated with a user identity that is different from a user associated with the command. 17. A non-transitory computer-readable storage medium comprising instructions that, when executed by a processor of a first computer, cause the first computer to: in response to receiving at least one command by a first computer, storing information associated with the at least one command in a transaction log; request a digital signature corresponding to a cryptographic key; sign a portion of the transaction log with the digital signature; and transmit the signed portion of the transaction log and the digital signature to a second computer, wherein the transaction log is configured to be read by the second computer using the digital signature. 18. The non-transitory computer-readable storage medium of claim 17 comprising instructions that, when executed by the processor of the first computer, further cause the first computer to: fulfill the at least one command part by: generating cleartext in response to decrypting ciphertext stored in the non-transitory computer-readable storage medium, or generating the ciphertext by decrypting cleartext stored in the non-transitory computer-readable storage medium. 19. The non-transitory computer-readable storage medium of claim 17 comprising instructions that, when executed by the processor of the first computer, further cause the first computer to: obtain the digital signature; verify that the digital signature was generated based at least in part on the cryptographic key; and return no data, as part of fulfilling the at least one command, in response to at least one of the digital signature not being verified, a user identity associated with the at least one command not being authenticated, or the user identity determined to correspond to an unauthorized identity. 20. The non-transitory computer-readable storage medium of claim 17 comprising instructions that, when executed by the processor of the first computer, further cause the first computer to: derive the cryptographic key based at least in part on an associated cryptographic key for data affected by the at least one command.
2,400
8,569
8,569
15,029,983
2,424
Embodiments of the present method comprise activating a data recording component on the computing device to receive information relating to the environment of the computer user and executing a quality check module in the computing device operative to analyse the environment of the computer user. The quality check module performs the steps of: assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom, determining and executing a responsive action where the received signal does not satisfy the quality metric, and initiating a computer user behavioural data collection process to computer user collect behavioural data during the interaction between the computer user and the computing device where the received signal satisfies the quality metric.
1. A method of performing environmental quality analysis as part of the initiation of a computer user behavioural data collection process during an interaction between a computer user and a computing device, the method comprising: activating a data recording component on the computing device to detect information relating to the environment of the computer user; executing a quality check module in the computing device operative to analyse the environment of the computer user, wherein the quality check module performs the steps of: assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom, determining and executing a responsive action where the received signal does not satisfy the quality metric, and initiating a computer user behavioural data collection process to computer user collect behavioural data during the interaction between the computer user and the computing device where the received signal satisfies the quality metric. 2. A method according to claim 1, wherein the interaction comprises exposure to media content that is played back on the computing device. 3. A method according to claim 2, wherein the step of executing the quality check module occurs before initiating playback of media content on the computing device. 4. A method according to claim 2, comprising supplying the media content to the computing device in a survey request, wherein the method includes: before initiating playback of media content on the computing device, determining a survey qualification status for the computer user; and supplying an alternative survey request where the survey qualification status is unacceptable. 5. A method according to claim 4, wherein determining a survey qualification status includes determining whether the received signal from the data recording component satisfies a quality metric. 6. A method according to claim 4, wherein determining a survey qualification status includes determining attributes of the environment of computer user and/or the computing device. 7. A method of assessing the quality of the environment in which computer user behavioural data is collected during playback of media content on a computing device, the method comprising: initiating playback of the media content on the computing device; activating a data recording component on the computing device to detect information relating to a computer user in response to initiating playback of the media content; and in response to initiating playback of the media content on the computing device, executing a quality check module in the computing device, wherein the quality check module performs the steps of: periodically assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom; continuing playback of media content on the computing device and collecting computer user behavioural data where the received signal satisfies the quality metric; and determining and executing responsive action where the received signal does not satisfy the quality metric. 8. A method according to claim 7, wherein the responsive action is selected from the group consisting of: pausing playback of media content on the computing device, displaying a prompt to the computer user, activating another data recording component to collect computer user behavioural data, and transmitting a communication to a third party. 9. A method according to claim 1, wherein the data recording component is a webcam and the received signal is a video feed from the webcam. 10. A method according to claim 1, wherein the data recording component is a microphone and the received signal is an audio feed from the microphone. 11. A method according to claim 1, wherein the data recording component is selected from the group consisting of: a GPS sensor, a gyroscope, a proximity sensor, and a lighting sensor. 12. A method of initiating a computer user behavioural data collection process during an interaction between a computer user and a computing device, the method comprising: detecting for the presence of one or more data recording components associated with the computing device, each of the one or more data recording components being arranged to detect information relating to the environment of the computer user; performing a quality assessment on a received signal from each available data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom; and based on the quality assessment, selecting one of the available data recording components to collect computer user behavioural data during the interaction between the computer user and the computing device. 13. A method according to claim 12, wherein a given data recording component is treated as unavailable if a received signal therefrom does not satisfy the predetermined quality metric. 14. A method of collecting computer user behavioural data during an interaction between a computer user and a computing device, the method comprising: detecting for the presence of one or more data recording components available to the computing device, each of the one or more data recording components being arranged to detect information relating to the environment of the computer user; displaying a selection screen on the computing device to prompt the computer user to select one of the available data recording components to be activated; receiving a user selection of an available data recording component; and using the selected available data recording component to collect computer user behavioural data during the interaction between the computer user and the computing device. 15. A method according to claim 12, wherein if there is only one available data recording component, using that available data recording component to collect computer user behavioural data during the interaction between the computer user and the computing device. 16. A method according to claim 12, wherein if there are no available data recording components, the method includes displaying a prompt on the computing device. 17. A method according to claim 12, wherein the interaction comprises exposure to media content that is played back on the computing device. 18. A method according to claim 17, wherein the media content is part of a survey request, and supplying an alternative survey request where no data recording components are available. 19. A method according to claim 12, wherein the detected data recording components comprise any webcam available to the computing device. 20. A method according to claim 2, comprising, before initiating playback of the media content on the computing device, loading all of the media content into a memory of the computing device. 21. A method according to claim 1, wherein the behavioural data comprises information indicative of the computer user's emotional state. 22. A method according to claim 1, comprising: establishing communication between the computing device and a remote server; and sending the collected behavioural data to the remote server for analysis. 23. A method according to claim 22 comprising: sending analysis results from the remote server to the computing device; and displaying the analysis results on the computing device. 24. A method according to claim 22, comprising part-processing the collected behavioural data before it is sent to the remote server for analysis. 25. A method according claim 2, wherein the media content is selected by the computer user from a video-sharing website or social network. 26. A computer program product comprising a computer readable storage medium having stored thereon computer program code, which when executed by a computer device cause the computing device to perform a method of environmental quality analysis as part of the initiation of a computer user behavioural data collection process during an interaction between a computer user and a computing device, the computer program product comprising: program code for activating a data recording component on the computing device to detect information relating to the environment of the computer user; program code for executing a quality check module in the computing device operative to analyse the environment of the computer user, wherein the quality check module performs the steps of: program code for assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom, program code for determining and executing a responsive action where the received signal does not satisfy the quality metric, and program code for initiating a computer user behavioural data collection process to computer user collect behavioural data during the interaction between the computer user and the computing device where the received signal satisfies the quality metric. 27. A computer program product according to claim 26, wherein the computer readable storage medium is accessible by a remote computing device, whereby the computer program code is downloadable for execution on the remote computing device.
Embodiments of the present method comprise activating a data recording component on the computing device to receive information relating to the environment of the computer user and executing a quality check module in the computing device operative to analyse the environment of the computer user. The quality check module performs the steps of: assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom, determining and executing a responsive action where the received signal does not satisfy the quality metric, and initiating a computer user behavioural data collection process to computer user collect behavioural data during the interaction between the computer user and the computing device where the received signal satisfies the quality metric.1. A method of performing environmental quality analysis as part of the initiation of a computer user behavioural data collection process during an interaction between a computer user and a computing device, the method comprising: activating a data recording component on the computing device to detect information relating to the environment of the computer user; executing a quality check module in the computing device operative to analyse the environment of the computer user, wherein the quality check module performs the steps of: assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom, determining and executing a responsive action where the received signal does not satisfy the quality metric, and initiating a computer user behavioural data collection process to computer user collect behavioural data during the interaction between the computer user and the computing device where the received signal satisfies the quality metric. 2. A method according to claim 1, wherein the interaction comprises exposure to media content that is played back on the computing device. 3. A method according to claim 2, wherein the step of executing the quality check module occurs before initiating playback of media content on the computing device. 4. A method according to claim 2, comprising supplying the media content to the computing device in a survey request, wherein the method includes: before initiating playback of media content on the computing device, determining a survey qualification status for the computer user; and supplying an alternative survey request where the survey qualification status is unacceptable. 5. A method according to claim 4, wherein determining a survey qualification status includes determining whether the received signal from the data recording component satisfies a quality metric. 6. A method according to claim 4, wherein determining a survey qualification status includes determining attributes of the environment of computer user and/or the computing device. 7. A method of assessing the quality of the environment in which computer user behavioural data is collected during playback of media content on a computing device, the method comprising: initiating playback of the media content on the computing device; activating a data recording component on the computing device to detect information relating to a computer user in response to initiating playback of the media content; and in response to initiating playback of the media content on the computing device, executing a quality check module in the computing device, wherein the quality check module performs the steps of: periodically assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom; continuing playback of media content on the computing device and collecting computer user behavioural data where the received signal satisfies the quality metric; and determining and executing responsive action where the received signal does not satisfy the quality metric. 8. A method according to claim 7, wherein the responsive action is selected from the group consisting of: pausing playback of media content on the computing device, displaying a prompt to the computer user, activating another data recording component to collect computer user behavioural data, and transmitting a communication to a third party. 9. A method according to claim 1, wherein the data recording component is a webcam and the received signal is a video feed from the webcam. 10. A method according to claim 1, wherein the data recording component is a microphone and the received signal is an audio feed from the microphone. 11. A method according to claim 1, wherein the data recording component is selected from the group consisting of: a GPS sensor, a gyroscope, a proximity sensor, and a lighting sensor. 12. A method of initiating a computer user behavioural data collection process during an interaction between a computer user and a computing device, the method comprising: detecting for the presence of one or more data recording components associated with the computing device, each of the one or more data recording components being arranged to detect information relating to the environment of the computer user; performing a quality assessment on a received signal from each available data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom; and based on the quality assessment, selecting one of the available data recording components to collect computer user behavioural data during the interaction between the computer user and the computing device. 13. A method according to claim 12, wherein a given data recording component is treated as unavailable if a received signal therefrom does not satisfy the predetermined quality metric. 14. A method of collecting computer user behavioural data during an interaction between a computer user and a computing device, the method comprising: detecting for the presence of one or more data recording components available to the computing device, each of the one or more data recording components being arranged to detect information relating to the environment of the computer user; displaying a selection screen on the computing device to prompt the computer user to select one of the available data recording components to be activated; receiving a user selection of an available data recording component; and using the selected available data recording component to collect computer user behavioural data during the interaction between the computer user and the computing device. 15. A method according to claim 12, wherein if there is only one available data recording component, using that available data recording component to collect computer user behavioural data during the interaction between the computer user and the computing device. 16. A method according to claim 12, wherein if there are no available data recording components, the method includes displaying a prompt on the computing device. 17. A method according to claim 12, wherein the interaction comprises exposure to media content that is played back on the computing device. 18. A method according to claim 17, wherein the media content is part of a survey request, and supplying an alternative survey request where no data recording components are available. 19. A method according to claim 12, wherein the detected data recording components comprise any webcam available to the computing device. 20. A method according to claim 2, comprising, before initiating playback of the media content on the computing device, loading all of the media content into a memory of the computing device. 21. A method according to claim 1, wherein the behavioural data comprises information indicative of the computer user's emotional state. 22. A method according to claim 1, comprising: establishing communication between the computing device and a remote server; and sending the collected behavioural data to the remote server for analysis. 23. A method according to claim 22 comprising: sending analysis results from the remote server to the computing device; and displaying the analysis results on the computing device. 24. A method according to claim 22, comprising part-processing the collected behavioural data before it is sent to the remote server for analysis. 25. A method according claim 2, wherein the media content is selected by the computer user from a video-sharing website or social network. 26. A computer program product comprising a computer readable storage medium having stored thereon computer program code, which when executed by a computer device cause the computing device to perform a method of environmental quality analysis as part of the initiation of a computer user behavioural data collection process during an interaction between a computer user and a computing device, the computer program product comprising: program code for activating a data recording component on the computing device to detect information relating to the environment of the computer user; program code for executing a quality check module in the computing device operative to analyse the environment of the computer user, wherein the quality check module performs the steps of: program code for assessing a received signal from the data recording component against a predetermined quality metric to ascertain if an informational content of the received signal meets a predetermined minimum quality to permit computer user behavioural data to be collected therefrom, program code for determining and executing a responsive action where the received signal does not satisfy the quality metric, and program code for initiating a computer user behavioural data collection process to computer user collect behavioural data during the interaction between the computer user and the computing device where the received signal satisfies the quality metric. 27. A computer program product according to claim 26, wherein the computer readable storage medium is accessible by a remote computing device, whereby the computer program code is downloadable for execution on the remote computing device.
2,400
8,570
8,570
14,533,923
2,465
Aspects of the disclosure provide for a thin control channel structure that can be utilized to enable multiplexing of two or more data transmission formats. For example, a thin control channel may carry information that enables ongoing transmissions utilizing a first, relatively long transmission time interval (TTI) to be punctured, and during the punctured portion of the long TTI, a transmission utilizing a second, relatively short TTI may be inserted. This puncturing is enabled by virtue of a thin channel structure wherein a control channel can carry scheduling information, grants, etc., informing receiving devices of the puncturing that is occurring or will occur. Furthermore, the thin control channel can be utilized to carry other control information, not being limited to puncturing information. Other aspects, embodiments, and features are also claimed and described.
1. A method of wireless communication, comprising: transmitting first user data on a downlink data channel utilizing a first transmission time interval (TTI); and transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 2. The method of claim 1, further comprising transmitting second user data on the downlink data channel utilizing the second TTI. 3. The method of claim 2, wherein the transmitting control information on the downlink control channel and the transmitting second user data on the downlink data channel are performed at the same time. 4. The method of claim 2, further comprising orthogonally multiplexing the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 5. The method of claim 4, further comprising modifying the first user data to account for lost downlink resources corresponding to the puncturing. 6. The method of claim 2, further comprising non-orthogonally multiplexing the second user data with the first user data on the downlink data channel by simultaneously transmitting the first user data and the second user data. 7. The method of claim 1, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 8. The method of claim 1, further comprising: transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 9. The method of claim 1, wherein the downlink data channel is separated in frequency from the downlink control channel. 10. A method of wireless communication, comprising: receiving first user data on an uplink data channel utilizing a first transmission time interval (TTI); receiving a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and receiving the second user data on the uplink data channel utilizing the second TTI. 11. The method of claim 10, further comprising: transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and transmitting an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 12. The method of claim 11, wherein the transmitting the uplink grant modification and the transmitting the control information on the downlink control channel are performed at the same time. 13. The method of claim 11, wherein the transmitting the uplink grant modification comprises transmitting the uplink grant modification on the downlink control channel. 14. The method of claim 10, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another. 15. An apparatus configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to transmit first user data on a downlink data channel utilizing a first transmission time interval (TTI); and utilize the transceiver to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 16. The apparatus of claim 15, wherein the at least one processor is further configured to utilize the transceiver to transmit second user data on the downlink data channel utilizing the second TTI. 17. The apparatus of claim 16, wherein the at least one processor is further configured to utilize the transceiver to transmit control information on the downlink control channel and to transmit second user data on the downlink data channel at the same time. 18. The apparatus of claim 16, wherein the at least one processor is further configured to orthogonally multiplex the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 19. The apparatus of claim 18, wherein the at least one processor is further configured to modify the first user data to account for lost downlink resources corresponding to the puncturing. 20. The apparatus of claim 16, wherein the at least one processor is further configured to non-orthogonally multiplex the second user data with the first user data on the downlink data channel by utilizing the transceiver to simultaneously transmit the first user data and the second user data. 21. The apparatus of claim 15, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 22. The apparatus of claim 15, wherein the at least one processor is further configured to utilize the transceiver to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 23. The apparatus of claim 15, wherein the downlink data channel is separated in frequency from the downlink control channel. 24. An apparatus configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive first user data on an uplink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to receive a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; utilize the transceiver to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and utilize the transceiver to receive the second user data on the uplink data channel utilizing the second TTI. 25. The apparatus of claim 24, wherein the at least one processor is further configured to: utilize the transceiver to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and utilize the transceiver to transmit an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 26. The apparatus of claim 25, wherein the at least one processor is further configured to utilize the transceiver to transmit the uplink grant modification and to transmit the control information on the downlink control channel at the same time. 27. The apparatus of claim 25, wherein the at least one processor, being configured to transmit the uplink grant modification, is further configured to transmit the uplink grant modification on the downlink control channel. 28. The apparatus of claim 24, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another. 29. An apparatus configured for wireless communication, comprising: means for transmitting first user data on a downlink data channel utilizing a first transmission time interval (TTI); and means for transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 30. The apparatus of claim 29, further comprising means for transmitting second user data on the downlink data channel utilizing the second TTI. 31. The apparatus of claim 30, wherein the means for transmitting control information on the downlink control channel and the means for transmitting second user data on the downlink data channel are configured to transmit the control information and the second user data at the same time. 32. The apparatus of claim 30, further comprising means for orthogonally multiplexing the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 33. The apparatus of claim 32, further comprising means for modifying the first user data to account for lost downlink resources corresponding to the puncturing. 34. The apparatus of claim 30, further comprising means for non-orthogonally multiplexing the second user data with the first user data on the downlink data channel by simultaneously transmitting the first user data and the second user data. 35. The apparatus of claim 29, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 36. The apparatus of claim 29, further comprising: means for transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 37. The apparatus of claim 29, wherein the downlink data channel is separated in frequency from the downlink control channel. 38. An apparatus configured for wireless communication, comprising: means for receiving first user data on an uplink data channel utilizing a first transmission time interval (TTI); means for receiving a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; means for transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and means for receiving the second user data on the uplink data channel utilizing the second TTI. 39. The apparatus of claim 38, further comprising: means for transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and means for transmitting an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 40. The apparatus of claim 39, wherein the means for transmitting the uplink grant modification and the means for transmitting the control information on the downlink control channel are configured to transmit the uplink grant modification and the control information at the same time. 41. The apparatus of claim 39, wherein the means for transmitting the uplink grant modification comprises transmitting the uplink grant modification on the downlink control channel. 42. The apparatus of claim 38, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another. 43. A computer-readable medium comprising computer-executable code, comprising: instructions for causing a computer to transmit first user data on a downlink data channel utilizing a first transmission time interval (TTI); and instructions for causing a computer to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 44. The computer-readable medium of claim 43, further comprising instructions for causing a computer to transmit second user data on the downlink data channel utilizing the second TTI. 45. The computer-readable medium of claim 44, further comprising instructions for causing a computer to transmit control information on the downlink control channel and to transmit second user data on the downlink data channel at the same time. 46. The computer-readable medium of claim 44, further comprising instructions for causing a computer to orthogonally multiplex the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 47. The computer-readable medium of claim 46, further comprising instructions for causing a computer to modify the first user data to account for lost downlink resources corresponding to the puncturing. 48. The computer-readable medium of claim 44, further comprising instructions for causing a computer to non-orthogonally multiplex the second user data with the first user data on the downlink data channel by utilizing the transceiver to simultaneously transmit the first user data and the second user data. 49. The computer-readable medium of claim 43, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 50. The computer-readable medium of claim 43, further comprising instructions for causing a computer to utilize the transceiver to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 51. The computer-readable medium of claim 43, wherein the downlink data channel is separated in frequency from the downlink control channel. 52. A computer-readable medium comprising computer-executable code, comprising: instructions for causing a computer to receive first user data on an uplink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to receive a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; instructions for causing a computer to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and instructions for causing a computer to receive the second user data on the uplink data channel utilizing the second TTI. 53. The computer-readable medium of claim 52, further comprising: instructions for causing a computer to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and instructions for causing a computer to transmit an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 54. The computer-readable medium of claim 53, further comprising instructions for causing a computer to transmit the uplink grant modification and to transmit the control information on the downlink control channel at the same time. 55. The computer-readable medium of claim 53, wherein the instructions for causing a computer to transmit the uplink grant modification, are further configured to transmit the uplink grant modification on the downlink control channel. 56. The computer-readable medium of claim 52, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another.
Aspects of the disclosure provide for a thin control channel structure that can be utilized to enable multiplexing of two or more data transmission formats. For example, a thin control channel may carry information that enables ongoing transmissions utilizing a first, relatively long transmission time interval (TTI) to be punctured, and during the punctured portion of the long TTI, a transmission utilizing a second, relatively short TTI may be inserted. This puncturing is enabled by virtue of a thin channel structure wherein a control channel can carry scheduling information, grants, etc., informing receiving devices of the puncturing that is occurring or will occur. Furthermore, the thin control channel can be utilized to carry other control information, not being limited to puncturing information. Other aspects, embodiments, and features are also claimed and described.1. A method of wireless communication, comprising: transmitting first user data on a downlink data channel utilizing a first transmission time interval (TTI); and transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 2. The method of claim 1, further comprising transmitting second user data on the downlink data channel utilizing the second TTI. 3. The method of claim 2, wherein the transmitting control information on the downlink control channel and the transmitting second user data on the downlink data channel are performed at the same time. 4. The method of claim 2, further comprising orthogonally multiplexing the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 5. The method of claim 4, further comprising modifying the first user data to account for lost downlink resources corresponding to the puncturing. 6. The method of claim 2, further comprising non-orthogonally multiplexing the second user data with the first user data on the downlink data channel by simultaneously transmitting the first user data and the second user data. 7. The method of claim 1, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 8. The method of claim 1, further comprising: transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 9. The method of claim 1, wherein the downlink data channel is separated in frequency from the downlink control channel. 10. A method of wireless communication, comprising: receiving first user data on an uplink data channel utilizing a first transmission time interval (TTI); receiving a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and receiving the second user data on the uplink data channel utilizing the second TTI. 11. The method of claim 10, further comprising: transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and transmitting an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 12. The method of claim 11, wherein the transmitting the uplink grant modification and the transmitting the control information on the downlink control channel are performed at the same time. 13. The method of claim 11, wherein the transmitting the uplink grant modification comprises transmitting the uplink grant modification on the downlink control channel. 14. The method of claim 10, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another. 15. An apparatus configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to transmit first user data on a downlink data channel utilizing a first transmission time interval (TTI); and utilize the transceiver to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 16. The apparatus of claim 15, wherein the at least one processor is further configured to utilize the transceiver to transmit second user data on the downlink data channel utilizing the second TTI. 17. The apparatus of claim 16, wherein the at least one processor is further configured to utilize the transceiver to transmit control information on the downlink control channel and to transmit second user data on the downlink data channel at the same time. 18. The apparatus of claim 16, wherein the at least one processor is further configured to orthogonally multiplex the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 19. The apparatus of claim 18, wherein the at least one processor is further configured to modify the first user data to account for lost downlink resources corresponding to the puncturing. 20. The apparatus of claim 16, wherein the at least one processor is further configured to non-orthogonally multiplex the second user data with the first user data on the downlink data channel by utilizing the transceiver to simultaneously transmit the first user data and the second user data. 21. The apparatus of claim 15, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 22. The apparatus of claim 15, wherein the at least one processor is further configured to utilize the transceiver to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 23. The apparatus of claim 15, wherein the downlink data channel is separated in frequency from the downlink control channel. 24. An apparatus configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to receive first user data on an uplink data channel utilizing a first transmission time interval (TTI); utilize the transceiver to receive a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; utilize the transceiver to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and utilize the transceiver to receive the second user data on the uplink data channel utilizing the second TTI. 25. The apparatus of claim 24, wherein the at least one processor is further configured to: utilize the transceiver to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and utilize the transceiver to transmit an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 26. The apparatus of claim 25, wherein the at least one processor is further configured to utilize the transceiver to transmit the uplink grant modification and to transmit the control information on the downlink control channel at the same time. 27. The apparatus of claim 25, wherein the at least one processor, being configured to transmit the uplink grant modification, is further configured to transmit the uplink grant modification on the downlink control channel. 28. The apparatus of claim 24, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another. 29. An apparatus configured for wireless communication, comprising: means for transmitting first user data on a downlink data channel utilizing a first transmission time interval (TTI); and means for transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 30. The apparatus of claim 29, further comprising means for transmitting second user data on the downlink data channel utilizing the second TTI. 31. The apparatus of claim 30, wherein the means for transmitting control information on the downlink control channel and the means for transmitting second user data on the downlink data channel are configured to transmit the control information and the second user data at the same time. 32. The apparatus of claim 30, further comprising means for orthogonally multiplexing the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 33. The apparatus of claim 32, further comprising means for modifying the first user data to account for lost downlink resources corresponding to the puncturing. 34. The apparatus of claim 30, further comprising means for non-orthogonally multiplexing the second user data with the first user data on the downlink data channel by simultaneously transmitting the first user data and the second user data. 35. The apparatus of claim 29, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 36. The apparatus of claim 29, further comprising: means for transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 37. The apparatus of claim 29, wherein the downlink data channel is separated in frequency from the downlink control channel. 38. An apparatus configured for wireless communication, comprising: means for receiving first user data on an uplink data channel utilizing a first transmission time interval (TTI); means for receiving a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; means for transmitting control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and means for receiving the second user data on the uplink data channel utilizing the second TTI. 39. The apparatus of claim 38, further comprising: means for transmitting a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and means for transmitting an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 40. The apparatus of claim 39, wherein the means for transmitting the uplink grant modification and the means for transmitting the control information on the downlink control channel are configured to transmit the uplink grant modification and the control information at the same time. 41. The apparatus of claim 39, wherein the means for transmitting the uplink grant modification comprises transmitting the uplink grant modification on the downlink control channel. 42. The apparatus of claim 38, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another. 43. A computer-readable medium comprising computer-executable code, comprising: instructions for causing a computer to transmit first user data on a downlink data channel utilizing a first transmission time interval (TTI); and instructions for causing a computer to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during the transmitting of the first user data, the control information being configured to modify processing of the downlink data channel. 44. The computer-readable medium of claim 43, further comprising instructions for causing a computer to transmit second user data on the downlink data channel utilizing the second TTI. 45. The computer-readable medium of claim 44, further comprising instructions for causing a computer to transmit control information on the downlink control channel and to transmit second user data on the downlink data channel at the same time. 46. The computer-readable medium of claim 44, further comprising instructions for causing a computer to orthogonally multiplex the second user data with the first user data on the downlink data channel by puncturing the first user data with the second user data in accordance with the control information on the downlink control channel. 47. The computer-readable medium of claim 46, further comprising instructions for causing a computer to modify the first user data to account for lost downlink resources corresponding to the puncturing. 48. The computer-readable medium of claim 44, further comprising instructions for causing a computer to non-orthogonally multiplex the second user data with the first user data on the downlink data channel by utilizing the transceiver to simultaneously transmit the first user data and the second user data. 49. The computer-readable medium of claim 43, wherein the control information comprises a grant modification configured to modify a grant of time-frequency resources corresponding to the first user data. 50. The computer-readable medium of claim 43, further comprising instructions for causing a computer to utilize the transceiver to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising the grant of time-frequency resources corresponding to the first user data. 51. The computer-readable medium of claim 43, wherein the downlink data channel is separated in frequency from the downlink control channel. 52. A computer-readable medium comprising computer-executable code, comprising: instructions for causing a computer to receive first user data on an uplink data channel utilizing a first transmission time interval (TTI); instructions for causing a computer to receive a scheduling request on an uplink feedback channel, the scheduling request being configured to request a grant of time-frequency resources for second user data; instructions for causing a computer to transmit control information on a downlink control channel utilizing a second TTI shorter in duration than the first TTI during reception of the first user data on the uplink data channel, the control information comprising a second user data grant for time-frequency resources corresponding to the second user data on the uplink data channel utilizing the second TTI; and instructions for causing a computer to receive the second user data on the uplink data channel utilizing the second TTI. 53. The computer-readable medium of claim 52, further comprising: instructions for causing a computer to transmit a resource assignment on a downlink assignment channel, the resource assignment comprising a first user data grant for time-frequency resources on the uplink data channel corresponding to the first user data; and instructions for causing a computer to transmit an uplink grant modification utilizing the second TTI, the uplink grant modification comprising information notifying at least one user equipment (UE) that the first user data grant is modified, and instructing the at least one UE to puncture transmissions of the first user data in accordance with a timing of the second user data. 54. The computer-readable medium of claim 53, further comprising instructions for causing a computer to transmit the uplink grant modification and to transmit the control information on the downlink control channel at the same time. 55. The computer-readable medium of claim 53, wherein the instructions for causing a computer to transmit the uplink grant modification, are further configured to transmit the uplink grant modification on the downlink control channel. 56. The computer-readable medium of claim 52, wherein the uplink feedback channel, the uplink data channel, and the downlink control channel are separated in frequency from one another.
2,400
8,571
8,571
15,401,886
2,485
An infrared imaging device includes a case, a plurality of electronic components, and a heat transfer structure. The plurality of electronic components is configured to collect data and have a predetermined temperature parameter. The plurality of electronic components is disposed within the case. The heat transfer structure is disposed within the case. The heat transfer structure is configured to conduct heat away from the plurality of electronic components. The heat transfer structure is further configured to regulate a temperature of the electronic components below the predetermined temperature parameter.
1. An infrared imaging device comprising: a case; a plurality of electronic components configured to collect data, said plurality of electronic components having a predetermined temperature parameter, said plurality of electronic components disposed within said case; and a heat transfer structure disposed within said case, said heat transfer structure configured to conduct heat away from said plurality of electronic components, wherein said heat transfer structure is further configured to regulate a temperature of said electronic components below the predetermined temperature parameter. 2. The infrared imaging device in accordance with claim 1 further comprising an insulation material, said plurality of electronic components disposed within said insulation material. 3. The infrared imaging device in accordance with claim 1, wherein said heat transfer structure comprises a heat pipe and a plurality of fins coupled to said heat pipe. 4. The infrared imaging device in accordance with claim 3, wherein said heat pipe extends through said casing. 5. The infrared imaging device in accordance with claim 3 further comprising a phase change material, said plurality of electronic components disposed within said phase change material, said phase change material having a first material phase and a second material phase, said phase change material configured to absorb heat through changing from the first material phase to the second material phase. 6. The infrared imaging device in accordance with claim 5, wherein said phase change material comprises one or more of a paraffin, a salt, and an acid melt material. 7. The infrared imaging device in accordance with claim 5, wherein said heat transfer structure is disposed within said phase change material, said heat transfer structure configured to conduct heat within said phase change material. 8. The infrared imaging device in accordance with claim 1, wherein said heat transfer structure comprises a cooler configured to cool said plurality of electronic components with a cooling fluid. 9. The infrared imaging device in accordance with claim 8 further comprising a plurality of fins coupled to said plurality of electronic components, said plurality of fins extending into said cooler, wherein said plurality of fins is configured to conduct heat away from said plurality of electronic components and into the cooling fluid. 10. The infrared imaging device in accordance with claim 9 further comprising a nozzle configured to spray the cooling fluid on said plurality of fins. 11. The infrared imaging device in accordance with claim 1, wherein said infrared imaging device has a mass, the mass of said infrared imaging device includes values in a range from and including about 10 grams to and including about 250 grams. 12. An engine comprising: a first casing; a second casing circumscribing said first casing, said second casing defining at least one port, said first casing and said second casing defining an undercowl cavity; and an infrared imaging device positioned within said at least one port, said infrared imaging device configured to collect data from said undercowl cavity, said infrared imaging device comprising: a case; a plurality of electronic components configured to collect data, said plurality of electronic components having a predetermined temperature parameter, said plurality of electronic components disposed within said case; and a heat transfer structure disposed within said case, said heat transfer structure configured to conduct heat away from said plurality of electronic components, wherein said heat transfer structure is further configured to regulate a temperature of said electronic components below the predetermined temperature parameter. 13. The engine in accordance with claim 12, wherein said heat transfer structure comprises a heat pipe and a plurality of fins coupled to said heat pipe. 14. The engine in accordance with claim 13, wherein said heat pipe extends through said casing and said second casing. 15. The engine in accordance with claim 14 further comprising a nacelle circumscribing said second casing, said nacelle and said second casing defining a bypass airflow passage, said heat pipe extends into the bypass airflow passage. 16. The engine in accordance with claim 12 further comprising a phase change material, said plurality of electronic components disposed within said phase change material, said phase change material having a first material phase and a second material phase, said phase change material configured to absorb heat through changing from the first material phase to the second material phase. 17. The engine in accordance with claim 16, wherein said phase change material comprises at least one of a paraffin, a salt, or an acid melt material. 18. The engine in accordance with claim 12, wherein said heat transfer structure comprises a cooler configured to cool said plurality of electronic components with a cooling fluid. 19. An engine comprising: a first casing; a second casing circumscribing said first casing, said second casing defining a plurality of ports, said first casing and said second casing defining an undercowl cavity; and a network of infrared imaging devices comprising a plurality of infrared imaging devices, said plurality of infrared imaging devices coupled in data transfer communication forming said network of infrared imaging devices, each infrared imaging device of said plurality of infrared imaging devices positioned within a port of said plurality of ports, said each infrared imaging device configured to collect data from said undercowl cavity, said each infrared imaging device comprising: a case; a plurality of electronic components configured to collect data, said plurality of electronic components having a predetermined temperature parameter, said plurality of electronic components disposed within said case; and a heat transfer structure disposed within said case, said heat transfer structure configured to conduct heat away from said plurality of electronic components, wherein said heat transfer structure is further configured to regulate a temperature of said electronic components below the predetermined temperature parameter. 20. The engine in accordance with claim 19, wherein said network of infrared imaging devices further comprises a controller configured to control said plurality of infrared imaging devices. 21. The engine in accordance with claim 20, wherein said plurality of infrared imaging devices are coupled in wireless data transfer communication with said controller.
An infrared imaging device includes a case, a plurality of electronic components, and a heat transfer structure. The plurality of electronic components is configured to collect data and have a predetermined temperature parameter. The plurality of electronic components is disposed within the case. The heat transfer structure is disposed within the case. The heat transfer structure is configured to conduct heat away from the plurality of electronic components. The heat transfer structure is further configured to regulate a temperature of the electronic components below the predetermined temperature parameter.1. An infrared imaging device comprising: a case; a plurality of electronic components configured to collect data, said plurality of electronic components having a predetermined temperature parameter, said plurality of electronic components disposed within said case; and a heat transfer structure disposed within said case, said heat transfer structure configured to conduct heat away from said plurality of electronic components, wherein said heat transfer structure is further configured to regulate a temperature of said electronic components below the predetermined temperature parameter. 2. The infrared imaging device in accordance with claim 1 further comprising an insulation material, said plurality of electronic components disposed within said insulation material. 3. The infrared imaging device in accordance with claim 1, wherein said heat transfer structure comprises a heat pipe and a plurality of fins coupled to said heat pipe. 4. The infrared imaging device in accordance with claim 3, wherein said heat pipe extends through said casing. 5. The infrared imaging device in accordance with claim 3 further comprising a phase change material, said plurality of electronic components disposed within said phase change material, said phase change material having a first material phase and a second material phase, said phase change material configured to absorb heat through changing from the first material phase to the second material phase. 6. The infrared imaging device in accordance with claim 5, wherein said phase change material comprises one or more of a paraffin, a salt, and an acid melt material. 7. The infrared imaging device in accordance with claim 5, wherein said heat transfer structure is disposed within said phase change material, said heat transfer structure configured to conduct heat within said phase change material. 8. The infrared imaging device in accordance with claim 1, wherein said heat transfer structure comprises a cooler configured to cool said plurality of electronic components with a cooling fluid. 9. The infrared imaging device in accordance with claim 8 further comprising a plurality of fins coupled to said plurality of electronic components, said plurality of fins extending into said cooler, wherein said plurality of fins is configured to conduct heat away from said plurality of electronic components and into the cooling fluid. 10. The infrared imaging device in accordance with claim 9 further comprising a nozzle configured to spray the cooling fluid on said plurality of fins. 11. The infrared imaging device in accordance with claim 1, wherein said infrared imaging device has a mass, the mass of said infrared imaging device includes values in a range from and including about 10 grams to and including about 250 grams. 12. An engine comprising: a first casing; a second casing circumscribing said first casing, said second casing defining at least one port, said first casing and said second casing defining an undercowl cavity; and an infrared imaging device positioned within said at least one port, said infrared imaging device configured to collect data from said undercowl cavity, said infrared imaging device comprising: a case; a plurality of electronic components configured to collect data, said plurality of electronic components having a predetermined temperature parameter, said plurality of electronic components disposed within said case; and a heat transfer structure disposed within said case, said heat transfer structure configured to conduct heat away from said plurality of electronic components, wherein said heat transfer structure is further configured to regulate a temperature of said electronic components below the predetermined temperature parameter. 13. The engine in accordance with claim 12, wherein said heat transfer structure comprises a heat pipe and a plurality of fins coupled to said heat pipe. 14. The engine in accordance with claim 13, wherein said heat pipe extends through said casing and said second casing. 15. The engine in accordance with claim 14 further comprising a nacelle circumscribing said second casing, said nacelle and said second casing defining a bypass airflow passage, said heat pipe extends into the bypass airflow passage. 16. The engine in accordance with claim 12 further comprising a phase change material, said plurality of electronic components disposed within said phase change material, said phase change material having a first material phase and a second material phase, said phase change material configured to absorb heat through changing from the first material phase to the second material phase. 17. The engine in accordance with claim 16, wherein said phase change material comprises at least one of a paraffin, a salt, or an acid melt material. 18. The engine in accordance with claim 12, wherein said heat transfer structure comprises a cooler configured to cool said plurality of electronic components with a cooling fluid. 19. An engine comprising: a first casing; a second casing circumscribing said first casing, said second casing defining a plurality of ports, said first casing and said second casing defining an undercowl cavity; and a network of infrared imaging devices comprising a plurality of infrared imaging devices, said plurality of infrared imaging devices coupled in data transfer communication forming said network of infrared imaging devices, each infrared imaging device of said plurality of infrared imaging devices positioned within a port of said plurality of ports, said each infrared imaging device configured to collect data from said undercowl cavity, said each infrared imaging device comprising: a case; a plurality of electronic components configured to collect data, said plurality of electronic components having a predetermined temperature parameter, said plurality of electronic components disposed within said case; and a heat transfer structure disposed within said case, said heat transfer structure configured to conduct heat away from said plurality of electronic components, wherein said heat transfer structure is further configured to regulate a temperature of said electronic components below the predetermined temperature parameter. 20. The engine in accordance with claim 19, wherein said network of infrared imaging devices further comprises a controller configured to control said plurality of infrared imaging devices. 21. The engine in accordance with claim 20, wherein said plurality of infrared imaging devices are coupled in wireless data transfer communication with said controller.
2,400
8,572
8,572
14,046,166
2,449
Systems and methods for managing a network are disclosed. One method can comprise establishing communication with an interface of a user device, wherein the user device is located within a first network that is external to a second network. Communication can be established with a computing device, wherein the computing device is located within the second network, and wherein data is received from the computing device based at least in part on a threshold service parameter. An emulation of the interface of the user device can communicate with the computing device to satisfy the threshold service parameter.
1. A method comprising: establishing communication with an interface of a user device, wherein the user device is located within a first network that is external to a second network; establishing communication with a computing device, wherein the computing device is located within the second network, and wherein data is received from the computing device based at least in part on a threshold service parameter; and emulating the interface of the user device, wherein the emulation of the interface of the user device communicates with the computing device to satisfy the threshold service parameter. 2. The method of claim 1, wherein the interface of the user device comprises an application client and the computing device comprises an application server. 3. The method of claim 1, wherein the first network comprises a local area network. 4. The method of claim 1, wherein the second network comprises a wide area network. 5. The method of claim 1, wherein the threshold service parameter comprises one or more of packet loss, latency, and available bandwidth. 6. The method of claim 1, wherein emulating the interface of the user device comprises establishing communication between the computing device and a faux application client, and establishing communication between the interface of the user device and a faux application server. 7. The method of claim 1, wherein satisfying the threshold service parameter comprises modifying transmission of data from the emulation of the interface to the interface of the user device to facilitate satisfaction of the threshold service parameter 8. A method comprising: establishing communication with an interface of a user device, wherein the user device is located within a first network that is external to a second network; establishing communication with a computing device, wherein the computing device is located within the second network; receiving data from the computing device, wherein the data is received from the computing device based at least in part on a threshold service parameter; detecting a service parameter associated with the communication with the interface of the user device; and if the detected service parameter does not satisfy the threshold service parameter, modifying transmission of the data to the interface of the user device to facilitate satisfaction of the threshold service parameter. 9. The method of claim 8, wherein the interface of the user device comprise an application client. 10. The method of claim 8, wherein the first network comprises a local area network. 11. The method of claim 8, wherein the computing device comprises an application server. 12. The method of claim 8, wherein the second network comprises a wide area network. 13. The method of claim 8, wherein one or more of the service parameter and the threshold service parameter comprise one or more of packet loss, latency, and available bandwidth. 14. The method of claim 8, wherein modifying transmission comprises executing forward error correction. 15. A network comprising: a user device having an interface in communication with a network device, wherein the user device is located within a first network that is external to a second network; and a computing device in communication with the network device, wherein the computing device is located within the second network, and wherein data is transmitted from the computing device based at least in part on a threshold service parameter, and wherein the network device is configured to emulate the interface of the user device, wherein the emulation of the interface of the user device communicates with the computing device to satisfy the threshold service parameter. 16. The network of claim 15, wherein the interface of the user device comprises an application client, and the computing device comprises an application server. 17. The network of claim 15, wherein the first network comprises a local area network and the second network comprises a wide area network. 18. The network of claim 15, wherein the threshold service parameter comprises one or more of packet loss, latency, and available bandwidth. 19. The network of claim 15, wherein the emulation of the interface of the user device comprises a faux application client in communication with the computing device, and a faux application server in communication with the interface of the user device. 20. The network of claim 15, wherein the network device is further configured to modify transmission of data to the interface of the user device to facilitate satisfaction of the threshold service parameter.
Systems and methods for managing a network are disclosed. One method can comprise establishing communication with an interface of a user device, wherein the user device is located within a first network that is external to a second network. Communication can be established with a computing device, wherein the computing device is located within the second network, and wherein data is received from the computing device based at least in part on a threshold service parameter. An emulation of the interface of the user device can communicate with the computing device to satisfy the threshold service parameter.1. A method comprising: establishing communication with an interface of a user device, wherein the user device is located within a first network that is external to a second network; establishing communication with a computing device, wherein the computing device is located within the second network, and wherein data is received from the computing device based at least in part on a threshold service parameter; and emulating the interface of the user device, wherein the emulation of the interface of the user device communicates with the computing device to satisfy the threshold service parameter. 2. The method of claim 1, wherein the interface of the user device comprises an application client and the computing device comprises an application server. 3. The method of claim 1, wherein the first network comprises a local area network. 4. The method of claim 1, wherein the second network comprises a wide area network. 5. The method of claim 1, wherein the threshold service parameter comprises one or more of packet loss, latency, and available bandwidth. 6. The method of claim 1, wherein emulating the interface of the user device comprises establishing communication between the computing device and a faux application client, and establishing communication between the interface of the user device and a faux application server. 7. The method of claim 1, wherein satisfying the threshold service parameter comprises modifying transmission of data from the emulation of the interface to the interface of the user device to facilitate satisfaction of the threshold service parameter 8. A method comprising: establishing communication with an interface of a user device, wherein the user device is located within a first network that is external to a second network; establishing communication with a computing device, wherein the computing device is located within the second network; receiving data from the computing device, wherein the data is received from the computing device based at least in part on a threshold service parameter; detecting a service parameter associated with the communication with the interface of the user device; and if the detected service parameter does not satisfy the threshold service parameter, modifying transmission of the data to the interface of the user device to facilitate satisfaction of the threshold service parameter. 9. The method of claim 8, wherein the interface of the user device comprise an application client. 10. The method of claim 8, wherein the first network comprises a local area network. 11. The method of claim 8, wherein the computing device comprises an application server. 12. The method of claim 8, wherein the second network comprises a wide area network. 13. The method of claim 8, wherein one or more of the service parameter and the threshold service parameter comprise one or more of packet loss, latency, and available bandwidth. 14. The method of claim 8, wherein modifying transmission comprises executing forward error correction. 15. A network comprising: a user device having an interface in communication with a network device, wherein the user device is located within a first network that is external to a second network; and a computing device in communication with the network device, wherein the computing device is located within the second network, and wherein data is transmitted from the computing device based at least in part on a threshold service parameter, and wherein the network device is configured to emulate the interface of the user device, wherein the emulation of the interface of the user device communicates with the computing device to satisfy the threshold service parameter. 16. The network of claim 15, wherein the interface of the user device comprises an application client, and the computing device comprises an application server. 17. The network of claim 15, wherein the first network comprises a local area network and the second network comprises a wide area network. 18. The network of claim 15, wherein the threshold service parameter comprises one or more of packet loss, latency, and available bandwidth. 19. The network of claim 15, wherein the emulation of the interface of the user device comprises a faux application client in communication with the computing device, and a faux application server in communication with the interface of the user device. 20. The network of claim 15, wherein the network device is further configured to modify transmission of data to the interface of the user device to facilitate satisfaction of the threshold service parameter.
2,400
8,573
8,573
15,163,901
2,466
Embodiments disclosed herein provide systems and methods for controlling bandwidth across a network address translation (NAT) system. In a particular embodiment a method provides, identifying a first endpoint and a second endpoint to a communication session. The first endpoint is located within a domain of the NAT system and the second endpoint is located outside to the domain. The method further provides determining a bandwidth limitation for the communication session and exchanging communications between the first and second endpoints in accordance with the bandwidth limitation.
1. A method for controlling bandwidth in a network address translation (NAT) system, the method comprising: identifying a first endpoint and a second endpoint to a communication session, wherein the first endpoint is located within a domain of the NAT system and the second endpoint is located outside to the domain; determining a bandwidth limitation for the communication session; exchanging communications between the first and second endpoints in accordance with the bandwidth limitation. 2. The method of claim 1, wherein exchanging communications between the first and second endpoints in accordance with the bandwidth limitation comprises: opening a relay path having the bandwidth limitation for the communication session through a relay system; and passing communications between the first and second endpoints via the relay path. 3. The method of claim 2, wherein the relay system comprises a Traversal Using Relays around NAT (TURN) server. 4. The method of claim 3, wherein identifying the first endpoint comprises: receiving a TURN allocation request from the first endpoint. 5. The method of claim 2, wherein determining a bandwidth limitation for the communication session comprises: receiving an indication of a maximum bandwidth required for the communication session from the first endpoint; setting the bandwidth limitation to at least the maximum bandwidth required for the communication session; and including the bandwidth limitation in a TURN allocation response to the first endpoint. 6. The method of claim 5, wherein the maximum bandwidth required for the communication session is based upon at least one of a quality of service (QoS) requirement, a bandwidth allocation policy, and a location of the first endpoint. 7. The method of claim 2, wherein determining a bandwidth limitation for the communication session further comprises: receiving an indication of a maximum bandwidth required for the communication session from the first endpoint; and if not enough bandwidth is available to satisfy the maximum bandwidth required for the communication session, setting the bandwidth limitation to an available amount of bandwidth and notifying the first endpoint of the bandwidth limitation. 8. The method of claim 1, further comprising: in response to a request for a network address of the second endpoint, providing the network address and the bandwidth limitation to the first endpoint. 9. The method of claim 8, wherein the first endpoint uses the network address to exchange communications with the second endpoint in accordance with the bandwidth limitation. 10. The method of claim 1, wherein the NAT system includes a network firewall. 11. A communication control system for controlling bandwidth in a network address translation (NAT) system, the communication control system comprising: one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media that, when read and executed by the processing system, direct the processing system to: identify a first endpoint and a second endpoint to a communication session, wherein the first endpoint is located within a domain of the NAT system and the second endpoint is located outside to the domain; determine a bandwidth limitation for the communication session; exchange communications between the first and second endpoints in accordance with the bandwidth limitation. 12. The communication control system of claim 11, wherein the communication control system comprises a relay system, and wherein to direct the processing system to exchange the communications between the first and second endpoints in accordance with the bandwidth limitation the program instructions direct the processing system to at least: open a relay path having the bandwidth limitation for the communication session through the relay system; and pass communications between the first and second endpoints via the relay path. 13. The communication control system of claim 12, wherein the relay system comprises a Traversal Using Relays around NAT (TURN) server. 14. The communication control system of claim 13, wherein to identify the first endpoint the program instructions direct the processing system to at least: receive a TURN allocation request from the first endpoint. 15. The communication control system of claim 12, wherein to determine a bandwidth limitation for the communication session the program instructions direct the processing system to at least: receive an indication of a maximum bandwidth required for the communication session from the first endpoint; set the bandwidth limitation to at least the maximum bandwidth required for the communication session; and include the bandwidth limitation in a TURN allocation response to the first endpoint. 16. The communication control system of claim 15, wherein the maximum bandwidth required for the communication session is based upon at least one of a quality of service (QoS) requirement, a bandwidth allocation policy, and a location of the first endpoint. 17. The communication control system of claim 12, wherein to determine a bandwidth limitation for the communication session further the program instructions direct the processing system to: receive an indication of a maximum bandwidth required for the communication session from the first endpoint; and if not enough bandwidth is available to satisfy the maximum bandwidth required for the communication session, set the bandwidth limitation to an available amount of bandwidth and notifying the first endpoint of the bandwidth limitation. 18. The communication control system of claim 11, wherein the program instructions further direct the processing system to: in response to a request for a network address of the second endpoint, provide the network address and the bandwidth limitation to the first endpoint. 19. The communication control system of claim 18, wherein the first endpoint uses the network address to exchange communications with the second endpoint in accordance with the bandwidth limitation. 20. The communication control system of claim 11, wherein the NAT system includes a network firewall.
Embodiments disclosed herein provide systems and methods for controlling bandwidth across a network address translation (NAT) system. In a particular embodiment a method provides, identifying a first endpoint and a second endpoint to a communication session. The first endpoint is located within a domain of the NAT system and the second endpoint is located outside to the domain. The method further provides determining a bandwidth limitation for the communication session and exchanging communications between the first and second endpoints in accordance with the bandwidth limitation.1. A method for controlling bandwidth in a network address translation (NAT) system, the method comprising: identifying a first endpoint and a second endpoint to a communication session, wherein the first endpoint is located within a domain of the NAT system and the second endpoint is located outside to the domain; determining a bandwidth limitation for the communication session; exchanging communications between the first and second endpoints in accordance with the bandwidth limitation. 2. The method of claim 1, wherein exchanging communications between the first and second endpoints in accordance with the bandwidth limitation comprises: opening a relay path having the bandwidth limitation for the communication session through a relay system; and passing communications between the first and second endpoints via the relay path. 3. The method of claim 2, wherein the relay system comprises a Traversal Using Relays around NAT (TURN) server. 4. The method of claim 3, wherein identifying the first endpoint comprises: receiving a TURN allocation request from the first endpoint. 5. The method of claim 2, wherein determining a bandwidth limitation for the communication session comprises: receiving an indication of a maximum bandwidth required for the communication session from the first endpoint; setting the bandwidth limitation to at least the maximum bandwidth required for the communication session; and including the bandwidth limitation in a TURN allocation response to the first endpoint. 6. The method of claim 5, wherein the maximum bandwidth required for the communication session is based upon at least one of a quality of service (QoS) requirement, a bandwidth allocation policy, and a location of the first endpoint. 7. The method of claim 2, wherein determining a bandwidth limitation for the communication session further comprises: receiving an indication of a maximum bandwidth required for the communication session from the first endpoint; and if not enough bandwidth is available to satisfy the maximum bandwidth required for the communication session, setting the bandwidth limitation to an available amount of bandwidth and notifying the first endpoint of the bandwidth limitation. 8. The method of claim 1, further comprising: in response to a request for a network address of the second endpoint, providing the network address and the bandwidth limitation to the first endpoint. 9. The method of claim 8, wherein the first endpoint uses the network address to exchange communications with the second endpoint in accordance with the bandwidth limitation. 10. The method of claim 1, wherein the NAT system includes a network firewall. 11. A communication control system for controlling bandwidth in a network address translation (NAT) system, the communication control system comprising: one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media that, when read and executed by the processing system, direct the processing system to: identify a first endpoint and a second endpoint to a communication session, wherein the first endpoint is located within a domain of the NAT system and the second endpoint is located outside to the domain; determine a bandwidth limitation for the communication session; exchange communications between the first and second endpoints in accordance with the bandwidth limitation. 12. The communication control system of claim 11, wherein the communication control system comprises a relay system, and wherein to direct the processing system to exchange the communications between the first and second endpoints in accordance with the bandwidth limitation the program instructions direct the processing system to at least: open a relay path having the bandwidth limitation for the communication session through the relay system; and pass communications between the first and second endpoints via the relay path. 13. The communication control system of claim 12, wherein the relay system comprises a Traversal Using Relays around NAT (TURN) server. 14. The communication control system of claim 13, wherein to identify the first endpoint the program instructions direct the processing system to at least: receive a TURN allocation request from the first endpoint. 15. The communication control system of claim 12, wherein to determine a bandwidth limitation for the communication session the program instructions direct the processing system to at least: receive an indication of a maximum bandwidth required for the communication session from the first endpoint; set the bandwidth limitation to at least the maximum bandwidth required for the communication session; and include the bandwidth limitation in a TURN allocation response to the first endpoint. 16. The communication control system of claim 15, wherein the maximum bandwidth required for the communication session is based upon at least one of a quality of service (QoS) requirement, a bandwidth allocation policy, and a location of the first endpoint. 17. The communication control system of claim 12, wherein to determine a bandwidth limitation for the communication session further the program instructions direct the processing system to: receive an indication of a maximum bandwidth required for the communication session from the first endpoint; and if not enough bandwidth is available to satisfy the maximum bandwidth required for the communication session, set the bandwidth limitation to an available amount of bandwidth and notifying the first endpoint of the bandwidth limitation. 18. The communication control system of claim 11, wherein the program instructions further direct the processing system to: in response to a request for a network address of the second endpoint, provide the network address and the bandwidth limitation to the first endpoint. 19. The communication control system of claim 18, wherein the first endpoint uses the network address to exchange communications with the second endpoint in accordance with the bandwidth limitation. 20. The communication control system of claim 11, wherein the NAT system includes a network firewall.
2,400
8,574
8,574
14,819,313
2,424
Systems, methods, apparatus and other mechanisms of providing a user interface (UI) at a service provider node in the television distribution system by encoding UI imagery to provide an encoded video stream bearing the UI imagery and configured for rendering as a UI screen via a client device video decoder, the UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for the UI screen.
1. A user interface (UI) system, comprising: a UI generator, at a service provider node in a television distribution system, for encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information and scaled live video imagery associated with each of a first subset of broadcast channels during a first time interval; and a scaling module, at the service provider node, for scaling video streams associated with at least the first subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 2. The UI system of claim 1, wherein: said UI generator, in response to receiving a client request for a UI screen, encoding programming information and scaled live video imagery associated with a requested subset of broadcast channels during a requested time interval. 3. The UI system of claim 2, wherein: said UI generator, in response to receiving a client request for a UI screen, communicating with a remote network element to retrieve therefrom programming information associated with a requested subset of broadcast channels during a requested time interval. 4. The UI system of claim 1, wherein a default UI screen within said encoded video stream is transmitted toward a client device via a default transmission channel in response to detecting a corresponding client device session initiation. 5. The UI system of claim 4, wherein: said head end server stores encoded UI assets associated with broadcast channels provided within said television distribution system; and said UI generator is operable to decode retrieved UI assets for use in forming said UI imagery. 6. The UI system of claim 1, wherein said video stream bearing said UI imagery comprises a plurality of UI screens, each of said UI screens including programming information and scaled live video imagery associated with a respective subset of broadcast channels during said first time interval. 7. The UI system of claim 1, wherein said video stream bearing said U1 imagery comprises a plurality of UI screens, each of said UI screens including programming information and scaled live video imagery associated with said subset of broadcast channels during a respective time interval. 8. The UI system of claim 1, wherein said encoded video stream bearing said UI imagery is transmitted toward said client device via a predefined video transport channel within said service provider network. 9. The UI system of claim 8, wherein a change in video transport channel used to transmit said encoded video stream bearing said UI imagery is advertised to said client device via a control signal. 10. The UI system of claim 1, wherein said remote network element comprises a head end server in a television distribution system. 11. The UI system of claim 1, wherein said service provider node comprises one of a service provider access node associated with one or more client devices, a service provider network node, a service provider server, a UI vendor server and a cable television network head end. 12. The UI system of claim 1, wherein said client device comprises one of a subscriber terminal, a set-top box (STB), a set-top terminal (STT), a smart phone and a computing device. 13. The UI system of claim 1, wherein the scaling module operates to spatially scale broadcast channel video of a first frame size to produce corresponding broadcast channel imagery of a second frame size, where the second frame size is smaller than the first frame size. 14. The UI system of claim 13, wherein the scaling module operates to temporally scale broadcast channel video of a first frame rate to produce corresponding broadcast channel imagery of a second frame rate, where the second frame rate is smaller than the first frame rate. 15. A method of providing a user interface (UI) to a client device in television distribution system, comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 16. The method of claim 15, further comprising: at the service provider node, in response to receiving a client request for a UI screen, encoding programming information and scaled live video imagery associated with a requested subset of broadcast channels during a requested time interval. 17. The method of claim 15, wherein said UI screen includes a programming guide grid depicting broadcast channels as a function of time slots including a current time slot, and wherein each current time slot grid position is adjacent to corresponding broadcast channel scaled live video imagery. 18. The method of claim 15, wherein said UI screen includes a video bar comprising a plurality of adjacent video images, each video image comprising scaled live video imagery of a respective broadcast channel. 19. The method of claim 15, further comprising: for a UI screen intended to be transmitted to a client device, inhibiting the inclusion therein of scaled live video imagery associated with any broadcast channel prohibited in accordance with a parental control indication associated with the client device. 20. The method of claim 19, further comprising: for a UI screen intended to be transmitted to a client device, inhibiting the inclusion therein of programming information associated with any broadcast channel prohibited in accordance with the parental control indication associated with the client device. 21. The method of claim 15, further comprising: for a UI screen intended to be transmitted to a client device, inhibiting the inclusion therein of scaled live video imagery associated with any premium broadcast channel not included within a service agreement associated with the client device. 22. An apparatus, comprising a processor and a storage medium for tangibly storing thereon program logic for execution by the processor, the program logic configured to cause said apparatus to perform a method of providing a user interface (UI) to a client device in television distribution system, the method comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 23. A tangible and non-transient computer readable storage medium storing instructions which, when executed by a computer, adapt the operation of the computer to provide a method of providing a user interface (UI) to a client device in television distribution system, the method comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 24. A computer program product wherein computer instructions, when executed by a processor in a network management element, adapt the operation of the network management element network element to perform a method of providing a user interface (UI) to a client device in television distribution system, the method comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen.
Systems, methods, apparatus and other mechanisms of providing a user interface (UI) at a service provider node in the television distribution system by encoding UI imagery to provide an encoded video stream bearing the UI imagery and configured for rendering as a UI screen via a client device video decoder, the UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for the UI screen.1. A user interface (UI) system, comprising: a UI generator, at a service provider node in a television distribution system, for encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information and scaled live video imagery associated with each of a first subset of broadcast channels during a first time interval; and a scaling module, at the service provider node, for scaling video streams associated with at least the first subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 2. The UI system of claim 1, wherein: said UI generator, in response to receiving a client request for a UI screen, encoding programming information and scaled live video imagery associated with a requested subset of broadcast channels during a requested time interval. 3. The UI system of claim 2, wherein: said UI generator, in response to receiving a client request for a UI screen, communicating with a remote network element to retrieve therefrom programming information associated with a requested subset of broadcast channels during a requested time interval. 4. The UI system of claim 1, wherein a default UI screen within said encoded video stream is transmitted toward a client device via a default transmission channel in response to detecting a corresponding client device session initiation. 5. The UI system of claim 4, wherein: said head end server stores encoded UI assets associated with broadcast channels provided within said television distribution system; and said UI generator is operable to decode retrieved UI assets for use in forming said UI imagery. 6. The UI system of claim 1, wherein said video stream bearing said UI imagery comprises a plurality of UI screens, each of said UI screens including programming information and scaled live video imagery associated with a respective subset of broadcast channels during said first time interval. 7. The UI system of claim 1, wherein said video stream bearing said U1 imagery comprises a plurality of UI screens, each of said UI screens including programming information and scaled live video imagery associated with said subset of broadcast channels during a respective time interval. 8. The UI system of claim 1, wherein said encoded video stream bearing said UI imagery is transmitted toward said client device via a predefined video transport channel within said service provider network. 9. The UI system of claim 8, wherein a change in video transport channel used to transmit said encoded video stream bearing said UI imagery is advertised to said client device via a control signal. 10. The UI system of claim 1, wherein said remote network element comprises a head end server in a television distribution system. 11. The UI system of claim 1, wherein said service provider node comprises one of a service provider access node associated with one or more client devices, a service provider network node, a service provider server, a UI vendor server and a cable television network head end. 12. The UI system of claim 1, wherein said client device comprises one of a subscriber terminal, a set-top box (STB), a set-top terminal (STT), a smart phone and a computing device. 13. The UI system of claim 1, wherein the scaling module operates to spatially scale broadcast channel video of a first frame size to produce corresponding broadcast channel imagery of a second frame size, where the second frame size is smaller than the first frame size. 14. The UI system of claim 13, wherein the scaling module operates to temporally scale broadcast channel video of a first frame rate to produce corresponding broadcast channel imagery of a second frame rate, where the second frame rate is smaller than the first frame rate. 15. A method of providing a user interface (UI) to a client device in television distribution system, comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 16. The method of claim 15, further comprising: at the service provider node, in response to receiving a client request for a UI screen, encoding programming information and scaled live video imagery associated with a requested subset of broadcast channels during a requested time interval. 17. The method of claim 15, wherein said UI screen includes a programming guide grid depicting broadcast channels as a function of time slots including a current time slot, and wherein each current time slot grid position is adjacent to corresponding broadcast channel scaled live video imagery. 18. The method of claim 15, wherein said UI screen includes a video bar comprising a plurality of adjacent video images, each video image comprising scaled live video imagery of a respective broadcast channel. 19. The method of claim 15, further comprising: for a UI screen intended to be transmitted to a client device, inhibiting the inclusion therein of scaled live video imagery associated with any broadcast channel prohibited in accordance with a parental control indication associated with the client device. 20. The method of claim 19, further comprising: for a UI screen intended to be transmitted to a client device, inhibiting the inclusion therein of programming information associated with any broadcast channel prohibited in accordance with the parental control indication associated with the client device. 21. The method of claim 15, further comprising: for a UI screen intended to be transmitted to a client device, inhibiting the inclusion therein of scaled live video imagery associated with any premium broadcast channel not included within a service agreement associated with the client device. 22. An apparatus, comprising a processor and a storage medium for tangibly storing thereon program logic for execution by the processor, the program logic configured to cause said apparatus to perform a method of providing a user interface (UI) to a client device in television distribution system, the method comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 23. A tangible and non-transient computer readable storage medium storing instructions which, when executed by a computer, adapt the operation of the computer to provide a method of providing a user interface (UI) to a client device in television distribution system, the method comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen. 24. A computer program product wherein computer instructions, when executed by a processor in a network management element, adapt the operation of the network management element network element to perform a method of providing a user interface (UI) to a client device in television distribution system, the method comprising: at a service provider node in the television distribution system, encoding UI imagery to provide an encoded video stream bearing said UI imagery and configured for rendering as a UI screen via a client device video decoder, said UI screen including programming information associated with each of a subset of broadcast channels during a plurality of time intervals, and scaled live video imagery associated with each of the subset of broadcast channels; and at the service provider node, scaling video streams associated with at least the subset of broadcast channels to provide respective scaled live video imagery for said UI screen.
2,400
8,575
8,575
14,433,115
2,477
An objective is to enable communications properly using an Scell even in a case where a radio base station which transmits “Activate command” and a radio base station which manages an Scell are different when “Inter-site CA” is performed. A radio base station eNB #1 according to the invention includes a transmission unit 12 configured to transmit an “Activate command” which is a command to activate a cell # B to a mobile station UE and thereafter notify a radio base station eNB #10 that the cell # B is activated.
1. A radio base station which is configured to be capable of functioning as a first radio base station in a mobile communication system allowing a mobile station to perform carrier aggregation using a first cell managed by the first radio base station and a second cell managed by a second radio base station, the radio base station comprising: a transmission unit configured to notify the second radio base station that the second cell is activated in a case where the transmission unit transmits a command to activate the second cell to the mobile station. 2. The radio base station according to claim 1, comprising a reception unit configured to receive acknowledgement information in response to the command from the mobile station, wherein the transmission unit makes the notification when the reception unit receives positive acknowledgement information in response to the command after the transmission unit transmits the command. 3. The radio base station according to claim 1, comprising a reception unit configured to receive a channel state report in the second cell from the mobile station, wherein the transmission unit makes the notification when the reception unit receives the channel state report after the transmission unit transmits the command. 4. The radio base station according to claim 1, wherein the transmission unit makes the notification to the second radio base station through a mobile management node or an anchor radio base station. 5. A mobile station configured to be capable of performing carrier aggregation using a first cell managed by a first radio base station and a second cell managed by a second radio base station, the mobile station comprising: a reception unit; and a random access procedure execution unit configured to execute a random access procedure, wherein the random access procedure execution unit executes a random access procedure with the second radio base station when the reception unit receives a command to activate the second cell from the first radio base station. 6. The mobile station according to claim 5, wherein the random access procedure execution unit executes the random access procedure with the second radio base station according a scheduling signal from the first radio base station.
An objective is to enable communications properly using an Scell even in a case where a radio base station which transmits “Activate command” and a radio base station which manages an Scell are different when “Inter-site CA” is performed. A radio base station eNB #1 according to the invention includes a transmission unit 12 configured to transmit an “Activate command” which is a command to activate a cell # B to a mobile station UE and thereafter notify a radio base station eNB #10 that the cell # B is activated.1. A radio base station which is configured to be capable of functioning as a first radio base station in a mobile communication system allowing a mobile station to perform carrier aggregation using a first cell managed by the first radio base station and a second cell managed by a second radio base station, the radio base station comprising: a transmission unit configured to notify the second radio base station that the second cell is activated in a case where the transmission unit transmits a command to activate the second cell to the mobile station. 2. The radio base station according to claim 1, comprising a reception unit configured to receive acknowledgement information in response to the command from the mobile station, wherein the transmission unit makes the notification when the reception unit receives positive acknowledgement information in response to the command after the transmission unit transmits the command. 3. The radio base station according to claim 1, comprising a reception unit configured to receive a channel state report in the second cell from the mobile station, wherein the transmission unit makes the notification when the reception unit receives the channel state report after the transmission unit transmits the command. 4. The radio base station according to claim 1, wherein the transmission unit makes the notification to the second radio base station through a mobile management node or an anchor radio base station. 5. A mobile station configured to be capable of performing carrier aggregation using a first cell managed by a first radio base station and a second cell managed by a second radio base station, the mobile station comprising: a reception unit; and a random access procedure execution unit configured to execute a random access procedure, wherein the random access procedure execution unit executes a random access procedure with the second radio base station when the reception unit receives a command to activate the second cell from the first radio base station. 6. The mobile station according to claim 5, wherein the random access procedure execution unit executes the random access procedure with the second radio base station according a scheduling signal from the first radio base station.
2,400
8,576
8,576
15,091,287
2,445
Described herein are methods and systems for admission control of a communication session over a communication network. The methods and systems of the present disclosure may comprise determining whether a communication session originates from an originating device that is part of an autodialing system. If the communication session does originate from an autodialing system, the methods and systems can determine whether the autodialing system is a valid autodialing system or an invalid autodialing system. The methods and systems can process or block future communications sessions from the originating device depending on whether the autodialing system is a valid autodialing system or invalid autodialing system, respectively.
1. A method comprising: determining one or more attributes of a plurality of communication sessions initiated by an originating device associated with an originating device identifier; determining, based on the one or more attributes, that the originating device identifier is associated with an autodialing system; responsive to determining that the originating device identifier is associated with an autodialing system, generating text data from audio data of at least one communication session initiated by the originating device; determining that the autodialing system is invalid based on a comparison of the text data to a database of keywords that indicate whether the at least one communication session is from a valid autodialing system or an invalid autodialing system; and responsive to determining that the autodialing system is an invalid autodialing system, blocking one or more future communication sessions associated with the originating device identifier. 2. The method of claim 1, further comprising: determining that the originating device identifier is on an exceptions list; and responsive to determining that the originating device identifier is on the exceptions list, processing the one or more future communication sessions. 3. The method of claim 1, wherein the one or more attributes comprise one or more of an answer seizure rate, a call rate, and a call hold time. 4. The method of claim 1, further comprising: analyzing audio data of at least two communication sessions associated with the originating device identifier; determining that at least a threshold portion of the audio data of the at least two communication sessions matches; and responsive to determining that the at least a threshold portion of the audio data of the at least two communication sessions matches, identifying the originating device identifier as associated with an autodialing system. 5. The method of claim 1, further comprising storing the originating device identifier in a database of invalid autodialing systems. 6. The method of claim 5, further comprising: receiving the one or more future communication sessions associated with the originating device identifier; determining that the originating device identifier is stored in the database of invalid autodialing systems; and responsive to determining that the originating device identifier is stored in the database of invalid autodialing systems, blocking the communication session. 7. The method of claim 1, further comprising analyzing the at least one communication session for fraud. 8. The method of claim 1, wherein the plurality of communication sessions comprises real-time transport protocol packets. 9. A method comprising: receiving a first communication session initiation request comprising, an originating device identifier; processing the first communication session initiation request to establish a first communication session between an originating device associated with the originating device identifier and a target device; storing a data record comprising one or more data entries of information about the first communication session between the originating device and the target device; determining one or more attributes relating to the originating device identifier based on the one or more data entries of the data record; determining that the one or more attributes satisfy a communication threshold that indicates the originating device identifier is associated with a possible autodialing system; and responsive to determining that the one or more attributes satisfy a communication threshold, tagging the originating device identifier as a possible autodialing system. 10. The method of claim 9, further comprising: receiving a second communication session initiation request comprising the originating device identifier; processing the second communication session initiation request to establish a second communication session; and intercepting the second communication session based on the originating device identifier being tagged as a possible autodialing system. 11. The method of claim 10, further comprising determining that the originating device identifier is associated with an autodialing system based on the second communication session 12. The method of claim 11, wherein the determining that the originating device identifier is associated with an autodialing system based on the second communication session comprises: comparing audio data of the second communication session to audio data of at least one other communication session associated with the originating device identifier; and determining whether at least a threshold portion of the audio data of the second communication session and the audio data of the at least one other communication session matches. 13. The method of claim 11, further comprising: determining that the autodialing system is an invalid autodialing system; and blocking one or more future communication sessions associated with the originating device identifier. 14. The method of claim 11, further comprising: determining that the autodialing system is a valid autodialing system; and adding the originating device identifier to an exceptions list. 15. The method of claim 9, wherein the one or more attributes comprise one or more of an answer seizure rate, a call rate, and a call hold time. 16. The method of claim 11, wherein the determining that the originating device identifier is associated with an invalid autodialing system comprises: converting audio data of the second communication session to text data; and performing a comparison of the text data to a database of keywords that indicate whether the second communication session is from a valid autodialing system or an invalid autodialing system. 17. The method of claim 13, wherein the blocking the one or more future communication sessions associated with the originating device identifier, comprises: routing the one or more future communication sessions to an interactive voice response (IVR) system; and completing the one or more future communication sessions with the IVR system. 18. A method comprising: processing a plurality of communication sessions initiated by an originating device associated with an originating device identifier; determining that a communication threshold for the originating device identifier has been satisfied based on analyzing a data record comprising one or more attributes for each of the plurality of communication sessions; retrieving audio content from one or more of the plurality of communication sessions; converting the audio content to text data and comparing the text data to a database of keywords to determine that the communication session is invalid; and responsive to determining that the communication session is invalid, blocking one or more future communication sessions associated with the originating device identifier. 19. The method of claim 18, wherein the communication threshold comprises one or more of an answer seizure rate threshold, a call rate threshold, and a call hold time threshold. 20. The method of claim 18, wherein the one or more attributes comprise one or more of an answer seizure rate, a call rate, and a call hold time. 21. The method of claim 18, wherein the one or more communication sessions comprise real-time transport protocol packets. 22. The method of claim 18, wherein the blocking the one or more future communication sessions associated with the originating device identifier comprises: routing the one or more future communication sessions to an interactive voice response (IVR) system; and completing the one or more future communication sessions with the IVR system.
Described herein are methods and systems for admission control of a communication session over a communication network. The methods and systems of the present disclosure may comprise determining whether a communication session originates from an originating device that is part of an autodialing system. If the communication session does originate from an autodialing system, the methods and systems can determine whether the autodialing system is a valid autodialing system or an invalid autodialing system. The methods and systems can process or block future communications sessions from the originating device depending on whether the autodialing system is a valid autodialing system or invalid autodialing system, respectively.1. A method comprising: determining one or more attributes of a plurality of communication sessions initiated by an originating device associated with an originating device identifier; determining, based on the one or more attributes, that the originating device identifier is associated with an autodialing system; responsive to determining that the originating device identifier is associated with an autodialing system, generating text data from audio data of at least one communication session initiated by the originating device; determining that the autodialing system is invalid based on a comparison of the text data to a database of keywords that indicate whether the at least one communication session is from a valid autodialing system or an invalid autodialing system; and responsive to determining that the autodialing system is an invalid autodialing system, blocking one or more future communication sessions associated with the originating device identifier. 2. The method of claim 1, further comprising: determining that the originating device identifier is on an exceptions list; and responsive to determining that the originating device identifier is on the exceptions list, processing the one or more future communication sessions. 3. The method of claim 1, wherein the one or more attributes comprise one or more of an answer seizure rate, a call rate, and a call hold time. 4. The method of claim 1, further comprising: analyzing audio data of at least two communication sessions associated with the originating device identifier; determining that at least a threshold portion of the audio data of the at least two communication sessions matches; and responsive to determining that the at least a threshold portion of the audio data of the at least two communication sessions matches, identifying the originating device identifier as associated with an autodialing system. 5. The method of claim 1, further comprising storing the originating device identifier in a database of invalid autodialing systems. 6. The method of claim 5, further comprising: receiving the one or more future communication sessions associated with the originating device identifier; determining that the originating device identifier is stored in the database of invalid autodialing systems; and responsive to determining that the originating device identifier is stored in the database of invalid autodialing systems, blocking the communication session. 7. The method of claim 1, further comprising analyzing the at least one communication session for fraud. 8. The method of claim 1, wherein the plurality of communication sessions comprises real-time transport protocol packets. 9. A method comprising: receiving a first communication session initiation request comprising, an originating device identifier; processing the first communication session initiation request to establish a first communication session between an originating device associated with the originating device identifier and a target device; storing a data record comprising one or more data entries of information about the first communication session between the originating device and the target device; determining one or more attributes relating to the originating device identifier based on the one or more data entries of the data record; determining that the one or more attributes satisfy a communication threshold that indicates the originating device identifier is associated with a possible autodialing system; and responsive to determining that the one or more attributes satisfy a communication threshold, tagging the originating device identifier as a possible autodialing system. 10. The method of claim 9, further comprising: receiving a second communication session initiation request comprising the originating device identifier; processing the second communication session initiation request to establish a second communication session; and intercepting the second communication session based on the originating device identifier being tagged as a possible autodialing system. 11. The method of claim 10, further comprising determining that the originating device identifier is associated with an autodialing system based on the second communication session 12. The method of claim 11, wherein the determining that the originating device identifier is associated with an autodialing system based on the second communication session comprises: comparing audio data of the second communication session to audio data of at least one other communication session associated with the originating device identifier; and determining whether at least a threshold portion of the audio data of the second communication session and the audio data of the at least one other communication session matches. 13. The method of claim 11, further comprising: determining that the autodialing system is an invalid autodialing system; and blocking one or more future communication sessions associated with the originating device identifier. 14. The method of claim 11, further comprising: determining that the autodialing system is a valid autodialing system; and adding the originating device identifier to an exceptions list. 15. The method of claim 9, wherein the one or more attributes comprise one or more of an answer seizure rate, a call rate, and a call hold time. 16. The method of claim 11, wherein the determining that the originating device identifier is associated with an invalid autodialing system comprises: converting audio data of the second communication session to text data; and performing a comparison of the text data to a database of keywords that indicate whether the second communication session is from a valid autodialing system or an invalid autodialing system. 17. The method of claim 13, wherein the blocking the one or more future communication sessions associated with the originating device identifier, comprises: routing the one or more future communication sessions to an interactive voice response (IVR) system; and completing the one or more future communication sessions with the IVR system. 18. A method comprising: processing a plurality of communication sessions initiated by an originating device associated with an originating device identifier; determining that a communication threshold for the originating device identifier has been satisfied based on analyzing a data record comprising one or more attributes for each of the plurality of communication sessions; retrieving audio content from one or more of the plurality of communication sessions; converting the audio content to text data and comparing the text data to a database of keywords to determine that the communication session is invalid; and responsive to determining that the communication session is invalid, blocking one or more future communication sessions associated with the originating device identifier. 19. The method of claim 18, wherein the communication threshold comprises one or more of an answer seizure rate threshold, a call rate threshold, and a call hold time threshold. 20. The method of claim 18, wherein the one or more attributes comprise one or more of an answer seizure rate, a call rate, and a call hold time. 21. The method of claim 18, wherein the one or more communication sessions comprise real-time transport protocol packets. 22. The method of claim 18, wherein the blocking the one or more future communication sessions associated with the originating device identifier comprises: routing the one or more future communication sessions to an interactive voice response (IVR) system; and completing the one or more future communication sessions with the IVR system.
2,400
8,577
8,577
14,778,394
2,486
A method encoding data values of a data set, including: selecting one of plural complementary sub-ranges of a code values set according to a current input data value, the code values set defined by a range variable; assigning the current input data value to a code value within the selected sub-range; modifying the code values set depending on the assigned code value and size of the selected sub-range; detecting whether the range variable is less than a predetermined minimum size and if so, successively increasing the range variable to increase the code values set size to at least the predetermined minimum size; outputting an encoded data bit in response to each size-increasing operation; after encoding a group of input data values, setting the range variable to a value selected from a predetermined subset of available range variable values, each subset value having at least one least significant bit of zero.
1. A data encoding apparatus for encoding input data values of a data set for encoding, the apparatus comprising: circuitry configured to select one of a plurality of complementary sub-ranges of a set of code values according to the value of a current input data value, the set of code values being defined by a range variable and to assign the current input data value to a code value within the selected sub-range; modifier circuitry configured to modify the set of code values in dependence upon the assigned code value and the size of the selected sub-range; detector circuitry configured to detect whether the range variable defining the set of code values is less than a predetermined minimum size and if so, to successively increase the range variable so as to increase the size of the set of code values until it has at least the predetermined minimum size; and outputting an encoded data bit in response to each such size-increasing operation; and range variable setter circuitry configured, after encoding a group of input data values, to set the range variable to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero. 2. The apparatus according to claim 1, in which the subset of available range variable values consists of the value 256. 3. The apparatus according to claim 1, in which: the proportions of the sub-ranges relative to the set of code values are defined by a context variable associated with the input data value. 4. The apparatus according to claim 3, comprising the step of: following the coding of an input data value, modifying the context variable, for use in respect of a next input data value, so as to increase the proportion of the set of code values in the sub-range that was selected for the current input data value. 5. The apparatus according to claim 1, in which: the set of code values comprises values from 0 to an upper value defined by the range variable, the upper value being between the predetermined minimum size and a second predetermined values. 6. The apparatus according to claim 5, in which the predetermined minimum size is 256 and the second predetermined value is 510. 7. The apparatus according to claim 1, in which; the subset of available values of the range variable comprises the predetermined minimum size. 8. The apparatus according to claim 1, in which the subset comprises two or more values between the predetermined minimum size and the second predetermined value. 9. The apparatus according to claim 8, in which the range variable setter is configured to select a value from the subset according to a current value of the range variable. 10. The apparatus according to claim 9, in which the range variable setter is configured to select a particular value from the subset if the current value of the range variable is between that particular value and one less than a next-higher value in the subset. 11. The apparatus according to claim 1, comprising: a bypass data encoder configured to encode data representing coefficients which are not represented a data set as bypass data; and a bypass data quantity detector configured to detect the quantity of bypass data associated with a current array; and in which: the range variable setter circuitry is configured to set the range variable if the quantity of bypass data exceeds a threshold amount, but not to set the range variable otherwise. 12. The apparatus according to claim 1, in which: the input data values represent image data; and the image data are encoded as transform units comprising a plurality of arrays of coefficients; in which the range variable setter circuitry is configured to set the range variable at the end of encoding a transform unit. 13. A method of data encoding input data values of a data set for encoding, the method comprising the steps of: selecting one of a plurality of complementary sub-ranges of a set of code values according to the value of a current input data value, the set of code values being defined by a range variable; assigning the current input data value to a code value within the selected sub-range; modifying the set of code values in dependence upon the assigned code value and the size of the selected sub-range; detecting whether the range variable defining the set of code values is less than a predetermined minimum size and if so, successively increasing the range variable so as to increase the size of the set of code values until it has at least the predetermined minimum size; and outputting an encoded data bit in response to each such size-increasing operation; and after encoding a group of input data values, setting the range variable to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero. 14. The method according to claim 13, in which the subset of available range variable values consists of the value 256. 15-28. (canceled) 29. A data decoding apparatus for decoding a sequence of arithmetic-encoded data values, the apparatus comprising: circuitry selector configured to select one of a plurality of complementary sub-ranges of a set of code values, the set of code values being defined by a range variable; modifier circuitry configured to modify the set of code values in dependence upon the size of the selected sub-range; detector circuitry configured to detect an encoded data value and, in response to the detection, to increase the size of the set of code values, and to detect a termination of the sequence at which the range variable is set to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero; and range variable setter circuitry configured, in response to the detection, to set the range variable and the size of the set of code values to the selected value. 30. The apparatus according to claim 29, in which the subset of available range variable values consists of the value 256. 31. The apparatus according to claim 29, comprising: second detector circuitry configured to detect, from a final encoded data value at a termination of the sequence, one or more equiprobably encoded data values. 32. A method of decoding a sequence of arithmetic-encoded data values, the method comprising the steps of: selecting one of a plurality of complementary sub-ranges of a set of code values, the set of code values being defined by a range variable; modifying the set of code values in dependence upon the size of the selected sub-range; detecting an encoded data value and, in response to the detection, to increase the size of the set of code values; detecting a termination of the sequence at which the range variable is set to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero; and in response to the detecting step, setting the range variable and the size of the set of code values to the selected value. 33. The method according to claim 32, in which the subset of available range variable values consists of the value 256. 34. method according to claim 32, comprising: detecting, from a final encoded data value at a termination of the sequence, one or more equiprobably encoded data values. 35-36. (canceled) 37. A non-transitory computer readable medium including computer program instructions, which when executed by a computer causes the computer to perform the method of claim 13. 38. A video data capture, transmission and/or storage apparatus comprising the apparatus according to claim 1.
A method encoding data values of a data set, including: selecting one of plural complementary sub-ranges of a code values set according to a current input data value, the code values set defined by a range variable; assigning the current input data value to a code value within the selected sub-range; modifying the code values set depending on the assigned code value and size of the selected sub-range; detecting whether the range variable is less than a predetermined minimum size and if so, successively increasing the range variable to increase the code values set size to at least the predetermined minimum size; outputting an encoded data bit in response to each size-increasing operation; after encoding a group of input data values, setting the range variable to a value selected from a predetermined subset of available range variable values, each subset value having at least one least significant bit of zero.1. A data encoding apparatus for encoding input data values of a data set for encoding, the apparatus comprising: circuitry configured to select one of a plurality of complementary sub-ranges of a set of code values according to the value of a current input data value, the set of code values being defined by a range variable and to assign the current input data value to a code value within the selected sub-range; modifier circuitry configured to modify the set of code values in dependence upon the assigned code value and the size of the selected sub-range; detector circuitry configured to detect whether the range variable defining the set of code values is less than a predetermined minimum size and if so, to successively increase the range variable so as to increase the size of the set of code values until it has at least the predetermined minimum size; and outputting an encoded data bit in response to each such size-increasing operation; and range variable setter circuitry configured, after encoding a group of input data values, to set the range variable to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero. 2. The apparatus according to claim 1, in which the subset of available range variable values consists of the value 256. 3. The apparatus according to claim 1, in which: the proportions of the sub-ranges relative to the set of code values are defined by a context variable associated with the input data value. 4. The apparatus according to claim 3, comprising the step of: following the coding of an input data value, modifying the context variable, for use in respect of a next input data value, so as to increase the proportion of the set of code values in the sub-range that was selected for the current input data value. 5. The apparatus according to claim 1, in which: the set of code values comprises values from 0 to an upper value defined by the range variable, the upper value being between the predetermined minimum size and a second predetermined values. 6. The apparatus according to claim 5, in which the predetermined minimum size is 256 and the second predetermined value is 510. 7. The apparatus according to claim 1, in which; the subset of available values of the range variable comprises the predetermined minimum size. 8. The apparatus according to claim 1, in which the subset comprises two or more values between the predetermined minimum size and the second predetermined value. 9. The apparatus according to claim 8, in which the range variable setter is configured to select a value from the subset according to a current value of the range variable. 10. The apparatus according to claim 9, in which the range variable setter is configured to select a particular value from the subset if the current value of the range variable is between that particular value and one less than a next-higher value in the subset. 11. The apparatus according to claim 1, comprising: a bypass data encoder configured to encode data representing coefficients which are not represented a data set as bypass data; and a bypass data quantity detector configured to detect the quantity of bypass data associated with a current array; and in which: the range variable setter circuitry is configured to set the range variable if the quantity of bypass data exceeds a threshold amount, but not to set the range variable otherwise. 12. The apparatus according to claim 1, in which: the input data values represent image data; and the image data are encoded as transform units comprising a plurality of arrays of coefficients; in which the range variable setter circuitry is configured to set the range variable at the end of encoding a transform unit. 13. A method of data encoding input data values of a data set for encoding, the method comprising the steps of: selecting one of a plurality of complementary sub-ranges of a set of code values according to the value of a current input data value, the set of code values being defined by a range variable; assigning the current input data value to a code value within the selected sub-range; modifying the set of code values in dependence upon the assigned code value and the size of the selected sub-range; detecting whether the range variable defining the set of code values is less than a predetermined minimum size and if so, successively increasing the range variable so as to increase the size of the set of code values until it has at least the predetermined minimum size; and outputting an encoded data bit in response to each such size-increasing operation; and after encoding a group of input data values, setting the range variable to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero. 14. The method according to claim 13, in which the subset of available range variable values consists of the value 256. 15-28. (canceled) 29. A data decoding apparatus for decoding a sequence of arithmetic-encoded data values, the apparatus comprising: circuitry selector configured to select one of a plurality of complementary sub-ranges of a set of code values, the set of code values being defined by a range variable; modifier circuitry configured to modify the set of code values in dependence upon the size of the selected sub-range; detector circuitry configured to detect an encoded data value and, in response to the detection, to increase the size of the set of code values, and to detect a termination of the sequence at which the range variable is set to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero; and range variable setter circuitry configured, in response to the detection, to set the range variable and the size of the set of code values to the selected value. 30. The apparatus according to claim 29, in which the subset of available range variable values consists of the value 256. 31. The apparatus according to claim 29, comprising: second detector circuitry configured to detect, from a final encoded data value at a termination of the sequence, one or more equiprobably encoded data values. 32. A method of decoding a sequence of arithmetic-encoded data values, the method comprising the steps of: selecting one of a plurality of complementary sub-ranges of a set of code values, the set of code values being defined by a range variable; modifying the set of code values in dependence upon the size of the selected sub-range; detecting an encoded data value and, in response to the detection, to increase the size of the set of code values; detecting a termination of the sequence at which the range variable is set to a value selected from a predetermined subset of available range variable values, each value in the subset having at least one least significant bit equal to zero; and in response to the detecting step, setting the range variable and the size of the set of code values to the selected value. 33. The method according to claim 32, in which the subset of available range variable values consists of the value 256. 34. method according to claim 32, comprising: detecting, from a final encoded data value at a termination of the sequence, one or more equiprobably encoded data values. 35-36. (canceled) 37. A non-transitory computer readable medium including computer program instructions, which when executed by a computer causes the computer to perform the method of claim 13. 38. A video data capture, transmission and/or storage apparatus comprising the apparatus according to claim 1.
2,400
8,578
8,578
16,162,805
2,484
Methods and systems are disclosed maintaining playback of content at a target or desired playback time. A playback device may be configured to compare a current playback time of a content asset to a target playback time of the content asset and to determine, for each comparison, whether a difference between the current playback time and the target playback time has reached a threshold. Based on determining that the difference between the current playback time and the target playback time has reached a threshold, the playback device may seek to the target playback time of the content asset. The playback device may be configured to repeatedly perform the comparing, determining and seeking operations in order to maintain the current playback time of the content within the threshold of the target playback time.
1. A method comprising: comparing, at one or more intervals and during playback of content, a current playback time of the content to a target playback time of the content; determining, for each comparison, whether a difference between the current playback time and the target playback time has satisfied a threshold; and seeking, based on determining that the difference has satisfied the threshold, to the target playback time. 2. The method of claim 1, wherein the target playback time of the content is determined based on a timestamp associated with the content. 3. The method of claim 2, wherein the timestamp is stored in a manifest associated with the content. 4. The method of claim 2, wherein comparing the current playback time of the content to the target playback time of the content comprises comparing the timestamp with a network time protocol. 5. The method of claim 1, wherein the threshold is less than one hundred milliseconds. 6. The method of claim 1, further comprising causing playback of the content at a location within the threshold of the target playback time of the content. 7. The method of claim 1, wherein the content is stored in a buffer. 8. A method comprising: receiving, at a device, one or more content fragments of a content asset and a manifest associated with the one or more content fragments, the manifest comprising a timestamp associated with each of the content fragments; causing playback of one or more of the content fragments; determining whether a difference between a current playback time of the content asset and a target playback time of the content asset has satisfied a threshold; and seeking, based on determining that the difference has satisfied the threshold, to the target playback time. 9. The method of claim 8, wherein the target playback time of the content asset is determined based on a timestamp associated with the content asset. 10. The method of claim 9, wherein the timestamp is stored in the manifest. 11. The method of claim 9, wherein the current playback time of the content asset is determined based on a network time protocol. 12. The method of claim 8, wherein the threshold is less than one hundred milliseconds. 13. The method of claim 8, further comprising causing playback of the content at a location within the threshold of the target playback time of the content. 14. A method comprising: comparing, periodically and during playback of content, a current playback time of the content to a target playback time of the content; determining whether a difference between the current playback time and the target playback time has satisfied a threshold; and seeking, in response to determining that the difference has satisfied the threshold, to the target playback time. 15. The method of claim 14, wherein the target playback time of the content is determined based on a timestamp associated with the content. 16. The method of claim 15, wherein the timestamp is stored in a manifest associated with the content. 17. The method of claim 15, wherein comparing the current playback time of the content to the target playback time of the content comprises comparing the timestamp with a network time protocol. 18. The method of claim 14, wherein the threshold is less than one hundred milliseconds. 19. The method of claim 14, further comprising causing playback of the content at a location within the threshold of the target playback time of the content. 20. The method of claim 14, wherein the content is stored in a buffer.
Methods and systems are disclosed maintaining playback of content at a target or desired playback time. A playback device may be configured to compare a current playback time of a content asset to a target playback time of the content asset and to determine, for each comparison, whether a difference between the current playback time and the target playback time has reached a threshold. Based on determining that the difference between the current playback time and the target playback time has reached a threshold, the playback device may seek to the target playback time of the content asset. The playback device may be configured to repeatedly perform the comparing, determining and seeking operations in order to maintain the current playback time of the content within the threshold of the target playback time.1. A method comprising: comparing, at one or more intervals and during playback of content, a current playback time of the content to a target playback time of the content; determining, for each comparison, whether a difference between the current playback time and the target playback time has satisfied a threshold; and seeking, based on determining that the difference has satisfied the threshold, to the target playback time. 2. The method of claim 1, wherein the target playback time of the content is determined based on a timestamp associated with the content. 3. The method of claim 2, wherein the timestamp is stored in a manifest associated with the content. 4. The method of claim 2, wherein comparing the current playback time of the content to the target playback time of the content comprises comparing the timestamp with a network time protocol. 5. The method of claim 1, wherein the threshold is less than one hundred milliseconds. 6. The method of claim 1, further comprising causing playback of the content at a location within the threshold of the target playback time of the content. 7. The method of claim 1, wherein the content is stored in a buffer. 8. A method comprising: receiving, at a device, one or more content fragments of a content asset and a manifest associated with the one or more content fragments, the manifest comprising a timestamp associated with each of the content fragments; causing playback of one or more of the content fragments; determining whether a difference between a current playback time of the content asset and a target playback time of the content asset has satisfied a threshold; and seeking, based on determining that the difference has satisfied the threshold, to the target playback time. 9. The method of claim 8, wherein the target playback time of the content asset is determined based on a timestamp associated with the content asset. 10. The method of claim 9, wherein the timestamp is stored in the manifest. 11. The method of claim 9, wherein the current playback time of the content asset is determined based on a network time protocol. 12. The method of claim 8, wherein the threshold is less than one hundred milliseconds. 13. The method of claim 8, further comprising causing playback of the content at a location within the threshold of the target playback time of the content. 14. A method comprising: comparing, periodically and during playback of content, a current playback time of the content to a target playback time of the content; determining whether a difference between the current playback time and the target playback time has satisfied a threshold; and seeking, in response to determining that the difference has satisfied the threshold, to the target playback time. 15. The method of claim 14, wherein the target playback time of the content is determined based on a timestamp associated with the content. 16. The method of claim 15, wherein the timestamp is stored in a manifest associated with the content. 17. The method of claim 15, wherein comparing the current playback time of the content to the target playback time of the content comprises comparing the timestamp with a network time protocol. 18. The method of claim 14, wherein the threshold is less than one hundred milliseconds. 19. The method of claim 14, further comprising causing playback of the content at a location within the threshold of the target playback time of the content. 20. The method of claim 14, wherein the content is stored in a buffer.
2,400
8,579
8,579
15,277,209
2,447
Mechanisms for identifying a component cluster among a plurality of components in a distributed computing environment are disclosed. Configuration information that corresponds to the plurality of components is accessed. The configuration information includes inter-component communication information. The inter-component communication information between the plurality of components is matched to determine a plurality of pairs of components that communicate with one another. Relationships between the components in the pairs of components are determined. A data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components is generated.
1. A method for identifying a component cluster among a plurality of components in a distributed computing environment, comprising: accessing, by a computing device comprising a processor device, configuration information that corresponds to the plurality of components, the configuration information comprising inter-component communication information; matching the inter-component communication information between the plurality of components to determine a plurality of pairs of components that communicate with one another; determining relationships between components in the pairs of components; and generating a data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components. 2. The method of claim 1 wherein generating the data structure further comprises generating the data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components, wherein each component in the component cluster is directly or indirectly related to each other component in the component cluster. 3. The method of claim 1 further comprising accessing an inventory structure that identifies the plurality of components. 4. The method of claim 3 further comprising: determining a location of a plurality of configuration files based on the inventory structure; and wherein accessing the configuration information that corresponds to the plurality of components comprises accessing, for at least some of the plurality of components, a corresponding configuration file of the plurality of configuration files, the corresponding configuration file comprising corresponding configuration information identifying one or more inter-component communication channels. 5. The method of claim 4 wherein accessing the configuration information that corresponds to the plurality of components further comprises sending, to at least one component, a request for the configuration information, and receiving, in response to the request, the configuration information from the at least one component. 6. The method of claim 1 further comprising: requesting, from at least one component, child component information that identifies child components of the at least one component; receiving, from the at least one component, the child component information; processing the child component information and identifying a child component that is absent from the data structure; and modifying the data structure to identify the child component and to identify that the child component is a child component of the at least one component. 7. The method of claim 1 wherein generating the data structure comprises: generating the data structure to include a plurality of nodes, each node corresponding to one of the components in the component cluster; and generating a plurality of edges, each edge connecting two nodes and identifying a relationship of the plurality of relationships between two components that correspond to the two nodes. 8. The method of claim 7 wherein an edge identifies one of a “SERVES CONTENT FOR,” a “STORES DATA TO,” and an “IS CLUSTERED WITH” relationship. 9. The method of claim 1 further comprising: accessing the data structure; generating, based on the data structure, an image that identifies each component identified in the component cluster, and the relationships between the components in the pairs of components in the component cluster; and presenting the image on a display device. 10. The method of claim 1 further comprising: determining that a particular component has faulted; determining that the particular component is identified in the data structure; determining, based on the data structure, a cluster name associated with the data structure; and presenting on a display device information that indicates that the particular component has faulted, and that identifies the cluster name. 11. The method of claim 10 further comprising presenting on the display device an image that identifies each component identified in the data structure, and the relationships between the pairs of components identified in the data structure. 12. The method of claim 10 further comprising: determining, based on the data structure, that the particular component is one of at least two components in a subset of components that share requests; and presenting on the display device information that indicates processing may be degraded because the particular component has faulted. 13. The method of claim 1 wherein the data structure further identifies, for at least of the components in the component cluster, a component type. 14. The method of claim 1 further comprising: determining a cluster name that identifies the component cluster; presenting the cluster name on a display device; receiving input that contains a new cluster name; and storing the new cluster name in conjunction with the data structure. 15. A computing device, comprising: a memory; a processor device coupled to the memory to: access configuration information that corresponds to a plurality of components, the configuration information comprising inter-component communication information; match the inter-component communication information between the plurality of components to determine a plurality of pairs of components that communicate with one another; determine relationships between the components in the pairs of components; and generate a data structure that identifies a component cluster of the pairs of components and the relationships between the components in the pairs of components. 16. The computing device of claim 15 wherein the processor device is further to: access an inventory structure that identifies the plurality of components; determine a location of a plurality of configuration files based on the inventory structure; and access, for at least some of the plurality of components, a corresponding configuration file of the plurality of configuration files, the corresponding configuration file comprising corresponding configuration information identifying one or more inter-component communication channels. 17. The computing device of claim 15 wherein to generate the data structure the processor device is further to: generate the data structure to include a plurality of nodes, each node corresponding to one of the components in the component cluster; and generate a plurality of edges, each edge connecting two nodes and identifying a relationship of the plurality of relationships between two components that correspond to the two nodes. 18. The computing device of claim 15 wherein the processor device is further to: access the data structure; generate, based on the data structure, an image that identifies each component identified in the component cluster, and the relationships between the components in the pairs of components in the component cluster; and present the image on a display device. 19. A computer program product for identifying a component cluster among a plurality of components in a distributed computing environment, the computer program product stored on a non-transitory computer-readable storage medium and including instructions to cause a processor device to: access configuration information that corresponds to the plurality of components, the configuration information comprising inter-component communication information; match the inter-component communication information between the plurality of components to determine a plurality of pairs of components that communicate with one another; determine relationships between components in the pairs of components; and generate a data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components. 20. The computer program product of claim 19 wherein the instructions are further to cause the processor device to: access an inventory structure that identifies the plurality of components; determine a location of a plurality of configuration files based on the inventory structure; and access, for at least some of the plurality of components, a corresponding configuration file of the plurality of configuration files, the corresponding configuration file comprising corresponding configuration information identifying one or more inter-component communication channels.
Mechanisms for identifying a component cluster among a plurality of components in a distributed computing environment are disclosed. Configuration information that corresponds to the plurality of components is accessed. The configuration information includes inter-component communication information. The inter-component communication information between the plurality of components is matched to determine a plurality of pairs of components that communicate with one another. Relationships between the components in the pairs of components are determined. A data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components is generated.1. A method for identifying a component cluster among a plurality of components in a distributed computing environment, comprising: accessing, by a computing device comprising a processor device, configuration information that corresponds to the plurality of components, the configuration information comprising inter-component communication information; matching the inter-component communication information between the plurality of components to determine a plurality of pairs of components that communicate with one another; determining relationships between components in the pairs of components; and generating a data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components. 2. The method of claim 1 wherein generating the data structure further comprises generating the data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components, wherein each component in the component cluster is directly or indirectly related to each other component in the component cluster. 3. The method of claim 1 further comprising accessing an inventory structure that identifies the plurality of components. 4. The method of claim 3 further comprising: determining a location of a plurality of configuration files based on the inventory structure; and wherein accessing the configuration information that corresponds to the plurality of components comprises accessing, for at least some of the plurality of components, a corresponding configuration file of the plurality of configuration files, the corresponding configuration file comprising corresponding configuration information identifying one or more inter-component communication channels. 5. The method of claim 4 wherein accessing the configuration information that corresponds to the plurality of components further comprises sending, to at least one component, a request for the configuration information, and receiving, in response to the request, the configuration information from the at least one component. 6. The method of claim 1 further comprising: requesting, from at least one component, child component information that identifies child components of the at least one component; receiving, from the at least one component, the child component information; processing the child component information and identifying a child component that is absent from the data structure; and modifying the data structure to identify the child component and to identify that the child component is a child component of the at least one component. 7. The method of claim 1 wherein generating the data structure comprises: generating the data structure to include a plurality of nodes, each node corresponding to one of the components in the component cluster; and generating a plurality of edges, each edge connecting two nodes and identifying a relationship of the plurality of relationships between two components that correspond to the two nodes. 8. The method of claim 7 wherein an edge identifies one of a “SERVES CONTENT FOR,” a “STORES DATA TO,” and an “IS CLUSTERED WITH” relationship. 9. The method of claim 1 further comprising: accessing the data structure; generating, based on the data structure, an image that identifies each component identified in the component cluster, and the relationships between the components in the pairs of components in the component cluster; and presenting the image on a display device. 10. The method of claim 1 further comprising: determining that a particular component has faulted; determining that the particular component is identified in the data structure; determining, based on the data structure, a cluster name associated with the data structure; and presenting on a display device information that indicates that the particular component has faulted, and that identifies the cluster name. 11. The method of claim 10 further comprising presenting on the display device an image that identifies each component identified in the data structure, and the relationships between the pairs of components identified in the data structure. 12. The method of claim 10 further comprising: determining, based on the data structure, that the particular component is one of at least two components in a subset of components that share requests; and presenting on the display device information that indicates processing may be degraded because the particular component has faulted. 13. The method of claim 1 wherein the data structure further identifies, for at least of the components in the component cluster, a component type. 14. The method of claim 1 further comprising: determining a cluster name that identifies the component cluster; presenting the cluster name on a display device; receiving input that contains a new cluster name; and storing the new cluster name in conjunction with the data structure. 15. A computing device, comprising: a memory; a processor device coupled to the memory to: access configuration information that corresponds to a plurality of components, the configuration information comprising inter-component communication information; match the inter-component communication information between the plurality of components to determine a plurality of pairs of components that communicate with one another; determine relationships between the components in the pairs of components; and generate a data structure that identifies a component cluster of the pairs of components and the relationships between the components in the pairs of components. 16. The computing device of claim 15 wherein the processor device is further to: access an inventory structure that identifies the plurality of components; determine a location of a plurality of configuration files based on the inventory structure; and access, for at least some of the plurality of components, a corresponding configuration file of the plurality of configuration files, the corresponding configuration file comprising corresponding configuration information identifying one or more inter-component communication channels. 17. The computing device of claim 15 wherein to generate the data structure the processor device is further to: generate the data structure to include a plurality of nodes, each node corresponding to one of the components in the component cluster; and generate a plurality of edges, each edge connecting two nodes and identifying a relationship of the plurality of relationships between two components that correspond to the two nodes. 18. The computing device of claim 15 wherein the processor device is further to: access the data structure; generate, based on the data structure, an image that identifies each component identified in the component cluster, and the relationships between the components in the pairs of components in the component cluster; and present the image on a display device. 19. A computer program product for identifying a component cluster among a plurality of components in a distributed computing environment, the computer program product stored on a non-transitory computer-readable storage medium and including instructions to cause a processor device to: access configuration information that corresponds to the plurality of components, the configuration information comprising inter-component communication information; match the inter-component communication information between the plurality of components to determine a plurality of pairs of components that communicate with one another; determine relationships between components in the pairs of components; and generate a data structure that identifies the component cluster of the pairs of components and the relationships between the components in the pairs of components. 20. The computer program product of claim 19 wherein the instructions are further to cause the processor device to: access an inventory structure that identifies the plurality of components; determine a location of a plurality of configuration files based on the inventory structure; and access, for at least some of the plurality of components, a corresponding configuration file of the plurality of configuration files, the corresponding configuration file comprising corresponding configuration information identifying one or more inter-component communication channels.
2,400
8,580
8,580
15,111,778
2,438
A system and method for authenticating one or more devices to access a secure resource utilizing device trait characteristics and user identification. Embodiments of the present invention include a multiple device authentication system ( 100 ), a direct mode authentication system using an access code ( 200 ), a direct mode authorization system ( 300 ), a direct mode authentication binding using tap to login ( 500 ), direct mode authentication binding system—single device login ( 600 ), direct mode login after binding ( 700 ), and single device login using a web browser or access application ( 800 ). Example disclosed embodiments include: obtaining user information about a user of a hardware device, authenticating the user from the user information, obtaining a hardware profile of the device, where the hardware profile includes user generated data stored on the device, and linking the user information and the hardware profile as a combined electronic identification.
1. A method for a user having a first device to authorize a second device, the method comprising: accessing a first server with the first device; requesting with the first device authorization for the second device from the first server; receiving an authorization code from the first server on the first device; transmitting the authorization code from the first device to the second device; transmitting the authorization code to a second server with the second device the so that the second server can authenticate the second device; and receiving a notice that the second device has been authenticated. 2. The method of claim 1, wherein the first and second servers are the same server. 3. The method of claim 1, wherein the first device is authorized. 4. The method of claim 1, the method further comprising: transmitting said first device trait characteristics from the first device to one of the servers; and transmitting said second device trait characteristics from the second device to one of the servers, wherein the first device and second device have a hardware profile, further comprising comparing of the hardware profiles of the first device and second device, wherein the second server can authenticate the second device if the comparison is within an allowed tolerance. 5. The method of claim 4, wherein the first device trait characteristics are salted with the user identification code and/or user information, and the second device trait characteristics are salted with the user identification code and/or user information. 6. The method of claim 5, wherein the first device or second device is salted with the user identification code in combination with the group consisting of: a password, PIN, user biometric information, or image code information. 7. A computer implemented system for authorizing a second device for a user having a first authorized device comprising: receiving a request from the first device for an authorization code for the second device; transmitting the authorization code to the first device; receiving the authorization code from the second device; authenticating the second device; and transmitting a notice that the second device has been authenticated. 8. The system according to claim 7, further comprising a computer or memory device having a program for performing: receiving a request, transmitting the authorization code, receiving the authorization code from the second device, authenticating the second device, and transmitting a notice. 9. A method for accessing a secure resource on a resource server, the method comprising: accessing a login page for the secure resource with a second device, the second device being a non-authenticated device, the login page providing an option to access an authentication server; selecting the option to access the authentication server with the second device; receiving on the second device an access code from the authentication server; transferring the access code to a first device, the first device being authenticated by the authentication server before or after receiving the access code; transferring the access code with the first device to the authentication server for generation of an authorization code by the authentication server; receiving on the second device the authorization code for transfer to the resource server; and after said authorization code is received on the second device, accessing the secure resource with the second device. 10. A method for providing a user access to a secure resource on a resource server with a second device that is not authenticated, the method comprising: transmitting to the second device an access code from an authentication server; authenticating a first device; after authenticating said first device, receiving the access code on the authentication server from the first authenticated device; generating on the authentication server an authorization code; transmitting the authorization code from the authentication server to the second device. 11. The method according to claim 10, the method further comprising: receiving on the resource server the authorization code from the second device; and providing access to the second device to the secure resource. 12. The method of claim 11, the method further comprising: transferring the authorization code from the resource server to the authentication server and generating a token on the authentication server. 13. The method of claim 12, the method further comprising transferring the token to the resource server. 14. The method of claim 11 or 13, wherein the first device is authorized for access to the secure resource. 15. A system for performing the method of any one of the features 11-13, wherein the resource server is programmed to perform all the acts specified; and the authentication server programmed to perform all the acts specified. 16. A method for accessing a secure resource on a resource server, the method comprising: accessing a login page for the secure resource with a second device, the second device being a non-authenticated device, the login page providing an option to access an authentication server; selecting the option to access the authentication server with the second device; receiving on the second device a login page from the authentication server and entering a credential to request login; confirming the login request with the first device, the first device having been authenticated, to the authentication server for generation of an authorization code by the authentication server; receiving on the second device the authorization code for transfer to the resource server; and after receiving on the second device the authorization code, accessing the secure resource with the second device. 17. A method for accessing a secure resource on a resource server, the method comprising: accessing a login page for the secure resource with an authenticated device, the login page providing an option to access an authentication server; selecting the option to access the authentication server; receiving on the device a login page from the authentication server and entering a credential to request login; confirming the login request with the device, to the authentication server for generation of an authorization code by the authentication server; receiving on the device the authorization code for transfer to the resource server; and after receiving on the device the authorization code, accessing the secure resource with the device. 18. A method of providing user access to a secure resource on a resource server with a second device that is not authenticated, the method comprising: transmitting to the second device an access code from an authentication server; authenticating a first device; after authenticating said first device, receiving the access code on the authentication server from the first authenticated device; generating on the authentication server an authorization code; and transmitting the authorization code from the authentication server to the second device. 19. The method of claim 18, the method further comprising: receiving on the resource server the authorization code from the second device; and providing the second device access to the secure resource. 20. The method of claim 19, the method further comprising: transferring the authorization code from the resource server to the authentication server and generating a token on the authentication server. 21. The method of claim 20, the method further comprising: transferring the token to the resource server. 22. The method of claim 18 or 21, wherein the first device is authorized for access to the secure resource. 23. A system for performing the method of any one of features 18-22, wherein the resource server is programmed to perform all the acts specified; and the authentication server is programmed to perform all the acts specified. 24. A method to access a secure resource on a resource server, the method comprising: a) requesting access to the secure resource with a web site browser on a device and receiving a login page from an authentication server on the device; b) using the login page, requesting access to the secure resource and transmitting the access request to an authentication application on the device; c) using the device authentication application, authenticating the device with an authentication server; d) receiving an authorization code on the device from the authentication server; e) transmitting the authorization code to the resource server for transmission to the authentication server; and f) accessing the secure resource with the device browser. 25. The method of claim 24, wherein the act of transmitting the access request to an authentication application on the device occurs automatically. 26. The method of claim 24 or 25, wherein steps (c)-(e) occur automatically. 27. A method to access a secure resource on a resource server, the method comprising: (a) requesting access to the secure resource with an access application on a device and receiving a login page from an authentication server on the device; (b) using the login page, requesting access to the secure resource and transmitting the access request to an authentication application on the device; (c) authenticating the device with the authentication server; (d) receiving an authorization code on the device from the authentication server; (e) transmitting the authorization code to the resource server for transmission to the authentication server; and (f) accessing the secure resource with the device access application. 28. A method to provide access to a secure resource server, the method comprising: (a) receiving on the resource server a request for access to the secure resource from a device and in response thereto transmitting a login page from an authentication server to the device; (b) receiving from the device on the authentication server an authentication request and if the device is authenticated, in response thereto providing an authorization code; (c) receiving from the device the authorization code on the resource server; (d) granting to the device access to the secure resource. 29. The method of claim 28, wherein the authentication server and the resource server are programmed for performing their respective acts. 30. The method of claim 24 or 27, wherein the authentication application performs the acts of: (a) transmitting device trait characteristics and a user ID to an authentication server and receiving an authentication response and authorization code from the authentication server; and (b) passing the authorization code to a web site browser or access application on the device. 31. The method of claim 28 or 29, wherein the act of transmitting the access request to an authentication application on the device occurs automatically. 32. The method of claim 27, wherein steps (c)-(e) occur automatically. 33. The method of claim 28, wherein in response to the authentication request, if the device is authenticated, generating and storing a user ID to allow access to the secure resource with the device. 34. A method accessing a secure resource on a resource server, the method comprising: (a) authenticating a device by transmitting device trait characteristics and a user identification to an authentication server; (b) receiving from the authentication server on the authenticated device a list of secure resources; (c) using the authenticated device to request from the authentication server access to at least one of the secure resources; (d) receiving on the authenticated device from the authentication server an authorization code; (e) transmitting to the resource server hosting the requested secure resource the authorization code; and (f) after step (e), accessing the requested secure resource. 35. A method of providing to a device access to a secure resource on a resource server, the method comprising: (a) receiving on an authentication server from the device, device trait characteristics and a user identification; (b) determining if the device is a registered device and if it is, transmitting to the device a list of accessible secure resources and an authorization code; (c) receiving on the resource server from the device the authorization code; and (d) providing to the device access to the secure resource. 36. The method for performing the method of claim 35, wherein the authentication server and the resource server programmed to perform the acts of claim 35. 37. A method to provide access to a secure resource server, the method comprising: presenting a client website login page on a device web browser or access application; sending a login request from device web browser or access application to an authentication server, wherein said login request is sent automatically; redirecting the login request to the authentication server; sending from the device, an authentication request to the authentication server; determining if authentication is successful; associating, if authentication was successful, a User ID or a Device ID from said device with the browser application or the access application; passing authorization code from authentication application on the first device to the web browser or access application wherein the device has the web browser application or access application installed on the device; utilization of the redirect URI and authorization code by the device website browser or access application; passing redirect URI and authorization code to the resource server; passing authorization code from resource server to authentication server; returning an access token from authentication server to resource server, whereby said resource server exchanges an authorization code for an access token; granting, by the resource server, a device website browser or access application access to the secure resource.
A system and method for authenticating one or more devices to access a secure resource utilizing device trait characteristics and user identification. Embodiments of the present invention include a multiple device authentication system ( 100 ), a direct mode authentication system using an access code ( 200 ), a direct mode authorization system ( 300 ), a direct mode authentication binding using tap to login ( 500 ), direct mode authentication binding system—single device login ( 600 ), direct mode login after binding ( 700 ), and single device login using a web browser or access application ( 800 ). Example disclosed embodiments include: obtaining user information about a user of a hardware device, authenticating the user from the user information, obtaining a hardware profile of the device, where the hardware profile includes user generated data stored on the device, and linking the user information and the hardware profile as a combined electronic identification.1. A method for a user having a first device to authorize a second device, the method comprising: accessing a first server with the first device; requesting with the first device authorization for the second device from the first server; receiving an authorization code from the first server on the first device; transmitting the authorization code from the first device to the second device; transmitting the authorization code to a second server with the second device the so that the second server can authenticate the second device; and receiving a notice that the second device has been authenticated. 2. The method of claim 1, wherein the first and second servers are the same server. 3. The method of claim 1, wherein the first device is authorized. 4. The method of claim 1, the method further comprising: transmitting said first device trait characteristics from the first device to one of the servers; and transmitting said second device trait characteristics from the second device to one of the servers, wherein the first device and second device have a hardware profile, further comprising comparing of the hardware profiles of the first device and second device, wherein the second server can authenticate the second device if the comparison is within an allowed tolerance. 5. The method of claim 4, wherein the first device trait characteristics are salted with the user identification code and/or user information, and the second device trait characteristics are salted with the user identification code and/or user information. 6. The method of claim 5, wherein the first device or second device is salted with the user identification code in combination with the group consisting of: a password, PIN, user biometric information, or image code information. 7. A computer implemented system for authorizing a second device for a user having a first authorized device comprising: receiving a request from the first device for an authorization code for the second device; transmitting the authorization code to the first device; receiving the authorization code from the second device; authenticating the second device; and transmitting a notice that the second device has been authenticated. 8. The system according to claim 7, further comprising a computer or memory device having a program for performing: receiving a request, transmitting the authorization code, receiving the authorization code from the second device, authenticating the second device, and transmitting a notice. 9. A method for accessing a secure resource on a resource server, the method comprising: accessing a login page for the secure resource with a second device, the second device being a non-authenticated device, the login page providing an option to access an authentication server; selecting the option to access the authentication server with the second device; receiving on the second device an access code from the authentication server; transferring the access code to a first device, the first device being authenticated by the authentication server before or after receiving the access code; transferring the access code with the first device to the authentication server for generation of an authorization code by the authentication server; receiving on the second device the authorization code for transfer to the resource server; and after said authorization code is received on the second device, accessing the secure resource with the second device. 10. A method for providing a user access to a secure resource on a resource server with a second device that is not authenticated, the method comprising: transmitting to the second device an access code from an authentication server; authenticating a first device; after authenticating said first device, receiving the access code on the authentication server from the first authenticated device; generating on the authentication server an authorization code; transmitting the authorization code from the authentication server to the second device. 11. The method according to claim 10, the method further comprising: receiving on the resource server the authorization code from the second device; and providing access to the second device to the secure resource. 12. The method of claim 11, the method further comprising: transferring the authorization code from the resource server to the authentication server and generating a token on the authentication server. 13. The method of claim 12, the method further comprising transferring the token to the resource server. 14. The method of claim 11 or 13, wherein the first device is authorized for access to the secure resource. 15. A system for performing the method of any one of the features 11-13, wherein the resource server is programmed to perform all the acts specified; and the authentication server programmed to perform all the acts specified. 16. A method for accessing a secure resource on a resource server, the method comprising: accessing a login page for the secure resource with a second device, the second device being a non-authenticated device, the login page providing an option to access an authentication server; selecting the option to access the authentication server with the second device; receiving on the second device a login page from the authentication server and entering a credential to request login; confirming the login request with the first device, the first device having been authenticated, to the authentication server for generation of an authorization code by the authentication server; receiving on the second device the authorization code for transfer to the resource server; and after receiving on the second device the authorization code, accessing the secure resource with the second device. 17. A method for accessing a secure resource on a resource server, the method comprising: accessing a login page for the secure resource with an authenticated device, the login page providing an option to access an authentication server; selecting the option to access the authentication server; receiving on the device a login page from the authentication server and entering a credential to request login; confirming the login request with the device, to the authentication server for generation of an authorization code by the authentication server; receiving on the device the authorization code for transfer to the resource server; and after receiving on the device the authorization code, accessing the secure resource with the device. 18. A method of providing user access to a secure resource on a resource server with a second device that is not authenticated, the method comprising: transmitting to the second device an access code from an authentication server; authenticating a first device; after authenticating said first device, receiving the access code on the authentication server from the first authenticated device; generating on the authentication server an authorization code; and transmitting the authorization code from the authentication server to the second device. 19. The method of claim 18, the method further comprising: receiving on the resource server the authorization code from the second device; and providing the second device access to the secure resource. 20. The method of claim 19, the method further comprising: transferring the authorization code from the resource server to the authentication server and generating a token on the authentication server. 21. The method of claim 20, the method further comprising: transferring the token to the resource server. 22. The method of claim 18 or 21, wherein the first device is authorized for access to the secure resource. 23. A system for performing the method of any one of features 18-22, wherein the resource server is programmed to perform all the acts specified; and the authentication server is programmed to perform all the acts specified. 24. A method to access a secure resource on a resource server, the method comprising: a) requesting access to the secure resource with a web site browser on a device and receiving a login page from an authentication server on the device; b) using the login page, requesting access to the secure resource and transmitting the access request to an authentication application on the device; c) using the device authentication application, authenticating the device with an authentication server; d) receiving an authorization code on the device from the authentication server; e) transmitting the authorization code to the resource server for transmission to the authentication server; and f) accessing the secure resource with the device browser. 25. The method of claim 24, wherein the act of transmitting the access request to an authentication application on the device occurs automatically. 26. The method of claim 24 or 25, wherein steps (c)-(e) occur automatically. 27. A method to access a secure resource on a resource server, the method comprising: (a) requesting access to the secure resource with an access application on a device and receiving a login page from an authentication server on the device; (b) using the login page, requesting access to the secure resource and transmitting the access request to an authentication application on the device; (c) authenticating the device with the authentication server; (d) receiving an authorization code on the device from the authentication server; (e) transmitting the authorization code to the resource server for transmission to the authentication server; and (f) accessing the secure resource with the device access application. 28. A method to provide access to a secure resource server, the method comprising: (a) receiving on the resource server a request for access to the secure resource from a device and in response thereto transmitting a login page from an authentication server to the device; (b) receiving from the device on the authentication server an authentication request and if the device is authenticated, in response thereto providing an authorization code; (c) receiving from the device the authorization code on the resource server; (d) granting to the device access to the secure resource. 29. The method of claim 28, wherein the authentication server and the resource server are programmed for performing their respective acts. 30. The method of claim 24 or 27, wherein the authentication application performs the acts of: (a) transmitting device trait characteristics and a user ID to an authentication server and receiving an authentication response and authorization code from the authentication server; and (b) passing the authorization code to a web site browser or access application on the device. 31. The method of claim 28 or 29, wherein the act of transmitting the access request to an authentication application on the device occurs automatically. 32. The method of claim 27, wherein steps (c)-(e) occur automatically. 33. The method of claim 28, wherein in response to the authentication request, if the device is authenticated, generating and storing a user ID to allow access to the secure resource with the device. 34. A method accessing a secure resource on a resource server, the method comprising: (a) authenticating a device by transmitting device trait characteristics and a user identification to an authentication server; (b) receiving from the authentication server on the authenticated device a list of secure resources; (c) using the authenticated device to request from the authentication server access to at least one of the secure resources; (d) receiving on the authenticated device from the authentication server an authorization code; (e) transmitting to the resource server hosting the requested secure resource the authorization code; and (f) after step (e), accessing the requested secure resource. 35. A method of providing to a device access to a secure resource on a resource server, the method comprising: (a) receiving on an authentication server from the device, device trait characteristics and a user identification; (b) determining if the device is a registered device and if it is, transmitting to the device a list of accessible secure resources and an authorization code; (c) receiving on the resource server from the device the authorization code; and (d) providing to the device access to the secure resource. 36. The method for performing the method of claim 35, wherein the authentication server and the resource server programmed to perform the acts of claim 35. 37. A method to provide access to a secure resource server, the method comprising: presenting a client website login page on a device web browser or access application; sending a login request from device web browser or access application to an authentication server, wherein said login request is sent automatically; redirecting the login request to the authentication server; sending from the device, an authentication request to the authentication server; determining if authentication is successful; associating, if authentication was successful, a User ID or a Device ID from said device with the browser application or the access application; passing authorization code from authentication application on the first device to the web browser or access application wherein the device has the web browser application or access application installed on the device; utilization of the redirect URI and authorization code by the device website browser or access application; passing redirect URI and authorization code to the resource server; passing authorization code from resource server to authentication server; returning an access token from authentication server to resource server, whereby said resource server exchanges an authorization code for an access token; granting, by the resource server, a device website browser or access application access to the secure resource.
2,400
8,581
8,581
14,782,251
2,468
Embodiments contemplate enhanced physical downlink control channel (EPDCCH). A user equipment (UE) or a wireless transmit/receive unit (WTRU) may receive a first type (e.g., type 1) EPDCCH common search space (CSS) subframe for example is a subset of subframes. The UE or WTRU may monitor first type downlink control information (DCI), for example perhaps within the first type EPDCCH CSS subframe, among other scenarios. A broadcast channel (e.g. MIB) may be received in the first type EPDCCH CSS. The UE or the WTRU may receive configuration information for a second type (e.g., type 2) EPDCCH CSS, for example from the first type EPDCCH CSS. A system information block (SIB) may be received in the second type EPDCCH CSS. The UE or the WTRU may monitor a second type DCI, for example perhaps in the second type EPDCCH CSS.
1. A method for providing enhanced physical downlink control channel (EPDCCH), the method comprising: receiving, by a wireless transmit/receive unit (WTRU), an EPDCCH common search space (CSS) configuration, the EPDCCH CSS configuration including a designation of one or more subframes; identifying, by the WTRU, a first subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the first subset of subframes corresponding to a first type EPDCCH CSS, the EPDCCH CSS configuration further including a designation of a first information corresponding to the first type EPDCCH CSS; identifying, by the WTRU, a second subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the second subset of subframes corresponding to a second type EPDCCH CSS; and monitoring the first subset of subframes for the first information. 2. The method of claim 1, wherein the receiving the EPDCCH CSS configuration includes: receiving an indication of the first subset of subframes of the one or more subframes from a Master Information Block (MIB) via a Physical Broadcast Control Channel (PBCH); and receiving an indication of the second subset of subframes of the one or more subframes from a System Information Block (SIB). 3. The method of claim 1, wherein the the EPDCCH CSS configuration further includes a designation of a second information corresponding to the second type EPDCCH CSS, the method further comprising: monitoring the second subset of subframes for the second information. 4. The method of claim 1, wherein the monitoring the first subset of subframes for the first information includes monitoring a first type downlink control information (DCI). 5. The method of claim 4, wherein the first type of DCI is scrambled with a System Information Radio Network Temporary Identifier (SI-RNTI). 6. The method of claim 3, wherein the monitoring the second subset of subframes for the second information includes monitoring a second type downlink control information (DCI). 7. The method of claim 6, wherein the second type of DCI is scrambled with at least one of: a Random Access Radio Network Temporary Identifier (RA-RNTI), a Paging Radio Network Temporary Identifier (P-RNTI), Transmit Power Control-Physical Uplink Control Channel Radio Network Temporary Identifier (TPC-PUCCH-RNTI), or a Transmit Power Control-Physical Uplink Shared Channel Radio Network Temporary Identifier (TPC-PUSCH-RNTI). 8. The method of claim 1, wherein the monitoring the first subset of subframes for the first information includes common reference signal (CRS) demodulation. 9. The method of claim 3, wherein the monitoring the first subset of subframes for the first information includes demodulation reference signal (DM-RS) demodulation. 10. The method of claim 1, wherein the monitoring the first subset of subframes for the first information includes obtaining system information related to a Master Information Block (MIB). 11. The method of claim 3, wherein the monitoring the first subset of subframes for the first information includes obtaining system information related to a System Information Block (SIB). 12. The method of claim 4, wherein the monitoring the first subset of subframes for the first information includes monitoring system information that includes at least one of: encoding with a tail-biting convolution code or an attached sixteen bit cyclic redundancy check (CRC). 13. The method of claim 12, wherein the sixteen bit CRC is scrambled with a Master Information Block (MIB) specific Radio Network Temporary Identifier (RNTI). 14. The method of claim 4, wherein the monitoring the first subset of subframes for the first information includes monitoring a predefined time location in the first type EPDCCH CSS. 15. The method of claim 4, wherein the monitoring the first subset of subframes for the first information includes monitoring a predefined frequency location in the first type EPDCCH CSS. 16.-25. (canceled) 26. A wireless transmit/receive unit (WTRU), comprising: a receiver, the receiver configured at least to: receive an enhanced physical downlink control channel (EPDCCH) common search space (CSS) configuration, the EPDCCH CSS configuration including a designation of one or more subframes; and a processor, the processor configured at least to: identify a first subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the first subset of subframes corresponding to a first type EPDCCH CSS, the EPDCCH CSS configuration further including a designation of a first information corresponding to the first type EPDCCH CSS; identify a second subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the second subset of subframes corresponding to a second type EPDCCH CSS; and monitor the first subset of subframes for the first information. 27. The WTRU of claim 26, wherein the receiver is further configured such that the receiving the EPDCCH CSS configuration includes: receiving an indication of the first subset of subframes of the one or more subframes from a Master Information Block (MIB) via a Physical Broadcast Control Channel (PBCH); and receiving an indication of the second subset of subframes of the one or more subframes from a System Information Block (SIB). 28. The WTRU of claim 26, wherein the the EPDCCH CSS configuration further includes a designation of a second information corresponding to the second type EPDCCH CSS, the processor being further configured to: monitor the second subset of subframes for the second information. 29. The WTRU of claim 26, wherein the processor is further configured such that the monitoring the first subset of subframes for the first information includes monitoring a first type downlink control information (DCI). 30. The WTRU of claim 28, wherein the processor is further configured such that the monitoring the second subset of subframes for the second information includes monitoring a second type downlink control information (DCI).
Embodiments contemplate enhanced physical downlink control channel (EPDCCH). A user equipment (UE) or a wireless transmit/receive unit (WTRU) may receive a first type (e.g., type 1) EPDCCH common search space (CSS) subframe for example is a subset of subframes. The UE or WTRU may monitor first type downlink control information (DCI), for example perhaps within the first type EPDCCH CSS subframe, among other scenarios. A broadcast channel (e.g. MIB) may be received in the first type EPDCCH CSS. The UE or the WTRU may receive configuration information for a second type (e.g., type 2) EPDCCH CSS, for example from the first type EPDCCH CSS. A system information block (SIB) may be received in the second type EPDCCH CSS. The UE or the WTRU may monitor a second type DCI, for example perhaps in the second type EPDCCH CSS.1. A method for providing enhanced physical downlink control channel (EPDCCH), the method comprising: receiving, by a wireless transmit/receive unit (WTRU), an EPDCCH common search space (CSS) configuration, the EPDCCH CSS configuration including a designation of one or more subframes; identifying, by the WTRU, a first subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the first subset of subframes corresponding to a first type EPDCCH CSS, the EPDCCH CSS configuration further including a designation of a first information corresponding to the first type EPDCCH CSS; identifying, by the WTRU, a second subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the second subset of subframes corresponding to a second type EPDCCH CSS; and monitoring the first subset of subframes for the first information. 2. The method of claim 1, wherein the receiving the EPDCCH CSS configuration includes: receiving an indication of the first subset of subframes of the one or more subframes from a Master Information Block (MIB) via a Physical Broadcast Control Channel (PBCH); and receiving an indication of the second subset of subframes of the one or more subframes from a System Information Block (SIB). 3. The method of claim 1, wherein the the EPDCCH CSS configuration further includes a designation of a second information corresponding to the second type EPDCCH CSS, the method further comprising: monitoring the second subset of subframes for the second information. 4. The method of claim 1, wherein the monitoring the first subset of subframes for the first information includes monitoring a first type downlink control information (DCI). 5. The method of claim 4, wherein the first type of DCI is scrambled with a System Information Radio Network Temporary Identifier (SI-RNTI). 6. The method of claim 3, wherein the monitoring the second subset of subframes for the second information includes monitoring a second type downlink control information (DCI). 7. The method of claim 6, wherein the second type of DCI is scrambled with at least one of: a Random Access Radio Network Temporary Identifier (RA-RNTI), a Paging Radio Network Temporary Identifier (P-RNTI), Transmit Power Control-Physical Uplink Control Channel Radio Network Temporary Identifier (TPC-PUCCH-RNTI), or a Transmit Power Control-Physical Uplink Shared Channel Radio Network Temporary Identifier (TPC-PUSCH-RNTI). 8. The method of claim 1, wherein the monitoring the first subset of subframes for the first information includes common reference signal (CRS) demodulation. 9. The method of claim 3, wherein the monitoring the first subset of subframes for the first information includes demodulation reference signal (DM-RS) demodulation. 10. The method of claim 1, wherein the monitoring the first subset of subframes for the first information includes obtaining system information related to a Master Information Block (MIB). 11. The method of claim 3, wherein the monitoring the first subset of subframes for the first information includes obtaining system information related to a System Information Block (SIB). 12. The method of claim 4, wherein the monitoring the first subset of subframes for the first information includes monitoring system information that includes at least one of: encoding with a tail-biting convolution code or an attached sixteen bit cyclic redundancy check (CRC). 13. The method of claim 12, wherein the sixteen bit CRC is scrambled with a Master Information Block (MIB) specific Radio Network Temporary Identifier (RNTI). 14. The method of claim 4, wherein the monitoring the first subset of subframes for the first information includes monitoring a predefined time location in the first type EPDCCH CSS. 15. The method of claim 4, wherein the monitoring the first subset of subframes for the first information includes monitoring a predefined frequency location in the first type EPDCCH CSS. 16.-25. (canceled) 26. A wireless transmit/receive unit (WTRU), comprising: a receiver, the receiver configured at least to: receive an enhanced physical downlink control channel (EPDCCH) common search space (CSS) configuration, the EPDCCH CSS configuration including a designation of one or more subframes; and a processor, the processor configured at least to: identify a first subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the first subset of subframes corresponding to a first type EPDCCH CSS, the EPDCCH CSS configuration further including a designation of a first information corresponding to the first type EPDCCH CSS; identify a second subset of subframes of the one or more subframes based on the EPDCCH CSS configuration, the second subset of subframes corresponding to a second type EPDCCH CSS; and monitor the first subset of subframes for the first information. 27. The WTRU of claim 26, wherein the receiver is further configured such that the receiving the EPDCCH CSS configuration includes: receiving an indication of the first subset of subframes of the one or more subframes from a Master Information Block (MIB) via a Physical Broadcast Control Channel (PBCH); and receiving an indication of the second subset of subframes of the one or more subframes from a System Information Block (SIB). 28. The WTRU of claim 26, wherein the the EPDCCH CSS configuration further includes a designation of a second information corresponding to the second type EPDCCH CSS, the processor being further configured to: monitor the second subset of subframes for the second information. 29. The WTRU of claim 26, wherein the processor is further configured such that the monitoring the first subset of subframes for the first information includes monitoring a first type downlink control information (DCI). 30. The WTRU of claim 28, wherein the processor is further configured such that the monitoring the second subset of subframes for the second information includes monitoring a second type downlink control information (DCI).
2,400
8,582
8,582
14,880,992
2,448
Techniques for forming groups of employees for receiving online content broadcasted by company administrators via an online social networking service are described. According to various embodiments, a plurality of content items is displayed, via an administrator user interface, to a user associated with a company. Thereafter, a user specification of a topic-based group is received together with a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group. The employees of the company that are associated with the topic-based group are then identified, and the recommendation to view the specific content item is broadcasted to the employees of the company that are associated with the topic-based group.
1. A method comprising: displaying, via an administrator user interface, to a user associated with a company, a plurality of content items; receiving, via the administrator user interface, a user specification of a topic-based group and a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group; identifying the one or more employees of the company that are associated with the topic-based group; and broadcasting the recommendation to view the specific content item to the one or more employees of the company that are associated with the topic-based group. 2. The method of claim 1, wherein the receiving of the user request further comprises: displaying, via the administrator user interface, indicia of multiple topic-based groups; and receiving, via the administrator user interface, a user selection of a first one of the indicia associated with the topic-based group. 3. The method of claim 1, further comprising associating an employee of the company with the topic-based group by: displaying, via an employee user interface displayed on a mobile device associated with the employee, a list of topic-based groups; receiving, via the employee user interface, a user selection of the topic-based group; and associating the employee with the selected topic-based group. 4. The method of claim 1, wherein the topic-based group is associated with a particular genre or topic. 5. The method of claim 1, further comprising associating an employee of the company with the topic-based group by: receiving, via the administrator user interface, a user specification of the topic-based group and attribute values for one or more member profile attributes; identifying a set of employees of the company on the online social networking service that are associated with the user-specified attribute values; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 6. The method of claim 5, further comprising: receiving, via an employee user interface displayed on a device associated with a specific employee of the identified set of employees, a request to join the topic-based group; and associating the specific employee with the topic-based group. 7. The method of claim 5, wherein the member profile attributes include at least one of age, location, industry, current job, employer, experience, skills, education, school, groups, company, Influencers, endorsements, seniority level, company size, connection count, and connection identities. 8. The method of claim 1, further comprising associating an employee of the company with the topic-based group by: identifying a set of employees of the company on the online social networking service that have an inferred interest in the topic-based group, based on member profile attributes of the set of employees; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 9. The method of claim 8, further comprising: receiving, via an employee user interface displayed on a device associated with a specific employee of the identified set of employees, a request to join the topic-based group; and associating the specific employee with the topic-based group. 10. The method of claim 8, wherein the member profile attributes include at least one of age, location, industry, current job, employer, experience, skills, education, school, groups, company, Influencers, endorsements, seniority level, company size, connection count, and connection identities. 11. A system comprising: a processor; and a memory device holding an instruction set executable on the processor to cause the system to perform operations comprising: displaying, via an administrator user interface, to a user associated with a company, a plurality of content items; receiving, via the administrator user interface, a user specification of a topic-based group and a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group; identifying the one or more employees of the company that are associated with the topic-based group; and broadcasting the recommendation to view the specific content item to the one or more employees of the company that are associated with the topic-based group. 12. The system of claim 11, wherein the receiving of the user request further comprises: displaying, via the administrator user interface, indicia of multiple topic-based groups; and receiving, via the administrator user interface, a user selection of a first one of the indicia associated with the topic-based group. 13. The system of claim 11, wherein the operations further comprise associating an employee of the company with the topic-based group by: displaying, via an employee user interface displayed on a mobile device associated with the employee, a list of topic-based groups; receiving, via the employee user interface, a user selection of the topic-based group; and associating the employee with the selected topic-based group. 14. The system of claim 11, wherein the operations further comprise associating an employee of the company with the topic-based group by: receiving, via the administrator user interface, a user specification of the topic-based group and attribute values for one or more member profile attributes; identifying a set of employees of the company on the online social networking service that are associated with the user-specified attribute values; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 15. The system of claim 11, wherein the operations further comprise associating an employee of the company with the topic-based group by: identifying a set of employees of the company on the online social networking service that have an inferred interest in the topic-based group, based on member profile attributes of the set of employees; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 16. A non-transitory machine-readable storage medium comprising instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising: displaying, via an administrator user interface, to a user associated with a company, a plurality of content items; receiving, via the administrator user interface, a user specification of a topic-based group and a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group; identifying the one or more employees of the company that are associated with the topic-based group; and broadcasting the recommendation to view the specific content item to the one or more employees of the company that are associated with the topic-based group. 17. The storage medium of claim 16, wherein the receiving of the user request further comprises: displaying, via the administrator user interface, indicia of multiple topic-based groups; and receiving, via the administrator user interface, a user selection of a first one of the indicia associated with the topic-based group. 18. The storage medium of claim 16, wherein the operations further comprise associating an employee of the company with the topic-based group by: displaying, via an employee user interface displayed on a mobile device associated with the employee, a list of topic-based groups; receiving, via the employee user interface, a user selection of the topic-based group; and associating the employee with the selected topic-based group. 19. The storage medium of claim 16, wherein the operations further comprise associating an employee of the company with the topic-based group by: receiving, via the administrator user interface, a user specification of the topic-based group and attribute values for one or more member profile attributes; identifying a set of employees of the company on the online social networking service that are associated with the user-specified attribute values; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 20. The storage medium of claim 16, wherein the operations further comprise associating an employee of the company with the topic-based group by: identifying a set of employees of the company on the online social networking service that have an inferred interest in the topic-based group, based on member profile attributes of the set of employees; and transmitting a notification to the identified set of employees prompting them to join the topic-based group.
Techniques for forming groups of employees for receiving online content broadcasted by company administrators via an online social networking service are described. According to various embodiments, a plurality of content items is displayed, via an administrator user interface, to a user associated with a company. Thereafter, a user specification of a topic-based group is received together with a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group. The employees of the company that are associated with the topic-based group are then identified, and the recommendation to view the specific content item is broadcasted to the employees of the company that are associated with the topic-based group.1. A method comprising: displaying, via an administrator user interface, to a user associated with a company, a plurality of content items; receiving, via the administrator user interface, a user specification of a topic-based group and a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group; identifying the one or more employees of the company that are associated with the topic-based group; and broadcasting the recommendation to view the specific content item to the one or more employees of the company that are associated with the topic-based group. 2. The method of claim 1, wherein the receiving of the user request further comprises: displaying, via the administrator user interface, indicia of multiple topic-based groups; and receiving, via the administrator user interface, a user selection of a first one of the indicia associated with the topic-based group. 3. The method of claim 1, further comprising associating an employee of the company with the topic-based group by: displaying, via an employee user interface displayed on a mobile device associated with the employee, a list of topic-based groups; receiving, via the employee user interface, a user selection of the topic-based group; and associating the employee with the selected topic-based group. 4. The method of claim 1, wherein the topic-based group is associated with a particular genre or topic. 5. The method of claim 1, further comprising associating an employee of the company with the topic-based group by: receiving, via the administrator user interface, a user specification of the topic-based group and attribute values for one or more member profile attributes; identifying a set of employees of the company on the online social networking service that are associated with the user-specified attribute values; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 6. The method of claim 5, further comprising: receiving, via an employee user interface displayed on a device associated with a specific employee of the identified set of employees, a request to join the topic-based group; and associating the specific employee with the topic-based group. 7. The method of claim 5, wherein the member profile attributes include at least one of age, location, industry, current job, employer, experience, skills, education, school, groups, company, Influencers, endorsements, seniority level, company size, connection count, and connection identities. 8. The method of claim 1, further comprising associating an employee of the company with the topic-based group by: identifying a set of employees of the company on the online social networking service that have an inferred interest in the topic-based group, based on member profile attributes of the set of employees; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 9. The method of claim 8, further comprising: receiving, via an employee user interface displayed on a device associated with a specific employee of the identified set of employees, a request to join the topic-based group; and associating the specific employee with the topic-based group. 10. The method of claim 8, wherein the member profile attributes include at least one of age, location, industry, current job, employer, experience, skills, education, school, groups, company, Influencers, endorsements, seniority level, company size, connection count, and connection identities. 11. A system comprising: a processor; and a memory device holding an instruction set executable on the processor to cause the system to perform operations comprising: displaying, via an administrator user interface, to a user associated with a company, a plurality of content items; receiving, via the administrator user interface, a user specification of a topic-based group and a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group; identifying the one or more employees of the company that are associated with the topic-based group; and broadcasting the recommendation to view the specific content item to the one or more employees of the company that are associated with the topic-based group. 12. The system of claim 11, wherein the receiving of the user request further comprises: displaying, via the administrator user interface, indicia of multiple topic-based groups; and receiving, via the administrator user interface, a user selection of a first one of the indicia associated with the topic-based group. 13. The system of claim 11, wherein the operations further comprise associating an employee of the company with the topic-based group by: displaying, via an employee user interface displayed on a mobile device associated with the employee, a list of topic-based groups; receiving, via the employee user interface, a user selection of the topic-based group; and associating the employee with the selected topic-based group. 14. The system of claim 11, wherein the operations further comprise associating an employee of the company with the topic-based group by: receiving, via the administrator user interface, a user specification of the topic-based group and attribute values for one or more member profile attributes; identifying a set of employees of the company on the online social networking service that are associated with the user-specified attribute values; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 15. The system of claim 11, wherein the operations further comprise associating an employee of the company with the topic-based group by: identifying a set of employees of the company on the online social networking service that have an inferred interest in the topic-based group, based on member profile attributes of the set of employees; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 16. A non-transitory machine-readable storage medium comprising instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising: displaying, via an administrator user interface, to a user associated with a company, a plurality of content items; receiving, via the administrator user interface, a user specification of a topic-based group and a user request to broadcast a recommendation to view a specific content item to one or more employees of the company that are members of an online social networking service and that are associated with the topic-based group; identifying the one or more employees of the company that are associated with the topic-based group; and broadcasting the recommendation to view the specific content item to the one or more employees of the company that are associated with the topic-based group. 17. The storage medium of claim 16, wherein the receiving of the user request further comprises: displaying, via the administrator user interface, indicia of multiple topic-based groups; and receiving, via the administrator user interface, a user selection of a first one of the indicia associated with the topic-based group. 18. The storage medium of claim 16, wherein the operations further comprise associating an employee of the company with the topic-based group by: displaying, via an employee user interface displayed on a mobile device associated with the employee, a list of topic-based groups; receiving, via the employee user interface, a user selection of the topic-based group; and associating the employee with the selected topic-based group. 19. The storage medium of claim 16, wherein the operations further comprise associating an employee of the company with the topic-based group by: receiving, via the administrator user interface, a user specification of the topic-based group and attribute values for one or more member profile attributes; identifying a set of employees of the company on the online social networking service that are associated with the user-specified attribute values; and transmitting a notification to the identified set of employees prompting them to join the topic-based group. 20. The storage medium of claim 16, wherein the operations further comprise associating an employee of the company with the topic-based group by: identifying a set of employees of the company on the online social networking service that have an inferred interest in the topic-based group, based on member profile attributes of the set of employees; and transmitting a notification to the identified set of employees prompting them to join the topic-based group.
2,400
8,583
8,583
15,277,860
2,467
A method of determining video calls involved in a single radio voice call continuity (SRVCC) handover on a wireless communication network. Packet gateway (PGW) call data records (CDRs) are analyzed to determine a number of calls on the wireless communication network that are video calls during a period of time. The PGW CDRs are analyzed to determine a number of video calls involved in an SRVCC handover during the period of time. Based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, a percentage of video calls involved in an SRVCC handover during the period of time is derived.
1. A method of determining video calls involved in a single radio voice call continuity (SRVCC) handover, the method comprising: analyzing, by one or more telephony application servers (TASs) of a wireless communication network, packet gateway (PGW) call data records (CDRs) to determine a number of calls on the wireless communication network that are video calls during a period of time; analyzing, by the one or more TASs, the PGW CDRs to determine a number of video calls involved in an SRVCC handover during the period of time; and based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, deriving a percentage of video calls involved in an SRVCC handover during the period of time. 2. The method of claim 1, further comprising: counting, using one or more counters located within the TASs, a number of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; based upon the counting, deriving a percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; and comparing the percentage of video calls involved in an SRVCC handover during the period of time with the percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time. 3. The method of claim 1, wherein the period of time is one of either (i) daily or (ii) hourly. 4. The method of claim 1, wherein the PGW CDRs comprise data indicating a type of radio access technology (RAT type), data indicating a Quality of Service (QoS) Indicator (QCI) and data indicating a switch from one RAT type to another RAT type. 5. The method of claim 1, wherein at least a portion of the wireless communication network operates according to long term evolution (LTE) protocols. 6. The method of claim 1, wherein the one or more TASs are located outside the wireless communication network. 7. The method of claim 1, wherein the one or more TASs are located within the wireless communication network. 8. An apparatus comprising: a processor; and programming instructions that, when executed by the processor, program the apparatus to perform operations including: analyze packet gateway (PGW) call data records (CDRs) to determine a number of calls on a wireless communication network that are video calls during a period of time; analyze, by the application server, the PGW CDRs to determine a number of video calls involved in a single radio voice call continuity (SRVCC) handover during the period of time; and based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, derive a percentage of video calls involved in an SRVCC handover during the period of time. 9. The apparatus of claim 8, wherein the operations further include: count a number of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; based upon the counting, derive a percentage of voice calls involved in an SRVCC handover on the wireless communication network during the period of time; and compare the percentage of video calls involved in an SRVCC handover during the period of time with the percentage of voice calls involved in an SRVCC handover on the wireless communication network during the period of time. 10. The apparatus of claim 8, wherein the period of time is one of either (i) daily or (ii) hourly. 11. The apparatus of claim 8, wherein the PGW CDRs comprise data indicating a type of radio access technology (RAT type), data indicating a Quality of Service (QoS) Indicator (QCI) and data indicating a switch from one RAT type to another RAT type. 12. The apparatus of claim 8, wherein at least a portion of the wireless communication network operates according to long term evolution (LTE) protocols. 13. The apparatus of claim 8, wherein the apparatus comprises an application server located outside the wireless communication network. 14. The apparatus of claim 8, wherein the apparatus comprises an application server located within the wireless communication network. 15. A non-transitory storage medium having programming instructions stored thereon that, when executed by a computing device, cause the computing device to perform operations comprising: analyze packet gateway (PGW) call data records (CDRs) to determine a number of calls on the wireless communication network that are video calls during a period of time; analyze, by the application server, the PGW CDRs to determine a number of video calls involved in a single radio voice call continuity (SRVCC) handover during the period of time; and based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, derive a percentage of video calls involved in an SRVCC handover during the period of time. 16. The non-transitory storage medium of claim 15, wherein the programming instructions are further executable by the apparatus to: count a number of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; based upon the counting, derive a percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; and compare the percentage of video calls involved in an SRVCC handover during the period of time with the percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time. 17. The non-transitory storage medium of claim 15, wherein the period of time is one of either (i) daily or (ii) hourly. 18. The non-transitory storage medium of claim 15, wherein the PGW CDRs comprise data indicating a type of radio access technology (RAT type), data indicating a Quality of Service (QoS) Indicator (QCI) and data indicating a switch from one RAT type to another RAT type. 19. The non-transitory storage medium of claim 15, wherein the apparatus comprises an application server located outside the wireless communication network. 20. The non-transitory storage medium of claim 15, wherein the apparatus comprises an application server located within the wireless communication network.
A method of determining video calls involved in a single radio voice call continuity (SRVCC) handover on a wireless communication network. Packet gateway (PGW) call data records (CDRs) are analyzed to determine a number of calls on the wireless communication network that are video calls during a period of time. The PGW CDRs are analyzed to determine a number of video calls involved in an SRVCC handover during the period of time. Based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, a percentage of video calls involved in an SRVCC handover during the period of time is derived.1. A method of determining video calls involved in a single radio voice call continuity (SRVCC) handover, the method comprising: analyzing, by one or more telephony application servers (TASs) of a wireless communication network, packet gateway (PGW) call data records (CDRs) to determine a number of calls on the wireless communication network that are video calls during a period of time; analyzing, by the one or more TASs, the PGW CDRs to determine a number of video calls involved in an SRVCC handover during the period of time; and based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, deriving a percentage of video calls involved in an SRVCC handover during the period of time. 2. The method of claim 1, further comprising: counting, using one or more counters located within the TASs, a number of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; based upon the counting, deriving a percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; and comparing the percentage of video calls involved in an SRVCC handover during the period of time with the percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time. 3. The method of claim 1, wherein the period of time is one of either (i) daily or (ii) hourly. 4. The method of claim 1, wherein the PGW CDRs comprise data indicating a type of radio access technology (RAT type), data indicating a Quality of Service (QoS) Indicator (QCI) and data indicating a switch from one RAT type to another RAT type. 5. The method of claim 1, wherein at least a portion of the wireless communication network operates according to long term evolution (LTE) protocols. 6. The method of claim 1, wherein the one or more TASs are located outside the wireless communication network. 7. The method of claim 1, wherein the one or more TASs are located within the wireless communication network. 8. An apparatus comprising: a processor; and programming instructions that, when executed by the processor, program the apparatus to perform operations including: analyze packet gateway (PGW) call data records (CDRs) to determine a number of calls on a wireless communication network that are video calls during a period of time; analyze, by the application server, the PGW CDRs to determine a number of video calls involved in a single radio voice call continuity (SRVCC) handover during the period of time; and based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, derive a percentage of video calls involved in an SRVCC handover during the period of time. 9. The apparatus of claim 8, wherein the operations further include: count a number of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; based upon the counting, derive a percentage of voice calls involved in an SRVCC handover on the wireless communication network during the period of time; and compare the percentage of video calls involved in an SRVCC handover during the period of time with the percentage of voice calls involved in an SRVCC handover on the wireless communication network during the period of time. 10. The apparatus of claim 8, wherein the period of time is one of either (i) daily or (ii) hourly. 11. The apparatus of claim 8, wherein the PGW CDRs comprise data indicating a type of radio access technology (RAT type), data indicating a Quality of Service (QoS) Indicator (QCI) and data indicating a switch from one RAT type to another RAT type. 12. The apparatus of claim 8, wherein at least a portion of the wireless communication network operates according to long term evolution (LTE) protocols. 13. The apparatus of claim 8, wherein the apparatus comprises an application server located outside the wireless communication network. 14. The apparatus of claim 8, wherein the apparatus comprises an application server located within the wireless communication network. 15. A non-transitory storage medium having programming instructions stored thereon that, when executed by a computing device, cause the computing device to perform operations comprising: analyze packet gateway (PGW) call data records (CDRs) to determine a number of calls on the wireless communication network that are video calls during a period of time; analyze, by the application server, the PGW CDRs to determine a number of video calls involved in a single radio voice call continuity (SRVCC) handover during the period of time; and based upon the determined number of calls that are video calls and on the determined number of video calls involved in an SRVCC handover, derive a percentage of video calls involved in an SRVCC handover during the period of time. 16. The non-transitory storage medium of claim 15, wherein the programming instructions are further executable by the apparatus to: count a number of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; based upon the counting, derive a percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time; and compare the percentage of video calls involved in an SRVCC handover during the period of time with the percentage of voice calls on the wireless communication network involved in an SRVCC handover during the period of time. 17. The non-transitory storage medium of claim 15, wherein the period of time is one of either (i) daily or (ii) hourly. 18. The non-transitory storage medium of claim 15, wherein the PGW CDRs comprise data indicating a type of radio access technology (RAT type), data indicating a Quality of Service (QoS) Indicator (QCI) and data indicating a switch from one RAT type to another RAT type. 19. The non-transitory storage medium of claim 15, wherein the apparatus comprises an application server located outside the wireless communication network. 20. The non-transitory storage medium of claim 15, wherein the apparatus comprises an application server located within the wireless communication network.
2,400
8,584
8,584
15,651,383
2,482
A system for mitigating contamination of a lens of an exterior vehicular camera includes a passive air flow device disposed at the vehicle and configured to passively direct air flow across an outer surface of a lens of the camera to establish a passive air stream curtain. An active air flow device is operable to actively propel air across the outer surface of the lens of the camera to establish an active air stream curtain. A control is operable to activate and deactivate the active air flow device. When the vehicle is driven at a speed of travel below a threshold level, the control activates the active air flow device to actively propel air across the outer surface of the lens of the camera. When the vehicle is in motion, the passive air stream curtain deflects polluting particles away from the outer surface of the lens of the camera.
1. A system for mitigating contamination of a lens of a vehicular camera, said system comprising: a camera comprising an imager and a lens, wherein said camera is disposed at an exterior portion of a vehicle and has a field of view exterior of the vehicle, and wherein said camera captures image data; wherein an outer surface of said lens of said camera is exposed to the environment exterior of the vehicle; a passive air flow device disposed at the vehicle and configured to passively direct air flow across said outer surface of said lens of said camera to establish a passive air stream curtain; an active air flow device operable to actively propel air across said outer surface of said lens of said camera to establish an active air stream curtain; a control operable to activate and deactivate said active air flow device responsive to speed of travel of the vehicle; wherein, when the vehicle is driven at a speed of travel below a threshold level, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera; and wherein, when the vehicle is driven at a speed of travel above the threshold level, said control does not activate said active air flow device to actively propel air across said outer surface of said lens of said camera. 2. The system of claim 1, wherein, when the vehicle is driven and in motion, said passive air flow device passively directs air flow across said outer surface of said lens of said camera, and wherein said passive air flow device is configured such that the passively directed air flow at said outer surface of said lens is at an air flow speed greater than a wind speed at an inlet port of said passive air flow device. 3. The system of claim 1, wherein, when the vehicle is driven and in motion, said passive air stream curtain deflects polluting particles away from said outer surface of said lens of said camera. 4. The system of claim 1, wherein said active air flow device comprises a compressor and a tube disposed between said compressor and said outer surface of said lens of said camera, and wherein said tube is separate from said air stream curtain. 5. The system of claim 4, wherein said active air flow device is located remotely from said passive air flow device and said camera. 6. The system of claim 1, wherein said control comprises an image processor, and wherein, responsive to said image processor processing image data captured by said camera, said control determines when there are polluting particles at said lens of said camera. 7. The system of claim 6, wherein, responsive to determination of polluting particles at said lens of said camera by processing by said image processor of image data captured by said camera, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera. 8. The system of claim 1, wherein said camera comprises a front camera disposed at a front portion of the vehicle and having a field of view forwardly of the vehicle. 9. The system of claim 8, wherein said passive air flow device comprises an inlet port, and wherein said inlet port receives air, and wherein an air channel of said passive air flow device channels and directs received air from said inlet port across said outer surface of said lens of said camera. 10. The system of claim 9, wherein said passive air flow device comprises a moisture separator that separates water from the received air, wherein the separated water is discharged via a water discharge port that discharges the separated water away from said lens of said camera. 11. The system of claim 10, wherein said moisture separator comprises baffles disposed at or near said inlet port of said passive air flow device. 12. The system of claim 1, comprising a heater device that heats air so that heated air is directed across said outer surface of said lens of said camera. 13. The system of claim 1, comprising a plurality of cameras disposed at the vehicle, each having a respective lens and imager, wherein said active air flow device comprises a plurality of outlet ports, and wherein said outlet ports are configured to direct propelled air across the outer surfaces of the respective lenses. 14. The system of claim 13, wherein said active air flow device selectively generates air flow through one or more of a plurality of conduits for directing air across the outer surfaces of the respective lenses. 15. The system of claim 1, wherein said control is operable to control discharge of liquid at said lens of said camera to enhance cleaning of said outer surface of said lens of said camera. 16. A system for mitigating contamination of a lens of a vehicular camera, said system comprising: a camera comprising an imager and a lens, wherein said camera is disposed at an exterior portion of a vehicle and has a field of view exterior of the vehicle, and wherein said camera captures image data; wherein an outer surface of said lens of said camera is exposed to the environment exterior of the vehicle; a passive air flow device disposed at the vehicle and configured to passively direct air flow across said outer surface of said lens of said camera to establish a passive air stream curtain; an active air flow device operable to actively propel air across said outer surface of said lens of said camera to establish an active air stream curtain; a control operable to activate and deactivate said active air flow device responsive to speed of travel of the vehicle; wherein, when the vehicle is driven at a speed of travel below a threshold level, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera; wherein, when the vehicle is driven at a speed of travel above the threshold level, said control does not active air flow device to actively propel air across said outer surface of said lens of said camera; wherein, when the vehicle is driven and in motion, said passive air flow device passively directs air flow across said outer surface of said lens of said camera, and wherein said passive air flow device is configured such that the passively directed air flow at said outer surface of said lens is at an air flow speed greater than a wind speed at an inlet port of said passive air flow device; and wherein, when the vehicle is driven and in motion, said passive air stream curtain deflects polluting particles away from said outer surface of said lens of said camera. 17. The system of claim 16, wherein said control comprises an image processor, and wherein, responsive to said image processor processing image data captured by said camera, said control determines when there are polluting particles at said lens of said camera, and wherein, responsive to determination of polluting particles at said lens of said camera by processing by said image processor of image data captured by said camera, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera. 18. A system for mitigating contamination of a lens of a vehicular camera, said system comprising: a camera comprising an imager and a lens, wherein said camera is disposed at an exterior portion of a vehicle and has a field of view exterior of the vehicle, and wherein said camera captures image data, and wherein said camera comprises a front camera disposed at a front portion of the vehicle and having a field of view forwardly of the vehicle; wherein an outer surface of said lens of said camera is exposed to the environment exterior of the vehicle; a passive air flow device disposed at the front portion of the vehicle, wherein said passive air flow device comprises an inlet port at the front portion of the vehicle, and wherein said inlet port receives air and said passive air flow device is configured to passively direct air flow across said outer surface of said lens of said camera to establish a passive air stream curtain; an active air flow device operable to actively propel air across said outer surface of said lens of said camera to establish an active air stream curtain; a control operable to activate and deactivate said active air flow device responsive to speed of travel of the vehicle; wherein, when the vehicle is driven at a speed of travel below a threshold level, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera; and wherein, when the vehicle is driven and in motion, said passive air stream curtain deflects polluting particles away from said outer surface of said lens of said camera. 19. The system of claim 18, wherein, when the vehicle is driven and in motion, said passive air flow device passively directs air flow across said outer surface of said lens of said camera, and wherein said passive air flow device is configured such that the passively directed air flow at said outer surface of said lens is at an air flow speed greater than a wind speed at an inlet port of said passive air flow device. 20. The system of claim 18, wherein said passive air flow device comprises a moisture separator that separates water from the received air, wherein the separated water is discharged via a water discharge port that discharges the separated water away from said lens of said camera. 21. The system of claim 18, comprising a heater device that heats air so that heated air is directed across said outer surface of said lens of said camera. 22. The system of claim 18, wherein said control is operable to control discharge of liquid at said lens of said camera to enhance cleaning of said outer surface of said lens of said camera.
A system for mitigating contamination of a lens of an exterior vehicular camera includes a passive air flow device disposed at the vehicle and configured to passively direct air flow across an outer surface of a lens of the camera to establish a passive air stream curtain. An active air flow device is operable to actively propel air across the outer surface of the lens of the camera to establish an active air stream curtain. A control is operable to activate and deactivate the active air flow device. When the vehicle is driven at a speed of travel below a threshold level, the control activates the active air flow device to actively propel air across the outer surface of the lens of the camera. When the vehicle is in motion, the passive air stream curtain deflects polluting particles away from the outer surface of the lens of the camera.1. A system for mitigating contamination of a lens of a vehicular camera, said system comprising: a camera comprising an imager and a lens, wherein said camera is disposed at an exterior portion of a vehicle and has a field of view exterior of the vehicle, and wherein said camera captures image data; wherein an outer surface of said lens of said camera is exposed to the environment exterior of the vehicle; a passive air flow device disposed at the vehicle and configured to passively direct air flow across said outer surface of said lens of said camera to establish a passive air stream curtain; an active air flow device operable to actively propel air across said outer surface of said lens of said camera to establish an active air stream curtain; a control operable to activate and deactivate said active air flow device responsive to speed of travel of the vehicle; wherein, when the vehicle is driven at a speed of travel below a threshold level, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera; and wherein, when the vehicle is driven at a speed of travel above the threshold level, said control does not activate said active air flow device to actively propel air across said outer surface of said lens of said camera. 2. The system of claim 1, wherein, when the vehicle is driven and in motion, said passive air flow device passively directs air flow across said outer surface of said lens of said camera, and wherein said passive air flow device is configured such that the passively directed air flow at said outer surface of said lens is at an air flow speed greater than a wind speed at an inlet port of said passive air flow device. 3. The system of claim 1, wherein, when the vehicle is driven and in motion, said passive air stream curtain deflects polluting particles away from said outer surface of said lens of said camera. 4. The system of claim 1, wherein said active air flow device comprises a compressor and a tube disposed between said compressor and said outer surface of said lens of said camera, and wherein said tube is separate from said air stream curtain. 5. The system of claim 4, wherein said active air flow device is located remotely from said passive air flow device and said camera. 6. The system of claim 1, wherein said control comprises an image processor, and wherein, responsive to said image processor processing image data captured by said camera, said control determines when there are polluting particles at said lens of said camera. 7. The system of claim 6, wherein, responsive to determination of polluting particles at said lens of said camera by processing by said image processor of image data captured by said camera, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera. 8. The system of claim 1, wherein said camera comprises a front camera disposed at a front portion of the vehicle and having a field of view forwardly of the vehicle. 9. The system of claim 8, wherein said passive air flow device comprises an inlet port, and wherein said inlet port receives air, and wherein an air channel of said passive air flow device channels and directs received air from said inlet port across said outer surface of said lens of said camera. 10. The system of claim 9, wherein said passive air flow device comprises a moisture separator that separates water from the received air, wherein the separated water is discharged via a water discharge port that discharges the separated water away from said lens of said camera. 11. The system of claim 10, wherein said moisture separator comprises baffles disposed at or near said inlet port of said passive air flow device. 12. The system of claim 1, comprising a heater device that heats air so that heated air is directed across said outer surface of said lens of said camera. 13. The system of claim 1, comprising a plurality of cameras disposed at the vehicle, each having a respective lens and imager, wherein said active air flow device comprises a plurality of outlet ports, and wherein said outlet ports are configured to direct propelled air across the outer surfaces of the respective lenses. 14. The system of claim 13, wherein said active air flow device selectively generates air flow through one or more of a plurality of conduits for directing air across the outer surfaces of the respective lenses. 15. The system of claim 1, wherein said control is operable to control discharge of liquid at said lens of said camera to enhance cleaning of said outer surface of said lens of said camera. 16. A system for mitigating contamination of a lens of a vehicular camera, said system comprising: a camera comprising an imager and a lens, wherein said camera is disposed at an exterior portion of a vehicle and has a field of view exterior of the vehicle, and wherein said camera captures image data; wherein an outer surface of said lens of said camera is exposed to the environment exterior of the vehicle; a passive air flow device disposed at the vehicle and configured to passively direct air flow across said outer surface of said lens of said camera to establish a passive air stream curtain; an active air flow device operable to actively propel air across said outer surface of said lens of said camera to establish an active air stream curtain; a control operable to activate and deactivate said active air flow device responsive to speed of travel of the vehicle; wherein, when the vehicle is driven at a speed of travel below a threshold level, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera; wherein, when the vehicle is driven at a speed of travel above the threshold level, said control does not active air flow device to actively propel air across said outer surface of said lens of said camera; wherein, when the vehicle is driven and in motion, said passive air flow device passively directs air flow across said outer surface of said lens of said camera, and wherein said passive air flow device is configured such that the passively directed air flow at said outer surface of said lens is at an air flow speed greater than a wind speed at an inlet port of said passive air flow device; and wherein, when the vehicle is driven and in motion, said passive air stream curtain deflects polluting particles away from said outer surface of said lens of said camera. 17. The system of claim 16, wherein said control comprises an image processor, and wherein, responsive to said image processor processing image data captured by said camera, said control determines when there are polluting particles at said lens of said camera, and wherein, responsive to determination of polluting particles at said lens of said camera by processing by said image processor of image data captured by said camera, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera. 18. A system for mitigating contamination of a lens of a vehicular camera, said system comprising: a camera comprising an imager and a lens, wherein said camera is disposed at an exterior portion of a vehicle and has a field of view exterior of the vehicle, and wherein said camera captures image data, and wherein said camera comprises a front camera disposed at a front portion of the vehicle and having a field of view forwardly of the vehicle; wherein an outer surface of said lens of said camera is exposed to the environment exterior of the vehicle; a passive air flow device disposed at the front portion of the vehicle, wherein said passive air flow device comprises an inlet port at the front portion of the vehicle, and wherein said inlet port receives air and said passive air flow device is configured to passively direct air flow across said outer surface of said lens of said camera to establish a passive air stream curtain; an active air flow device operable to actively propel air across said outer surface of said lens of said camera to establish an active air stream curtain; a control operable to activate and deactivate said active air flow device responsive to speed of travel of the vehicle; wherein, when the vehicle is driven at a speed of travel below a threshold level, said control activates said active air flow device to actively propel air across said outer surface of said lens of said camera; and wherein, when the vehicle is driven and in motion, said passive air stream curtain deflects polluting particles away from said outer surface of said lens of said camera. 19. The system of claim 18, wherein, when the vehicle is driven and in motion, said passive air flow device passively directs air flow across said outer surface of said lens of said camera, and wherein said passive air flow device is configured such that the passively directed air flow at said outer surface of said lens is at an air flow speed greater than a wind speed at an inlet port of said passive air flow device. 20. The system of claim 18, wherein said passive air flow device comprises a moisture separator that separates water from the received air, wherein the separated water is discharged via a water discharge port that discharges the separated water away from said lens of said camera. 21. The system of claim 18, comprising a heater device that heats air so that heated air is directed across said outer surface of said lens of said camera. 22. The system of claim 18, wherein said control is operable to control discharge of liquid at said lens of said camera to enhance cleaning of said outer surface of said lens of said camera.
2,400
8,585
8,585
15,300,584
2,413
The solution presented herein introduces variable repetition levels for control and data transmissions via a physical downlink control channel for machine-type communications, e.g., the M-PDDCH. When a wireless terminal detects and correctly decodes a message carried by physical downlink control channel for machine-type communications that requests retransmissions, the wireless terminal performs adaptive uplink retransmissions according to a retransmission format defined by the message. The retransmission format defines at least one of a modulation and coding rate for the retransmissions, a frequency resource for the retransmissions, and a number of repetitions.
1. A method performed by a wireless terminal in communication with a wireless network node, the method comprising: receiving a grant for uplink transmission from the network node, wherein the received grant indicates a first number of repetitions; transmitting on an uplink shared channel according to the first number of repetitions; monitoring a first channel for a message a first number of subframes after the wireless terminal transmits on the uplink shared channel according to the first number of repetitions, wherein the first channel comprises a physical downlink control channel for machine-type communications; and if the message is detected and correctly decoded, and if the decoded message requests retransmission, performing adaptive uplink retransmission according to a first retransmission format indicated by the decoded message. 2. The method of claim 1 further comprising performing non-adaptive retransmission according to a second retransmission format if at least one of the message is not detected, the message is not correctly decoded, and the decoded message does not request retransmission, wherein the second retransmission format comprises a currently controlling retransmission format received from the network node before detection of the message. 3. The method of claim 1 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the message includes downlink control information indicating a process number for the adaptive uplink retransmission. 4. The method of claim 3 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 5. The method of claim 1 wherein the first retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 6. The method of claim 1 wherein receiving the grant for uplink transmission comprises receiving a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 7. A wireless terminal in communication with a wireless network node, the wireless terminal comprising: a receiver configured to receive a grant for uplink transmission from the network node, wherein the received grant indicates a first number of repetitions; a transmitter configured to transmit on an uplink shared channel according to the first number of repetitions; and a processing circuit configured to monitor a first channel for a message a first number of subframes after the transmitter transmits on the uplink shared channel according to the first number of repetitions, wherein the first channel comprises a physical downlink control channel for machine-type communications (MTC); if the processing circuit detects and correctly decodes the message, and if the decoded message requests retransmission, the processing circuit is further configured to perform adaptive uplink retransmission, via the transmitter, according to a first retransmission format indicated by the decoded message. 8. The wireless terminal of claim 7 wherein the processing circuit is further configured to perform non-adaptive retransmission, via the transmitter, according to a second retransmission format if at least one of the message is not detected, the message is not correctly decoded, and the message does not request retransmission, wherein the second retransmission format comprises a currently controlling retransmission format previously received from the network node. 9. The wireless terminal of claim 7 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the message includes downlink control information indicating a process number for the adaptive uplink retransmission. 10. The wireless terminal of claim 9 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 11. The wireless terminal of claim 7 wherein the first retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 12. The wireless terminal of claim 7 wherein the grant for uplink transmission comprises a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 13. The wireless terminal of claim 7 wherein the wireless terminal comprises a low complexity wireless terminal. 14. The wireless terminal of claim 13 wherein the low complexity wireless terminal comprises an MTC wireless terminal. 15. A computer program product stored in a non-transitory computer readable medium for controlling a wireless terminal in communication with a wireless network node, the computer program product comprising software instructions that when run on the wireless terminal, causes the wireless terminal to: receive a grant for uplink transmission from the network node, wherein the received grant indicates a first number of repetitions; transmit on an uplink shared channel according to the first number of repetitions; monitor a first channel for a message a first number of subframes after the wireless terminal transmits on the uplink shared channel according to the first number of repetitions, wherein the first channel comprises a physical downlink control channel for machine-type communications; and if the message is detected and correctly decoded, and if the decoded message requests retransmission, perform adaptive uplink retransmission according to a first retransmission format indicated by the decoded message. 16. A method performed by a wireless network node in communication with a wireless terminal, the method comprising: transmitting a grant for uplink transmission to the wireless terminal, wherein the transmitted grant indicates a first number of uplink repetitions; and transmitting a message to the wireless terminal via a first channel comprising a physical downlink control channel for machine-type communications to provide an adaptive retransmission format to the wireless terminal a first number of subframes after the wireless terminal transmits on an uplink shared channel according to the first number of uplink repetitions, the adaptive retransmission format being for a subsequent uplink retransmission from the wireless terminal. 17. The method of claim 16 wherein the adaptive retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 18. The method of claim 16 wherein transmitting the grant for uplink transmission comprises transmitting a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 19. The method of claim 16 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the message includes downlink control information indicating a process number for the subsequent uplink retransmissions from the wireless terminal. 20. The method of claim 19 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 21. A wireless network node in communication with a wireless terminal, the wireless network node comprising: a receiver; a transmitter configured to transmit a grant for uplink transmission to the wireless terminal, wherein the transmitted grant indicates a first number of repetitions; and a processing circuit configured to generate a message for a first channel comprising a physical downlink control channel for machine-type communications, wherein the message provides an adaptive retransmission format to the wireless terminal a first number of subframes after the wireless terminal transmits on an uplink shared channel according to the first number of repetitions, the adaptive retransmission format being for a subsequent uplink retransmission from the wireless terminal; wherein the transmitter is further configured to transmit the message via the first channel. 22. The wireless network node of claim 21 wherein the adaptive retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 23. The wireless network node of claim 21 wherein the grant for uplink transmission comprises a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 24. The wireless network node of claim 21 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the transmitted message includes downlink control information indicating a process number for the subsequent uplink retransmissions. 25. The wireless network node of claim 24 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 26. A computer program product stored in a non-transitory computer readable medium for controlling a wireless network node in communication with a wireless terminal, the computer program product comprising software instructions that when run on the wireless network node, causes the wireless network node to: transmit a grant for uplink transmission to the wireless terminal, wherein the transmitted grant indicates a first number of uplink repetitions; and transmit a message to the wireless terminal via a first channel comprising a physical downlink control channel for machine-type communications to provide an adaptive retransmission format to the wireless terminal a first number of subframes after the wireless terminal transmits on an uplink shared channel according to the first number of uplink repetitions, the adaptive retransmission format being for a subsequent uplink retransmission from the wireless terminal.
The solution presented herein introduces variable repetition levels for control and data transmissions via a physical downlink control channel for machine-type communications, e.g., the M-PDDCH. When a wireless terminal detects and correctly decodes a message carried by physical downlink control channel for machine-type communications that requests retransmissions, the wireless terminal performs adaptive uplink retransmissions according to a retransmission format defined by the message. The retransmission format defines at least one of a modulation and coding rate for the retransmissions, a frequency resource for the retransmissions, and a number of repetitions.1. A method performed by a wireless terminal in communication with a wireless network node, the method comprising: receiving a grant for uplink transmission from the network node, wherein the received grant indicates a first number of repetitions; transmitting on an uplink shared channel according to the first number of repetitions; monitoring a first channel for a message a first number of subframes after the wireless terminal transmits on the uplink shared channel according to the first number of repetitions, wherein the first channel comprises a physical downlink control channel for machine-type communications; and if the message is detected and correctly decoded, and if the decoded message requests retransmission, performing adaptive uplink retransmission according to a first retransmission format indicated by the decoded message. 2. The method of claim 1 further comprising performing non-adaptive retransmission according to a second retransmission format if at least one of the message is not detected, the message is not correctly decoded, and the decoded message does not request retransmission, wherein the second retransmission format comprises a currently controlling retransmission format received from the network node before detection of the message. 3. The method of claim 1 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the message includes downlink control information indicating a process number for the adaptive uplink retransmission. 4. The method of claim 3 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 5. The method of claim 1 wherein the first retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 6. The method of claim 1 wherein receiving the grant for uplink transmission comprises receiving a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 7. A wireless terminal in communication with a wireless network node, the wireless terminal comprising: a receiver configured to receive a grant for uplink transmission from the network node, wherein the received grant indicates a first number of repetitions; a transmitter configured to transmit on an uplink shared channel according to the first number of repetitions; and a processing circuit configured to monitor a first channel for a message a first number of subframes after the transmitter transmits on the uplink shared channel according to the first number of repetitions, wherein the first channel comprises a physical downlink control channel for machine-type communications (MTC); if the processing circuit detects and correctly decodes the message, and if the decoded message requests retransmission, the processing circuit is further configured to perform adaptive uplink retransmission, via the transmitter, according to a first retransmission format indicated by the decoded message. 8. The wireless terminal of claim 7 wherein the processing circuit is further configured to perform non-adaptive retransmission, via the transmitter, according to a second retransmission format if at least one of the message is not detected, the message is not correctly decoded, and the message does not request retransmission, wherein the second retransmission format comprises a currently controlling retransmission format previously received from the network node. 9. The wireless terminal of claim 7 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the message includes downlink control information indicating a process number for the adaptive uplink retransmission. 10. The wireless terminal of claim 9 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 11. The wireless terminal of claim 7 wherein the first retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 12. The wireless terminal of claim 7 wherein the grant for uplink transmission comprises a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 13. The wireless terminal of claim 7 wherein the wireless terminal comprises a low complexity wireless terminal. 14. The wireless terminal of claim 13 wherein the low complexity wireless terminal comprises an MTC wireless terminal. 15. A computer program product stored in a non-transitory computer readable medium for controlling a wireless terminal in communication with a wireless network node, the computer program product comprising software instructions that when run on the wireless terminal, causes the wireless terminal to: receive a grant for uplink transmission from the network node, wherein the received grant indicates a first number of repetitions; transmit on an uplink shared channel according to the first number of repetitions; monitor a first channel for a message a first number of subframes after the wireless terminal transmits on the uplink shared channel according to the first number of repetitions, wherein the first channel comprises a physical downlink control channel for machine-type communications; and if the message is detected and correctly decoded, and if the decoded message requests retransmission, perform adaptive uplink retransmission according to a first retransmission format indicated by the decoded message. 16. A method performed by a wireless network node in communication with a wireless terminal, the method comprising: transmitting a grant for uplink transmission to the wireless terminal, wherein the transmitted grant indicates a first number of uplink repetitions; and transmitting a message to the wireless terminal via a first channel comprising a physical downlink control channel for machine-type communications to provide an adaptive retransmission format to the wireless terminal a first number of subframes after the wireless terminal transmits on an uplink shared channel according to the first number of uplink repetitions, the adaptive retransmission format being for a subsequent uplink retransmission from the wireless terminal. 17. The method of claim 16 wherein the adaptive retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 18. The method of claim 16 wherein transmitting the grant for uplink transmission comprises transmitting a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 19. The method of claim 16 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the message includes downlink control information indicating a process number for the subsequent uplink retransmissions from the wireless terminal. 20. The method of claim 19 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 21. A wireless network node in communication with a wireless terminal, the wireless network node comprising: a receiver; a transmitter configured to transmit a grant for uplink transmission to the wireless terminal, wherein the transmitted grant indicates a first number of repetitions; and a processing circuit configured to generate a message for a first channel comprising a physical downlink control channel for machine-type communications, wherein the message provides an adaptive retransmission format to the wireless terminal a first number of subframes after the wireless terminal transmits on an uplink shared channel according to the first number of repetitions, the adaptive retransmission format being for a subsequent uplink retransmission from the wireless terminal; wherein the transmitter is further configured to transmit the message via the first channel. 22. The wireless network node of claim 21 wherein the adaptive retransmission format defines at least one of a modulation and coding rate for the adaptive uplink retransmission, a frequency resource for the adaptive uplink retransmission, and a second number of repetitions for the adaptive uplink retransmission. 23. The wireless network node of claim 21 wherein the grant for uplink transmission comprises a downlink control information (DCI) indicating a grant for random access channel (RACH) Msg3 transmission. 24. The wireless network node of claim 21 wherein the adaptive uplink retransmission comprises asynchronous uplink retransmission, and wherein the transmitted message includes downlink control information indicating a process number for the subsequent uplink retransmissions. 25. The wireless network node of claim 24 wherein the process number comprises a hybrid automatic repeat request (HARQ) process number. 26. A computer program product stored in a non-transitory computer readable medium for controlling a wireless network node in communication with a wireless terminal, the computer program product comprising software instructions that when run on the wireless network node, causes the wireless network node to: transmit a grant for uplink transmission to the wireless terminal, wherein the transmitted grant indicates a first number of uplink repetitions; and transmit a message to the wireless terminal via a first channel comprising a physical downlink control channel for machine-type communications to provide an adaptive retransmission format to the wireless terminal a first number of subframes after the wireless terminal transmits on an uplink shared channel according to the first number of uplink repetitions, the adaptive retransmission format being for a subsequent uplink retransmission from the wireless terminal.
2,400
8,586
8,586
15,159,289
2,481
This application relates to systems and methods for imaging the iris of an individual. The iris images may be taken with an off-axis imager attached to a head-mounted system such as a pair of eyeglasses. In some instances, the iris images may be used for biometric recognition and identification.
1. A system for imaging the iris comprising an optical device and an off-axis imager attached to the optical device, wherein the off-axis imager comprises a lens and a camera body. 2. The system of claim 1, wherein the optical device comprises a head-mounted device. 3. The system of claim 2, wherein the head-mounted device comprises a pair of eyeglasses or goggles. 4. The system of claim 3, wherein the head-mounted device comprises a pair of eyeglasses, the pair of eyeglasses comprising a frame having an upper rim and a lower rim, and a transparent display. 5. The system of claim 1, wherein the optical device comprises an eyepiece. 6. The system of claim 5, wherein the eyepiece is a monocle or binoculars. 7. The system of claim 5, wherein the eyepiece is contained within a telescope, microscope, or a compound optical system used for viewing. 8. The system of claim 4, wherein the off-axis imager is attached to the lower rim of the frame. 9. The system of claim 1, wherein the lens of the off-axis imager has a tilt ranging from about 2.0 to about 8.5 degrees. 10. The system of claim 1, wherein the lens of the off-axis imager has a shift offset ranging from about 1.0 to about 2.5 mm. 11. A method for imaging an iris comprising providing an optical device having an off-axis imager attached thereto and imaging an iris of an individual using the off-axis imager, wherein the off-axis imager comprises a lens and a camera body. 12. The method of claim 11, further comprising obtaining biometric information from the imaged iris and processing the biometric information to verify the identity of the individual. 13. The method of claim 12, wherein the biometric information is converted into an iris code. 14. The method of claim 11, further comprising tilting the lens of the off-axis imager to adjust a focal plane of the camera body to be parallel with a plane of the individual's iris. 15. The method of claim 14, wherein the lens is tilted between about 2.0 to about 8.5 degrees. 16. The method of claim 15, further comprising shifting the lens of the off-axis imager between about 1.0 to about 2.5 mm. 17. The method of claim 11, wherein imaging the iris comprises partially or entirely imaging the iris of the individual. 18. The method of claim 11, wherein one or both irises of the individual are partially or entirely imaged.
This application relates to systems and methods for imaging the iris of an individual. The iris images may be taken with an off-axis imager attached to a head-mounted system such as a pair of eyeglasses. In some instances, the iris images may be used for biometric recognition and identification.1. A system for imaging the iris comprising an optical device and an off-axis imager attached to the optical device, wherein the off-axis imager comprises a lens and a camera body. 2. The system of claim 1, wherein the optical device comprises a head-mounted device. 3. The system of claim 2, wherein the head-mounted device comprises a pair of eyeglasses or goggles. 4. The system of claim 3, wherein the head-mounted device comprises a pair of eyeglasses, the pair of eyeglasses comprising a frame having an upper rim and a lower rim, and a transparent display. 5. The system of claim 1, wherein the optical device comprises an eyepiece. 6. The system of claim 5, wherein the eyepiece is a monocle or binoculars. 7. The system of claim 5, wherein the eyepiece is contained within a telescope, microscope, or a compound optical system used for viewing. 8. The system of claim 4, wherein the off-axis imager is attached to the lower rim of the frame. 9. The system of claim 1, wherein the lens of the off-axis imager has a tilt ranging from about 2.0 to about 8.5 degrees. 10. The system of claim 1, wherein the lens of the off-axis imager has a shift offset ranging from about 1.0 to about 2.5 mm. 11. A method for imaging an iris comprising providing an optical device having an off-axis imager attached thereto and imaging an iris of an individual using the off-axis imager, wherein the off-axis imager comprises a lens and a camera body. 12. The method of claim 11, further comprising obtaining biometric information from the imaged iris and processing the biometric information to verify the identity of the individual. 13. The method of claim 12, wherein the biometric information is converted into an iris code. 14. The method of claim 11, further comprising tilting the lens of the off-axis imager to adjust a focal plane of the camera body to be parallel with a plane of the individual's iris. 15. The method of claim 14, wherein the lens is tilted between about 2.0 to about 8.5 degrees. 16. The method of claim 15, further comprising shifting the lens of the off-axis imager between about 1.0 to about 2.5 mm. 17. The method of claim 11, wherein imaging the iris comprises partially or entirely imaging the iris of the individual. 18. The method of claim 11, wherein one or both irises of the individual are partially or entirely imaged.
2,400
8,587
8,587
16,063,947
2,464
A service connection control method and a terminal, where the method includes detecting, by the terminal, that a network signal is interrupted, maintaining, by the terminal, a first service connection to a server, where the first service connection is used for communication between the server and the terminal before the network signal is interrupted, detecting, by the terminal, that the network signal recovers to normal, and reusing, by the terminal, the first service connection when an Internet Protocol (IP) address of the terminal does not change within a first time interval, where the first time interval is a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal.
1.-18. (canceled) 19. A service coupling control method, comprising: detecting, by a terminal, that a network signal is interrupted; maintaining, by the terminal, a first service coupling to a server, the first service coupling being used for communication between the server and the terminal before the network signal is interrupted; detecting, by the terminal, that the network signal recovers to normal; and reusing, by the terminal, the first service coupling when an Internet Protocol (IP) address of the terminal does not change within a first time interval, the first time interval comprising a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal. 20. The method of claim 19, wherein reusing the first service coupling comprises: detecting, by the terminal, that the IP address of the terminal does not change within the first time interval; sending, by the terminal, a probe request message to the server detecting a network status between the terminal and the server; receiving, by the terminal, a probe response message from the server comprising a response message for the probe request message; and reusing, by the terminal, the first service coupling when the network status between the server and the terminal indicated by the probe response message is normal. 21. The method of claim 20, further comprising establishing, by the terminal, a second service coupling to the server when the network status between the server and the terminal indicated by the probe response message is abnormal. 22. The method of claim 19, wherein reusing the first service coupling comprises reusing, by the terminal, the first service coupling when the IP address of the terminal does not change within the first time interval and the first time interval is less than a first time interval threshold. 23. The method of claim 19, wherein reusing the first service coupling comprises reusing, by the terminal, the first service coupling when the IP address of the terminal does not change within the first interval and a distance between a first position and a second position of the terminal is less than a first distance threshold, the first position comprising a position of the terminal when the network signal is interrupted, and the second position comprising a position of the terminal when the network signal recovers to normal. 24. The method of claim 19, further comprising establishing, by the terminal, a third service coupling to the server when the IP address of the terminal changes within the first time interval. 25. The method of claim 22, further comprising establishing, by the terminal, a third service coupling to the server when the IP address of the terminal changes within the first time interval. 26. The method of claim 23, further comprising establishing, by the terminal, a third service coupling to the server when the IP address of the terminal changes within the first time interval. 27. The method of claim 22, further comprising establishing, by the terminal, a third service coupling to the server when the first time interval is greater than the first time e threshold. 28. The method of claim 23, further comprising establishing, by the terminal, a third service coupling to the server, when the distance is greater than the first distance threshold. 29. A terminal, comprising: a memory; a transceiver coupled to the memory; a processor coupled to the transceiver and the memory using a bus system and configured to: detect that a network signal is interrupted; maintain a first service coupling between the terminal and a server; the first service coupling being used for communication between the server and the terminal before the network signal is interrupted; detect that the network signal recovers to normal; and reuse the first service coupling when an Internet Protocol (IP) address of the terminal does not change within a first time interval, the first time interval comprising a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal. 30. The terminal of claim 29, wherein the processor is further configured to detect that the IP address of the terminal does not change within the first time interval, the transceiver being configured to: send a probe request message to the server detecting a network status between the terminal and the server; and receive a probe response message from the server comprising a response message for the probe request message, and the processor being further configured to reuse the first service coupling when the network status between the server and the terminal indicated by the probe response message is normal. 31. The terminal of claim 30, wherein the processor is further configured to establish a second service coupling between the terminal and the server when the network status between the server and the terminal indicated by the probe response message is abnormal. 32. The terminal of claim 29, wherein the processor is further configured to reuse the first service coupling when the IP address of the terminal does not change within the first time interval and the first time interval is less than a first time interval threshold. 33. The terminal of claim 29, wherein the processor is further configured to reuse the first service coupling when the IP address of the terminal does not change within the first time interval and a distance between a first position and a second position of the terminal is less than a first distance threshold, the first position comprising a position of the terminal when the network signal is interrupted, and the second position comprising a position of the terminal when the network signal recovers to normal. 34. The terminal of claim 29, wherein the processor is further configured to establish a third service coupling to the server when the IP address of the terminal changes within the first time interval. 35. The method of claim 32, wherein the processor is further configured to establish a third service coupling to the server when the IP address of the terminal changes within the first time interval. 36. The method of claim 33, wherein the processor is further configured to establish a third service coupling to the server when the IP address of the terminal changes within the first time interval. 37. The method of claim 32, wherein the processor is further configured to establish a third service coupling to the server when the first time interval is greater than the first time interval threshold. 38. A non-transitory computer readable storage medium configured to store one or more programs, the one or more programs comprising instructions, and when executed, the one or more programs causing a terminal to be configured to: detect that a network signal is interrupted; maintain a first service coupling between the terminal and a server, the first service coupling being used for communication between the server and the terminal before the network signal is interrupted; detect that the network signal recovers to normal; and reuse the first service coupling when an Internet Protocol (IP) address of the terminal does not change within a first time interval, the first time interval comprising a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal.
A service connection control method and a terminal, where the method includes detecting, by the terminal, that a network signal is interrupted, maintaining, by the terminal, a first service connection to a server, where the first service connection is used for communication between the server and the terminal before the network signal is interrupted, detecting, by the terminal, that the network signal recovers to normal, and reusing, by the terminal, the first service connection when an Internet Protocol (IP) address of the terminal does not change within a first time interval, where the first time interval is a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal.1.-18. (canceled) 19. A service coupling control method, comprising: detecting, by a terminal, that a network signal is interrupted; maintaining, by the terminal, a first service coupling to a server, the first service coupling being used for communication between the server and the terminal before the network signal is interrupted; detecting, by the terminal, that the network signal recovers to normal; and reusing, by the terminal, the first service coupling when an Internet Protocol (IP) address of the terminal does not change within a first time interval, the first time interval comprising a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal. 20. The method of claim 19, wherein reusing the first service coupling comprises: detecting, by the terminal, that the IP address of the terminal does not change within the first time interval; sending, by the terminal, a probe request message to the server detecting a network status between the terminal and the server; receiving, by the terminal, a probe response message from the server comprising a response message for the probe request message; and reusing, by the terminal, the first service coupling when the network status between the server and the terminal indicated by the probe response message is normal. 21. The method of claim 20, further comprising establishing, by the terminal, a second service coupling to the server when the network status between the server and the terminal indicated by the probe response message is abnormal. 22. The method of claim 19, wherein reusing the first service coupling comprises reusing, by the terminal, the first service coupling when the IP address of the terminal does not change within the first time interval and the first time interval is less than a first time interval threshold. 23. The method of claim 19, wherein reusing the first service coupling comprises reusing, by the terminal, the first service coupling when the IP address of the terminal does not change within the first interval and a distance between a first position and a second position of the terminal is less than a first distance threshold, the first position comprising a position of the terminal when the network signal is interrupted, and the second position comprising a position of the terminal when the network signal recovers to normal. 24. The method of claim 19, further comprising establishing, by the terminal, a third service coupling to the server when the IP address of the terminal changes within the first time interval. 25. The method of claim 22, further comprising establishing, by the terminal, a third service coupling to the server when the IP address of the terminal changes within the first time interval. 26. The method of claim 23, further comprising establishing, by the terminal, a third service coupling to the server when the IP address of the terminal changes within the first time interval. 27. The method of claim 22, further comprising establishing, by the terminal, a third service coupling to the server when the first time interval is greater than the first time e threshold. 28. The method of claim 23, further comprising establishing, by the terminal, a third service coupling to the server, when the distance is greater than the first distance threshold. 29. A terminal, comprising: a memory; a transceiver coupled to the memory; a processor coupled to the transceiver and the memory using a bus system and configured to: detect that a network signal is interrupted; maintain a first service coupling between the terminal and a server; the first service coupling being used for communication between the server and the terminal before the network signal is interrupted; detect that the network signal recovers to normal; and reuse the first service coupling when an Internet Protocol (IP) address of the terminal does not change within a first time interval, the first time interval comprising a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal. 30. The terminal of claim 29, wherein the processor is further configured to detect that the IP address of the terminal does not change within the first time interval, the transceiver being configured to: send a probe request message to the server detecting a network status between the terminal and the server; and receive a probe response message from the server comprising a response message for the probe request message, and the processor being further configured to reuse the first service coupling when the network status between the server and the terminal indicated by the probe response message is normal. 31. The terminal of claim 30, wherein the processor is further configured to establish a second service coupling between the terminal and the server when the network status between the server and the terminal indicated by the probe response message is abnormal. 32. The terminal of claim 29, wherein the processor is further configured to reuse the first service coupling when the IP address of the terminal does not change within the first time interval and the first time interval is less than a first time interval threshold. 33. The terminal of claim 29, wherein the processor is further configured to reuse the first service coupling when the IP address of the terminal does not change within the first time interval and a distance between a first position and a second position of the terminal is less than a first distance threshold, the first position comprising a position of the terminal when the network signal is interrupted, and the second position comprising a position of the terminal when the network signal recovers to normal. 34. The terminal of claim 29, wherein the processor is further configured to establish a third service coupling to the server when the IP address of the terminal changes within the first time interval. 35. The method of claim 32, wherein the processor is further configured to establish a third service coupling to the server when the IP address of the terminal changes within the first time interval. 36. The method of claim 33, wherein the processor is further configured to establish a third service coupling to the server when the IP address of the terminal changes within the first time interval. 37. The method of claim 32, wherein the processor is further configured to establish a third service coupling to the server when the first time interval is greater than the first time interval threshold. 38. A non-transitory computer readable storage medium configured to store one or more programs, the one or more programs comprising instructions, and when executed, the one or more programs causing a terminal to be configured to: detect that a network signal is interrupted; maintain a first service coupling between the terminal and a server, the first service coupling being used for communication between the server and the terminal before the network signal is interrupted; detect that the network signal recovers to normal; and reuse the first service coupling when an Internet Protocol (IP) address of the terminal does not change within a first time interval, the first time interval comprising a time interval between a moment at which the network signal is interrupted and a moment at which the network signal recovers to normal.
2,400
8,588
8,588
15,593,143
2,485
There is provided an apparatus with a sample holder to hold a sample to be imaged. An image capture device has a field of view and captures an image of the field of view. Also provided is an actuator. A controller controls the actuator to cause relative movement between the sample holder and the image capture device at a given speed and at a given direction during an exposure time of the image capture device such that, in use, the sample moves across at least a portion of the field of view during the exposure time. A processor performs a deblur algorithm to deblur the image using the given speed and the given direction.
1. An apparatus, comprising: a sample holder to hold a sample to be imaged; an image capture device having a field of view, to capture an image of the field of view; an actuator; a controller to control the actuator to cause relative movement between the sample holder and the image capture device at a given speed and at a given direction during an exposure time of the image capture device such that, in use, the sample moves across at least a portion of the field of view during the exposure time; and a processor to perform a deblur algorithm to deblur the image using the given speed and the given direction. 2. The apparatus according to claim 1, wherein the given speed of the relative movement between the sample and the image capture device is substantially constant. 3. The apparatus according to claim 1, wherein the relative movement between the sample and the image capture device occurs substantially only in the given direction. 4. The apparatus according to claim 1, further comprising: speed determining circuitry to determine the given speed. 5. The apparatus according to claim 1, further comprising: direction determining circuitry to determine the given direction. 6. The apparatus according to claim 1, wherein: the image capture device is to capture a plurality of images of a plurality of fields of view of the image capture device; and the actuator is further to cause relative movement between the sample and the image capture device between each of the plurality of images such that the image capture device obtains the plurality of fields of view. 7. The apparatus according to claim 6, wherein: the sample holder holds a plurality of samples to be imaged; and the plurality of images comprises at least one image of each of the plurality of samples. 8. The apparatus according to claim 6, wherein two consecutive images in the plurality of images overlap by an amount greater than a product of the exposure time of the image capture device and the given speed. 9. The apparatus according to claim 6, wherein two consecutive images in the plurality of images overlap by an amount less than 120% of a product of the exposure time of the image capture device and the given speed. 10. The apparatus according to claim 1, wherein two consecutive images in the plurality of images overlap by 50%. 11. The apparatus according to claim 1, wherein the deblur algorithm is iterative. 12. The apparatus according to claim 1, wherein: the image comprises a plurality of rows of pixels; an axis of the rows of pixels is aligned with the given direction; and the deblur algorithm comprises a plurality of independent row processing operations each corresponding to a given row of the plurality of rows of pixels. 13. The apparatus according to claim 1, wherein at least some of the row processing operations are performed in parallel. 14. The apparatus according to claim 12, wherein: the deblur algorithm is iterative; at each iteration, an evaluation value for a row of pixels is determined; and based on the evaluation value for the row of pixels in one iteration and the evaluation value for the row of pixels in a next iteration, the deblur algorithm is to disregard that row of pixels in subsequent iterations. 15. The apparatus according to claim 14, wherein based on a difference between the evaluation value for the row of pixels in one iteration and the evaluation value for the row of pixels in the next iteration, the deblur algorithm is to ignore that row of pixels in subsequent iterations. 16. The apparatus according to claim 1, wherein the deblur algorithm is based on a Lucy-Richardson deconvolution process. 17. The apparatus according to claim 1, wherein the image capture device performs fluorescence imaging. 18. The apparatus according to claim 1, wherein the image capture device is a grayscale image capture device. 19. The apparatus according to claim 1, wherein the apparatus is a digital microscope. 20. An image processing method, comprising: holding a sample to be imaged; capturing an image of a field of view; causing relative movement between the sample and an image capture device at a given speed and a given direction such that the sample moves across a portion of the field of view; and performing a deblur algorithm to deblur the image using the given speed and the given direction, wherein an exposure time of the image capture device when capturing the image corresponds with a time taken for the sample to move across the portion of the field of view. 21. An image processing apparatus, comprising: means for holding a sample to be imaged; means for capturing an image of a field of view; means for actuating; means for controlling the means for actuating to cause relative movement between the means for holding the sample to be imaged and the means for capturing during an exposure time of the means for capturing such that, in use, the sample moves across at least a portion of the field of view during the exposure time, wherein the relative movement is at a given speed and a given direction; and means for performing a deblur algorithm to deblur the image using the given speed and the given direction. 22. An image processing method, comprising: receiving an input image on which deblurring is to be performed, wherein the input image comprises a plurality of rows of pixels; receiving a given speed and given direction; and performing a deblurring operation on the image by performing a plurality of independent row processing operations using the given speed and the given direction, each corresponding to a given row of the plurality of rows, wherein at least some of the row processing operations are performed in parallel. 23. An apparatus, comprising: a sample holder to hold a sample to be imaged; an image capture device having a field of view, to capture an image of the field of view as a plurality of rows of pixels; an actuator; and a controller to control the actuator to cause relative movement between the sample holder and the image capture device at a given speed and at a given direction during an exposure time of the image capture device such that, in use, the sample moves across at least a portion of the field of view during the exposure time, wherein an axis of the rows of pixels is aligned with the given direction. 24. A program for causing a computer to perform the method of claim 20.
There is provided an apparatus with a sample holder to hold a sample to be imaged. An image capture device has a field of view and captures an image of the field of view. Also provided is an actuator. A controller controls the actuator to cause relative movement between the sample holder and the image capture device at a given speed and at a given direction during an exposure time of the image capture device such that, in use, the sample moves across at least a portion of the field of view during the exposure time. A processor performs a deblur algorithm to deblur the image using the given speed and the given direction.1. An apparatus, comprising: a sample holder to hold a sample to be imaged; an image capture device having a field of view, to capture an image of the field of view; an actuator; a controller to control the actuator to cause relative movement between the sample holder and the image capture device at a given speed and at a given direction during an exposure time of the image capture device such that, in use, the sample moves across at least a portion of the field of view during the exposure time; and a processor to perform a deblur algorithm to deblur the image using the given speed and the given direction. 2. The apparatus according to claim 1, wherein the given speed of the relative movement between the sample and the image capture device is substantially constant. 3. The apparatus according to claim 1, wherein the relative movement between the sample and the image capture device occurs substantially only in the given direction. 4. The apparatus according to claim 1, further comprising: speed determining circuitry to determine the given speed. 5. The apparatus according to claim 1, further comprising: direction determining circuitry to determine the given direction. 6. The apparatus according to claim 1, wherein: the image capture device is to capture a plurality of images of a plurality of fields of view of the image capture device; and the actuator is further to cause relative movement between the sample and the image capture device between each of the plurality of images such that the image capture device obtains the plurality of fields of view. 7. The apparatus according to claim 6, wherein: the sample holder holds a plurality of samples to be imaged; and the plurality of images comprises at least one image of each of the plurality of samples. 8. The apparatus according to claim 6, wherein two consecutive images in the plurality of images overlap by an amount greater than a product of the exposure time of the image capture device and the given speed. 9. The apparatus according to claim 6, wherein two consecutive images in the plurality of images overlap by an amount less than 120% of a product of the exposure time of the image capture device and the given speed. 10. The apparatus according to claim 1, wherein two consecutive images in the plurality of images overlap by 50%. 11. The apparatus according to claim 1, wherein the deblur algorithm is iterative. 12. The apparatus according to claim 1, wherein: the image comprises a plurality of rows of pixels; an axis of the rows of pixels is aligned with the given direction; and the deblur algorithm comprises a plurality of independent row processing operations each corresponding to a given row of the plurality of rows of pixels. 13. The apparatus according to claim 1, wherein at least some of the row processing operations are performed in parallel. 14. The apparatus according to claim 12, wherein: the deblur algorithm is iterative; at each iteration, an evaluation value for a row of pixels is determined; and based on the evaluation value for the row of pixels in one iteration and the evaluation value for the row of pixels in a next iteration, the deblur algorithm is to disregard that row of pixels in subsequent iterations. 15. The apparatus according to claim 14, wherein based on a difference between the evaluation value for the row of pixels in one iteration and the evaluation value for the row of pixels in the next iteration, the deblur algorithm is to ignore that row of pixels in subsequent iterations. 16. The apparatus according to claim 1, wherein the deblur algorithm is based on a Lucy-Richardson deconvolution process. 17. The apparatus according to claim 1, wherein the image capture device performs fluorescence imaging. 18. The apparatus according to claim 1, wherein the image capture device is a grayscale image capture device. 19. The apparatus according to claim 1, wherein the apparatus is a digital microscope. 20. An image processing method, comprising: holding a sample to be imaged; capturing an image of a field of view; causing relative movement between the sample and an image capture device at a given speed and a given direction such that the sample moves across a portion of the field of view; and performing a deblur algorithm to deblur the image using the given speed and the given direction, wherein an exposure time of the image capture device when capturing the image corresponds with a time taken for the sample to move across the portion of the field of view. 21. An image processing apparatus, comprising: means for holding a sample to be imaged; means for capturing an image of a field of view; means for actuating; means for controlling the means for actuating to cause relative movement between the means for holding the sample to be imaged and the means for capturing during an exposure time of the means for capturing such that, in use, the sample moves across at least a portion of the field of view during the exposure time, wherein the relative movement is at a given speed and a given direction; and means for performing a deblur algorithm to deblur the image using the given speed and the given direction. 22. An image processing method, comprising: receiving an input image on which deblurring is to be performed, wherein the input image comprises a plurality of rows of pixels; receiving a given speed and given direction; and performing a deblurring operation on the image by performing a plurality of independent row processing operations using the given speed and the given direction, each corresponding to a given row of the plurality of rows, wherein at least some of the row processing operations are performed in parallel. 23. An apparatus, comprising: a sample holder to hold a sample to be imaged; an image capture device having a field of view, to capture an image of the field of view as a plurality of rows of pixels; an actuator; and a controller to control the actuator to cause relative movement between the sample holder and the image capture device at a given speed and at a given direction during an exposure time of the image capture device such that, in use, the sample moves across at least a portion of the field of view during the exposure time, wherein an axis of the rows of pixels is aligned with the given direction. 24. A program for causing a computer to perform the method of claim 20.
2,400
8,589
8,589
15,243,472
2,497
One embodiment a method, including: providing, using a processor, a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; obtaining, using a processor, user image data; determining, using the user image data, that a user has performed the predetermined gesture; and thereafter providing the user access to information. Other aspects are described and claimed.
1. A method, comprising: providing, using a processor, a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; obtaining, using a processor, user image data; determining, using the user image data, that a user has performed the predetermined gesture; and thereafter providing the user access to information. 2. The method of claim 1, wherein the information is a protected web page requiring human action to obtain. 3. The method of claim 1, wherein the user image data comprises three dimensional (3D) image data. 4. The method of claim 1, further comprising transmitting, over a network, a web page comprising a request. 5. The method of claim 4, wherein the request comprises a request that the user perform the predetermined gesture. 6. The method of claim 1, further comprising storing image data of the user. 7. The method of claim 1, wherein the predetermined gesture comprises a series of predetermined gestures. 8. The method of claim 7, wherein each of the series of predetermined gestures is in a predetermined order. 9. The method of claim 8, wherein the determining comprises determining that the each of the series of predetermined gestures is performed in the predetermined order. 10. A device, comprising: a network connection; a processor; and a memory that stores instructions executable by the processor to: provide a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; obtain user image data; determine, using the user image data, that a user has performed the predetermined gesture; and thereafter provide the user access to information. 11. The device of claim 10, wherein the information is a protected web page requiring human action to obtain. 12. The device of claim 10, wherein the user image data comprises three dimensional (3D) image data. 13. The device of claim 10, wherein the processor executes instructions to transmit, over the network connection, a web page comprising a request. 14. The device of claim 13, wherein the request comprises a request that the user perform the predetermined gesture. 15. The device of claim 10, wherein the processor executes instructions to store image data of the user. 16. The device of claim 10, wherein the predetermined gesture comprises a series of predetermined gestures. 17. The device of claim 16, wherein each of the series of predetermined gestures is in a predetermined order. 18. The device of claim 17, wherein the processor determines that the each of the series of predetermined gestures is performed in the predetermined order. 19. The device of claim 10, wherein the device comprises a web server. 20. A program product, comprising: a computer readable storage device that stores code that is executable by a processor, the code comprising: code that provides a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; code that obtains user image data; code that determines, using the user image data, that a user has performed the predetermined gesture; and code that thereafter provides the user access to information.
One embodiment a method, including: providing, using a processor, a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; obtaining, using a processor, user image data; determining, using the user image data, that a user has performed the predetermined gesture; and thereafter providing the user access to information. Other aspects are described and claimed.1. A method, comprising: providing, using a processor, a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; obtaining, using a processor, user image data; determining, using the user image data, that a user has performed the predetermined gesture; and thereafter providing the user access to information. 2. The method of claim 1, wherein the information is a protected web page requiring human action to obtain. 3. The method of claim 1, wherein the user image data comprises three dimensional (3D) image data. 4. The method of claim 1, further comprising transmitting, over a network, a web page comprising a request. 5. The method of claim 4, wherein the request comprises a request that the user perform the predetermined gesture. 6. The method of claim 1, further comprising storing image data of the user. 7. The method of claim 1, wherein the predetermined gesture comprises a series of predetermined gestures. 8. The method of claim 7, wherein each of the series of predetermined gestures is in a predetermined order. 9. The method of claim 8, wherein the determining comprises determining that the each of the series of predetermined gestures is performed in the predetermined order. 10. A device, comprising: a network connection; a processor; and a memory that stores instructions executable by the processor to: provide a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; obtain user image data; determine, using the user image data, that a user has performed the predetermined gesture; and thereafter provide the user access to information. 11. The device of claim 10, wherein the information is a protected web page requiring human action to obtain. 12. The device of claim 10, wherein the user image data comprises three dimensional (3D) image data. 13. The device of claim 10, wherein the processor executes instructions to transmit, over the network connection, a web page comprising a request. 14. The device of claim 13, wherein the request comprises a request that the user perform the predetermined gesture. 15. The device of claim 10, wherein the processor executes instructions to store image data of the user. 16. The device of claim 10, wherein the predetermined gesture comprises a series of predetermined gestures. 17. The device of claim 16, wherein each of the series of predetermined gestures is in a predetermined order. 18. The device of claim 17, wherein the processor determines that the each of the series of predetermined gestures is performed in the predetermined order. 19. The device of claim 10, wherein the device comprises a web server. 20. A program product, comprising: a computer readable storage device that stores code that is executable by a processor, the code comprising: code that provides a user challenge over a network, wherein the user challenge is associated with a predetermined gesture to be performed by a user; code that obtains user image data; code that determines, using the user image data, that a user has performed the predetermined gesture; and code that thereafter provides the user access to information.
2,400
8,590
8,590
15,379,800
2,485
A vision system of a vehicle includes a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle. An image processor is operable to process image data captured by the camera. The camera is connected to a system of the vehicle via an image data transmission line. The image data transmission line transmits an image signal from the camera and provides a power signal to the camera. The image data transmission line includes a filter that filters electrical noise in at least one signal, such as the power signal, carried by the image data transmission line.
1. A vision system of a vehicle, said vision system comprising: a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle; an image processor operable to process image data captured by said camera; wherein said camera is connected to a system of the vehicle via an image data transmission line, and wherein said image data transmission line transmits an image signal from said camera and provides a power signal to said camera; and wherein said image data transmission line comprises a filter that filters electrical noise in at least one signal carried by said image data transmission line. 2. The vision system of claim 1, wherein said filter comprises a filtering circuit disposed in line with a linear voltage regulator. 3. The vision system of claim 1, wherein said filter comprises a filtering circuit disposed in line with a DC/DC converter. 4. The vision system of claim 1, wherein said camera comprises said image processor. 5. The vision system of claim 1, wherein said image processor is disposed remote from said camera, and wherein said image data transmission line transmits image data captured by said camera to said image processor. 6. The vision system of claim 1, wherein said image data transmission line communicates data captured by said camera to a control. 7. The vision system of claim 6, wherein said control comprises said image processor. 8. The vision system of claim 1, wherein said image data transmission line communicates a control signal to said camera. 9. The vision system of claim 1, comprising a display disposed in the vehicle and viewable by a driver of the vehicle, wherein said display displays images derived from image data captured by said camera and communicated via said image data transmission line. 10. The vision system of claim 1, wherein said filter filters electrical noise in the power signal carried by said image data transmission line to said camera. 11. A vision system of a vehicle, said vision system comprising: a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle; an image processor operable to process image data captured by said camera; wherein said camera is connected to a system of the vehicle via an image data transmission line, and wherein said image data transmission line transmits an image signal from said camera and provides a power signal to said camera; wherein said image data transmission line comprises a filter that filters electrical noise in at least one signal carried by said image data transmission line; wherein said filter comprises a filtering circuit disposed in line with at least one of (i) a linear voltage regulator and (ii) a DC/DC converter; and wherein said filter filters electrical noise in the power signal carried by said image data transmission line to said camera. 12. The vision system of claim 11, wherein said camera comprises said image processor. 13. The vision system of claim 11, wherein said image processor is disposed remote from said camera, and wherein said image data transmission line transmits image data captured by said camera to said image processor. 14. The vision system of claim 11, wherein said image data transmission line communicates data captured by said camera to a control, and wherein said control comprises said image processor. 15. The vision system of claim 11, comprising a display disposed in the vehicle and viewable by a driver of the vehicle, wherein said display displays images derived from image data captured by said camera and communicated via said image data transmission line. 16. A vision system of a vehicle, said vision system comprising: a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle; an image processor operable to process image data captured by said camera; wherein said camera is connected to a system of the vehicle via an image data transmission line, and wherein said image data transmission line transmits an image signal from said camera and provides a power signal to said camera; wherein said image data transmission line communicates a control signal to said camera; wherein said image data transmission line comprises a filter that filters electrical noise in at least one signal carried by said image data transmission line; and wherein said filter filters electrical noise in the power signal carried by said image data transmission line to said camera. 17. The vision system of claim 16, wherein said filter comprises a filtering circuit disposed in line with a linear voltage regulator. 18. The vision system of claim 16, wherein said filter comprises a filtering circuit disposed in line with a DC/DC converter. 19. The vision system of claim 16, wherein said camera comprises said image processor. 20. The vision system of claim 16, wherein said image processor is disposed remote from said camera, and wherein said image data transmission line transmits image data captured by said camera to said image processor.
A vision system of a vehicle includes a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle. An image processor is operable to process image data captured by the camera. The camera is connected to a system of the vehicle via an image data transmission line. The image data transmission line transmits an image signal from the camera and provides a power signal to the camera. The image data transmission line includes a filter that filters electrical noise in at least one signal, such as the power signal, carried by the image data transmission line.1. A vision system of a vehicle, said vision system comprising: a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle; an image processor operable to process image data captured by said camera; wherein said camera is connected to a system of the vehicle via an image data transmission line, and wherein said image data transmission line transmits an image signal from said camera and provides a power signal to said camera; and wherein said image data transmission line comprises a filter that filters electrical noise in at least one signal carried by said image data transmission line. 2. The vision system of claim 1, wherein said filter comprises a filtering circuit disposed in line with a linear voltage regulator. 3. The vision system of claim 1, wherein said filter comprises a filtering circuit disposed in line with a DC/DC converter. 4. The vision system of claim 1, wherein said camera comprises said image processor. 5. The vision system of claim 1, wherein said image processor is disposed remote from said camera, and wherein said image data transmission line transmits image data captured by said camera to said image processor. 6. The vision system of claim 1, wherein said image data transmission line communicates data captured by said camera to a control. 7. The vision system of claim 6, wherein said control comprises said image processor. 8. The vision system of claim 1, wherein said image data transmission line communicates a control signal to said camera. 9. The vision system of claim 1, comprising a display disposed in the vehicle and viewable by a driver of the vehicle, wherein said display displays images derived from image data captured by said camera and communicated via said image data transmission line. 10. The vision system of claim 1, wherein said filter filters electrical noise in the power signal carried by said image data transmission line to said camera. 11. A vision system of a vehicle, said vision system comprising: a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle; an image processor operable to process image data captured by said camera; wherein said camera is connected to a system of the vehicle via an image data transmission line, and wherein said image data transmission line transmits an image signal from said camera and provides a power signal to said camera; wherein said image data transmission line comprises a filter that filters electrical noise in at least one signal carried by said image data transmission line; wherein said filter comprises a filtering circuit disposed in line with at least one of (i) a linear voltage regulator and (ii) a DC/DC converter; and wherein said filter filters electrical noise in the power signal carried by said image data transmission line to said camera. 12. The vision system of claim 11, wherein said camera comprises said image processor. 13. The vision system of claim 11, wherein said image processor is disposed remote from said camera, and wherein said image data transmission line transmits image data captured by said camera to said image processor. 14. The vision system of claim 11, wherein said image data transmission line communicates data captured by said camera to a control, and wherein said control comprises said image processor. 15. The vision system of claim 11, comprising a display disposed in the vehicle and viewable by a driver of the vehicle, wherein said display displays images derived from image data captured by said camera and communicated via said image data transmission line. 16. A vision system of a vehicle, said vision system comprising: a camera configured to be disposed at a vehicle so as to have a field of view interior or exterior of the vehicle; an image processor operable to process image data captured by said camera; wherein said camera is connected to a system of the vehicle via an image data transmission line, and wherein said image data transmission line transmits an image signal from said camera and provides a power signal to said camera; wherein said image data transmission line communicates a control signal to said camera; wherein said image data transmission line comprises a filter that filters electrical noise in at least one signal carried by said image data transmission line; and wherein said filter filters electrical noise in the power signal carried by said image data transmission line to said camera. 17. The vision system of claim 16, wherein said filter comprises a filtering circuit disposed in line with a linear voltage regulator. 18. The vision system of claim 16, wherein said filter comprises a filtering circuit disposed in line with a DC/DC converter. 19. The vision system of claim 16, wherein said camera comprises said image processor. 20. The vision system of claim 16, wherein said image processor is disposed remote from said camera, and wherein said image data transmission line transmits image data captured by said camera to said image processor.
2,400
8,591
8,591
15,012,718
2,477
Some embodiments provide a method for a network controller that manages several managed forwarding elements. The method receives a request to trace a specified packet having a particular source on a logical switching element. The method generates the packet at the network controller according to the packet specification. The generated packet includes an indicator that the packet is for a trace operation. The method inserts the packet into a managed forwarding element associated with the particular source. The method receives a set of messages from a set of managed forwarding elements that process the packet regarding operations performed on the packet.
1-29. (canceled) 30. For a network controller that manages a set of managed forwarding elements (MFEs), a method comprising: receiving a request to trace a specified packet having a particular source on a logical forwarding element; at the network controller, defining data for a packet according to the packet specification, the data defined for the packet comprising an indicator that the packet is for a trace operation; inserting the defined packet data into a MFE associated with the particular source in order for the MFE to process the packet data as though receiving a packet from the particular source; and receiving a set of messages from a set of MFEs that process the packet data regarding operations performed on the packet data. 31. The method of claim 30, wherein the logical forwarding element is a logical switch and the particular source is a logical port of the logical switch. 32. The method of claim 31, wherein the logical port is associated with a MAC address of a virtual interface of a virtual machine that connects to the logical switch. 33. The method of claim 31, wherein the logical port is associated with an external network to which the logical switch connects, wherein a plurality of different MFEs are associated with the logical port, the method further comprising selecting one of the plurality of different MFEs associated with the logical port. 34. The method of claim 31, wherein the logical port is associated with a remote domain to which the logical switch connects, wherein a plurality of different MFEs are associated with the logical port, the method further comprising selecting one of the plurality of different MFEs associated with the logical port. 35. The method of claim 30, wherein the set of messages comprises a message from each MFE that encapsulates the packet data in a tunnel and sends the encapsulated packet data through the tunnel. 36. The method of claim 35, wherein each message regarding sending the packet data into a tunnel comprises an identifier for the MFE that encapsulates the packet data and an identifier for the tunnel through which the packet data is sent. 37. The method of claim 35, wherein when the MFE at which the packet data is inserted by the network controller sends the packet data directly to a destination MFE, only one message regarding sending the packet data into a tunnel is received by the network controller. 38. The method of claim 30, wherein the set of messages comprises a message from a destination MFE that delivers the packet to a logical port of the logical forwarding element. 39. The method of claim 38, wherein the message from the destination MFE comprises an identifier for the destination MFE and a port identifier for the logical port. 40. The method of claim 30, wherein inserting the packet comprises sending a command to modify at least one register of the MFE associated with the particular source. 41. A non-transitory machine readable medium storing a network controller program which when executed by at least one processing unit manages a plurality of managed forwarding elements (MFEs), the network controller program comprising sets of instructions for: receiving a request to trace a specified packet having a particular source on a logical forwarding element; defining data for a packet according to the packet specification, the data defined for the packet comprising an indicator that the packet is for a trace operation; inserting the defined packet data into a MFE associated with the particular source in order for the MFE to process the packet data as though receiving a packet from the particular source; and receiving a set of messages from a set of MFEs that process the packet data regarding operations performed on the packet data. 42. The non-transitory machine readable medium of claim 41, wherein the logical forwarding element is a logical switch and the particular source is a logical port of the logical switch. 43. The non-transitory machine readable medium of claim 42, wherein the logical port is associated with a MAC address of a virtual interface of a virtual machine that connects to the logical switch. 44. The non-transitory machine readable medium of claim 42, wherein a plurality of different MFEs are associated with the logical port, wherein the network controller program further comprises a set of instructions for selecting one of the plurality of different MFEs associated with the logical port. 45. The non-transitory machine readable medium of claim 41, wherein the set of messages comprises a message from each MFE that encapsulates the packet data in a tunnel and sends the encapsulated packet data through the tunnel. 46. The non-transitory machine readable medium of claim 45, wherein each message regarding sending the packet data into a tunnel comprises an identifier for the MFE that encapsulates the packet data and an identifier for the tunnel through which the packet data is sent. 47. The non-transitory machine readable medium of claim 41, wherein the set of messages comprises a message from a destination MFE that delivers the packet to a logical port of the logical forwarding element. 48. The non-transitory machine readable medium of claim 47, wherein the message from the destination MFE comprises an identifier for the destination managed forwarding element and a port identifier for the logical port. 49. The non-transitory machine readable medium of claim 41, wherein the set of instructions for inserting the packet comprises a set of instructions for sending a command to modify at least one register of the MFE associated with the particular source.
Some embodiments provide a method for a network controller that manages several managed forwarding elements. The method receives a request to trace a specified packet having a particular source on a logical switching element. The method generates the packet at the network controller according to the packet specification. The generated packet includes an indicator that the packet is for a trace operation. The method inserts the packet into a managed forwarding element associated with the particular source. The method receives a set of messages from a set of managed forwarding elements that process the packet regarding operations performed on the packet.1-29. (canceled) 30. For a network controller that manages a set of managed forwarding elements (MFEs), a method comprising: receiving a request to trace a specified packet having a particular source on a logical forwarding element; at the network controller, defining data for a packet according to the packet specification, the data defined for the packet comprising an indicator that the packet is for a trace operation; inserting the defined packet data into a MFE associated with the particular source in order for the MFE to process the packet data as though receiving a packet from the particular source; and receiving a set of messages from a set of MFEs that process the packet data regarding operations performed on the packet data. 31. The method of claim 30, wherein the logical forwarding element is a logical switch and the particular source is a logical port of the logical switch. 32. The method of claim 31, wherein the logical port is associated with a MAC address of a virtual interface of a virtual machine that connects to the logical switch. 33. The method of claim 31, wherein the logical port is associated with an external network to which the logical switch connects, wherein a plurality of different MFEs are associated with the logical port, the method further comprising selecting one of the plurality of different MFEs associated with the logical port. 34. The method of claim 31, wherein the logical port is associated with a remote domain to which the logical switch connects, wherein a plurality of different MFEs are associated with the logical port, the method further comprising selecting one of the plurality of different MFEs associated with the logical port. 35. The method of claim 30, wherein the set of messages comprises a message from each MFE that encapsulates the packet data in a tunnel and sends the encapsulated packet data through the tunnel. 36. The method of claim 35, wherein each message regarding sending the packet data into a tunnel comprises an identifier for the MFE that encapsulates the packet data and an identifier for the tunnel through which the packet data is sent. 37. The method of claim 35, wherein when the MFE at which the packet data is inserted by the network controller sends the packet data directly to a destination MFE, only one message regarding sending the packet data into a tunnel is received by the network controller. 38. The method of claim 30, wherein the set of messages comprises a message from a destination MFE that delivers the packet to a logical port of the logical forwarding element. 39. The method of claim 38, wherein the message from the destination MFE comprises an identifier for the destination MFE and a port identifier for the logical port. 40. The method of claim 30, wherein inserting the packet comprises sending a command to modify at least one register of the MFE associated with the particular source. 41. A non-transitory machine readable medium storing a network controller program which when executed by at least one processing unit manages a plurality of managed forwarding elements (MFEs), the network controller program comprising sets of instructions for: receiving a request to trace a specified packet having a particular source on a logical forwarding element; defining data for a packet according to the packet specification, the data defined for the packet comprising an indicator that the packet is for a trace operation; inserting the defined packet data into a MFE associated with the particular source in order for the MFE to process the packet data as though receiving a packet from the particular source; and receiving a set of messages from a set of MFEs that process the packet data regarding operations performed on the packet data. 42. The non-transitory machine readable medium of claim 41, wherein the logical forwarding element is a logical switch and the particular source is a logical port of the logical switch. 43. The non-transitory machine readable medium of claim 42, wherein the logical port is associated with a MAC address of a virtual interface of a virtual machine that connects to the logical switch. 44. The non-transitory machine readable medium of claim 42, wherein a plurality of different MFEs are associated with the logical port, wherein the network controller program further comprises a set of instructions for selecting one of the plurality of different MFEs associated with the logical port. 45. The non-transitory machine readable medium of claim 41, wherein the set of messages comprises a message from each MFE that encapsulates the packet data in a tunnel and sends the encapsulated packet data through the tunnel. 46. The non-transitory machine readable medium of claim 45, wherein each message regarding sending the packet data into a tunnel comprises an identifier for the MFE that encapsulates the packet data and an identifier for the tunnel through which the packet data is sent. 47. The non-transitory machine readable medium of claim 41, wherein the set of messages comprises a message from a destination MFE that delivers the packet to a logical port of the logical forwarding element. 48. The non-transitory machine readable medium of claim 47, wherein the message from the destination MFE comprises an identifier for the destination managed forwarding element and a port identifier for the logical port. 49. The non-transitory machine readable medium of claim 41, wherein the set of instructions for inserting the packet comprises a set of instructions for sending a command to modify at least one register of the MFE associated with the particular source.
2,400
8,592
8,592
14,741,102
2,419
A system and method for the melding of information from tracking systems and surveillance camera systems uses the tracking information as a means for indexing and organizing the image information from the surveillance camera systems. Video clips from surveillance cameras are accessed while tracking positions of user devices. This can enable the access of the image information using the tracked positions of the user devices.
1. A method for accessing image information from surveillance cameras, the method comprising: tracking positions of user devices; acquiring image information from surveillance cameras; and enabling the access of the image information using the tracked positions of the user devices. 2. The method of claim 1, wherein enabling access to the image information comprises: retrieving image information for time periods when the user devices were within fields of view of the surveillance cameras; and providing the retrieved image information to an operator. 3. The method of claim 1, wherein enabling access to the image information comprises: retrieving image information for time periods when the user devices were within fields of view of the surveillance cameras; and generating a compendium of the retrieved image information from multiple surveillance cameras. 4. The method of claim 1, further comprising determining fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices. 5. The method of claim 4, further comprising updating the fields of view of the surveillance cameras if pan angles or tilt angles or zoom positions of the surveillance camera changes. 6. The method of claim 1, further comprising: determining fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices; and comparing the fields of view to the positions of the user devices. 7. A system for accessing image information from surveillance cameras, the system comprising: a tracking system for tracking positions of user devices for a tracked coordinate space; a surveillance camera system for acquiring image information from surveillance cameras within the tracked coordinate space; and an image call-up system enabling the access of the image information using the tracked positions of the user devices. 8. The system of claim 7, wherein image call-up system retrieves image information for time periods when the user devices were within fields of view of the surveillance cameras and displaying the retrieved image information. 9. The system of claim 7, wherein image call-up system retrieves image information for time periods when the user devices were within fields of view of the surveillance cameras and generates a compendium of the retrieved image information from multiple surveillance cameras. 10. The system of claim 7, wherein the image call-up system determines fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices. 11. The system of claim 10, wherein the image call-up system updates the fields of view of the surveillance cameras if pan angles or tilt angles or zoom positions of the surveillance camera changes. 12. The system of claim 7, wherein the image call-up system determines fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices and compares the fields of view to the positions of the user devices. 13. A method for image information access, comprising: displaying a floor plan for a building; indicating paths of user devices with respect to the floor plan; indicating surveillance cameras along the paths; and enabling access to image information from the surveillance cameras for time periods when the user devices were within fields of view of the surveillance cameras along the paths. 14. The method of claim 13, wherein displaying the floor plan comprises displaying a schematic graphic on a video display device. 15. The method of claim 13, wherein enabling access to the image information comprises enabling selection of surveillance cameras along the paths and displaying image information for the paths of the user devices. 16. The method of claim 13, further comprising: determining fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices; comparing the fields of view to the positions of the user devices; and providing image information for surveillance cameras on the paths. 17. The method of claim 13, wherein enabling access to the image information comprises: retrieving image information for time periods when the user devices were within fields of view of the surveillance cameras; and generating a compendium of the retrieved image information from multiple surveillance cameras. 18. The method of claim 13, further comprising generating split displays with image information from multiple surveillance cameras for time periods when the user devices were within the fields of view of multiple surveillance cameras. 19. A system for image information access, comprising: a tracking system for tracking positions of user devices for a tracked coordinate space; a surveillance camera system for acquiring image information from surveillance cameras within the tracked coordinate space; and an image call-up system that displays a plan for the tracked coordinate space, indicates paths of user devices with respect to the plan, indicates surveillance cameras along the paths, and enables access to image information from the surveillance cameras for time periods when the user devices were within fields of view of the surveillance cameras along the paths. 20. The system of claim 19, wherein displaying the plan comprises displaying a schematic graphic on a video display device of the image call-up system. 21. The system of claim 19, wherein the image call-up system determines fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices, compares the fields of view to the positions of the user devices, and provides image information for surveillance cameras on the paths. 22. The system of claim 19, wherein the image call-up system retrieves image information for time periods when the user devices were within fields of view of the surveillance cameras and generates a compendium of the retrieved image information from multiple surveillance cameras. 23. The system of claim 19, wherein the image call-up system generates split displays with image information from multiple surveillance cameras for time periods when the user devices were within the fields of view of multiple surveillance cameras. 24. A method for accessing image information from surveillance cameras, the method comprising: tracking positions of user devices; acquiring image information with surveillance cameras; using the tracked positions of the user devices to find a surveillance camera with a field of view covering a current position of the user device; and providing image information from that surveillance camera. 25. A system for accessing image information from surveillance cameras, the system comprising: a tracking system for tracking positions of user devices for a tracked coordinate space; a surveillance camera system for acquiring image information from surveillance cameras within the tracked coordinate space; and an image call-up system using the tracked positions of the user devices to find a surveillance camera with a field of view covering a current position of the user device and providing image information from that surveillance camera.
A system and method for the melding of information from tracking systems and surveillance camera systems uses the tracking information as a means for indexing and organizing the image information from the surveillance camera systems. Video clips from surveillance cameras are accessed while tracking positions of user devices. This can enable the access of the image information using the tracked positions of the user devices.1. A method for accessing image information from surveillance cameras, the method comprising: tracking positions of user devices; acquiring image information from surveillance cameras; and enabling the access of the image information using the tracked positions of the user devices. 2. The method of claim 1, wherein enabling access to the image information comprises: retrieving image information for time periods when the user devices were within fields of view of the surveillance cameras; and providing the retrieved image information to an operator. 3. The method of claim 1, wherein enabling access to the image information comprises: retrieving image information for time periods when the user devices were within fields of view of the surveillance cameras; and generating a compendium of the retrieved image information from multiple surveillance cameras. 4. The method of claim 1, further comprising determining fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices. 5. The method of claim 4, further comprising updating the fields of view of the surveillance cameras if pan angles or tilt angles or zoom positions of the surveillance camera changes. 6. The method of claim 1, further comprising: determining fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices; and comparing the fields of view to the positions of the user devices. 7. A system for accessing image information from surveillance cameras, the system comprising: a tracking system for tracking positions of user devices for a tracked coordinate space; a surveillance camera system for acquiring image information from surveillance cameras within the tracked coordinate space; and an image call-up system enabling the access of the image information using the tracked positions of the user devices. 8. The system of claim 7, wherein image call-up system retrieves image information for time periods when the user devices were within fields of view of the surveillance cameras and displaying the retrieved image information. 9. The system of claim 7, wherein image call-up system retrieves image information for time periods when the user devices were within fields of view of the surveillance cameras and generates a compendium of the retrieved image information from multiple surveillance cameras. 10. The system of claim 7, wherein the image call-up system determines fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices. 11. The system of claim 10, wherein the image call-up system updates the fields of view of the surveillance cameras if pan angles or tilt angles or zoom positions of the surveillance camera changes. 12. The system of claim 7, wherein the image call-up system determines fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices and compares the fields of view to the positions of the user devices. 13. A method for image information access, comprising: displaying a floor plan for a building; indicating paths of user devices with respect to the floor plan; indicating surveillance cameras along the paths; and enabling access to image information from the surveillance cameras for time periods when the user devices were within fields of view of the surveillance cameras along the paths. 14. The method of claim 13, wherein displaying the floor plan comprises displaying a schematic graphic on a video display device. 15. The method of claim 13, wherein enabling access to the image information comprises enabling selection of surveillance cameras along the paths and displaying image information for the paths of the user devices. 16. The method of claim 13, further comprising: determining fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices; comparing the fields of view to the positions of the user devices; and providing image information for surveillance cameras on the paths. 17. The method of claim 13, wherein enabling access to the image information comprises: retrieving image information for time periods when the user devices were within fields of view of the surveillance cameras; and generating a compendium of the retrieved image information from multiple surveillance cameras. 18. The method of claim 13, further comprising generating split displays with image information from multiple surveillance cameras for time periods when the user devices were within the fields of view of multiple surveillance cameras. 19. A system for image information access, comprising: a tracking system for tracking positions of user devices for a tracked coordinate space; a surveillance camera system for acquiring image information from surveillance cameras within the tracked coordinate space; and an image call-up system that displays a plan for the tracked coordinate space, indicates paths of user devices with respect to the plan, indicates surveillance cameras along the paths, and enables access to image information from the surveillance cameras for time periods when the user devices were within fields of view of the surveillance cameras along the paths. 20. The system of claim 19, wherein displaying the plan comprises displaying a schematic graphic on a video display device of the image call-up system. 21. The system of claim 19, wherein the image call-up system determines fields of view of the surveillance cameras with respect to a tracked coordinate space for the user devices, compares the fields of view to the positions of the user devices, and provides image information for surveillance cameras on the paths. 22. The system of claim 19, wherein the image call-up system retrieves image information for time periods when the user devices were within fields of view of the surveillance cameras and generates a compendium of the retrieved image information from multiple surveillance cameras. 23. The system of claim 19, wherein the image call-up system generates split displays with image information from multiple surveillance cameras for time periods when the user devices were within the fields of view of multiple surveillance cameras. 24. A method for accessing image information from surveillance cameras, the method comprising: tracking positions of user devices; acquiring image information with surveillance cameras; using the tracked positions of the user devices to find a surveillance camera with a field of view covering a current position of the user device; and providing image information from that surveillance camera. 25. A system for accessing image information from surveillance cameras, the system comprising: a tracking system for tracking positions of user devices for a tracked coordinate space; a surveillance camera system for acquiring image information from surveillance cameras within the tracked coordinate space; and an image call-up system using the tracked positions of the user devices to find a surveillance camera with a field of view covering a current position of the user device and providing image information from that surveillance camera.
2,400
8,593
8,593
15,012,185
2,439
Disclosed are various examples for configuring network security based on device management characteristics. In one example, a specification of a set of network resources on an internal network is received from an administrator client. The set of network resources are those network resources that a particular application executed in client devices on an external network should be authorized to access. A gateway from the external network to the internal network is then configured to permit the particular application to have access to the set of network resources.
1. A non-transitory computer-readable medium embodying at least one program executable in at least one computing device, the at least one program, when executed by the at least one computing device, being configured to cause the at least one computing device to at least: receive, from an administrator client, a specification of a set of network resources on an internal network that a particular application executed in client devices on an external network should be authorized to access; and configure a gateway from the external network to the internal network to assign a network address meeting predefined criteria to a virtual private network tunnel endpoint corresponding to the particular application, the network address permitting the particular application to have access to the set of network resources. 2. The non-transitory computer-readable medium of claim 1, wherein when executed the at least one program further causes the at least one computing device to at least: receive, from the administrator client, a specification of at least one device management attribute that should be present on a client device on which the particular application is deployed in order to permit the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria; and configure the gateway to verify that the at least one device management attribute is present before permitting the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria. 3. The non-transitory computer-readable medium of claim 2, wherein the at least one device management attribute includes at least one of: a location of the client device, a user of the client device, an operating system of the client device, and a jailbreak status of the client device. 4. The non-transitory computer-readable medium of claim 1, wherein when executed the at least one program further causes the at least one computing device to at least: receive a package containing the particular application from the administrator client; and configure an application catalog to make the particular application available for deployment to the client devices. 5. A system, comprising: at least one computing device; and a network administration service executable by the at least one computing device, the network administration service configured to cause the at least one computing device to at least: receive, from an administrator client, a specification of a set of network resources on an internal network that a particular application executed in client devices on an external network should be authorized to access; and configure a gateway from the external network to the internal network to permit the particular application to have access to the set of network resources. 6. The system of claim 5, wherein configuring the gateway further comprises configuring the gateway to assign a network address meeting predefined criteria to a tunnel endpoint associated with the application, wherein network traffic from network addresses meeting the predefined criteria is permitted to be forwarded to the set of network resources by the internal network. 7. The system of claim 5, wherein when executed the network administration service is further configured to cause the at least one computing device to at least: receive, from the administrator client, a specification of at least one device management attribute that should be present on a client device on which the particular application is deployed in order to permit the particular application to have access to the set of network resources; and configure the gateway to verify that the at least one device management attribute is present before permitting the particular application to have access to the set of network resources. 8. The system of claim 7, wherein the at least one device management attribute includes at least one of: a location of the client device, a user of the client device, an operating system of the client device, and a jailbreak status of the client device. 9. The system of claim 7, wherein when executed the network administration service is further configured to cause the at least one computing device to at least configure the gateway to route network traffic from the particular application on the client device to a default network resource in response to determining that the at least one device management attribute is not present. 10. The system of claim 9, wherein when executed the network administration service is further configured to cause the at least one computing device to at least receive a specification of the default network resource from the administrator client. 11. The system of claim 5, wherein the gateway includes an endpoint for a virtual private network tunnel through the external network to a client device upon which the application is executed, and upon configuration the gateway is configured to assign a particular network address to the endpoint, wherein the internal network is configured to route network traffic from the particular network address to a virtual network segment of the internal network through which the set of network resources are accessible. 12. The system of claim 5, wherein the client devices are managed by an organization, and the internal network is operated by the organization. 13. The system of claim 5, wherein when executed the network administration service is further configured to cause the at least one computing device to at least generate a user interface that includes a selection component to select a particular security group from a plurality of security groups, the particular security group corresponding to the set of network resources. 14. The system of claim 5, wherein when executed the network administration service is further configured to cause the at least one computing device to at least: receive a package containing the particular application from the administrator client; and configure an application catalog to make the particular application available for deployment to the client devices. 15. A method, comprising: receiving, from an administrator client, a specification of a set of network resources on an internal network that a particular application executed in client devices on an external network should be authorized to access; and configuring a gateway from the external network to the internal network to assign a network address meeting predefined criteria to a virtual private network tunnel endpoint corresponding to the particular application, the network address permitting the particular application to have access to the set of network resources. 16. The method of claim 15, further comprising receiving a mapping of the set of network resources to the predefined criteria from a network controller. 17. The method of claim 15, further comprising: receiving a package containing the particular application from the administrator client; and configuring an application catalog to make the particular application available for deployment to the client devices. 18. The method of claim 15, further comprising: receiving, from the administrator client, a specification of at least one device management attribute that should be present on a client device on which the particular application is deployed in order to permit the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria; and configuring the gateway to verify that the at least one device management attribute is present before permitting the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria. 19. The method of claim 18, wherein the at least one device management attribute includes at least one of: a location of the client device, a user of the client device, an operating system of the client device, and a jailbreak status of the client device. 20. The method of claim 18, further comprising configuring the gateway to assign a different network address meeting different predefined criteria to the virtual private network tunnel endpoint in response to determining that the at least one device management attribute is not present, wherein the different network address permits the particular application to have access to a default network resource but not to the set of network resources.
Disclosed are various examples for configuring network security based on device management characteristics. In one example, a specification of a set of network resources on an internal network is received from an administrator client. The set of network resources are those network resources that a particular application executed in client devices on an external network should be authorized to access. A gateway from the external network to the internal network is then configured to permit the particular application to have access to the set of network resources.1. A non-transitory computer-readable medium embodying at least one program executable in at least one computing device, the at least one program, when executed by the at least one computing device, being configured to cause the at least one computing device to at least: receive, from an administrator client, a specification of a set of network resources on an internal network that a particular application executed in client devices on an external network should be authorized to access; and configure a gateway from the external network to the internal network to assign a network address meeting predefined criteria to a virtual private network tunnel endpoint corresponding to the particular application, the network address permitting the particular application to have access to the set of network resources. 2. The non-transitory computer-readable medium of claim 1, wherein when executed the at least one program further causes the at least one computing device to at least: receive, from the administrator client, a specification of at least one device management attribute that should be present on a client device on which the particular application is deployed in order to permit the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria; and configure the gateway to verify that the at least one device management attribute is present before permitting the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria. 3. The non-transitory computer-readable medium of claim 2, wherein the at least one device management attribute includes at least one of: a location of the client device, a user of the client device, an operating system of the client device, and a jailbreak status of the client device. 4. The non-transitory computer-readable medium of claim 1, wherein when executed the at least one program further causes the at least one computing device to at least: receive a package containing the particular application from the administrator client; and configure an application catalog to make the particular application available for deployment to the client devices. 5. A system, comprising: at least one computing device; and a network administration service executable by the at least one computing device, the network administration service configured to cause the at least one computing device to at least: receive, from an administrator client, a specification of a set of network resources on an internal network that a particular application executed in client devices on an external network should be authorized to access; and configure a gateway from the external network to the internal network to permit the particular application to have access to the set of network resources. 6. The system of claim 5, wherein configuring the gateway further comprises configuring the gateway to assign a network address meeting predefined criteria to a tunnel endpoint associated with the application, wherein network traffic from network addresses meeting the predefined criteria is permitted to be forwarded to the set of network resources by the internal network. 7. The system of claim 5, wherein when executed the network administration service is further configured to cause the at least one computing device to at least: receive, from the administrator client, a specification of at least one device management attribute that should be present on a client device on which the particular application is deployed in order to permit the particular application to have access to the set of network resources; and configure the gateway to verify that the at least one device management attribute is present before permitting the particular application to have access to the set of network resources. 8. The system of claim 7, wherein the at least one device management attribute includes at least one of: a location of the client device, a user of the client device, an operating system of the client device, and a jailbreak status of the client device. 9. The system of claim 7, wherein when executed the network administration service is further configured to cause the at least one computing device to at least configure the gateway to route network traffic from the particular application on the client device to a default network resource in response to determining that the at least one device management attribute is not present. 10. The system of claim 9, wherein when executed the network administration service is further configured to cause the at least one computing device to at least receive a specification of the default network resource from the administrator client. 11. The system of claim 5, wherein the gateway includes an endpoint for a virtual private network tunnel through the external network to a client device upon which the application is executed, and upon configuration the gateway is configured to assign a particular network address to the endpoint, wherein the internal network is configured to route network traffic from the particular network address to a virtual network segment of the internal network through which the set of network resources are accessible. 12. The system of claim 5, wherein the client devices are managed by an organization, and the internal network is operated by the organization. 13. The system of claim 5, wherein when executed the network administration service is further configured to cause the at least one computing device to at least generate a user interface that includes a selection component to select a particular security group from a plurality of security groups, the particular security group corresponding to the set of network resources. 14. The system of claim 5, wherein when executed the network administration service is further configured to cause the at least one computing device to at least: receive a package containing the particular application from the administrator client; and configure an application catalog to make the particular application available for deployment to the client devices. 15. A method, comprising: receiving, from an administrator client, a specification of a set of network resources on an internal network that a particular application executed in client devices on an external network should be authorized to access; and configuring a gateway from the external network to the internal network to assign a network address meeting predefined criteria to a virtual private network tunnel endpoint corresponding to the particular application, the network address permitting the particular application to have access to the set of network resources. 16. The method of claim 15, further comprising receiving a mapping of the set of network resources to the predefined criteria from a network controller. 17. The method of claim 15, further comprising: receiving a package containing the particular application from the administrator client; and configuring an application catalog to make the particular application available for deployment to the client devices. 18. The method of claim 15, further comprising: receiving, from the administrator client, a specification of at least one device management attribute that should be present on a client device on which the particular application is deployed in order to permit the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria; and configuring the gateway to verify that the at least one device management attribute is present before permitting the virtual private network tunnel endpoint to be assigned the network address meeting the predefined criteria. 19. The method of claim 18, wherein the at least one device management attribute includes at least one of: a location of the client device, a user of the client device, an operating system of the client device, and a jailbreak status of the client device. 20. The method of claim 18, further comprising configuring the gateway to assign a different network address meeting different predefined criteria to the virtual private network tunnel endpoint in response to determining that the at least one device management attribute is not present, wherein the different network address permits the particular application to have access to a default network resource but not to the set of network resources.
2,400
8,594
8,594
14,556,197
2,492
Methods and apparatus for identifying media are described. An example method includes determining application identification information for a media presentation application executing on a media device, determining a first watermark for the application identification information from a lookup table, requesting media identification information for media from the media presentation application, determining a second watermark for the media identification information from the lookup table, inserting the first watermark in the media prior to output of the media by the media device, and inserting the second watermark in the media prior to the output of the media by the media device.
1. A method comprising: requesting media identification information for media from a media presentation application; determining a watermark for the media identification information from a lookup table; inserting the watermark in the media prior to the output of the media by the media device.
Methods and apparatus for identifying media are described. An example method includes determining application identification information for a media presentation application executing on a media device, determining a first watermark for the application identification information from a lookup table, requesting media identification information for media from the media presentation application, determining a second watermark for the media identification information from the lookup table, inserting the first watermark in the media prior to output of the media by the media device, and inserting the second watermark in the media prior to the output of the media by the media device.1. A method comprising: requesting media identification information for media from a media presentation application; determining a watermark for the media identification information from a lookup table; inserting the watermark in the media prior to the output of the media by the media device.
2,400
8,595
8,595
15,469,095
2,453
Various systems and methods for request distribution are described herein. In an example, a system for request distribution includes a storage to store instructions and a processor. In an example, upon execution of the instructions, the processor instructs the system to identify an endpoint for routing a request based on a request value using a global lookup table. In an example, upon execution of the instructions, the processor instructs the system to generate a case identifier, wherein the case identifier includes a case hint based on the endpoint for routing the request. In an example, upon execution of the instructions, the processor instructs the system to route the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and a data shard corresponding to the request.
1. A system for request distribution comprising: a storage device to store instructions; a processor, that upon execution of the instructions, instructs the system to: identify an endpoint for routing a request based on a request value and a global lookup table; generate a case identifier, wherein the case identifier comprises a case hint based on the endpoint for routing the request; and route the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and a data shard corresponding to the request. 2. The system of claim 1, wherein the data shard is information specific to a user making the request. 3. The system of claim 1, wherein, the processor is to: detect that there is no co-location of a service agent to process the request and a data shard corresponding to the request; and select the independent scale group based on a distance from a request location to a location of the independent scale group. 4. The system of claim 1, wherein: the request value comprises a safe harbor restriction; and the case hint reflects the safe harbor restriction. 5. The system of claim 1, wherein: the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and data shard; the request value comprises a safe harbor restriction; the case hint reflects the safe harbor restriction; and a route of the request determined with priority given first by the safe harbor restriction and then by the co-location of the geographic interaction point and the data shard. 6. The system of claim 1, wherein the request value comprises one or more of product manufacturing information, a geographic location of a service center, a broad topic included in the request, a date the request was detected, a country of origin of the request, a predominant language of the country of origin of the request, or a location associated with a user making the request. 7. The system of claim 1, wherein the global lookup table uses a schema to identify a location of a data shard associated with the request value. 8. The system of claim 1, wherein the processor, upon execution of the instructions, instructs the system to process the request from a web portal. 9. The system of claim 1, wherein the processor, upon execution of the instructions, instructs the system to process the request from a telephone communication. 10. The system of claim 1, wherein the processor, upon execution of the instructions, instructs the system to process the request from a web chat application. 11. A method for request distribution, comprising: identifying an endpoint for routing a request based on a request value using a global lookup table; generating a case identifier, wherein the case identifier comprises a case hint based on the endpoint for routing the request; and routing the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent. 12. The method of claim 11, wherein the data shard is information specific to a user making the request. 13. The method of claim 11, wherein the method comprises: detecting that there is no co-location of a service agent to process the request and a data shard corresponding to the request; and selecting the independent scale group based on a distance from a request location to a location of the independent scale group. 14. The method of claim 11, wherein: the request value comprises a safe harbor restriction; and the case hint reflects the safe harbor restriction. 15. The method of claim 11, wherein: the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and data shard; the request value comprises a safe harbor restriction; the case hint reflects the safe harbor restriction; and a route of the request determined with priority given first to the safe harbor restriction and then to the co-location of the geographic interaction point and the data shard. 16. The method of claim 11, wherein the request value comprises one or more of product manufacturing information, geographic location of a service center, a broad topic included in the request, a date the request was made, a country of origin of the request, a predominant language of the country of origin of the request, or a location associated with a user making the request. 17. A tangible computer-readable storage media comprising instructions that, in response to an execution by a processor, cause the processor to: identify an endpoint for routing a request based on a request value using a global lookup table; generate a case identifier, wherein the case identifier comprises a case hint based on the endpoint for routing the request; and route the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent. 18. The tangible computer-readable storage media of claim 17, wherein the data shard is information specific to a user making the request. 19. The tangible computer-readable storage media of claim 17, wherein, the processor may also: detect that there is no co-location of a service agent to process the request and a data shard corresponding to the request; and select the independent scale group based on a distance from a request location to a location of the independent scale group. 20. The tangible computer-readable storage media of claim 17, wherein: the request value comprises a safe harbor restriction; and the case hint reflects the safe harbor restriction.
Various systems and methods for request distribution are described herein. In an example, a system for request distribution includes a storage to store instructions and a processor. In an example, upon execution of the instructions, the processor instructs the system to identify an endpoint for routing a request based on a request value using a global lookup table. In an example, upon execution of the instructions, the processor instructs the system to generate a case identifier, wherein the case identifier includes a case hint based on the endpoint for routing the request. In an example, upon execution of the instructions, the processor instructs the system to route the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and a data shard corresponding to the request.1. A system for request distribution comprising: a storage device to store instructions; a processor, that upon execution of the instructions, instructs the system to: identify an endpoint for routing a request based on a request value and a global lookup table; generate a case identifier, wherein the case identifier comprises a case hint based on the endpoint for routing the request; and route the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and a data shard corresponding to the request. 2. The system of claim 1, wherein the data shard is information specific to a user making the request. 3. The system of claim 1, wherein, the processor is to: detect that there is no co-location of a service agent to process the request and a data shard corresponding to the request; and select the independent scale group based on a distance from a request location to a location of the independent scale group. 4. The system of claim 1, wherein: the request value comprises a safe harbor restriction; and the case hint reflects the safe harbor restriction. 5. The system of claim 1, wherein: the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and data shard; the request value comprises a safe harbor restriction; the case hint reflects the safe harbor restriction; and a route of the request determined with priority given first by the safe harbor restriction and then by the co-location of the geographic interaction point and the data shard. 6. The system of claim 1, wherein the request value comprises one or more of product manufacturing information, a geographic location of a service center, a broad topic included in the request, a date the request was detected, a country of origin of the request, a predominant language of the country of origin of the request, or a location associated with a user making the request. 7. The system of claim 1, wherein the global lookup table uses a schema to identify a location of a data shard associated with the request value. 8. The system of claim 1, wherein the processor, upon execution of the instructions, instructs the system to process the request from a web portal. 9. The system of claim 1, wherein the processor, upon execution of the instructions, instructs the system to process the request from a telephone communication. 10. The system of claim 1, wherein the processor, upon execution of the instructions, instructs the system to process the request from a web chat application. 11. A method for request distribution, comprising: identifying an endpoint for routing a request based on a request value using a global lookup table; generating a case identifier, wherein the case identifier comprises a case hint based on the endpoint for routing the request; and routing the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent. 12. The method of claim 11, wherein the data shard is information specific to a user making the request. 13. The method of claim 11, wherein the method comprises: detecting that there is no co-location of a service agent to process the request and a data shard corresponding to the request; and selecting the independent scale group based on a distance from a request location to a location of the independent scale group. 14. The method of claim 11, wherein: the request value comprises a safe harbor restriction; and the case hint reflects the safe harbor restriction. 15. The method of claim 11, wherein: the independent scale group is selected based on a co-location of a geographic interaction point for a service agent and data shard; the request value comprises a safe harbor restriction; the case hint reflects the safe harbor restriction; and a route of the request determined with priority given first to the safe harbor restriction and then to the co-location of the geographic interaction point and the data shard. 16. The method of claim 11, wherein the request value comprises one or more of product manufacturing information, geographic location of a service center, a broad topic included in the request, a date the request was made, a country of origin of the request, a predominant language of the country of origin of the request, or a location associated with a user making the request. 17. A tangible computer-readable storage media comprising instructions that, in response to an execution by a processor, cause the processor to: identify an endpoint for routing a request based on a request value using a global lookup table; generate a case identifier, wherein the case identifier comprises a case hint based on the endpoint for routing the request; and route the request to an independent scale group based on the case hint, wherein the independent scale group is selected based on a co-location of a geographic interaction point for a service agent. 18. The tangible computer-readable storage media of claim 17, wherein the data shard is information specific to a user making the request. 19. The tangible computer-readable storage media of claim 17, wherein, the processor may also: detect that there is no co-location of a service agent to process the request and a data shard corresponding to the request; and select the independent scale group based on a distance from a request location to a location of the independent scale group. 20. The tangible computer-readable storage media of claim 17, wherein: the request value comprises a safe harbor restriction; and the case hint reflects the safe harbor restriction.
2,400
8,596
8,596
15,875,044
2,477
A computer network includes a server computer having communication ports that are wired to switch ports of two separate network switches. The network switches receive link aggregation control packets from the server computer, and automatically aggregate corresponding switch ports into a single logical port channel based on contents of the control packets.
1. A computer network comprising: a server computer having a first communication port and a second communication port; a first network switch having a first switch port that is adapted to receive a first network traffic from the first communication port of the server computer by way of a first wired connection between the first switch port of the first network switch and the first communication port of the server computer; and a second network switch having a first switch port that is adapted to receive a second network traffic from the second communication port of the server computer by way of a second wired connection between the first switch port of the second network switch and the second communication port of the server computer, wherein the first network switch is adapted to extract link aggregation data from the first network traffic received at the first switch port of the first network switch, and to add the first switch port of the first network switch as a member of a first port channel aggregation that includes the first switch port of the second network switch and that has a same aggregation information as indicated in the link aggregation data extracted from the first network traffic. 2. The computer network of claim 1, wherein the first communication port of the server computer is a Network Interface Card (NIC) port. 3. The computer network of claim 1, wherein the first wired connection is a backplane connection. 4. The computer network of claim 1, wherein the first network switch and the second network switch are configured as peer network devices, with the first network switch being a primary switch and the second network switch being a secondary switch. 5. The computer network of claim 4, wherein the second network switch is adapted to receive from the first network switch a peer notification indicating an update to a second port channel aggregation that has a first port channel aggregation number and has a first aggregation information. 6. The computer network of claim 5, wherein, in response to receiving the peer notification from the first network switch, the second network switch is adapted to delete a third port channel aggregation maintained by the second network switch and having a second port channel aggregation number and a second aggregation information, wherein the first port channel aggregation number is different from the second port channel aggregation number, and the first aggregation information is same as the second aggregation information. 7. The computer network of claim 6, wherein the first aggregation information and the second aggregation information are a partner system identifier of the first network switch and the second network switch. 8. The computer network of claim 6, wherein the peer notification is received over an inter-peer link that connects the first network switch to the second network switch. 9. A computer-implemented method of automatically configuring a multi-chassis link aggregation in network switches, the method comprising: receiving a first network traffic at a first switch port of a first network switch; receiving a second network traffic at a first switch port of a second network switch; extracting a control packet from the first network traffic received at the first switch port of the first network switch; and configuring, in the first network switch, a multi-chassis link aggregation that includes the first switch port of the first network switch and the first switch port of the second network switch based on a partner aggregation key and a partner system identifier indicated in the control packet extracted from the first network traffic, wherein the partner aggregation key and the partner system identifier corresponds to the multi-chassis link aggregation. 10. The method of claim 9, wherein configuring the multi-chassis link aggregation comprises: adding the first switch port of the first network switch to the multi-chassis link aggregation in response to detecting that the first switch port of the first network switch is not a member of the multi-chassis link aggregation, and the partner aggregation key and the partner system identifier indicated in the extracted control packet are same as those of the multi-chassis link aggregation. 11. The method of claim 9, wherein the first network switch is a primary switch and the second network switch is a secondary switch in a multi-chassis peer arrangement, and the method further comprises: creating the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the first network switch with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet. 12. The method of claim 9, wherein the first network switch is a secondary switch and the second network switch is a primary switch in a multi-chassis peer arrangement, and the method further comprises: creating, in the first network switch, the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the first and second network switches with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet. 13. The method of claim 9, wherein the first network switch is a secondary switch and the second network switch is a primary switch in a multi-chassis peer arrangement, and the method further comprises: creating, in the first network switch, the multi-chassis link aggregation with a same port channel number as another multi-chassis link aggregation in the second network switch in response to detecting that the other multi-chassis link aggregation in the second network switch has a same partner aggregation key and partner system identifier as those indicated in the extracted control packet. 14. The method of claim 9, further comprising: receiving, in the first network switch, a peer notification from the second network switch, the peer notification involving an update to another multi-chassis link aggregation; and discarding the peer notification when the first network switch is a primary switch in a multi-chassis peer arrangement and the second network switch is a secondary switch in the multi-chassis peer arrangement. 15. The method of claim 9, further comprising: receiving, in the first network switch, a peer notification from the second network switch, the peer notification involving an update to another multi-chassis link aggregation; and deleting the multi-chassis link aggregation in the first network switch when the first network switch is a secondary switch in a multi-chassis peer arrangement, the second network switch is a primary switch in the multi-chassis peer arrangement, and the multi-chassis link aggregation in the first network switch has a same partner system identifier and partner aggregation key as the other multi-chassis link aggregation in the second network switch. 16. A network switch comprising: a processor; and a memory that is configured to store instructions that when executed by the processor cause the network switch to: receive network traffic at a first switch port of the network switch; extract a control packet from the first network traffic received at the first switch port of the network switch; and configure a multi-chassis link aggregation that includes the switch port of the network switch and a first switch port of another network switch based on a partner aggregation key and a partner system identifier indicated in the control packet extracted from the network traffic, wherein the partner aggregation key and the partner system identifier correspond to the multi-chassis link aggregation. 17. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: add the first switch port of the network switch to the multi-chassis link aggregation in response to detecting that the first switch port of the first network switch is not a member of the multi-chassis link aggregation, and the partner aggregation key and the partner system identifier indicated in the extracted control packet are same as those of the multi-chassis link aggregation. 18. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: create the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the network switch with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet, wherein the network switch is a primary switch and the other network switch is a secondary switch in a multi-chassis peer arrangement 19. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: create, in the network switch, the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the network switch and in the other network switch with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet, wherein the network switch is a secondary switch and the other network switch is a primary switch in a multi-chassis peer arrangement. 20. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: creating, in the network switch, the multi-chassis link aggregation with a same port channel number as another multi-chassis link aggregation in the other network switch in response to detecting that the other multi-chassis link aggregation in the other network switch has a same partner aggregation key and partner system identifier as those indicated in the extracted control packet, wherein the network switch is a secondary switch and the other network switch is a primary switch in a multi-chassis peer arrangement.
A computer network includes a server computer having communication ports that are wired to switch ports of two separate network switches. The network switches receive link aggregation control packets from the server computer, and automatically aggregate corresponding switch ports into a single logical port channel based on contents of the control packets.1. A computer network comprising: a server computer having a first communication port and a second communication port; a first network switch having a first switch port that is adapted to receive a first network traffic from the first communication port of the server computer by way of a first wired connection between the first switch port of the first network switch and the first communication port of the server computer; and a second network switch having a first switch port that is adapted to receive a second network traffic from the second communication port of the server computer by way of a second wired connection between the first switch port of the second network switch and the second communication port of the server computer, wherein the first network switch is adapted to extract link aggregation data from the first network traffic received at the first switch port of the first network switch, and to add the first switch port of the first network switch as a member of a first port channel aggregation that includes the first switch port of the second network switch and that has a same aggregation information as indicated in the link aggregation data extracted from the first network traffic. 2. The computer network of claim 1, wherein the first communication port of the server computer is a Network Interface Card (NIC) port. 3. The computer network of claim 1, wherein the first wired connection is a backplane connection. 4. The computer network of claim 1, wherein the first network switch and the second network switch are configured as peer network devices, with the first network switch being a primary switch and the second network switch being a secondary switch. 5. The computer network of claim 4, wherein the second network switch is adapted to receive from the first network switch a peer notification indicating an update to a second port channel aggregation that has a first port channel aggregation number and has a first aggregation information. 6. The computer network of claim 5, wherein, in response to receiving the peer notification from the first network switch, the second network switch is adapted to delete a third port channel aggregation maintained by the second network switch and having a second port channel aggregation number and a second aggregation information, wherein the first port channel aggregation number is different from the second port channel aggregation number, and the first aggregation information is same as the second aggregation information. 7. The computer network of claim 6, wherein the first aggregation information and the second aggregation information are a partner system identifier of the first network switch and the second network switch. 8. The computer network of claim 6, wherein the peer notification is received over an inter-peer link that connects the first network switch to the second network switch. 9. A computer-implemented method of automatically configuring a multi-chassis link aggregation in network switches, the method comprising: receiving a first network traffic at a first switch port of a first network switch; receiving a second network traffic at a first switch port of a second network switch; extracting a control packet from the first network traffic received at the first switch port of the first network switch; and configuring, in the first network switch, a multi-chassis link aggregation that includes the first switch port of the first network switch and the first switch port of the second network switch based on a partner aggregation key and a partner system identifier indicated in the control packet extracted from the first network traffic, wherein the partner aggregation key and the partner system identifier corresponds to the multi-chassis link aggregation. 10. The method of claim 9, wherein configuring the multi-chassis link aggregation comprises: adding the first switch port of the first network switch to the multi-chassis link aggregation in response to detecting that the first switch port of the first network switch is not a member of the multi-chassis link aggregation, and the partner aggregation key and the partner system identifier indicated in the extracted control packet are same as those of the multi-chassis link aggregation. 11. The method of claim 9, wherein the first network switch is a primary switch and the second network switch is a secondary switch in a multi-chassis peer arrangement, and the method further comprises: creating the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the first network switch with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet. 12. The method of claim 9, wherein the first network switch is a secondary switch and the second network switch is a primary switch in a multi-chassis peer arrangement, and the method further comprises: creating, in the first network switch, the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the first and second network switches with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet. 13. The method of claim 9, wherein the first network switch is a secondary switch and the second network switch is a primary switch in a multi-chassis peer arrangement, and the method further comprises: creating, in the first network switch, the multi-chassis link aggregation with a same port channel number as another multi-chassis link aggregation in the second network switch in response to detecting that the other multi-chassis link aggregation in the second network switch has a same partner aggregation key and partner system identifier as those indicated in the extracted control packet. 14. The method of claim 9, further comprising: receiving, in the first network switch, a peer notification from the second network switch, the peer notification involving an update to another multi-chassis link aggregation; and discarding the peer notification when the first network switch is a primary switch in a multi-chassis peer arrangement and the second network switch is a secondary switch in the multi-chassis peer arrangement. 15. The method of claim 9, further comprising: receiving, in the first network switch, a peer notification from the second network switch, the peer notification involving an update to another multi-chassis link aggregation; and deleting the multi-chassis link aggregation in the first network switch when the first network switch is a secondary switch in a multi-chassis peer arrangement, the second network switch is a primary switch in the multi-chassis peer arrangement, and the multi-chassis link aggregation in the first network switch has a same partner system identifier and partner aggregation key as the other multi-chassis link aggregation in the second network switch. 16. A network switch comprising: a processor; and a memory that is configured to store instructions that when executed by the processor cause the network switch to: receive network traffic at a first switch port of the network switch; extract a control packet from the first network traffic received at the first switch port of the network switch; and configure a multi-chassis link aggregation that includes the switch port of the network switch and a first switch port of another network switch based on a partner aggregation key and a partner system identifier indicated in the control packet extracted from the network traffic, wherein the partner aggregation key and the partner system identifier correspond to the multi-chassis link aggregation. 17. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: add the first switch port of the network switch to the multi-chassis link aggregation in response to detecting that the first switch port of the first network switch is not a member of the multi-chassis link aggregation, and the partner aggregation key and the partner system identifier indicated in the extracted control packet are same as those of the multi-chassis link aggregation. 18. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: create the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the network switch with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet, wherein the network switch is a primary switch and the other network switch is a secondary switch in a multi-chassis peer arrangement 19. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: create, in the network switch, the multi-chassis link aggregation in response to detecting that there is no port channel aggregation in the network switch and in the other network switch with a same partner aggregation key and partner system identifier as those indicated in the extracted control packet, wherein the network switch is a secondary switch and the other network switch is a primary switch in a multi-chassis peer arrangement. 20. The network switch of claim 16, wherein the instructions stored in the memory, when executed by the processor, further cause the network switch to: creating, in the network switch, the multi-chassis link aggregation with a same port channel number as another multi-chassis link aggregation in the other network switch in response to detecting that the other multi-chassis link aggregation in the other network switch has a same partner aggregation key and partner system identifier as those indicated in the extracted control packet, wherein the network switch is a secondary switch and the other network switch is a primary switch in a multi-chassis peer arrangement.
2,400
8,597
8,597
16,019,847
2,438
Disclosed are various examples for multi-party authentication and authentication. In one example, a user can gain access to secured data stored by a managed device based on the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.
1. A method, comprising: receiving an access request from a first user to access secured data stored on a first computing device; determining that access by the first user to the secured data requires that a minimum quantity of a set of second users be within a threshold proximity of the first computing device; determining a location of the first computing device; determining a respective location of at least one second computing device individually associated with at least one of the set of second users; determining that the minimum quantity of the set of second users are within the threshold proximity based at least in part on the location and the respective location of the at least one second computing device; and facilitating access by the first user to the secured data. 2. The method of claim 1, wherein the at least one second computing device also stores the secured data. 3. The method of claim 1, further comprising communicating with a management server to determine the respective location of at least one second computing device. 4. The method of claim 1, further comprising communicating directly with the at least one second computing device by way of a local wireless connection to determine the respective location of at least one second computing device. 5. The method of claim 1, wherein the at least one second computing device is determined to be within the threshold proximity when direct communication between the first computing device and the at least one second computing device by way of a local wireless connection is successful. 6. The method of claim 1, wherein the minimum quantity of the set of second users comprises at least two second users. 7. The method of claim 1, wherein the location of the first computing device is determined using a global positioning system (GPS) device. 8. The method of claim 1, further comprising receiving an incorrect security credential from the first user before determining that access by the first user to the secured data requires that the minimum quantity of the set of second users be within the threshold proximity of the first computing device. 9. The method of claim 1, further comprising receiving an indication from the first user that a required security credential cannot be provided before determining that access by the first user to the secured data requires that the minimum quantity of the set of second users be within the threshold proximity of the first computing device. 10. The method of claim 1, further comprising determining that the secured data is of a sufficient importance in spite of a required security credential being provided by the first user so that access by the first user to the secured data requires that the minimum quantity of the set of second users be within the threshold proximity of the first computing device. 11. A system, comprising: a first computing device comprising a processor and a memory; and executable instructions stored by the memory, wherein when executed by the processor causes the first computing device to at least: receive an access request from a first user to access secured data stored by the memory; determine that access by the first user to the secured data requires that a minimum quantity of a set of second users be within a threshold proximity of the first computing device; determine a location of the first computing device; determine a respective location of at least one second computing device individually associated with at least one of the set of second users; determine that the minimum quantity of the set of second users are within the threshold proximity based at least in part on the location and the respective location of the at least one second computing device; and facilitate access by the first user to the secured data. 12. The system of claim 11, wherein a memory of the at least one second computing device also stores the secured data. 13. The system of claim 11, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate with a management server to determine the respective location of at least one second computing device. 14. The system of claim 11, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate directly with the at least one second computing device by way of a local wireless connection to determine the respective location of at least one second computing device. 15. The system of claim 11, wherein the at least one second computing device is determined to be within the threshold proximity when direct communication between the first computing device and the at least one second computing device by way of a local wireless connection is successful. 16. A non-transitory computer-readable medium storing executable instructions that, when executed by a processor of a first computing device, cause the first computing device to at least: receive an access request from a first user to access secured data stored by the first computing device; determine that access by the first user to the secured data requires that a minimum quantity of a set of second users be within a threshold proximity of the first computing device; determine a location of the first computing device; determine a respective location of at least one second computing device individually associated with at least one of the set of second users; determine that the minimum quantity of the set of second users are within the threshold proximity based at least in part on the location and the respective location of the at least one second computing device; and facilitate access by the first user to the secured data. 17. The non-transitory computer-readable medium of claim 16, wherein the at least one second computing device also stores the secured data. 18. The non-transitory computer-readable medium of claim 16, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate with a management server to determine the respective location of at least one second computing device. 19. The non-transitory computer-readable medium of claim 16, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate directly with the at least one second computing device by way of a local wireless connection to determine the respective location of at least one second computing device. 20. The non-transitory computer-readable medium of claim 16, wherein the at least one second computing device is determined to be within the threshold proximity when direct communication between the first computing device and the at least one second computing device by way of a local wireless connection is successful.
Disclosed are various examples for multi-party authentication and authentication. In one example, a user can gain access to secured data stored by a managed device based on the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.1. A method, comprising: receiving an access request from a first user to access secured data stored on a first computing device; determining that access by the first user to the secured data requires that a minimum quantity of a set of second users be within a threshold proximity of the first computing device; determining a location of the first computing device; determining a respective location of at least one second computing device individually associated with at least one of the set of second users; determining that the minimum quantity of the set of second users are within the threshold proximity based at least in part on the location and the respective location of the at least one second computing device; and facilitating access by the first user to the secured data. 2. The method of claim 1, wherein the at least one second computing device also stores the secured data. 3. The method of claim 1, further comprising communicating with a management server to determine the respective location of at least one second computing device. 4. The method of claim 1, further comprising communicating directly with the at least one second computing device by way of a local wireless connection to determine the respective location of at least one second computing device. 5. The method of claim 1, wherein the at least one second computing device is determined to be within the threshold proximity when direct communication between the first computing device and the at least one second computing device by way of a local wireless connection is successful. 6. The method of claim 1, wherein the minimum quantity of the set of second users comprises at least two second users. 7. The method of claim 1, wherein the location of the first computing device is determined using a global positioning system (GPS) device. 8. The method of claim 1, further comprising receiving an incorrect security credential from the first user before determining that access by the first user to the secured data requires that the minimum quantity of the set of second users be within the threshold proximity of the first computing device. 9. The method of claim 1, further comprising receiving an indication from the first user that a required security credential cannot be provided before determining that access by the first user to the secured data requires that the minimum quantity of the set of second users be within the threshold proximity of the first computing device. 10. The method of claim 1, further comprising determining that the secured data is of a sufficient importance in spite of a required security credential being provided by the first user so that access by the first user to the secured data requires that the minimum quantity of the set of second users be within the threshold proximity of the first computing device. 11. A system, comprising: a first computing device comprising a processor and a memory; and executable instructions stored by the memory, wherein when executed by the processor causes the first computing device to at least: receive an access request from a first user to access secured data stored by the memory; determine that access by the first user to the secured data requires that a minimum quantity of a set of second users be within a threshold proximity of the first computing device; determine a location of the first computing device; determine a respective location of at least one second computing device individually associated with at least one of the set of second users; determine that the minimum quantity of the set of second users are within the threshold proximity based at least in part on the location and the respective location of the at least one second computing device; and facilitate access by the first user to the secured data. 12. The system of claim 11, wherein a memory of the at least one second computing device also stores the secured data. 13. The system of claim 11, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate with a management server to determine the respective location of at least one second computing device. 14. The system of claim 11, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate directly with the at least one second computing device by way of a local wireless connection to determine the respective location of at least one second computing device. 15. The system of claim 11, wherein the at least one second computing device is determined to be within the threshold proximity when direct communication between the first computing device and the at least one second computing device by way of a local wireless connection is successful. 16. A non-transitory computer-readable medium storing executable instructions that, when executed by a processor of a first computing device, cause the first computing device to at least: receive an access request from a first user to access secured data stored by the first computing device; determine that access by the first user to the secured data requires that a minimum quantity of a set of second users be within a threshold proximity of the first computing device; determine a location of the first computing device; determine a respective location of at least one second computing device individually associated with at least one of the set of second users; determine that the minimum quantity of the set of second users are within the threshold proximity based at least in part on the location and the respective location of the at least one second computing device; and facilitate access by the first user to the secured data. 17. The non-transitory computer-readable medium of claim 16, wherein the at least one second computing device also stores the secured data. 18. The non-transitory computer-readable medium of claim 16, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate with a management server to determine the respective location of at least one second computing device. 19. The non-transitory computer-readable medium of claim 16, wherein the executable instructions, when executed by the processor, further causes the first computing device to at least: communicate directly with the at least one second computing device by way of a local wireless connection to determine the respective location of at least one second computing device. 20. The non-transitory computer-readable medium of claim 16, wherein the at least one second computing device is determined to be within the threshold proximity when direct communication between the first computing device and the at least one second computing device by way of a local wireless connection is successful.
2,400
8,598
8,598
15,433,516
2,434
Systems and methods for controlling use of a software feature. One system includes a client device having an interface for receiving a feature control filter associated with the software feature from an external source and an electronic processor. The electronic processor executes the feature control filter to detect a current value of at least one run-time parameter of the client device, and compares the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for the software feature. When the current value satisfies the predetermined value, the electronic processor enables the software feature on the client device. When the current value does not satisfy the predetermined value, the electronic processor does not enable the software feature on the client device.
1. A system for controlling use of a software feature on a client device, the system comprising: the client device including an interface for receiving a feature control filter associated with the software feature from an external source, and an electronic processor configured to execute the feature control filter to detect a current value of at least one run-time parameter of the client device, compare the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for the software feature, when the current value of the at least one run-time parameter of the client device satisfies the predetermined value of the at least one run-time parameter defined for the software feature, enable the software feature on the client device, and when the current value of the at least one run-time parameter of the client device does not satisfy the predetermined value of the at least one run-time parameter defined for the software feature, not enable the software feature on the client device. 2. The system of claim 1, wherein the feature control filter is embedded in the software feature. 3. The system of claim 1, wherein the interface is further configured to receive the software feature. 4. The system of claim 1, wherein the electronic processor is configured to detect the current value of the at least one run-time parameter of the client device through an application programming interface. 5. The system of claim 4, wherein the application programming interface provides a function that returns a Boolean value and takes the predetermined value of the at least one run-time parameter as input, wherein the function returns a TRUE value when the current value of the at least one run-time parameter satisfies the predetermined value of the at least one run-time parameter and returns a FALSE value when the current value of the at least one run-time parameter does not satisfy the predetermined value of the at least one run-time parameter. 6. The system of claim 1, wherein the at least one run-time parameter of the client device includes at least one selected from a group consisting of a type of operating system used by the client device, a software application version used by the client device, a hardware configuration of the client device, a platform of the client device, an architecture of the client device, and a build of the client device. 7. The system of claim 1, wherein the at least one run-time parameter of the client device includes a parameter of a user of the client device, wherein the parameter of the user of the client device includes at least one selected from a group consisting of a user name, a group name, an access level, a subscription level, and a channel. 8. The system of claim 1, wherein the at least one run-time parameter of the client device includes at least one selected from a group consisting of a language associated with the client device, a country associated with the client device, and a region associated with the client device. 9. The system of claim 1, wherein the software feature is associated with a flight identifier and wherein the electronic processor is further configured to receive a shutdown instruction including a unique flight number, generate a hash of the flight identifier using a hashing algorithm, compare the hash of the flight identifier and the unique flight number, and disable the software feature when the hash of the flight identifier matches the unique flight number. 10. A method for controlling use of a software feature on a client device, the method comprising: receiving, at the client device, a feature control filter associated with the software feature, wherein the feature control filter is embedded in a software application associated with the software feature; executing, with an electronic processor included in the client device, the feature control filter to detect a current value of at least one run-time parameter of the client device, compare the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for the software feature, when the current value of the at least one run-time parameter of the client device satisfies the predetermined value of the at least one run-time parameter defined for the software feature, enable the software feature on the client device, and when the current value of the at least one run-time parameter of the client device does not satisfy the predetermined value of the at least one run-time parameter defined for the software feature, not enable the software feature on the client device. 11. The method of claim 10, wherein detecting the current value of the at least one run-time parameter of the client device includes detecting the current value of the at least one run-time parameter of the client device through an application programming interface. 12. The method of claim 11, wherein detecting the current value of the at least one run-time parameter of the client device through the application programming interface includes calling a function that returns a Boolean value and takes the predetermined value of the at least one run-time parameter as input, wherein the function returns a TRUE value when the current value of the at least one run-time parameter satisfies the predetermined value of the at least one run-time parameter and returns a FALSE value when the current value of the at least one run-time parameter does not satisfy the predetermined value of the at least one run-time parameter. 13. The method of claim 10, wherein detecting the current value of the at least one run-time parameter includes detecting the current value of at least one selected from a group consisting of a type of operating system used by the client device, a software application version used by the client device, a hardware configuration of the client device, a platform of the client device, an architecture of the client device, and a build of the client device. 14. The method of claim 10, wherein detecting the current value of the at least one run-time parameter includes detecting the current value of a user parameter including at least one selected from a group consisting of a user name, a group name, an access level, a subscription level, and a channel. 15. The method of claim 10, wherein detecting the current value of the at least one run-time parameter includes detecting the current value of at least one selected from a group consisting of a language associated with the client device, a country associated with the client device, and a region associated with the client device. 16. The method of claim 10, further comprising: receiving, at the client device, a shutdown instruction including a unique flight number; generating, with the electronic processor included in the client device, a hash of a flight identifier associated with the software feature using a hashing algorithm; comparing, with the electronic processor included in the client device, the hash of the flight identifier and the unique flight number; and disabling, with the electronic processor included in the client device, the software feature when the hash of the flight identifier matches the unique flight number. 17. Non-transitory computer-readable medium storing instructions, that when executed, perform a set of functions, the set of functions comprising: detecting a current value of at least one run-time parameter of a client device; comparing the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for a software feature; when the current value of the at least one run-time parameter of the client device satisfies the predetermined value of the at least one run-time parameter defined for the software feature, enabling the software feature on the client device; receiving a shutdown instruction including a unique flight number; determining whether the unique flight number is associated with the software feature using a hashing algorithm; and disabling the software feature on the client device when the unique flight number is associated with the software feature. 18. The non-transitory, computer-readable medium of claim 17, wherein the hashing algorithm includes a Fowler-Noll-Vo hashing algorithm. 19. The non-transitory, computer-readable medium of claim 17, wherein determining whether the unique flight number is associated with the software feature using the hashing algorithm includes using the hashing algorithm to generate a second unique flight number based on an identifier associated with the software feature and comparing the second unique flight number and the first unique flight number and wherein disabling the software feature when the first unique flight number is associated with the software feature includes disabling the software feature when the first unique flight number matches the second unique flight number. 20. The non-transitory, computer-readable medium of claim 17, wherein the hashing algorithm includes a two-way hashing algorithm.
Systems and methods for controlling use of a software feature. One system includes a client device having an interface for receiving a feature control filter associated with the software feature from an external source and an electronic processor. The electronic processor executes the feature control filter to detect a current value of at least one run-time parameter of the client device, and compares the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for the software feature. When the current value satisfies the predetermined value, the electronic processor enables the software feature on the client device. When the current value does not satisfy the predetermined value, the electronic processor does not enable the software feature on the client device.1. A system for controlling use of a software feature on a client device, the system comprising: the client device including an interface for receiving a feature control filter associated with the software feature from an external source, and an electronic processor configured to execute the feature control filter to detect a current value of at least one run-time parameter of the client device, compare the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for the software feature, when the current value of the at least one run-time parameter of the client device satisfies the predetermined value of the at least one run-time parameter defined for the software feature, enable the software feature on the client device, and when the current value of the at least one run-time parameter of the client device does not satisfy the predetermined value of the at least one run-time parameter defined for the software feature, not enable the software feature on the client device. 2. The system of claim 1, wherein the feature control filter is embedded in the software feature. 3. The system of claim 1, wherein the interface is further configured to receive the software feature. 4. The system of claim 1, wherein the electronic processor is configured to detect the current value of the at least one run-time parameter of the client device through an application programming interface. 5. The system of claim 4, wherein the application programming interface provides a function that returns a Boolean value and takes the predetermined value of the at least one run-time parameter as input, wherein the function returns a TRUE value when the current value of the at least one run-time parameter satisfies the predetermined value of the at least one run-time parameter and returns a FALSE value when the current value of the at least one run-time parameter does not satisfy the predetermined value of the at least one run-time parameter. 6. The system of claim 1, wherein the at least one run-time parameter of the client device includes at least one selected from a group consisting of a type of operating system used by the client device, a software application version used by the client device, a hardware configuration of the client device, a platform of the client device, an architecture of the client device, and a build of the client device. 7. The system of claim 1, wherein the at least one run-time parameter of the client device includes a parameter of a user of the client device, wherein the parameter of the user of the client device includes at least one selected from a group consisting of a user name, a group name, an access level, a subscription level, and a channel. 8. The system of claim 1, wherein the at least one run-time parameter of the client device includes at least one selected from a group consisting of a language associated with the client device, a country associated with the client device, and a region associated with the client device. 9. The system of claim 1, wherein the software feature is associated with a flight identifier and wherein the electronic processor is further configured to receive a shutdown instruction including a unique flight number, generate a hash of the flight identifier using a hashing algorithm, compare the hash of the flight identifier and the unique flight number, and disable the software feature when the hash of the flight identifier matches the unique flight number. 10. A method for controlling use of a software feature on a client device, the method comprising: receiving, at the client device, a feature control filter associated with the software feature, wherein the feature control filter is embedded in a software application associated with the software feature; executing, with an electronic processor included in the client device, the feature control filter to detect a current value of at least one run-time parameter of the client device, compare the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for the software feature, when the current value of the at least one run-time parameter of the client device satisfies the predetermined value of the at least one run-time parameter defined for the software feature, enable the software feature on the client device, and when the current value of the at least one run-time parameter of the client device does not satisfy the predetermined value of the at least one run-time parameter defined for the software feature, not enable the software feature on the client device. 11. The method of claim 10, wherein detecting the current value of the at least one run-time parameter of the client device includes detecting the current value of the at least one run-time parameter of the client device through an application programming interface. 12. The method of claim 11, wherein detecting the current value of the at least one run-time parameter of the client device through the application programming interface includes calling a function that returns a Boolean value and takes the predetermined value of the at least one run-time parameter as input, wherein the function returns a TRUE value when the current value of the at least one run-time parameter satisfies the predetermined value of the at least one run-time parameter and returns a FALSE value when the current value of the at least one run-time parameter does not satisfy the predetermined value of the at least one run-time parameter. 13. The method of claim 10, wherein detecting the current value of the at least one run-time parameter includes detecting the current value of at least one selected from a group consisting of a type of operating system used by the client device, a software application version used by the client device, a hardware configuration of the client device, a platform of the client device, an architecture of the client device, and a build of the client device. 14. The method of claim 10, wherein detecting the current value of the at least one run-time parameter includes detecting the current value of a user parameter including at least one selected from a group consisting of a user name, a group name, an access level, a subscription level, and a channel. 15. The method of claim 10, wherein detecting the current value of the at least one run-time parameter includes detecting the current value of at least one selected from a group consisting of a language associated with the client device, a country associated with the client device, and a region associated with the client device. 16. The method of claim 10, further comprising: receiving, at the client device, a shutdown instruction including a unique flight number; generating, with the electronic processor included in the client device, a hash of a flight identifier associated with the software feature using a hashing algorithm; comparing, with the electronic processor included in the client device, the hash of the flight identifier and the unique flight number; and disabling, with the electronic processor included in the client device, the software feature when the hash of the flight identifier matches the unique flight number. 17. Non-transitory computer-readable medium storing instructions, that when executed, perform a set of functions, the set of functions comprising: detecting a current value of at least one run-time parameter of a client device; comparing the current value of the at least one run-time parameter of the client device to a predetermined value of the at least one run-time parameter defined for a software feature; when the current value of the at least one run-time parameter of the client device satisfies the predetermined value of the at least one run-time parameter defined for the software feature, enabling the software feature on the client device; receiving a shutdown instruction including a unique flight number; determining whether the unique flight number is associated with the software feature using a hashing algorithm; and disabling the software feature on the client device when the unique flight number is associated with the software feature. 18. The non-transitory, computer-readable medium of claim 17, wherein the hashing algorithm includes a Fowler-Noll-Vo hashing algorithm. 19. The non-transitory, computer-readable medium of claim 17, wherein determining whether the unique flight number is associated with the software feature using the hashing algorithm includes using the hashing algorithm to generate a second unique flight number based on an identifier associated with the software feature and comparing the second unique flight number and the first unique flight number and wherein disabling the software feature when the first unique flight number is associated with the software feature includes disabling the software feature when the first unique flight number matches the second unique flight number. 20. The non-transitory, computer-readable medium of claim 17, wherein the hashing algorithm includes a two-way hashing algorithm.
2,400
8,599
8,599
12,128,623
2,469
A method for improving transmission of a downlink shared transport channel in a wireless communications system is provided in the present invention to avoid redundant signaling. The method includes steps of mapping a broadcast control channel to a downlink shared transport channel for transmitting a system information broadcast message through the downlink shared transport channel, and forming a packet without any headers according to the system information broadcast message.
1. A method for improving transmission of a downlink shared transport channel in a wireless communications system, the method comprising: mapping a broadcast control channel to a downlink shared transport channel by a media access control, named MAC hereinafter, protocol entity for transmission of a system information broadcast message through the downlink shared transport channel; and forming a MAC protocol data unit, named PDU hereinafter, according to the system information broadcast message, wherein the MAC PDU comprises no header fields. 2. The method of claim 1, wherein a specific radio network temporary identifier is utilized for the transmission of the system information broadcast message through the downlink shared transport channel. 3. The method of claim 1, wherein the MAC PDU comprises only one MAC service data unit, named SDU, corresponding to the system information broadcast message. 4. The method of claim 1, wherein the MAC PDU comprises no padding bits added by the MAC protocol entity. 5. The method of claim 1 further comprising: padding the system information broadcast message to fit in with a transport block size by an upper layer protocol entity. 6. The method of claim 5, wherein the upper layer protocol entity is a radio resource control, named RRC, protocol entity. 7. A communications device used in a wireless communications system for improving transmission of a downlink shared transport channel, the communications device comprising: a control circuit for realizing functions of the communications device; a central processing unit coupled to the control circuit for executing a program code to operate the control circuit; and a memory coupled to the central processing unit for storing the program code; wherein the program code comprises: mapping a broadcast control channel to a downlink shared transport channel by a media access control, named MAC hereinafter, protocol entity for transmission of a system information broadcast message through the downlink shared transport channel; and forming a MAC protocol data unit, named PDU hereinafter, according to the system information broadcast message, wherein the MAC PDU comprises no header fields. 8. The communications device of claim 7, wherein a specific radio network temporary identifier is utilized for the transmission of the system information broadcast message through the downlink shared transport channel. 9. The communications device of claim 7, wherein the MAC PDU comprises only one MAC service data unit, named SDU, corresponding to the system information broadcast message. 10. The communications device of claim 7, wherein the MAC PDU comprises no padding bits added by the MAC protocol entity. 11. The communications device of claim 7, wherein the program code further comprises: padding the system information broadcast message to fit in with a transport block size by an upper layer protocol entity. 12. The communications device of claim 7, wherein the upper layer protocol entity is a radio resource control, named RRC, protocol entity.
A method for improving transmission of a downlink shared transport channel in a wireless communications system is provided in the present invention to avoid redundant signaling. The method includes steps of mapping a broadcast control channel to a downlink shared transport channel for transmitting a system information broadcast message through the downlink shared transport channel, and forming a packet without any headers according to the system information broadcast message.1. A method for improving transmission of a downlink shared transport channel in a wireless communications system, the method comprising: mapping a broadcast control channel to a downlink shared transport channel by a media access control, named MAC hereinafter, protocol entity for transmission of a system information broadcast message through the downlink shared transport channel; and forming a MAC protocol data unit, named PDU hereinafter, according to the system information broadcast message, wherein the MAC PDU comprises no header fields. 2. The method of claim 1, wherein a specific radio network temporary identifier is utilized for the transmission of the system information broadcast message through the downlink shared transport channel. 3. The method of claim 1, wherein the MAC PDU comprises only one MAC service data unit, named SDU, corresponding to the system information broadcast message. 4. The method of claim 1, wherein the MAC PDU comprises no padding bits added by the MAC protocol entity. 5. The method of claim 1 further comprising: padding the system information broadcast message to fit in with a transport block size by an upper layer protocol entity. 6. The method of claim 5, wherein the upper layer protocol entity is a radio resource control, named RRC, protocol entity. 7. A communications device used in a wireless communications system for improving transmission of a downlink shared transport channel, the communications device comprising: a control circuit for realizing functions of the communications device; a central processing unit coupled to the control circuit for executing a program code to operate the control circuit; and a memory coupled to the central processing unit for storing the program code; wherein the program code comprises: mapping a broadcast control channel to a downlink shared transport channel by a media access control, named MAC hereinafter, protocol entity for transmission of a system information broadcast message through the downlink shared transport channel; and forming a MAC protocol data unit, named PDU hereinafter, according to the system information broadcast message, wherein the MAC PDU comprises no header fields. 8. The communications device of claim 7, wherein a specific radio network temporary identifier is utilized for the transmission of the system information broadcast message through the downlink shared transport channel. 9. The communications device of claim 7, wherein the MAC PDU comprises only one MAC service data unit, named SDU, corresponding to the system information broadcast message. 10. The communications device of claim 7, wherein the MAC PDU comprises no padding bits added by the MAC protocol entity. 11. The communications device of claim 7, wherein the program code further comprises: padding the system information broadcast message to fit in with a transport block size by an upper layer protocol entity. 12. The communications device of claim 7, wherein the upper layer protocol entity is a radio resource control, named RRC, protocol entity.
2,400