Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
8,700
8,700
15,812,867
2,426
Methods and systems for redirecting content players are described. A request for content may be received by a network device from a user device. A session ID may be generated to track both the current and subsequent request for the content. The network device may redirect the user device to an initial segment of an advertisement. For an initial request by the content player that requests a segment of the content not associated with an initial segment of the advertisement, the content player can be redirected to the initial segment of the advertisement. For subsequent request for the content, the content player can be provided the particular segment of the content initially requested without redirection.
1. A method comprising: receiving, from a device, a request for a content stream, wherein the content stream comprises one or more segments of a content item and one or more segments of an advertisement, and wherein the request indicates a requested starting point in the content stream; and based on determining that the request for the content stream is an initial request for the content stream: generating an identifier associated with the request, and sending to the device, a redirect message comprising an instruction to initiate the content stream at a second point in the content stream that corresponds to an initial segment of the one or more segments of the advertisement, and wherein the second point in the content stream is different than the requested starting point. 2. The method of claim 1, wherein the redirect message comprises the identifier and one or more uniform resource locator (URL) addresses. 3. The method of claim 1, wherein the instruction to initiate the content stream at the second point in the content stream causes the initial segment of the advertisement to be output. 4. The method of claim 1, wherein the determining that the request for the content stream is the initial request comprises determining that the identifier associated with the request does not exist. 5. The method of claim 1, wherein execution of the instruction to initiate the content stream at the second point in the content stream is tracked. 6. The method of claim 1, wherein the content item and the advertisement are associated by a genre. 7. The method of claim 1, further comprising: receiving, by the device, the redirect message, wherein the redirect message further comprises a resource location for the initial segment of the one or more segments of the advertisement, and one or more resource locations for the one or more segments of the content item; retrieving, based on the resource location for the initial segment of the advertisement, the advertisement for output; and retrieving, based on the one or more resource locations for the one or more segments of the content item, the content item for output after the advertisement. 8. A method comprising: sending a request for a content stream, wherein the content stream comprises one or more segments of a content item and one or more segments of an advertisement, and wherein the request indicates a requested starting point in the content stream; receiving a redirect message comprising a resource location for an initial segment of the one or more segments of the advertisement, and one or more resource locations for the one or more segments of the content item, wherein a start point of the initial segment is different from the requested starting point; retrieving, based on the resource location for the initial segment of the advertisement, the advertisement for output; and retrieving, based on the one or more resource locations for the one or more segments of the content item, the content item for output after the advertisement. 9. The method of claim 8, wherein the content stream comprises video. 10. The method of claim 8, wherein the resource location for the initial segment of the advertisement comprises a uniform resource locator (URL) address, and wherein the one or more resource locations for the one or more segments of the content item comprise one or more URL addresses. 11. The method of claim 8, further comprising receiving, based on a determination that an identifier associated with the request for the content stream does not exist, an identifier that indicates that the request for the content stream is an initial request. 12. The method of claim 8, wherein the redirect message comprises information for tracking consumption of the initial segment, the one or more segments of the content item, or both. 13. The method of claim 8, wherein the content item and the advertisement are associated by a genre. 14. An apparatus comprising: one or more processors; and memory storing processor executable instructions that, when executed by the one or more processors, cause the apparatus to: receive, from a device, a request for a content stream, wherein the content stream comprises one or more segments of a content item and one or more segments of an advertisement, and wherein the request indicates a requested starting point in the content stream; and based on determining that the request for the content stream is an initial request for the content stream: generate an identifier associated with the request, and send, to the device, a redirect message comprising an instruction to initiate the content stream at a second point in the content stream that corresponds to an initial segment of the one or more segments of the advertisement, and wherein the second point in the content stream is different than the requested starting point. 15. The apparatus of claim 14, wherein the content stream further comprises video. 16. The apparatus of claim 14, wherein the redirect message comprises the identifier and one or more uniform resource locator (URL) addresses. 17. The apparatus of claim 14, wherein the instruction to initiate the content stream at the second point in the content stream causes the initial segment f the advertisement to be output. 18. The apparatus of claim 14, wherein the processor executable instructions that, when executed by the one or more processors, further cause the apparatus to determine that the identifier associated with the request for the content stream does not exist. 19. The apparatus of claim 14, wherein an execution of the instruction to initiate the content stream at the second point in the content stream is tracked. 20. The apparatus of claim 14, wherein the content item and the advertisement are associated by a genre.
Methods and systems for redirecting content players are described. A request for content may be received by a network device from a user device. A session ID may be generated to track both the current and subsequent request for the content. The network device may redirect the user device to an initial segment of an advertisement. For an initial request by the content player that requests a segment of the content not associated with an initial segment of the advertisement, the content player can be redirected to the initial segment of the advertisement. For subsequent request for the content, the content player can be provided the particular segment of the content initially requested without redirection.1. A method comprising: receiving, from a device, a request for a content stream, wherein the content stream comprises one or more segments of a content item and one or more segments of an advertisement, and wherein the request indicates a requested starting point in the content stream; and based on determining that the request for the content stream is an initial request for the content stream: generating an identifier associated with the request, and sending to the device, a redirect message comprising an instruction to initiate the content stream at a second point in the content stream that corresponds to an initial segment of the one or more segments of the advertisement, and wherein the second point in the content stream is different than the requested starting point. 2. The method of claim 1, wherein the redirect message comprises the identifier and one or more uniform resource locator (URL) addresses. 3. The method of claim 1, wherein the instruction to initiate the content stream at the second point in the content stream causes the initial segment of the advertisement to be output. 4. The method of claim 1, wherein the determining that the request for the content stream is the initial request comprises determining that the identifier associated with the request does not exist. 5. The method of claim 1, wherein execution of the instruction to initiate the content stream at the second point in the content stream is tracked. 6. The method of claim 1, wherein the content item and the advertisement are associated by a genre. 7. The method of claim 1, further comprising: receiving, by the device, the redirect message, wherein the redirect message further comprises a resource location for the initial segment of the one or more segments of the advertisement, and one or more resource locations for the one or more segments of the content item; retrieving, based on the resource location for the initial segment of the advertisement, the advertisement for output; and retrieving, based on the one or more resource locations for the one or more segments of the content item, the content item for output after the advertisement. 8. A method comprising: sending a request for a content stream, wherein the content stream comprises one or more segments of a content item and one or more segments of an advertisement, and wherein the request indicates a requested starting point in the content stream; receiving a redirect message comprising a resource location for an initial segment of the one or more segments of the advertisement, and one or more resource locations for the one or more segments of the content item, wherein a start point of the initial segment is different from the requested starting point; retrieving, based on the resource location for the initial segment of the advertisement, the advertisement for output; and retrieving, based on the one or more resource locations for the one or more segments of the content item, the content item for output after the advertisement. 9. The method of claim 8, wherein the content stream comprises video. 10. The method of claim 8, wherein the resource location for the initial segment of the advertisement comprises a uniform resource locator (URL) address, and wherein the one or more resource locations for the one or more segments of the content item comprise one or more URL addresses. 11. The method of claim 8, further comprising receiving, based on a determination that an identifier associated with the request for the content stream does not exist, an identifier that indicates that the request for the content stream is an initial request. 12. The method of claim 8, wherein the redirect message comprises information for tracking consumption of the initial segment, the one or more segments of the content item, or both. 13. The method of claim 8, wherein the content item and the advertisement are associated by a genre. 14. An apparatus comprising: one or more processors; and memory storing processor executable instructions that, when executed by the one or more processors, cause the apparatus to: receive, from a device, a request for a content stream, wherein the content stream comprises one or more segments of a content item and one or more segments of an advertisement, and wherein the request indicates a requested starting point in the content stream; and based on determining that the request for the content stream is an initial request for the content stream: generate an identifier associated with the request, and send, to the device, a redirect message comprising an instruction to initiate the content stream at a second point in the content stream that corresponds to an initial segment of the one or more segments of the advertisement, and wherein the second point in the content stream is different than the requested starting point. 15. The apparatus of claim 14, wherein the content stream further comprises video. 16. The apparatus of claim 14, wherein the redirect message comprises the identifier and one or more uniform resource locator (URL) addresses. 17. The apparatus of claim 14, wherein the instruction to initiate the content stream at the second point in the content stream causes the initial segment f the advertisement to be output. 18. The apparatus of claim 14, wherein the processor executable instructions that, when executed by the one or more processors, further cause the apparatus to determine that the identifier associated with the request for the content stream does not exist. 19. The apparatus of claim 14, wherein an execution of the instruction to initiate the content stream at the second point in the content stream is tracked. 20. The apparatus of claim 14, wherein the content item and the advertisement are associated by a genre.
2,400
8,701
8,701
15,264,366
2,425
In a conventional art, an output layer set having no output layer is sometimes defined. Consequently, even if the decoder decodes a bit stream to obtain each layer in the output layer set without the output layer, there is no picture to be outputted. There is a possibility that such coded data causes the decoder expecting an output to operate unexpectedly. Output layer sets having the same configuration may be defined. Consequently, the amount of code pertaining to the output layer sets defined in an overlapping manner is redundant. According to an aspect of the present invention, specification of a bit stream conformance pertaining to the output layer set prevents occurrence of an output layer set without an output layer and a redundant output layer set.
1. An image decoding apparatus that decodes hierarchical image coded data including one or more layers, comprising: a layer set information decoding unit that decodes layer set information representing a layer configuration of a layer set; an output layer set information decoding unit that decodes a layer set identifier for identifying the layer set, and an output layer flag OutputLayerFlag for designating whether the layer included in the layer set is an output layer or not, and derives an output layer set; and a picture decoding unit that decodes a picture on the output layer included in the output layer set, wherein the output layer set includes at least one output layer. 2. The image decoding apparatus according to claim 1, wherein the output layer flag indicates that the output layer is regarded as a target layer when the flag has a value of one, and the output layer is not regarded as the target layer when the flag has a value of zero, and a total sum of values of the output layer flags of the layers included in the output layer set is at least one. 3. The image decoding apparatus according to claim 2, wherein the output layer set information decoding unit assumes, as one, a value of the output layer flag pertaining to a base layer of the output layer set where the layer set identifier has a value of zero. 4. The image decoding apparatus according to claim 3, wherein when the number of layer sets included in the hierarchical image coded data is larger than one, the output layer set information decoding unit decodes the number of additional output layer sets from the hierarchical image coded data, and when a syntax pertaining to the number of additional output layer sets is not in the hierarchical image coded data, the decoding unit assumes the number of additional output layer sets as zero.
In a conventional art, an output layer set having no output layer is sometimes defined. Consequently, even if the decoder decodes a bit stream to obtain each layer in the output layer set without the output layer, there is no picture to be outputted. There is a possibility that such coded data causes the decoder expecting an output to operate unexpectedly. Output layer sets having the same configuration may be defined. Consequently, the amount of code pertaining to the output layer sets defined in an overlapping manner is redundant. According to an aspect of the present invention, specification of a bit stream conformance pertaining to the output layer set prevents occurrence of an output layer set without an output layer and a redundant output layer set.1. An image decoding apparatus that decodes hierarchical image coded data including one or more layers, comprising: a layer set information decoding unit that decodes layer set information representing a layer configuration of a layer set; an output layer set information decoding unit that decodes a layer set identifier for identifying the layer set, and an output layer flag OutputLayerFlag for designating whether the layer included in the layer set is an output layer or not, and derives an output layer set; and a picture decoding unit that decodes a picture on the output layer included in the output layer set, wherein the output layer set includes at least one output layer. 2. The image decoding apparatus according to claim 1, wherein the output layer flag indicates that the output layer is regarded as a target layer when the flag has a value of one, and the output layer is not regarded as the target layer when the flag has a value of zero, and a total sum of values of the output layer flags of the layers included in the output layer set is at least one. 3. The image decoding apparatus according to claim 2, wherein the output layer set information decoding unit assumes, as one, a value of the output layer flag pertaining to a base layer of the output layer set where the layer set identifier has a value of zero. 4. The image decoding apparatus according to claim 3, wherein when the number of layer sets included in the hierarchical image coded data is larger than one, the output layer set information decoding unit decodes the number of additional output layer sets from the hierarchical image coded data, and when a syntax pertaining to the number of additional output layer sets is not in the hierarchical image coded data, the decoding unit assumes the number of additional output layer sets as zero.
2,400
8,702
8,702
14,815,950
2,431
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections.
1. A non-transitory machine readable medium for storing a program for updating a keyring with a plurality of keys, the keyring stored on a host computing device that executes a plurality of virtual machines (VMs) and used for encryption operations for data messages associated with at least one particular VM, the program for execution by at least one processing unit, the program comprising sets of instructions for: receiving a command to (1) fetch a new key for the keyring and (2) remove a particular key from the plurality of keys in the keyring; sending a request for the new key; continuing to process data messages received from the particular VM by using a first set of keys in the keyring including the particular key, while processing data messages transmitted by the particular VM by using a second set of keys in the keyring excluding the particular key; and upon receiving a new key, removing the particular key from the key ring. 2. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for processing received and transmitted data messages for the particular VM by using the keyring that includes the new key upon receiving the new key. 3. The non-transitory machine readable medium of claim 1, wherein the command is received when the particular key has been used for a certain duration of time. 4. The non-transitory machine readable medium of claim 1, wherein the command is received when the particular key has been used to encrypt a certain number of data messages. 5. The non-transitory machine readable medium of claim 1, wherein the command is received when the particular key has been used to encrypt a certain amount of data. 6. The non-transitory machine readable medium of claim 1, wherein the received command is sent by a controller that generates the command based on statistics that the controller collects from the host computing device regarding data that the particular key was used to encrypt. 7. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for receiving the new key from a key generator in response to the sent request, wherein the first and second set of keys are used because of a transit delay in receiving the new key from the key generator. 8. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for receiving the new key from a key generator in response to the sent request, wherein the command is received from a controller that monitors usage of keys on the host computing device. 9. The non-transitory machine readable medium of claim 1, wherein encryption operation are performed on data messages exchanged between the particular VM and other VMs in order to protect said data messages, said particular VM and other VMs forming a logical private network (LPN). 10. The non-transitory machine readable medium of claim 9, wherein at least one of the other VMs executes on a different host computing device than the particular VM 11. The non-transitory machine readable medium of claim 9, wherein at least one of the other VMs executes on a same host computing device as the particular VM. 12. A method for updating a keyring with a plurality of keys, the keyring stored on a host computing device that executes a plurality of virtual machines (VMs) and used for encryption operations for data messages associated with at least one particular VM, the method comprises: receiving a command to (1) fetch a new key for the keyring and (2) remove a particular key from the plurality of keys in the keyring; sending a request for the new key; continuing to process data messages received from the particular VM by using a first set of keys in the keyring including the particular key, while processing data messages transmitted by the particular VM by using a second set of keys in the keyring excluding the particular key; and upon receiving a new key, removing the particular key from the key ring. 13. The method of claim 12 further comprising processing received and transmitted data messages for the particular VM by using the keyring that includes the new key upon receiving the new key. 14. The method of claim 2, wherein the first set of keys includes the particular key and the second set of keys excludes the particular key in order to rotate out the particular key and rotate in the new key when the new key is received, wherein upon receiving the new key both the first and second sets of keys are the same. 15. The method of claim 12, wherein the command is received when the particular key has been used for a certain duration of time. 16. The method of claim 12, wherein the command is received when the particular key has been used to encrypt at least one of a certain number of data messages and a certain amount of data. 17. The method of claim 12, wherein the received command is sent by a controller that generates the command based on statistics that the controller collects from the host computing device regarding data that the particular key was used to encrypt. 18. The method of claim 12 further comprising receiving the new key from a key generator in response to the sent request, wherein the first and second set of keys are used because of a transit delay in receiving the new key from the key generator. 19. The method of claim 12 further comprising receiving the new key from a key generator in response to the sent request, wherein the command is received from a controller that monitors usage of keys on the host computing device. 20. The method of claim 12, wherein encryption operation are performed on data messages exchanged between the particular VM and other VMs in order to protect said data messages, said particular VM and other VMs forming a logical private network (LPN).
For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host. When two different GVMs are part of two different logical overlay networks that are implemented on common network fabric, the method in some embodiments encrypts the data messages exchanged between the GVMs of one logical network differently than the data messages exchanged between the GVMs of another logical network. In some embodiments, the method can also encrypt different types of data messages from the same GVM differently. Also, in some embodiments, the method can dynamically enforce encryption rules in response to dynamically detected events, such as malware infections.1. A non-transitory machine readable medium for storing a program for updating a keyring with a plurality of keys, the keyring stored on a host computing device that executes a plurality of virtual machines (VMs) and used for encryption operations for data messages associated with at least one particular VM, the program for execution by at least one processing unit, the program comprising sets of instructions for: receiving a command to (1) fetch a new key for the keyring and (2) remove a particular key from the plurality of keys in the keyring; sending a request for the new key; continuing to process data messages received from the particular VM by using a first set of keys in the keyring including the particular key, while processing data messages transmitted by the particular VM by using a second set of keys in the keyring excluding the particular key; and upon receiving a new key, removing the particular key from the key ring. 2. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for processing received and transmitted data messages for the particular VM by using the keyring that includes the new key upon receiving the new key. 3. The non-transitory machine readable medium of claim 1, wherein the command is received when the particular key has been used for a certain duration of time. 4. The non-transitory machine readable medium of claim 1, wherein the command is received when the particular key has been used to encrypt a certain number of data messages. 5. The non-transitory machine readable medium of claim 1, wherein the command is received when the particular key has been used to encrypt a certain amount of data. 6. The non-transitory machine readable medium of claim 1, wherein the received command is sent by a controller that generates the command based on statistics that the controller collects from the host computing device regarding data that the particular key was used to encrypt. 7. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for receiving the new key from a key generator in response to the sent request, wherein the first and second set of keys are used because of a transit delay in receiving the new key from the key generator. 8. The non-transitory machine readable medium of claim 1, wherein the program further comprises a set of instructions for receiving the new key from a key generator in response to the sent request, wherein the command is received from a controller that monitors usage of keys on the host computing device. 9. The non-transitory machine readable medium of claim 1, wherein encryption operation are performed on data messages exchanged between the particular VM and other VMs in order to protect said data messages, said particular VM and other VMs forming a logical private network (LPN). 10. The non-transitory machine readable medium of claim 9, wherein at least one of the other VMs executes on a different host computing device than the particular VM 11. The non-transitory machine readable medium of claim 9, wherein at least one of the other VMs executes on a same host computing device as the particular VM. 12. A method for updating a keyring with a plurality of keys, the keyring stored on a host computing device that executes a plurality of virtual machines (VMs) and used for encryption operations for data messages associated with at least one particular VM, the method comprises: receiving a command to (1) fetch a new key for the keyring and (2) remove a particular key from the plurality of keys in the keyring; sending a request for the new key; continuing to process data messages received from the particular VM by using a first set of keys in the keyring including the particular key, while processing data messages transmitted by the particular VM by using a second set of keys in the keyring excluding the particular key; and upon receiving a new key, removing the particular key from the key ring. 13. The method of claim 12 further comprising processing received and transmitted data messages for the particular VM by using the keyring that includes the new key upon receiving the new key. 14. The method of claim 2, wherein the first set of keys includes the particular key and the second set of keys excludes the particular key in order to rotate out the particular key and rotate in the new key when the new key is received, wherein upon receiving the new key both the first and second sets of keys are the same. 15. The method of claim 12, wherein the command is received when the particular key has been used for a certain duration of time. 16. The method of claim 12, wherein the command is received when the particular key has been used to encrypt at least one of a certain number of data messages and a certain amount of data. 17. The method of claim 12, wherein the received command is sent by a controller that generates the command based on statistics that the controller collects from the host computing device regarding data that the particular key was used to encrypt. 18. The method of claim 12 further comprising receiving the new key from a key generator in response to the sent request, wherein the first and second set of keys are used because of a transit delay in receiving the new key from the key generator. 19. The method of claim 12 further comprising receiving the new key from a key generator in response to the sent request, wherein the command is received from a controller that monitors usage of keys on the host computing device. 20. The method of claim 12, wherein encryption operation are performed on data messages exchanged between the particular VM and other VMs in order to protect said data messages, said particular VM and other VMs forming a logical private network (LPN).
2,400
8,703
8,703
15,516,726
2,444
It is disclosed a network node ( 200,220, 300, 400, 500, 600, 80 ) and a method for executing an analytics task. The network node is adapted to reside in a telecommunication network, and to be supported by a distributed cloud infrastructure. The network node is adapted to execute at least one service application ( 202 ) executing a first service and at least one analytics application ( 204 ) executing at least part of a distributed analytics service, where the network node further is adapted to comprise a node policy agent ( 206, 226,304, 504, 606 ) and a node manager ( 210, 230, 306, 406, 506, 608 ). By applying a policy restrictions on the analytics task executed on the same network node as a service application, service level agreements for the service application in a telecommunication cloud can be upheld.
1-26. (canceled) 27. A method for execution of an analytics task in a first network node of a telecommunication network, wherein the first network node is supported by a distributed cloud infrastructure and executes at least one service application executing a first service and at least one analytics application executing at least part of a distributed analytics service, the method comprising: obtaining, by a node policy agent, a policy for entitling resources to the analytics application, wherein the policy is based on the analytics task and on a service-level agreement (SLA) for the first service; transmitting, by the node policy agent, the policy to a node manager; receiving, by the node manager, an analytics task from a second network node of the telecommunication network; and executing, by the node manager, the analytics task within the analytics application, based on the policy. 28. The method of claim 27, wherein the SLA for the first service concerns an amount of processing resources, networking resources, and storing resources, which the service application has access to according to the SLA. 29. The method of claim 27, wherein the obtaining the policy comprises setting, by the node policy agent, policy parameter values of a policy residing within the node policy agent. 30. The method of claim 29: further comprising noticing that a second service is being executed by the service application; and wherein the obtaining the policy comprises modifying policy parameter values of the policy based on a SLA for the second service. 31. The method of claim 30, wherein the modifying policy parameter values of the policy comprises one or more of: updating time periods during which analytics tasks are allowed; updating processing and memory resources available to the analytics task; and updating data transmission restrictions for the analytics task. 32. The method of claim 27: further comprising noticing that a second service is being executed by the service application; further comprising requesting, from a policy manager of the second network node, a second policy; and wherein the obtaining the policy comprises receiving the second policy from the policy manager. 33. The method of claim 27, further comprising: sampling, by a policy monitor, of resource utilization of the analytics task; transmitting, by the policy monitor, information about the resource utilization to the node manager; and comparing, by the node manager, the resource utilization being sampled and resources entitled to the analytics application in the first network node. 34. The method of claim 33, wherein executing the analytics task based on the policy, comprises acting, by the node manager, to remedy a violation of the policy, if it is violated by analytics task being executed by the node manager; and continuing the sampling of the resource utilization, if the policy is not violated by the analytics task being executed by the node manager. 35. The method of claim 34, wherein the acting, by the node manager, to remedy the violation, comprises one or more of: stopping execution of an analytics task immediately; delaying the execution of an analytics task; letting an analytics task to continue but denying execution of new analytics tasks received from a resource manager; stopping an analytics task, and starting to replicate data to be analyzed in the analytics task to another network node having available resources so that the analytics task will continue on the another network node; and performing any of the above actions based on a priority of analytics tasks being executed on the first network node. 36. The method of claim 34, further comprising determining, by the node manager, whether the policy is violated. 37. The method of claim 27, wherein the analytics task is comprised by the distributed analytics service. 38. The method of claim 27, wherein the first service comprises a telecommunication service. 39. A network node adapted to reside in a telecommunication network, and to be supported by a distributed cloud infrastructure, where the network node is capable of executing an analytics task, the network node being configured to, and, where the network node comprises: processing circuitry; memory containing instructions executable by the processing circuitry whereby the network node is operative to: execute at least one service application executing a first service; execute at least one analytics application executing at least part of a distributed analytics service; function as a node policy agent and a node manager, each residing in any of the at least one service application and the at least one analytics application; wherein the node policy agent is configured to: obtain a policy for entitling resources to the analytics application, wherein the policy is based on the analytics task and on a service level agreement (SLA) for the first service; and transmit the policy to the node manager; and wherein the node manager is configured to: receive, an analytics task from a second network node of the telecommunication network; and execute the analytics task within the analytics application, based on the policy. 40. The network node of claim 39, wherein the SLA for the first service concerns an amount of processing, storing, and networking resources, which the service application has access to according to the SLA. 41. The network node of claim 39, wherein the node policy agent is configured to set policy parameter values of a policy residing within the node policy agent. 42. The network node of claim 41: wherein the instructions are such that the network node is configured to notice that a second service is being executed by the service application; and wherein the node policy agent is configured to modify policy parameter values of the policy based on a SLA for the second service. 43. The network node of claim 42, wherein the node policy agent configured to: update time periods during which analytics tasks are allowed; update processing and memory resources available to the analytics task; and update data transmission restrictions for the analytics task. 44. The network node of claim 39: wherein the instructions are such that the network node is configured to notice that a second service is being executed by the service application; and wherein the node policy agent is configured to request a second policy, from a policy manager of the second network node, and to receive the second policy from the policy manager. 45. The network node of claim 39: wherein the instructions are such that the network node is configured to function as a policy monitor residing in any of the at least one service application and the at least one analytics application; wherein the policy monitor is configured to: sample resource utilization of the analytics task; transmit information about the resource utilization to the node manager; wherein the node manager is configured to compare the resource utilization that is being sampled and resources reserved to the analytics application in the network node. 46. The network node of claim 45, wherein the node manager is configured to: act to remedy a violation of the policy, if the policy is violated by an analytics task being executed by the node manager; and continue to sample resource utilization, if the policy is not violated by the analytics task being executed by the node manager. 47. The network node of claim 46, wherein the node manager is configured to act to remedy the violation by one or more of: stopping execution of an analytics task immediately; delaying the execution of an analytics task; letting an analytics task to continue, but to deny execution of new analytics tasks received from a resource manager; stopping an analytics task, and to start to replicate data to another network node having available resources so that the analytics task will continue on the another network node; and perform any of the above actions based on a priority of analytics tasks being executed on the network node. 48. The network node of claim 46, wherein the node manager further is configured to determine whether the policy is violated. 49. The network node of claim 39, wherein the analytics task is comprised by the distributed analytics service. 50. The network node of claim 39, wherein the first service comprises a telecommunication service. 51. A non-transitory computer readable recording medium storing a computer program product for controlling execution of an analytics task in a first network node of a telecommunication network, wherein the first network node is supported by a distributed cloud infrastructure and executes at least one service application executing a first service and at least one analytics application executing at least part of a distributed analytics service, the computer program product comprising software instructions which, when run on processing circuitry of the network node, causes the network node to: obtain, by a node policy agent, a policy for entitling resources to the analytics application, wherein the policy is based on the analytics task and on a service-level agreement (SLA) for the first service; transmit, by the node policy agent, the policy to a node manager; receive, by the node manager, an analytics task from a second network node of the telecommunication network; and execute, by the node manager, the analytics task within the analytics application, based on the policy.
It is disclosed a network node ( 200,220, 300, 400, 500, 600, 80 ) and a method for executing an analytics task. The network node is adapted to reside in a telecommunication network, and to be supported by a distributed cloud infrastructure. The network node is adapted to execute at least one service application ( 202 ) executing a first service and at least one analytics application ( 204 ) executing at least part of a distributed analytics service, where the network node further is adapted to comprise a node policy agent ( 206, 226,304, 504, 606 ) and a node manager ( 210, 230, 306, 406, 506, 608 ). By applying a policy restrictions on the analytics task executed on the same network node as a service application, service level agreements for the service application in a telecommunication cloud can be upheld.1-26. (canceled) 27. A method for execution of an analytics task in a first network node of a telecommunication network, wherein the first network node is supported by a distributed cloud infrastructure and executes at least one service application executing a first service and at least one analytics application executing at least part of a distributed analytics service, the method comprising: obtaining, by a node policy agent, a policy for entitling resources to the analytics application, wherein the policy is based on the analytics task and on a service-level agreement (SLA) for the first service; transmitting, by the node policy agent, the policy to a node manager; receiving, by the node manager, an analytics task from a second network node of the telecommunication network; and executing, by the node manager, the analytics task within the analytics application, based on the policy. 28. The method of claim 27, wherein the SLA for the first service concerns an amount of processing resources, networking resources, and storing resources, which the service application has access to according to the SLA. 29. The method of claim 27, wherein the obtaining the policy comprises setting, by the node policy agent, policy parameter values of a policy residing within the node policy agent. 30. The method of claim 29: further comprising noticing that a second service is being executed by the service application; and wherein the obtaining the policy comprises modifying policy parameter values of the policy based on a SLA for the second service. 31. The method of claim 30, wherein the modifying policy parameter values of the policy comprises one or more of: updating time periods during which analytics tasks are allowed; updating processing and memory resources available to the analytics task; and updating data transmission restrictions for the analytics task. 32. The method of claim 27: further comprising noticing that a second service is being executed by the service application; further comprising requesting, from a policy manager of the second network node, a second policy; and wherein the obtaining the policy comprises receiving the second policy from the policy manager. 33. The method of claim 27, further comprising: sampling, by a policy monitor, of resource utilization of the analytics task; transmitting, by the policy monitor, information about the resource utilization to the node manager; and comparing, by the node manager, the resource utilization being sampled and resources entitled to the analytics application in the first network node. 34. The method of claim 33, wherein executing the analytics task based on the policy, comprises acting, by the node manager, to remedy a violation of the policy, if it is violated by analytics task being executed by the node manager; and continuing the sampling of the resource utilization, if the policy is not violated by the analytics task being executed by the node manager. 35. The method of claim 34, wherein the acting, by the node manager, to remedy the violation, comprises one or more of: stopping execution of an analytics task immediately; delaying the execution of an analytics task; letting an analytics task to continue but denying execution of new analytics tasks received from a resource manager; stopping an analytics task, and starting to replicate data to be analyzed in the analytics task to another network node having available resources so that the analytics task will continue on the another network node; and performing any of the above actions based on a priority of analytics tasks being executed on the first network node. 36. The method of claim 34, further comprising determining, by the node manager, whether the policy is violated. 37. The method of claim 27, wherein the analytics task is comprised by the distributed analytics service. 38. The method of claim 27, wherein the first service comprises a telecommunication service. 39. A network node adapted to reside in a telecommunication network, and to be supported by a distributed cloud infrastructure, where the network node is capable of executing an analytics task, the network node being configured to, and, where the network node comprises: processing circuitry; memory containing instructions executable by the processing circuitry whereby the network node is operative to: execute at least one service application executing a first service; execute at least one analytics application executing at least part of a distributed analytics service; function as a node policy agent and a node manager, each residing in any of the at least one service application and the at least one analytics application; wherein the node policy agent is configured to: obtain a policy for entitling resources to the analytics application, wherein the policy is based on the analytics task and on a service level agreement (SLA) for the first service; and transmit the policy to the node manager; and wherein the node manager is configured to: receive, an analytics task from a second network node of the telecommunication network; and execute the analytics task within the analytics application, based on the policy. 40. The network node of claim 39, wherein the SLA for the first service concerns an amount of processing, storing, and networking resources, which the service application has access to according to the SLA. 41. The network node of claim 39, wherein the node policy agent is configured to set policy parameter values of a policy residing within the node policy agent. 42. The network node of claim 41: wherein the instructions are such that the network node is configured to notice that a second service is being executed by the service application; and wherein the node policy agent is configured to modify policy parameter values of the policy based on a SLA for the second service. 43. The network node of claim 42, wherein the node policy agent configured to: update time periods during which analytics tasks are allowed; update processing and memory resources available to the analytics task; and update data transmission restrictions for the analytics task. 44. The network node of claim 39: wherein the instructions are such that the network node is configured to notice that a second service is being executed by the service application; and wherein the node policy agent is configured to request a second policy, from a policy manager of the second network node, and to receive the second policy from the policy manager. 45. The network node of claim 39: wherein the instructions are such that the network node is configured to function as a policy monitor residing in any of the at least one service application and the at least one analytics application; wherein the policy monitor is configured to: sample resource utilization of the analytics task; transmit information about the resource utilization to the node manager; wherein the node manager is configured to compare the resource utilization that is being sampled and resources reserved to the analytics application in the network node. 46. The network node of claim 45, wherein the node manager is configured to: act to remedy a violation of the policy, if the policy is violated by an analytics task being executed by the node manager; and continue to sample resource utilization, if the policy is not violated by the analytics task being executed by the node manager. 47. The network node of claim 46, wherein the node manager is configured to act to remedy the violation by one or more of: stopping execution of an analytics task immediately; delaying the execution of an analytics task; letting an analytics task to continue, but to deny execution of new analytics tasks received from a resource manager; stopping an analytics task, and to start to replicate data to another network node having available resources so that the analytics task will continue on the another network node; and perform any of the above actions based on a priority of analytics tasks being executed on the network node. 48. The network node of claim 46, wherein the node manager further is configured to determine whether the policy is violated. 49. The network node of claim 39, wherein the analytics task is comprised by the distributed analytics service. 50. The network node of claim 39, wherein the first service comprises a telecommunication service. 51. A non-transitory computer readable recording medium storing a computer program product for controlling execution of an analytics task in a first network node of a telecommunication network, wherein the first network node is supported by a distributed cloud infrastructure and executes at least one service application executing a first service and at least one analytics application executing at least part of a distributed analytics service, the computer program product comprising software instructions which, when run on processing circuitry of the network node, causes the network node to: obtain, by a node policy agent, a policy for entitling resources to the analytics application, wherein the policy is based on the analytics task and on a service-level agreement (SLA) for the first service; transmit, by the node policy agent, the policy to a node manager; receive, by the node manager, an analytics task from a second network node of the telecommunication network; and execute, by the node manager, the analytics task within the analytics application, based on the policy.
2,400
8,704
8,704
15,467,891
2,453
A social networking system performs account recovery for a user with the help of the user's connections (e.g., friends). The social networking system selects connections of the user based on information indicating likelihood of real-world interactions between the user and the selected connections. Access codes are sent to the selected connections and the user instructed to obtain access codes from the selected connections via a communication that is outside the social networking system, for example, via phone. The user provides the access codes obtained from the selected connections to the social networking system. If the access codes provided by the user match the access codes sent to the selected connections, the user is granted access to the account. Real-world interactions between two users are determined based on sharing of devices between the users or information indicating presence of the users in the same place during same time interval.
1. A computer implemented method comprising: receiving, at a social networking system, a request for recovering an account of a requesting user of a social networking system, wherein the requesting user is connected to a plurality of users of the social networking system; determining, for each user of the plurality of users, a likelihood of a real-world relationship between the requesting user and the corresponding user; selecting a subset of the plurality of users based on the determined likelihoods of real-world relationships of the plurality of users; sending a first set of access codes to the selected subset of users; receiving a second set of access codes from the requesting user; and responsive to one or more access codes in the second set matching the access codes in the first set, granting access to the account to the requesting user. 2. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying an image stored by the social networking system with which both the requesting user and the corresponding user are associated; and responsive to identifying the image, selecting the corresponding user. 3. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying an event with which both the requesting user and the corresponding user are associated; and responsive to identifying the event; selecting the corresponding user. 4. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying a first device used by the requesting user; identifying a second device used by the corresponding user; and responsive to determining that the first device is same as the second device, selecting the corresponding user. 5. The computer implemented method of claim 4, wherein the first device and the second device are client devices used for creating sessions for interacting with the social networking system. 6. The computer implemented method of claim 4, wherein the first device and the second device are cameras used for capturing images uploaded to the social networking system. 7. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying a first location associated with the requesting user; identifying a second location associated with the corresponding user; and responsive to determining that the first location is same as the second location, selecting the corresponding user. 8. The computer implemented method of claim 7, wherein the first location and the second location correspond to a work place specified in user profiles of the requesting user and the corresponding user. 9. The computer implemented method of claim 1, wherein the requesting user is granted access to the account responsive to a number of matching access codes exceeding a predefined threshold value. 10. The computer implemented method of claim 9, wherein the predefined threshold value is determined based on a type of suspicious activity associated with the account. 11. The computer implemented method of claim 1, wherein the requesting user is granted access to the account responsive to the number of matching access codes exceeding a predefined percentage of the number of access codes in the first set. 12. The computer implemented method of claim 1, wherein the request for recovering an account is received responsive to the account being locked upon determination of suspicious activity associated with the account. 13. The computer implemented method of claim 1, further comprising sending instructions to the selected subset of users to transmit access codes to the requesting user via a communication by phone. 14. The computer implemented method of claim 1, further comprising sending instructions to the selected subset of users to transmit access codes to the requesting user via a communication outside the social networking system. 15. The computer implemented method of claim 1, wherein selecting the subset of the plurality of users comprises receiving the selected subset of users from the requesting user. 16. The computer implemented method of claim 1, further comprising: matching information identifying a client device used by the requesting user to recover the account with information identifying a client device used by the requesting user for past interactions; and wherein the requesting user is granted access to the account responsive to the matching indicating that the client device used by the requesting user to recover the account is same as the client device used by the requesting user for past interactions. 17. The computer implemented method of claim 1, further comprising determining that at least one selected user of the subset of users is not directly connected in the social networking system to the remaining users of the subset of users. 18. The computer implemented method of claim 1, further comprising: determining clusters of connections of the requesting user, wherein a first pair of connections both belonging to a cluster have higher degree of similarity of characteristics compared with a second pair of connections comprising connections from two different clusters; and verifying that the selected subset of users comprises a connection of the requesting user from at least two different clusters. 19. The computer implemented method of claim 1, wherein responsive to the one or more access codes in the second set matching the access codes in the first set, granting access to the account comprises: sending a message to the requesting user with information regarding the granting of access; and responsive to sending the message, waiting for a predetermined time interval before granting account access. 20. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor, cause the processor to: receive, at a social networking system, a request for recovering an account of a requesting user of a social networking system, wherein the requesting user is connected to a plurality of users of the social networking system; determine, for each user of the plurality of users, a likelihood of a real-world relationship between the requesting user and the corresponding user; select a subset of the plurality of users based on the determined likelihoods of real-world relationships of the plurality of users; send a first set of access codes to the selected subset of users; receive a second set of access codes from the requesting user; and responsive to one or more access codes in the second set matching the access codes in the first set, grant access to the account to the requesting user.
A social networking system performs account recovery for a user with the help of the user's connections (e.g., friends). The social networking system selects connections of the user based on information indicating likelihood of real-world interactions between the user and the selected connections. Access codes are sent to the selected connections and the user instructed to obtain access codes from the selected connections via a communication that is outside the social networking system, for example, via phone. The user provides the access codes obtained from the selected connections to the social networking system. If the access codes provided by the user match the access codes sent to the selected connections, the user is granted access to the account. Real-world interactions between two users are determined based on sharing of devices between the users or information indicating presence of the users in the same place during same time interval.1. A computer implemented method comprising: receiving, at a social networking system, a request for recovering an account of a requesting user of a social networking system, wherein the requesting user is connected to a plurality of users of the social networking system; determining, for each user of the plurality of users, a likelihood of a real-world relationship between the requesting user and the corresponding user; selecting a subset of the plurality of users based on the determined likelihoods of real-world relationships of the plurality of users; sending a first set of access codes to the selected subset of users; receiving a second set of access codes from the requesting user; and responsive to one or more access codes in the second set matching the access codes in the first set, granting access to the account to the requesting user. 2. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying an image stored by the social networking system with which both the requesting user and the corresponding user are associated; and responsive to identifying the image, selecting the corresponding user. 3. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying an event with which both the requesting user and the corresponding user are associated; and responsive to identifying the event; selecting the corresponding user. 4. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying a first device used by the requesting user; identifying a second device used by the corresponding user; and responsive to determining that the first device is same as the second device, selecting the corresponding user. 5. The computer implemented method of claim 4, wherein the first device and the second device are client devices used for creating sessions for interacting with the social networking system. 6. The computer implemented method of claim 4, wherein the first device and the second device are cameras used for capturing images uploaded to the social networking system. 7. The computer implemented method of claim 1, wherein determining a likelihood of a real-world relationship with a corresponding user comprises: identifying a first location associated with the requesting user; identifying a second location associated with the corresponding user; and responsive to determining that the first location is same as the second location, selecting the corresponding user. 8. The computer implemented method of claim 7, wherein the first location and the second location correspond to a work place specified in user profiles of the requesting user and the corresponding user. 9. The computer implemented method of claim 1, wherein the requesting user is granted access to the account responsive to a number of matching access codes exceeding a predefined threshold value. 10. The computer implemented method of claim 9, wherein the predefined threshold value is determined based on a type of suspicious activity associated with the account. 11. The computer implemented method of claim 1, wherein the requesting user is granted access to the account responsive to the number of matching access codes exceeding a predefined percentage of the number of access codes in the first set. 12. The computer implemented method of claim 1, wherein the request for recovering an account is received responsive to the account being locked upon determination of suspicious activity associated with the account. 13. The computer implemented method of claim 1, further comprising sending instructions to the selected subset of users to transmit access codes to the requesting user via a communication by phone. 14. The computer implemented method of claim 1, further comprising sending instructions to the selected subset of users to transmit access codes to the requesting user via a communication outside the social networking system. 15. The computer implemented method of claim 1, wherein selecting the subset of the plurality of users comprises receiving the selected subset of users from the requesting user. 16. The computer implemented method of claim 1, further comprising: matching information identifying a client device used by the requesting user to recover the account with information identifying a client device used by the requesting user for past interactions; and wherein the requesting user is granted access to the account responsive to the matching indicating that the client device used by the requesting user to recover the account is same as the client device used by the requesting user for past interactions. 17. The computer implemented method of claim 1, further comprising determining that at least one selected user of the subset of users is not directly connected in the social networking system to the remaining users of the subset of users. 18. The computer implemented method of claim 1, further comprising: determining clusters of connections of the requesting user, wherein a first pair of connections both belonging to a cluster have higher degree of similarity of characteristics compared with a second pair of connections comprising connections from two different clusters; and verifying that the selected subset of users comprises a connection of the requesting user from at least two different clusters. 19. The computer implemented method of claim 1, wherein responsive to the one or more access codes in the second set matching the access codes in the first set, granting access to the account comprises: sending a message to the requesting user with information regarding the granting of access; and responsive to sending the message, waiting for a predetermined time interval before granting account access. 20. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor, cause the processor to: receive, at a social networking system, a request for recovering an account of a requesting user of a social networking system, wherein the requesting user is connected to a plurality of users of the social networking system; determine, for each user of the plurality of users, a likelihood of a real-world relationship between the requesting user and the corresponding user; select a subset of the plurality of users based on the determined likelihoods of real-world relationships of the plurality of users; send a first set of access codes to the selected subset of users; receive a second set of access codes from the requesting user; and responsive to one or more access codes in the second set matching the access codes in the first set, grant access to the account to the requesting user.
2,400
8,705
8,705
15,992,219
2,456
A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.
1. A device for switching and monitoring an AC-powered appliance, for use with in-wall AC power cable carrying an AC power and connected thereto by an outlet or via an outlet opening, and for use with a wireless network, the device comprising: a first AC connector for connecting to the in-wall AC power cable; a second AC connector for connecting the appliance to the AC power cable to be powered by the AC power; an electrically actuated switch connectable between the first and second AC connectors for switching the AC power to the appliance; a current sensor couplable between the first and second AC connectors for measuring an AC current to the appliance; an antenna for communication over the wireless network; a wireless transceiver coupled to the antenna for transmitting digital data to, and for receiving digital data from, the wireless network; and a single enclosure housing the electrically actuated switch, the current sensor, the antenna, and the wireless transceiver, wherein the electrically actuated switch is coupled to the wireless transceiver for being activated in response to digital data received from the wireless network, wherein the current sensor is coupled to the wireless transceiver for transmitting digital data in response to the measured AC current to the wireless network, wherein the device is powered by the AC power when connected to the AC power cable, and wherein the device is consists of, comprises, or is integrated with, the outlet or a plug-in module that is pluggable to the outlet. 2. The device according to claim 1, wherein the current sensor comprises an ampermeter, galvanometer, or a hot-wire ampermeter. 3. The device according to claim 1, wherein the current sensor comprises a current clamp, a current probe, a current transformer, or uses a ‘Hall effect’. 4. The device according to claim 1, wherein the current sensor is a non-contact or a non-conductive current meter. 5. The device according to claim 1, further comprising a wattmeter connectable between the first and second AC connectors for measuring a magnitude of an active AC power or an electrical energy consumed by the appliance. 6. The device according to claim 5, wherein the wattmeter comprises single or multi-phase AC power or energy meter. 7. The device according to claim 5, wherein the wattmeter comprises a bolometer, or wherein the wattmeter accumulates or averages readings. 8. The device according to claim 5, wherein the wattmeter comprises the current sensor, or wherein the wattmeter is based on multiplying a measured voltage and the current measured by the current sensor. 9. The device according to claim 5, wherein the wattmeter or the current sensor are induction based. 10. The device according to claim 1, wherein the electrically actuated switch is ‘normally open’ type, ‘normally closed’ type, or a changeover switch, wherein the electrically actuated switch is ‘make-before-break’ or ‘break-before-make’ type, or wherein the electrically actuated switch have two or more poles or two or more throws, and the contacts of the electrically actuated switch are arranged as a Single-Pole-Double-Throw (SPDT), Double-Pole-Double-Throw (DPDT), Double-Pole-Single-Throw (DPST), or Single-Pole-Changeover (SPCO). 11. The device according to claim 1, wherein the electrically actuated switch is a latching or a non-latching type relay. 12. The device according to claim 11, wherein the relay is a solenoid-based electromagnetic relay that is a reed relay, wherein the relay is solid-state or semiconductor based, or wherein the relay is a Solid State Relay (SSR). 13. The device according to claim 1, wherein the electrically actuated switch is based on an electrical circuit that comprises an open collector transistor, an open drain transistor, a thyristor, a TRIAC, or an opto-isolator. 14. The device according to claim 1, wherein the wireless network is a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN modem. 15. The device according to claim 14, wherein the WPAN is according to, based on, or compatible with, Bluetooth™ or IEEE 802.15.1-2005 standards. 16. The device according to claim 14, wherein the WPAN is according to, based on, or compatible with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standards. 17. The device according to claim 1, wherein the wireless network is a Wireless Local Area Network (WLAN), the antenna is a WLAN antenna, and the wireless transceiver is a WLAN modem. 18. The device according to claim 17, wherein the WLAN is according to, based on, or compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac. 19. The device according to claim 1, wherein the wireless network is a wireless broadband network. 20. The device according to claim 1, wherein the wireless network uses a licensed or unlicensed radio frequency band. 21. The device according to claim 20, wherein the unlicensed radio frequency band is an Industrial, Scientific and Medical (ISM) radio band. 22. The device according to claim 1, wherein the wireless network is a satellite network, the antenna is a satellite antenna, and the wireless transceiver is a satellite modem. 23. The device according to claim 1, wherein the wireless network is a WiMAX network, wherein the antenna is a WiMAX antenna and the wireless transceiver is a WiMAX modem, and wherein the WiMAX network is according to, or based on, or compatible with, IEEE 802.16-2009. 24. The device according to claim 1, wherein the wireless network is a cellular telephone network, the antenna is a cellular antenna, and the wireless transceiver is a cellular modem. 25. The device according to claim 24, wherein the cellular telephone network is a Third Generation (3G) network that uses UMTS W-CDMA, UMTS HSPA, UMTS TDD, CDMA2000 CDMA2000 EV-DO, or GSM EDGE-Evolution, or wherein the cellular telephone network is a Fourth Generation (4G) network that uses HSPA+, Mobile WiMAX, LTE, LTE-Advanced, MBWA, or is based on IEEE 802.20-2008. 26. The device according to claim 1, further comprising a first sensor having an output that responds to a physical phenomenon in the single enclosure. 27. The device according to claim 26, wherein the electrically actuated switch is coupled to the first sensor for being activated in response to the physical phenomenon. 28. The device according to claim 26, wherein the wireless transceiver is coupled to the first sensor for transmitting digital data to the wireless network via the antenna in response to the physical phenomenon. 29. The device according to claim 26, wherein the first sensor is a piezoelectric sensor that includes single crystal material or a piezoelectric ceramics and uses a transverse, longitudinal, or shear effect mode of the piezoelectric effect. 30. The device according to claim 26, further comprising multiple sensors arranged as a directional sensor array operative to estimate the number, magnitude, frequency, Direction-Of-Arrival (DOA), distance, or speed of the physical phenomenon impinging the sensor array. 31. The device according to claim 26, wherein the first sensor is a thermoelectric sensor that responds to a temperature or to a temperature gradient of an object using conduction, convection, or radiation, and wherein the thermoelectric sensor consists of, or comprises, a Positive Temperature Coefficient (PTC) thermistor, a Negative Temperature Coefficient (NTC) thermistor, a thermocouple, a quartz crystal, or a Resistance Temperature Detector (RTD). 32. The device according to claim 26, wherein the first sensor consists of, or comprises, a nanosensor, a crystal, or a semiconductor. 33. The device according to claim 26, wherein the first sensor consists of, or comprises, an eddy-current sensor. 34. The device according to claim 26, wherein the first sensor consists of, or comprises, an atmospheric or an environmental sensor. 35. The device according to claim 26, wherein the first sensor consists of, or comprises, a bulk or surface acoustic sensor. 36. The device according to claim 26, wherein the first sensor consists of, or comprises, a radiation sensor that responds to radioactivity, nuclear radiation, alpha particles, beta particles, or gamma rays, and is based on gas ionization. 37. The device according to claim 26, wherein the first sensor consists of, or comprises, a photoelectric sensor that responds to a visible or an invisible light, and wherein the invisible light is infrared, ultraviolet, X-rays, or gamma rays. 38. The device according to claim 37, wherein the photoelectric sensor is based on the photoelectric or photovoltaic effect, and consists of, or comprises, a semiconductor component that consists of, or comprises, a photodiode, a phototransistor, or a solar cell. 39. The device according to claim 37, wherein the photoelectric sensor is based on Charge-Coupled Device (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 40. The device according to claim 26, wherein the first sensor consists of, or comprises, a photosensitive image sensor array comprising multiple photoelectric sensors, for capturing an image and producing electronic image information representing the image, and the device further comprising one or more optical lens for focusing the received light and to guide the image, and wherein the image sensor is disposed approximately at an image focal point plane of the one or more optical lens for properly capturing the image. 41. The device according to claim 40, further comprising an image processor coupled to the image sensor for providing a digital data video signal according to a digital video format, the digital video signal carrying digital data video based on the captured images, and wherein the digital video format is based on one out of: TIFF (Tagged Image File Format), RAW format, AVI, DV, MOV, WMV, MP4, DCF (Design Rule for Camera Format), ITU-T H.261, ITU-T H.263, ITU-T H.264, ITU-T CCIR 601, ASF, Exif (Exchangeable Image File Format), and DPOF (Digital Print Order Format) standards. 42. The device according to claim 26, wherein the first sensor consists of, or comprises, an electrochemical sensor that responds to an object chemical structure, properties, composition, or reactions. 43. The device according to claim 42, wherein the electrochemical sensor consists of, or comprises, a pH meter or a gas sensor responding to a presence of radon, hydrogen, oxygen, or Carbon-Monoxide (CO), or wherein the electrochemical sensor is based on optical detection or on ionization and is a smoke, a flame, or a fire detector, or is responsive to combustible, flammable, or toxic gas. 44. The device according to claim 26, wherein the first sensor consists of, or comprises, a physiological sensor that responds to parameters associated with a live body. 45. The device according to claim 26, wherein the first sensor consists of, or comprises, an electroacoustic sensor that responds to an audible or inaudible sound. 46. The device according to claim 45, wherein the electroacoustic sensor is an omnidirectional, unidirectional, or bidirectional microphone that is based on the sensing an incident sound based motion of a diaphragm or a ribbon, and the microphone consists of, or comprises, a condenser, an electret, a dynamic, a ribbon, a carbon, or a piezoelectric microphone. 47. The device according to claim 1, further comprising in the single enclosure a light source that emits visible or non-visible light for illumination or indication, the non-visible light is infrared, ultraviolet, X-rays, or gamma rays, the light source is couplable to the AC power cable for being powered from the AC power. 48. The device according to claim 47, wherein the light source is coupled to the wireless transceiver for illumination or indication in response to digital data received from the wireless network. 49. The device according to claim 47, wherein the light source is coupled to the current sensor for illumination or indication in response to the measured AC current. 50. The device according to claim 47, wherein the light source consists of, or comprises, a lamp, an incandescent lamp, a gas discharge lamp, a fluorescent lamp, a Solid-State Lighting (SSL), a Light Emitting Diode (LED), an Organic LED (OLED), a polymer LED (PLED), or a laser diode. 51. The device according to claim 1, further comprising in the single enclosure an actuator for affecting a physical phenomenon, wherein the actuator is coupled to the wireless transceiver for being activated or controlled in response to digital data received from the wireless network. 52. The device according to claim 51, wherein the actuator consists of, or comprises, a motion actuator that causes linear or rotary motion, and the device further comprising a conversion mechanism for respectfully converting to rotary or linear motion based on a screw, a wheel and axle, or a cam. 53. The device according to claim 51, wherein the actuator consists of, or comprises, a sounder for converting an electrical energy to omnidirectional, unidirectional, or bidirectional pattern emitted, audible or inaudible, sound waves. 54. The device according to claim 51, wherein the actuator consists of, or comprises, an electromagnetic coil or an electromagnet operative for generating a magnetic or electric field. 55. The device according to claim 51, wherein the actuator consists of, or comprises, an electrical signal generator. 56. The device according to claim 51, wherein the actuator consists of, or comprises, a chemical or an electrochemical actuator, and is operative for producing, changing, or affecting a matter structure, properties, composition, process, or reactions. 57. The device according to claim 51, wherein the actuator consists of, or comprises, a thermoelectric actuator and is a heater or a cooler, operative for affecting the temperature of a solid, a liquid, or a gas object, and is coupled to the object by conduction, convection, force convention, thermal radiation, or by the transfer of energy by phase changes. 58. The device according to claim 1, further being addressable in the wireless network using distinct locally administered addresses or a universally administered digital addresses stored in a volatile or non-volatile memory in the single enclosure, which uniquely identifying the device in the wireless network or in the Internet. 59. The device according to claim 58, wherein the digital address is a MAC layer address that is MAC-48, EUI-48, or EUI-64 address type. 60. The device according to claim 58, wherein the digital address is a layer 3 address and is static or dynamic IP address that is IPv4 or IPv6 type address. 61. The device according to claim 58, wherein the digital address is autonomously assigned, or wherein the digital address is assigned by another device using DHCP. 62. The device according to claim 1, further comprising in the single enclosure a first connector for connecting to a first device external to the single enclosure. 63. The device according to claim 62, wherein the first connector consists of, or comprises, a Universal Serial Bus (USB) connector. 64. The device according to claim 62, wherein the first connector is couplable to the AC power cable for powering the first device by the AC power. 65. The device according to claim 1, further comprising in the single enclosure an AC/DC converter for powering the device by a DC voltage from the AC power. 66. The device according to claim 65, further comprising in the single enclosure a first connector for connecting to a first device external to the single enclosure, and wherein the first connector is coupled to the AC/DC converter for DC powering the first device.
A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.1. A device for switching and monitoring an AC-powered appliance, for use with in-wall AC power cable carrying an AC power and connected thereto by an outlet or via an outlet opening, and for use with a wireless network, the device comprising: a first AC connector for connecting to the in-wall AC power cable; a second AC connector for connecting the appliance to the AC power cable to be powered by the AC power; an electrically actuated switch connectable between the first and second AC connectors for switching the AC power to the appliance; a current sensor couplable between the first and second AC connectors for measuring an AC current to the appliance; an antenna for communication over the wireless network; a wireless transceiver coupled to the antenna for transmitting digital data to, and for receiving digital data from, the wireless network; and a single enclosure housing the electrically actuated switch, the current sensor, the antenna, and the wireless transceiver, wherein the electrically actuated switch is coupled to the wireless transceiver for being activated in response to digital data received from the wireless network, wherein the current sensor is coupled to the wireless transceiver for transmitting digital data in response to the measured AC current to the wireless network, wherein the device is powered by the AC power when connected to the AC power cable, and wherein the device is consists of, comprises, or is integrated with, the outlet or a plug-in module that is pluggable to the outlet. 2. The device according to claim 1, wherein the current sensor comprises an ampermeter, galvanometer, or a hot-wire ampermeter. 3. The device according to claim 1, wherein the current sensor comprises a current clamp, a current probe, a current transformer, or uses a ‘Hall effect’. 4. The device according to claim 1, wherein the current sensor is a non-contact or a non-conductive current meter. 5. The device according to claim 1, further comprising a wattmeter connectable between the first and second AC connectors for measuring a magnitude of an active AC power or an electrical energy consumed by the appliance. 6. The device according to claim 5, wherein the wattmeter comprises single or multi-phase AC power or energy meter. 7. The device according to claim 5, wherein the wattmeter comprises a bolometer, or wherein the wattmeter accumulates or averages readings. 8. The device according to claim 5, wherein the wattmeter comprises the current sensor, or wherein the wattmeter is based on multiplying a measured voltage and the current measured by the current sensor. 9. The device according to claim 5, wherein the wattmeter or the current sensor are induction based. 10. The device according to claim 1, wherein the electrically actuated switch is ‘normally open’ type, ‘normally closed’ type, or a changeover switch, wherein the electrically actuated switch is ‘make-before-break’ or ‘break-before-make’ type, or wherein the electrically actuated switch have two or more poles or two or more throws, and the contacts of the electrically actuated switch are arranged as a Single-Pole-Double-Throw (SPDT), Double-Pole-Double-Throw (DPDT), Double-Pole-Single-Throw (DPST), or Single-Pole-Changeover (SPCO). 11. The device according to claim 1, wherein the electrically actuated switch is a latching or a non-latching type relay. 12. The device according to claim 11, wherein the relay is a solenoid-based electromagnetic relay that is a reed relay, wherein the relay is solid-state or semiconductor based, or wherein the relay is a Solid State Relay (SSR). 13. The device according to claim 1, wherein the electrically actuated switch is based on an electrical circuit that comprises an open collector transistor, an open drain transistor, a thyristor, a TRIAC, or an opto-isolator. 14. The device according to claim 1, wherein the wireless network is a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN modem. 15. The device according to claim 14, wherein the WPAN is according to, based on, or compatible with, Bluetooth™ or IEEE 802.15.1-2005 standards. 16. The device according to claim 14, wherein the WPAN is according to, based on, or compatible with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standards. 17. The device according to claim 1, wherein the wireless network is a Wireless Local Area Network (WLAN), the antenna is a WLAN antenna, and the wireless transceiver is a WLAN modem. 18. The device according to claim 17, wherein the WLAN is according to, based on, or compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac. 19. The device according to claim 1, wherein the wireless network is a wireless broadband network. 20. The device according to claim 1, wherein the wireless network uses a licensed or unlicensed radio frequency band. 21. The device according to claim 20, wherein the unlicensed radio frequency band is an Industrial, Scientific and Medical (ISM) radio band. 22. The device according to claim 1, wherein the wireless network is a satellite network, the antenna is a satellite antenna, and the wireless transceiver is a satellite modem. 23. The device according to claim 1, wherein the wireless network is a WiMAX network, wherein the antenna is a WiMAX antenna and the wireless transceiver is a WiMAX modem, and wherein the WiMAX network is according to, or based on, or compatible with, IEEE 802.16-2009. 24. The device according to claim 1, wherein the wireless network is a cellular telephone network, the antenna is a cellular antenna, and the wireless transceiver is a cellular modem. 25. The device according to claim 24, wherein the cellular telephone network is a Third Generation (3G) network that uses UMTS W-CDMA, UMTS HSPA, UMTS TDD, CDMA2000 CDMA2000 EV-DO, or GSM EDGE-Evolution, or wherein the cellular telephone network is a Fourth Generation (4G) network that uses HSPA+, Mobile WiMAX, LTE, LTE-Advanced, MBWA, or is based on IEEE 802.20-2008. 26. The device according to claim 1, further comprising a first sensor having an output that responds to a physical phenomenon in the single enclosure. 27. The device according to claim 26, wherein the electrically actuated switch is coupled to the first sensor for being activated in response to the physical phenomenon. 28. The device according to claim 26, wherein the wireless transceiver is coupled to the first sensor for transmitting digital data to the wireless network via the antenna in response to the physical phenomenon. 29. The device according to claim 26, wherein the first sensor is a piezoelectric sensor that includes single crystal material or a piezoelectric ceramics and uses a transverse, longitudinal, or shear effect mode of the piezoelectric effect. 30. The device according to claim 26, further comprising multiple sensors arranged as a directional sensor array operative to estimate the number, magnitude, frequency, Direction-Of-Arrival (DOA), distance, or speed of the physical phenomenon impinging the sensor array. 31. The device according to claim 26, wherein the first sensor is a thermoelectric sensor that responds to a temperature or to a temperature gradient of an object using conduction, convection, or radiation, and wherein the thermoelectric sensor consists of, or comprises, a Positive Temperature Coefficient (PTC) thermistor, a Negative Temperature Coefficient (NTC) thermistor, a thermocouple, a quartz crystal, or a Resistance Temperature Detector (RTD). 32. The device according to claim 26, wherein the first sensor consists of, or comprises, a nanosensor, a crystal, or a semiconductor. 33. The device according to claim 26, wherein the first sensor consists of, or comprises, an eddy-current sensor. 34. The device according to claim 26, wherein the first sensor consists of, or comprises, an atmospheric or an environmental sensor. 35. The device according to claim 26, wherein the first sensor consists of, or comprises, a bulk or surface acoustic sensor. 36. The device according to claim 26, wherein the first sensor consists of, or comprises, a radiation sensor that responds to radioactivity, nuclear radiation, alpha particles, beta particles, or gamma rays, and is based on gas ionization. 37. The device according to claim 26, wherein the first sensor consists of, or comprises, a photoelectric sensor that responds to a visible or an invisible light, and wherein the invisible light is infrared, ultraviolet, X-rays, or gamma rays. 38. The device according to claim 37, wherein the photoelectric sensor is based on the photoelectric or photovoltaic effect, and consists of, or comprises, a semiconductor component that consists of, or comprises, a photodiode, a phototransistor, or a solar cell. 39. The device according to claim 37, wherein the photoelectric sensor is based on Charge-Coupled Device (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 40. The device according to claim 26, wherein the first sensor consists of, or comprises, a photosensitive image sensor array comprising multiple photoelectric sensors, for capturing an image and producing electronic image information representing the image, and the device further comprising one or more optical lens for focusing the received light and to guide the image, and wherein the image sensor is disposed approximately at an image focal point plane of the one or more optical lens for properly capturing the image. 41. The device according to claim 40, further comprising an image processor coupled to the image sensor for providing a digital data video signal according to a digital video format, the digital video signal carrying digital data video based on the captured images, and wherein the digital video format is based on one out of: TIFF (Tagged Image File Format), RAW format, AVI, DV, MOV, WMV, MP4, DCF (Design Rule for Camera Format), ITU-T H.261, ITU-T H.263, ITU-T H.264, ITU-T CCIR 601, ASF, Exif (Exchangeable Image File Format), and DPOF (Digital Print Order Format) standards. 42. The device according to claim 26, wherein the first sensor consists of, or comprises, an electrochemical sensor that responds to an object chemical structure, properties, composition, or reactions. 43. The device according to claim 42, wherein the electrochemical sensor consists of, or comprises, a pH meter or a gas sensor responding to a presence of radon, hydrogen, oxygen, or Carbon-Monoxide (CO), or wherein the electrochemical sensor is based on optical detection or on ionization and is a smoke, a flame, or a fire detector, or is responsive to combustible, flammable, or toxic gas. 44. The device according to claim 26, wherein the first sensor consists of, or comprises, a physiological sensor that responds to parameters associated with a live body. 45. The device according to claim 26, wherein the first sensor consists of, or comprises, an electroacoustic sensor that responds to an audible or inaudible sound. 46. The device according to claim 45, wherein the electroacoustic sensor is an omnidirectional, unidirectional, or bidirectional microphone that is based on the sensing an incident sound based motion of a diaphragm or a ribbon, and the microphone consists of, or comprises, a condenser, an electret, a dynamic, a ribbon, a carbon, or a piezoelectric microphone. 47. The device according to claim 1, further comprising in the single enclosure a light source that emits visible or non-visible light for illumination or indication, the non-visible light is infrared, ultraviolet, X-rays, or gamma rays, the light source is couplable to the AC power cable for being powered from the AC power. 48. The device according to claim 47, wherein the light source is coupled to the wireless transceiver for illumination or indication in response to digital data received from the wireless network. 49. The device according to claim 47, wherein the light source is coupled to the current sensor for illumination or indication in response to the measured AC current. 50. The device according to claim 47, wherein the light source consists of, or comprises, a lamp, an incandescent lamp, a gas discharge lamp, a fluorescent lamp, a Solid-State Lighting (SSL), a Light Emitting Diode (LED), an Organic LED (OLED), a polymer LED (PLED), or a laser diode. 51. The device according to claim 1, further comprising in the single enclosure an actuator for affecting a physical phenomenon, wherein the actuator is coupled to the wireless transceiver for being activated or controlled in response to digital data received from the wireless network. 52. The device according to claim 51, wherein the actuator consists of, or comprises, a motion actuator that causes linear or rotary motion, and the device further comprising a conversion mechanism for respectfully converting to rotary or linear motion based on a screw, a wheel and axle, or a cam. 53. The device according to claim 51, wherein the actuator consists of, or comprises, a sounder for converting an electrical energy to omnidirectional, unidirectional, or bidirectional pattern emitted, audible or inaudible, sound waves. 54. The device according to claim 51, wherein the actuator consists of, or comprises, an electromagnetic coil or an electromagnet operative for generating a magnetic or electric field. 55. The device according to claim 51, wherein the actuator consists of, or comprises, an electrical signal generator. 56. The device according to claim 51, wherein the actuator consists of, or comprises, a chemical or an electrochemical actuator, and is operative for producing, changing, or affecting a matter structure, properties, composition, process, or reactions. 57. The device according to claim 51, wherein the actuator consists of, or comprises, a thermoelectric actuator and is a heater or a cooler, operative for affecting the temperature of a solid, a liquid, or a gas object, and is coupled to the object by conduction, convection, force convention, thermal radiation, or by the transfer of energy by phase changes. 58. The device according to claim 1, further being addressable in the wireless network using distinct locally administered addresses or a universally administered digital addresses stored in a volatile or non-volatile memory in the single enclosure, which uniquely identifying the device in the wireless network or in the Internet. 59. The device according to claim 58, wherein the digital address is a MAC layer address that is MAC-48, EUI-48, or EUI-64 address type. 60. The device according to claim 58, wherein the digital address is a layer 3 address and is static or dynamic IP address that is IPv4 or IPv6 type address. 61. The device according to claim 58, wherein the digital address is autonomously assigned, or wherein the digital address is assigned by another device using DHCP. 62. The device according to claim 1, further comprising in the single enclosure a first connector for connecting to a first device external to the single enclosure. 63. The device according to claim 62, wherein the first connector consists of, or comprises, a Universal Serial Bus (USB) connector. 64. The device according to claim 62, wherein the first connector is couplable to the AC power cable for powering the first device by the AC power. 65. The device according to claim 1, further comprising in the single enclosure an AC/DC converter for powering the device by a DC voltage from the AC power. 66. The device according to claim 65, further comprising in the single enclosure a first connector for connecting to a first device external to the single enclosure, and wherein the first connector is coupled to the AC/DC converter for DC powering the first device.
2,400
8,706
8,706
15,433,098
2,495
The disclosure is directed to an autonomous method for dynamically providing a security policy. A method in accordance with an embodiment includes: determining an existence of a new Internet-based security threat; proposing a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determining a change in a set of business rules; proposing a business rules update to the existing security policy in response to the change in the set of business rules; combining the security threat update and the business rules update into a consolidated security policy update; and updating the existing security policy based on the consolidated security update.
1. An autonomous method for dynamically providing a security policy, comprising: determining an existence of a new Internet-based security threat; proposing a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determining a change in a set of business rules; proposing a business rules update to the existing security policy in response to the change in the set of business rules; combining the security threat update and the business rules update into a consolidated security policy update; and updating the existing security policy based on the consolidated security update. 2. The autonomous method for dynamically providing a security policy according to claim 1, further comprising: determining an existence of at least one additional new Internet-based security threat; proposing an additional security threat update to the existing security policy in response to the existence of each additional new Internet-based security threat; and including each additional security threat update in the consolidated security policy update. 3. The autonomous method for dynamically providing a security policy according to claim 1, wherein the proposing the security threat update occurs immediately after the determination of the new Internet-based security threat. 4. The autonomous method for dynamically providing a security policy according to claim 1, further comprising: determining an existence of at least one additional change in the set of business rules; proposing an additional business rules update to the existing security policy in response to the existence of each additional change business rules update; and including each additional business rules update in the consolidated security policy update. 5. The autonomous method for dynamically providing a security policy according to claim 1, wherein the proposing the business rules update occurs immediately after the determination of the change in the set of business rules. 6. The autonomous method for dynamically providing a security policy according to claim 1, wherein the determining the new Internet-based security threat further comprises continuously monitoring at least one repository containing security exposures and security issues. 7. The autonomous method for dynamically providing a security policy according to claim 1, wherein the determining the new Internet-based security threat further comprises continuously monitoring the set of business rules for any changes. 8. The autonomous method for dynamically providing a security policy according to claim 1, further comprising: implementing the updated security policy in a security automation tool; and scanning, using the security automation tool, at least one resource of an IT environment using the updated security policy. 9. An autonomous system for dynamically providing a security policy, comprising: an autonomous security policy engine configured to: determine an existence of a new Internet-based security threat; propose a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determine a change in a set of business rules; propose a business rules update to the existing security policy in response to the change in the set of business rules; combine the security threat update and the business rules update into a consolidated security policy update; and update the existing security policy based on the consolidated security update. 10. The autonomous system for dynamically providing a security policy according to claim 9, further comprising a security automation tool for implementing the updated security policy and scanning at least one resource of an IT environment using the updated security policy. 11. The autonomous system for dynamically providing a security policy according to claim 9, further comprising at least one repository containing security exposures and security issues, wherein the autonomous security policy engine is configured to determine the new Internet-based security threat by continuously monitoring the at least one repository. 12. A computer program product comprising program code embodied in at least one computer-readable storage medium, which when executed, enables a computer system to implement an autonomous method for dynamically providing a security policy, the method comprising: determining an existence of a new Internet-based security threat; proposing a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determining a change in a set of business rules; proposing a business rules update to the existing security policy in response to the change in the set of business rules; combining the security threat update and the business rules update into a consolidated security policy update; and updating the existing security policy based on the consolidated security update. 13. The computer program product according to claim 12, the method further comprising: determining an existence of at least one additional new Internet-based security threat; proposing an additional security threat update to the existing security policy in response to the existence of each additional new Internet-based security threat; and including each additional security threat update in the consolidated security policy update. 14. The computer program product according to claim 12, wherein the proposing the security threat update occurs immediately after the determination of the new Internet-based security threat. 15. The computer program product according to claim 12, the method further comprising: determining an existence of at least one additional change in the set of business rules; proposing an additional business rules update to the existing security policy in response to the existence of each additional change business rules update; and including each additional business rules update in the consolidated security policy update. 16. The computer program product according to claim 12, wherein the proposing the business rules update occurs immediately after the determination of the change in the set of business rules. 17. The computer program product according to claim 12, wherein the determining the new Internet-based security threat further comprises continuously monitoring at least one repository containing security exposures and security issues. 18. The computer program product according to claim 12, wherein the determining the new Internet-based security threat further comprises continuously monitoring the set of business rules for any changes. 19. The computer program product according to claim 12, further comprising: implementing the updated security policy; and scanning at least one resource of an IT environment using the updated security policy.
The disclosure is directed to an autonomous method for dynamically providing a security policy. A method in accordance with an embodiment includes: determining an existence of a new Internet-based security threat; proposing a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determining a change in a set of business rules; proposing a business rules update to the existing security policy in response to the change in the set of business rules; combining the security threat update and the business rules update into a consolidated security policy update; and updating the existing security policy based on the consolidated security update.1. An autonomous method for dynamically providing a security policy, comprising: determining an existence of a new Internet-based security threat; proposing a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determining a change in a set of business rules; proposing a business rules update to the existing security policy in response to the change in the set of business rules; combining the security threat update and the business rules update into a consolidated security policy update; and updating the existing security policy based on the consolidated security update. 2. The autonomous method for dynamically providing a security policy according to claim 1, further comprising: determining an existence of at least one additional new Internet-based security threat; proposing an additional security threat update to the existing security policy in response to the existence of each additional new Internet-based security threat; and including each additional security threat update in the consolidated security policy update. 3. The autonomous method for dynamically providing a security policy according to claim 1, wherein the proposing the security threat update occurs immediately after the determination of the new Internet-based security threat. 4. The autonomous method for dynamically providing a security policy according to claim 1, further comprising: determining an existence of at least one additional change in the set of business rules; proposing an additional business rules update to the existing security policy in response to the existence of each additional change business rules update; and including each additional business rules update in the consolidated security policy update. 5. The autonomous method for dynamically providing a security policy according to claim 1, wherein the proposing the business rules update occurs immediately after the determination of the change in the set of business rules. 6. The autonomous method for dynamically providing a security policy according to claim 1, wherein the determining the new Internet-based security threat further comprises continuously monitoring at least one repository containing security exposures and security issues. 7. The autonomous method for dynamically providing a security policy according to claim 1, wherein the determining the new Internet-based security threat further comprises continuously monitoring the set of business rules for any changes. 8. The autonomous method for dynamically providing a security policy according to claim 1, further comprising: implementing the updated security policy in a security automation tool; and scanning, using the security automation tool, at least one resource of an IT environment using the updated security policy. 9. An autonomous system for dynamically providing a security policy, comprising: an autonomous security policy engine configured to: determine an existence of a new Internet-based security threat; propose a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determine a change in a set of business rules; propose a business rules update to the existing security policy in response to the change in the set of business rules; combine the security threat update and the business rules update into a consolidated security policy update; and update the existing security policy based on the consolidated security update. 10. The autonomous system for dynamically providing a security policy according to claim 9, further comprising a security automation tool for implementing the updated security policy and scanning at least one resource of an IT environment using the updated security policy. 11. The autonomous system for dynamically providing a security policy according to claim 9, further comprising at least one repository containing security exposures and security issues, wherein the autonomous security policy engine is configured to determine the new Internet-based security threat by continuously monitoring the at least one repository. 12. A computer program product comprising program code embodied in at least one computer-readable storage medium, which when executed, enables a computer system to implement an autonomous method for dynamically providing a security policy, the method comprising: determining an existence of a new Internet-based security threat; proposing a security threat update to an existing security policy in response to the existence of the new Internet-based security threat; determining a change in a set of business rules; proposing a business rules update to the existing security policy in response to the change in the set of business rules; combining the security threat update and the business rules update into a consolidated security policy update; and updating the existing security policy based on the consolidated security update. 13. The computer program product according to claim 12, the method further comprising: determining an existence of at least one additional new Internet-based security threat; proposing an additional security threat update to the existing security policy in response to the existence of each additional new Internet-based security threat; and including each additional security threat update in the consolidated security policy update. 14. The computer program product according to claim 12, wherein the proposing the security threat update occurs immediately after the determination of the new Internet-based security threat. 15. The computer program product according to claim 12, the method further comprising: determining an existence of at least one additional change in the set of business rules; proposing an additional business rules update to the existing security policy in response to the existence of each additional change business rules update; and including each additional business rules update in the consolidated security policy update. 16. The computer program product according to claim 12, wherein the proposing the business rules update occurs immediately after the determination of the change in the set of business rules. 17. The computer program product according to claim 12, wherein the determining the new Internet-based security threat further comprises continuously monitoring at least one repository containing security exposures and security issues. 18. The computer program product according to claim 12, wherein the determining the new Internet-based security threat further comprises continuously monitoring the set of business rules for any changes. 19. The computer program product according to claim 12, further comprising: implementing the updated security policy; and scanning at least one resource of an IT environment using the updated security policy.
2,400
8,707
8,707
14,818,134
2,419
Methods incorporating extensions to copy-above mode for palette mode coding are disclosed. In one aspect, the method includes coding a current pixel of a current block of video data in copy-previous mode via coding a previous line index. The coding of the current pixel in copy-previous mode further including identifying a number of candidate values for the previous line index, identifying a number of escape pixels in a column of pixels above the current pixel in the current block, and reducing a number of candidate values of the previous line index by the number of identified escape pixels.
1. A method for removing redundancies for coding video data in palette mode, the method comprising: coding a current pixel of a current block of the video data in copy-previous mode via coding a previous line index, the previous line index indicating an index of a line including a pixel located above the current pixel in the current block, the coding of the current pixel in copy-previous mode further comprising: identifying a number of candidate values for the previous line index; identifying a number of escape pixels in a column of pixels above the current pixel in the current block; and reducing the number of candidate values for the previous line index by the number of identified escape pixels. 2. The method of claim 1, wherein the coding the current pixel in copy-previous mode further comprises coding a run length value, the run length value indicating the number of successive pixels to be coded based on the previous line index. 3. The method of claim 1, wherein the coding of the previous line index comprises coding a distance between the previous line index and a current line index. 4. The method of claim 1, wherein the escape pixels are explicitly signaled in a bitstream. 5. The method of claim 1, wherein the coding of the current pixel in copy-previous mode further comprises: identifying whether an above adjacent pixel directly above the current pixel is an escape pixel; identifying a number of pixels in the column of pixels above the current pixel that have the same value as the above adjacent pixel in response to the above adjacent pixel being an escape pixel; and reducing the number of candidate values for the previous line index by the number of identified pixels that have the same value as the above adjacent pixel. 6. The method of claim 1, wherein the coding of the current pixel in copy-previous mode further comprises: identifying whether a left adjacent pixel in scan order is an end of a copy-previous mode run; identifying a left previous line index in response to the left adjacent pixel being an end of a copy-previous mode run; and reducing the number of candidate values for the previous line index by one. 7. The method of claim 6, further comprising coding a palette index for the current pixel equal to a predetermined value in response to the left previous line index being outside of the current block. 8. The method of claim 1, wherein the current pixel is in the first or second line of the current block, wherein the coding of the current pixel in copy-previous mode further comprises: bypassing the coding of the previous line index; and coding a palette index equal to a predetermined value. 9. The method of claim 1, wherein the previous line index is coded via a truncated binary code. 10. A device for encoding video data, comprising: a memory configured to store at least a portion of the video data; and at least one processor in communication with the memory and configured to: code a current pixel of a current block of the video data in copy-previous mode via coding a previous line index, the previous line index indicating an index of a line including a pixel located above the current pixel in the current block; identify a number of candidate values for the previous line index; identify a number of escape pixels in a column of pixels above the current pixel in the current block; and reduce the number of candidate values for the previous line index by the number of identified escape pixels. 11. The device of claim 10, wherein the processor is further configured to code a run length value, the run length value indicating the number of successive pixels to be coded based on the previous line index. 12. The device of claim 10, wherein processor is further configured to code a distance between the previous line index and a current line index. 13. The device of claim 10, wherein the escape pixels are explicitly signaled in a bitstream. 14. The device of claim 10, wherein the processor is further configured to: identify whether an above adjacent pixel directly above the current pixel is an escape pixel; identify a number of pixels in the column of pixels above the current pixel that have the same value as the above adjacent pixel in response to the above adjacent pixel being an escape pixel; and reduce the number of candidate values for the previous line index by the number of identified pixels that have the same value as the above adjacent pixel. 15. The device of claim 10, wherein the processor is further configured to: identify whether a left adjacent pixel in scan order is an end of a copy-previous mode run; identify a left previous line index in response to the left adjacent pixel being an end of a copy-previous mode run; and reduce the number of candidate values of the previous line index by one. 16. A method for referencing neighboring pixels for coding video data in palette mode, comprising: determining whether a neighboring pixel that is located in a neighboring block is available; and coding a current pixel of a current block of the video data in copy-above mode via coding a run length value in response to the neighboring pixel being available, the current pixel being in the first line of the current block in scan order. 17. The method of claim 16, wherein the determination of whether the neighboring pixel is available comprises: determining whether the neighboring block is in another slice or tile; or determining: i) whether constraint intra prediction (CIP) is enabled and ii) whether the neighboring pixel is intra predicted. 18. The method of claim 16, further comprising: padding the neighboring block with a padded pixel in response to the neighboring pixel being unavailable; and coding the current pixel in copy-above mode based on the padded pixel. 19. The method of claim 16, further comprising: inserting a copy index into the palette, the copy index indicating that a reconstructed color is directly copied to a corresponding pixel of the current block from a corresponding neighboring pixel from the neighboring block; and coding the current pixel via assigning the copy index to the current pixel. 20. The method of claim 19, wherein the copy index is equal to the size of the palette, and wherein an escape index is equal to the size of the palette plus one. 21. The method of claim 16, wherein the copy-outside mode is used on at most one set of consecutive pixels in the current block. 22. The method of claim 16, further comprising inserting a reconstructed color value of the neighbor pixel in the palette. 23. The method of claim 16, further comprising coding a first value indicative of whether any neighboring pixels are using in the copy-above mode of the current block. 24. The method of claim 23, further comprising coding a second value indicative of whether copy-above from neighboring pixel is enabled, the second value being coded in the picture parameter set (PPS) or header, and the first value being coded at the block level, wherein the first value is prevented from being coded when the second value indicates that copy from neighboring pixel is not enabled. 25. A device for encoding video data, comprising: a memory configured to store at least a portion of the video data; and at least one processor in communication with the memory and configured to: determine whether a neighboring pixel that is located in a neighboring block is available; and code a current pixel of a current block of the video data in copy-above mode via coding a run length value in response to the neighboring pixel being available, the current pixel being in the first line of the current block in scan order. 26. The device of claim 25, wherein the processor is further configured to: determine whether the neighboring block is in another slice or tile; or determine: i) whether constrain intra prediction (CIP) is enabled and ii) whether the neighboring pixel is intra predicted. 27. The device of claim 25, wherein the processor is further configured to: pad the neighboring block with a padded pixel in response to the neighboring pixel being unavailable; and code the current pixel in copy-above mode based on the padded pixel. 28. The device of claim 25, wherein the processor is further configured to: insert a copy index into the palette, the copy index indicating that a reconstructed color is directly copied to a corresponding pixel of the current block from a corresponding neighboring pixel from the neighboring block; and code the current pixel via assigning the copy index to the current pixel. 29. The device of claim 28, wherein the copy index is equal to the size of the palette, and wherein an escape index is equal to the size of the palette plus one. 30. The device of claim 25, wherein the copy-outside mode is used on at most one set of consecutive pixels in the current block.
Methods incorporating extensions to copy-above mode for palette mode coding are disclosed. In one aspect, the method includes coding a current pixel of a current block of video data in copy-previous mode via coding a previous line index. The coding of the current pixel in copy-previous mode further including identifying a number of candidate values for the previous line index, identifying a number of escape pixels in a column of pixels above the current pixel in the current block, and reducing a number of candidate values of the previous line index by the number of identified escape pixels.1. A method for removing redundancies for coding video data in palette mode, the method comprising: coding a current pixel of a current block of the video data in copy-previous mode via coding a previous line index, the previous line index indicating an index of a line including a pixel located above the current pixel in the current block, the coding of the current pixel in copy-previous mode further comprising: identifying a number of candidate values for the previous line index; identifying a number of escape pixels in a column of pixels above the current pixel in the current block; and reducing the number of candidate values for the previous line index by the number of identified escape pixels. 2. The method of claim 1, wherein the coding the current pixel in copy-previous mode further comprises coding a run length value, the run length value indicating the number of successive pixels to be coded based on the previous line index. 3. The method of claim 1, wherein the coding of the previous line index comprises coding a distance between the previous line index and a current line index. 4. The method of claim 1, wherein the escape pixels are explicitly signaled in a bitstream. 5. The method of claim 1, wherein the coding of the current pixel in copy-previous mode further comprises: identifying whether an above adjacent pixel directly above the current pixel is an escape pixel; identifying a number of pixels in the column of pixels above the current pixel that have the same value as the above adjacent pixel in response to the above adjacent pixel being an escape pixel; and reducing the number of candidate values for the previous line index by the number of identified pixels that have the same value as the above adjacent pixel. 6. The method of claim 1, wherein the coding of the current pixel in copy-previous mode further comprises: identifying whether a left adjacent pixel in scan order is an end of a copy-previous mode run; identifying a left previous line index in response to the left adjacent pixel being an end of a copy-previous mode run; and reducing the number of candidate values for the previous line index by one. 7. The method of claim 6, further comprising coding a palette index for the current pixel equal to a predetermined value in response to the left previous line index being outside of the current block. 8. The method of claim 1, wherein the current pixel is in the first or second line of the current block, wherein the coding of the current pixel in copy-previous mode further comprises: bypassing the coding of the previous line index; and coding a palette index equal to a predetermined value. 9. The method of claim 1, wherein the previous line index is coded via a truncated binary code. 10. A device for encoding video data, comprising: a memory configured to store at least a portion of the video data; and at least one processor in communication with the memory and configured to: code a current pixel of a current block of the video data in copy-previous mode via coding a previous line index, the previous line index indicating an index of a line including a pixel located above the current pixel in the current block; identify a number of candidate values for the previous line index; identify a number of escape pixels in a column of pixels above the current pixel in the current block; and reduce the number of candidate values for the previous line index by the number of identified escape pixels. 11. The device of claim 10, wherein the processor is further configured to code a run length value, the run length value indicating the number of successive pixels to be coded based on the previous line index. 12. The device of claim 10, wherein processor is further configured to code a distance between the previous line index and a current line index. 13. The device of claim 10, wherein the escape pixels are explicitly signaled in a bitstream. 14. The device of claim 10, wherein the processor is further configured to: identify whether an above adjacent pixel directly above the current pixel is an escape pixel; identify a number of pixels in the column of pixels above the current pixel that have the same value as the above adjacent pixel in response to the above adjacent pixel being an escape pixel; and reduce the number of candidate values for the previous line index by the number of identified pixels that have the same value as the above adjacent pixel. 15. The device of claim 10, wherein the processor is further configured to: identify whether a left adjacent pixel in scan order is an end of a copy-previous mode run; identify a left previous line index in response to the left adjacent pixel being an end of a copy-previous mode run; and reduce the number of candidate values of the previous line index by one. 16. A method for referencing neighboring pixels for coding video data in palette mode, comprising: determining whether a neighboring pixel that is located in a neighboring block is available; and coding a current pixel of a current block of the video data in copy-above mode via coding a run length value in response to the neighboring pixel being available, the current pixel being in the first line of the current block in scan order. 17. The method of claim 16, wherein the determination of whether the neighboring pixel is available comprises: determining whether the neighboring block is in another slice or tile; or determining: i) whether constraint intra prediction (CIP) is enabled and ii) whether the neighboring pixel is intra predicted. 18. The method of claim 16, further comprising: padding the neighboring block with a padded pixel in response to the neighboring pixel being unavailable; and coding the current pixel in copy-above mode based on the padded pixel. 19. The method of claim 16, further comprising: inserting a copy index into the palette, the copy index indicating that a reconstructed color is directly copied to a corresponding pixel of the current block from a corresponding neighboring pixel from the neighboring block; and coding the current pixel via assigning the copy index to the current pixel. 20. The method of claim 19, wherein the copy index is equal to the size of the palette, and wherein an escape index is equal to the size of the palette plus one. 21. The method of claim 16, wherein the copy-outside mode is used on at most one set of consecutive pixels in the current block. 22. The method of claim 16, further comprising inserting a reconstructed color value of the neighbor pixel in the palette. 23. The method of claim 16, further comprising coding a first value indicative of whether any neighboring pixels are using in the copy-above mode of the current block. 24. The method of claim 23, further comprising coding a second value indicative of whether copy-above from neighboring pixel is enabled, the second value being coded in the picture parameter set (PPS) or header, and the first value being coded at the block level, wherein the first value is prevented from being coded when the second value indicates that copy from neighboring pixel is not enabled. 25. A device for encoding video data, comprising: a memory configured to store at least a portion of the video data; and at least one processor in communication with the memory and configured to: determine whether a neighboring pixel that is located in a neighboring block is available; and code a current pixel of a current block of the video data in copy-above mode via coding a run length value in response to the neighboring pixel being available, the current pixel being in the first line of the current block in scan order. 26. The device of claim 25, wherein the processor is further configured to: determine whether the neighboring block is in another slice or tile; or determine: i) whether constrain intra prediction (CIP) is enabled and ii) whether the neighboring pixel is intra predicted. 27. The device of claim 25, wherein the processor is further configured to: pad the neighboring block with a padded pixel in response to the neighboring pixel being unavailable; and code the current pixel in copy-above mode based on the padded pixel. 28. The device of claim 25, wherein the processor is further configured to: insert a copy index into the palette, the copy index indicating that a reconstructed color is directly copied to a corresponding pixel of the current block from a corresponding neighboring pixel from the neighboring block; and code the current pixel via assigning the copy index to the current pixel. 29. The device of claim 28, wherein the copy index is equal to the size of the palette, and wherein an escape index is equal to the size of the palette plus one. 30. The device of claim 25, wherein the copy-outside mode is used on at most one set of consecutive pixels in the current block.
2,400
8,708
8,708
14,719,946
2,436
A communications network security system includes a robustness agent that operates within a communications interface of a device at one or more nodes of the network to analyze and filter messages coming from or going onto the network. At each of the nodes, the robustness agent determines one or more sets of message characteristics associated with each of the messages passing through the agent, and the agent is configured to allow certain types of messages (e.g., messages with certain predetermined sets of characteristics) to be passed through the agent, prevent messages with other predetermined characteristics from being passed through the agent, such as by halting (discarding or filtering) these messages, and/or passes still other messages having other sets of message characteristics to a volume filter to be counted. The volume filter counts the number of messages with a particular set of message characteristics and passes these messages if the number of these detected messages over a particular period of time is less than a particular threshold, and filters these messages if the number of counted messages is greater than a particular threshold over a particular period of time.
1. A security system for use in a communications network having a plurality of network nodes communicatively coupled via a communications link, comprising: one or more message module interfaces, wherein each of the message module interfaces executes on a processor at one of the network nodes to detect message traffic at the network node and to determine one or more message characteristics of each of the messages; a rules memory that stores one or more logic rules; and one or more filtering units stored in and executed on a processor and coupled to the rules memory, each of the filtering units including; a first filtering module, and a second filtering module, wherein the first filtering module executes on the processor and applies one or more logic rules stored in the rules memory based on the message characteristic information to pass the message, to halt the message, or to pass the message to the second filtering module; wherein the second filtering module counts the number of messages having a particular set of message characteristics to determine a message count and passes the message or halts the message having the particular set of message characteristics based on the message count. 2. The security system of claim 1, wherein the message count comprises a particular number of messages with the particular set of message characteristics received within a particular time period. 3. The security system of claim 1, wherein the rules memory is a read-only memory. 4. The security system of claim 1, wherein the rules memory is a read/write memory. 5. The security system of claim 1 wherein the rules memory includes a first portion that is a read-only memory and includes a second portion that is a read/write memory. 6. The security system of claim 1, wherein the rules memory is a flash memory. 7. The security system of claim 6, wherein the rules memory is a removable flash memory. 8. The security system of claim 1, further including a logging module coupled to the first or the second filtering modules, which executes on the processor, to receive information regarding one or more halted messages and to store information regarding the one or more halted messages. 9. The security system of claim 8, wherein the logging module further includes a communications interface that sends one more logs of halted messages to a user. 10. The security system of claim 8, wherein the logging module stores metadata regarding the halted messages. 11. The security system of claim 1, further including an alert generation module that is coupled to the second filtering module, wherein the alert generation module executes on the processor to send an alert to a user when the message count reaches a predetermined level. 12. The security system of claim 1, further including an alert generation module that is coupled to the second filtering module, wherein the alert generation module executes on the processor to disconnect a device from the communications network when the message count reaches a predetermined level. 13. The security system of claim 1, wherein the one or more filtering units includes a first filtering unit that receives and analyzes messages coming into the network node from the communications link and a second filtering unit that receives and analyzes messages generated in the network node and being sent to another network node via the communications link. 14. A method of securing message traffic in a communications network, comprising: receiving a series of messages at a device connected to the communications network; analyzing, via a processor at the device, each of the series of messages to determine one or more message characteristics of each of the messages; and filtering each of the messages, via the processor at the device, based on a set of logic rules stored at the device, the filtering including passing messages with one or more first sets of message characteristics, halting messages with one or more second sets of message characteristics, and counting messages with one or more third sets of message characteristics, and further including passing or halting the messages with the one or more third sets of message characteristics based on counts associated with the one or more third sets of message characteristics. 15. The method of claim 14, wherein counting messages with one or more third sets of message characteristics includes counting the number of messages having one of the third sets of message characteristics received within a particular time period. 16. The method of claim 14, wherein counting messages with one or more third sets of message characteristics includes keeping a count of the number of messages of each of the third sets of message characteristics received within a particular time period. 17. The method of claim 14, wherein counting messages with one or more third sets of message characteristics includes keeping a count of the number of messages of each of the third sets of message characteristics. 18. The method of claim 14, further including storing the logic rules in a read-only memory in the device. 19. The method of claim 14, further including storing the logic rules in a read/write memory in the device. 20. The method of claim 14, further including storing a first portion of the logic rules in a read-only memory and storing a second portion of the logic rules in a read/write memory. 21. The method of claim 14, further including storing at least of portion of the logic rules in a flash memory at the device. 22. The method of claim 14, further including logging information regarding one or more halted messages to create on or more log files. 23. The method of claim 22, further including communicating the one or more log files with the logging information to a user via the communications network. 24. The method of claim 22, wherein logging information includes storing metadata regarding the halted messages in a memory at the device. 25. The method of claim 14, further including generating an alert to send to a user when a message count of messages with one of the one or more third set of message characteristics reaches a predetermined level. 26. The method of claim 14, further including initiating a security action when a message count of messages with one of the one or more third set of message characteristics reaches a predetermined level. 27. The method of claim 26, wherein initiating the security action includes initiating virus or intrusion detection software in a device on the communications network. 28. The method of claim 26, wherein initiating the security action includes disconnecting a device from a communications link of the communications network. 29. The method of claim 26, wherein initiating the security action includes disconnecting a different device on the communications network from the communications link of the communications network. 30. The method of claim 14, wherein passing the messages with the one or more first sets of message characteristics and passing the messages with the one or more third set of message characteristics includes passing the messages to a communications stack of the device for processing at the device. 31. The method of claim 14, wherein passing the messages with the one or more first sets of message characteristics and passing the messages with the one or more third set of message characteristics includes passing the messages to a communications link of the communications network for transmission to another device on the communications network. 32. The method of claim 14, wherein receiving the series of messages at a device connected to the communications network includes receiving a first series of messages generated within the device and receiving a second series of messages received from a communications link of the communications network, wherein analyzing each of the series of messages includes analyzing each of the first series of messages and the second series of messages separately, and wherein filtering each of the messages includes filtering each of the first series of messages and the second series of messages separately. 33. The method of claim 32, wherein filtering each of the first series of messages and the second series of messages separately includes filtering the first series of messages using a first set of logic rules and filtering the second series of messages using a second and different set of logic rules. 34. A communications network, comprising: a communications link; a plurality of network nodes, each of the network nodes including a network device coupled to the communications link and having a processor and a communications stack that executes on the processor to process messages coming from and going to the communications link; wherein each of a plurality of the network nodes further includes, one or more message module interfaces, wherein each of the message module interfaces executes on a processor at a network node to detect message traffic coming from the communications stack or from the communications link to determine one or more message characteristics of each of the messages; a rules memory that stores one or more logic rules; and a filtering module stored in and executed on a processor and coupled to the rules memory, that uses the set of logic rules stored in the rules memory to pass messages with one or more first sets of message characteristics, to halt messages with one or more second sets of message characteristics, and to count messages with one or more third sets of message characteristics, and that further passes or halts the messages with the one or more third sets of message characteristics based on counts associated with the one or more third sets of message characteristics. 35. The communications network of claim 34, wherein the filtering module produces the message counts for the messages with the one or more third sets of message characteristics as a number of messages with a particular set of message characteristics received within a particular time period. 36. The communications network of claim 34, wherein the rules memory is a read-only memory. 37. The communications network of claim 34, wherein the rules memory is a read/write memory. 38. The communications network of claim 34, wherein the rules memory includes a first portion that is a read-only memory and includes a second portion that is a read/write memory. 39. The communications network of claim 34, wherein each of the plurality of network nodes further includes a logging module coupled to the filtering module, wherein the logging module executes on the processor to receive information regarding one or more halted messages and to store information regarding the one or more halted messages in one or more logs. 40. The communications network of claim 39, wherein the logging module further includes a communication interface that sends the one or more logs of halted messages to a user. 41. The communications network of claim 40, wherein the logging module stores metadata regarding the halted messages. 42. The communications network of claim 34, wherein each of the plurality of network nodes further includes an alert generation module that is coupled to the filtering module, wherein the alert generation module executes on the processor to send an alert to a user when one of the message counts reaches a predetermined level. 43. The communications network of claim 34, wherein each of the plurality of network nodes further includes an alert generation module that is coupled to the filtering module, wherein the alert generation module executes on the processor to disconnect a device from the communications link network when one of the message counts reaches a predetermined level. 44. The communications network of claim 34, wherein each of the plurality of network nodes includes two or more filtering modules, wherein a first one of the two or more filtering modules receives and analyzes incoming messages into the network device at the network node from the communications link and a second one of the two or more filtering modules that receives and analyzes messages generated in the network device at the network node and being sent to another network device at another network node via the communications link.
A communications network security system includes a robustness agent that operates within a communications interface of a device at one or more nodes of the network to analyze and filter messages coming from or going onto the network. At each of the nodes, the robustness agent determines one or more sets of message characteristics associated with each of the messages passing through the agent, and the agent is configured to allow certain types of messages (e.g., messages with certain predetermined sets of characteristics) to be passed through the agent, prevent messages with other predetermined characteristics from being passed through the agent, such as by halting (discarding or filtering) these messages, and/or passes still other messages having other sets of message characteristics to a volume filter to be counted. The volume filter counts the number of messages with a particular set of message characteristics and passes these messages if the number of these detected messages over a particular period of time is less than a particular threshold, and filters these messages if the number of counted messages is greater than a particular threshold over a particular period of time.1. A security system for use in a communications network having a plurality of network nodes communicatively coupled via a communications link, comprising: one or more message module interfaces, wherein each of the message module interfaces executes on a processor at one of the network nodes to detect message traffic at the network node and to determine one or more message characteristics of each of the messages; a rules memory that stores one or more logic rules; and one or more filtering units stored in and executed on a processor and coupled to the rules memory, each of the filtering units including; a first filtering module, and a second filtering module, wherein the first filtering module executes on the processor and applies one or more logic rules stored in the rules memory based on the message characteristic information to pass the message, to halt the message, or to pass the message to the second filtering module; wherein the second filtering module counts the number of messages having a particular set of message characteristics to determine a message count and passes the message or halts the message having the particular set of message characteristics based on the message count. 2. The security system of claim 1, wherein the message count comprises a particular number of messages with the particular set of message characteristics received within a particular time period. 3. The security system of claim 1, wherein the rules memory is a read-only memory. 4. The security system of claim 1, wherein the rules memory is a read/write memory. 5. The security system of claim 1 wherein the rules memory includes a first portion that is a read-only memory and includes a second portion that is a read/write memory. 6. The security system of claim 1, wherein the rules memory is a flash memory. 7. The security system of claim 6, wherein the rules memory is a removable flash memory. 8. The security system of claim 1, further including a logging module coupled to the first or the second filtering modules, which executes on the processor, to receive information regarding one or more halted messages and to store information regarding the one or more halted messages. 9. The security system of claim 8, wherein the logging module further includes a communications interface that sends one more logs of halted messages to a user. 10. The security system of claim 8, wherein the logging module stores metadata regarding the halted messages. 11. The security system of claim 1, further including an alert generation module that is coupled to the second filtering module, wherein the alert generation module executes on the processor to send an alert to a user when the message count reaches a predetermined level. 12. The security system of claim 1, further including an alert generation module that is coupled to the second filtering module, wherein the alert generation module executes on the processor to disconnect a device from the communications network when the message count reaches a predetermined level. 13. The security system of claim 1, wherein the one or more filtering units includes a first filtering unit that receives and analyzes messages coming into the network node from the communications link and a second filtering unit that receives and analyzes messages generated in the network node and being sent to another network node via the communications link. 14. A method of securing message traffic in a communications network, comprising: receiving a series of messages at a device connected to the communications network; analyzing, via a processor at the device, each of the series of messages to determine one or more message characteristics of each of the messages; and filtering each of the messages, via the processor at the device, based on a set of logic rules stored at the device, the filtering including passing messages with one or more first sets of message characteristics, halting messages with one or more second sets of message characteristics, and counting messages with one or more third sets of message characteristics, and further including passing or halting the messages with the one or more third sets of message characteristics based on counts associated with the one or more third sets of message characteristics. 15. The method of claim 14, wherein counting messages with one or more third sets of message characteristics includes counting the number of messages having one of the third sets of message characteristics received within a particular time period. 16. The method of claim 14, wherein counting messages with one or more third sets of message characteristics includes keeping a count of the number of messages of each of the third sets of message characteristics received within a particular time period. 17. The method of claim 14, wherein counting messages with one or more third sets of message characteristics includes keeping a count of the number of messages of each of the third sets of message characteristics. 18. The method of claim 14, further including storing the logic rules in a read-only memory in the device. 19. The method of claim 14, further including storing the logic rules in a read/write memory in the device. 20. The method of claim 14, further including storing a first portion of the logic rules in a read-only memory and storing a second portion of the logic rules in a read/write memory. 21. The method of claim 14, further including storing at least of portion of the logic rules in a flash memory at the device. 22. The method of claim 14, further including logging information regarding one or more halted messages to create on or more log files. 23. The method of claim 22, further including communicating the one or more log files with the logging information to a user via the communications network. 24. The method of claim 22, wherein logging information includes storing metadata regarding the halted messages in a memory at the device. 25. The method of claim 14, further including generating an alert to send to a user when a message count of messages with one of the one or more third set of message characteristics reaches a predetermined level. 26. The method of claim 14, further including initiating a security action when a message count of messages with one of the one or more third set of message characteristics reaches a predetermined level. 27. The method of claim 26, wherein initiating the security action includes initiating virus or intrusion detection software in a device on the communications network. 28. The method of claim 26, wherein initiating the security action includes disconnecting a device from a communications link of the communications network. 29. The method of claim 26, wherein initiating the security action includes disconnecting a different device on the communications network from the communications link of the communications network. 30. The method of claim 14, wherein passing the messages with the one or more first sets of message characteristics and passing the messages with the one or more third set of message characteristics includes passing the messages to a communications stack of the device for processing at the device. 31. The method of claim 14, wherein passing the messages with the one or more first sets of message characteristics and passing the messages with the one or more third set of message characteristics includes passing the messages to a communications link of the communications network for transmission to another device on the communications network. 32. The method of claim 14, wherein receiving the series of messages at a device connected to the communications network includes receiving a first series of messages generated within the device and receiving a second series of messages received from a communications link of the communications network, wherein analyzing each of the series of messages includes analyzing each of the first series of messages and the second series of messages separately, and wherein filtering each of the messages includes filtering each of the first series of messages and the second series of messages separately. 33. The method of claim 32, wherein filtering each of the first series of messages and the second series of messages separately includes filtering the first series of messages using a first set of logic rules and filtering the second series of messages using a second and different set of logic rules. 34. A communications network, comprising: a communications link; a plurality of network nodes, each of the network nodes including a network device coupled to the communications link and having a processor and a communications stack that executes on the processor to process messages coming from and going to the communications link; wherein each of a plurality of the network nodes further includes, one or more message module interfaces, wherein each of the message module interfaces executes on a processor at a network node to detect message traffic coming from the communications stack or from the communications link to determine one or more message characteristics of each of the messages; a rules memory that stores one or more logic rules; and a filtering module stored in and executed on a processor and coupled to the rules memory, that uses the set of logic rules stored in the rules memory to pass messages with one or more first sets of message characteristics, to halt messages with one or more second sets of message characteristics, and to count messages with one or more third sets of message characteristics, and that further passes or halts the messages with the one or more third sets of message characteristics based on counts associated with the one or more third sets of message characteristics. 35. The communications network of claim 34, wherein the filtering module produces the message counts for the messages with the one or more third sets of message characteristics as a number of messages with a particular set of message characteristics received within a particular time period. 36. The communications network of claim 34, wherein the rules memory is a read-only memory. 37. The communications network of claim 34, wherein the rules memory is a read/write memory. 38. The communications network of claim 34, wherein the rules memory includes a first portion that is a read-only memory and includes a second portion that is a read/write memory. 39. The communications network of claim 34, wherein each of the plurality of network nodes further includes a logging module coupled to the filtering module, wherein the logging module executes on the processor to receive information regarding one or more halted messages and to store information regarding the one or more halted messages in one or more logs. 40. The communications network of claim 39, wherein the logging module further includes a communication interface that sends the one or more logs of halted messages to a user. 41. The communications network of claim 40, wherein the logging module stores metadata regarding the halted messages. 42. The communications network of claim 34, wherein each of the plurality of network nodes further includes an alert generation module that is coupled to the filtering module, wherein the alert generation module executes on the processor to send an alert to a user when one of the message counts reaches a predetermined level. 43. The communications network of claim 34, wherein each of the plurality of network nodes further includes an alert generation module that is coupled to the filtering module, wherein the alert generation module executes on the processor to disconnect a device from the communications link network when one of the message counts reaches a predetermined level. 44. The communications network of claim 34, wherein each of the plurality of network nodes includes two or more filtering modules, wherein a first one of the two or more filtering modules receives and analyzes incoming messages into the network device at the network node from the communications link and a second one of the two or more filtering modules that receives and analyzes messages generated in the network device at the network node and being sent to another network device at another network node via the communications link.
2,400
8,709
8,709
14,075,028
2,457
In one embodiment, a method includes receiving an indication that a user of the social-networking system watched at least a portion of a program, determining that the user intended to watch the program, and generating a story in response to the determination. The story is published to the social-networking system a predetermined amount of time after receiving the indication.
1. A method comprising: by one or more computers of a social-networking system, receiving an indication that a user of the social-networking system watched at least a portion of a program; by the one or more computers of the social-networking system, determining that the user intended to watch the program; by the one or more computers of the social-networking system, generating a story in response to the determination; and by the one or more computers of the social-networking system, publishing the story to the social-networking system a predetermined amount of time after receiving the indication. 2. The method of claim 1, wherein determining that the user intended to watch the program comprises: starting a timer in response to receiving the indication; and inferring that the user intended to watch the program when an amount of time on the timer exceeds a second predetermined amount of time. 3. The method of claim 1, wherein the story comprises a post indicating that the user watched the program. 4. The method of claim 1, wherein the story comprises an advertisement of the program. 5. The method of claim 2, wherein the predetermined amount of time is greater than the second predetermined amount of time. 6. The method of claim 1, further comprising, by the one or more computers of the social-networking system, removing the story from a timeline of the user upon receiving a second indication that the user desires to remove the story. 7. The method of claim 1, further comprising, by the one or more computers of the social-networking system, providing an option for display on a display device operable to allow the user to change a privacy setting after the story is published to the social-networking system. 8. One or more computer-readable non-transitory storage media in one or more computing systems, the media embodying logic that is operable when executed to: receive an indication that a user of the social-networking system watched at least a portion of a program; determine that the user intended to watch the program; generate a story in response to the determination; and publish the story to the social-networking system a predetermined amount of time after receiving the indication. 9. The media of claim 8, wherein the logic is further operable to determine that the user intended to watch the program by: starting a timer in response to receiving the indication; and inferring that the user intended to watch the program when an amount of time on the timer exceeds a second predetermined amount of time. 10. The media of claim 8, wherein the story comprises a post indicating that the user watched the program. 11. The media of claim 8, wherein the story comprises an advertisement of the program. 12. The media of claim 9, wherein the predetermined amount of time is greater than the second predetermined amount of time. 13. The media of claim 8, wherein the logic is further operable to remove the story from a timeline of the user upon receiving a second indication that the user desires to remove the story. 14. The media of claim 8, wherein the logic is further operable to provide an option for display on a display device operable to allow the user to change a privacy setting after the story is published to the social-networking system. 15. A system comprising: one or more memory devices; and a processor communicatively coupled to the one or more memory devices, the processor operable to: receive an indication that a user of the social-networking system watched at least a portion of a program; determine that the user intended to watch the program; generate a story in response to the determination; and publish the story to the social-networking system a predetermined amount of time after receiving the indication. 16. The system of claim 15, wherein the processor is further operable to determine that the user intended to watch the program by: starting a timer in response to receiving the indication; and inferring that the user intended to watch the program when an amount of time on the timer exceeds a second predetermined amount of time. 17. The system of claim 15, wherein the story comprises a post indicating that the user watched the program. 18. The system of claim 15, wherein the story comprises an advertisement of the program. 19. The system of claim 16, wherein the predetermined amount of time is greater than the second predetermined amount of time. 20. The system of claim 15, wherein the processor is further operable to remove the story from a timeline of the user upon receiving a second indication that the user desires to remove the story.
In one embodiment, a method includes receiving an indication that a user of the social-networking system watched at least a portion of a program, determining that the user intended to watch the program, and generating a story in response to the determination. The story is published to the social-networking system a predetermined amount of time after receiving the indication.1. A method comprising: by one or more computers of a social-networking system, receiving an indication that a user of the social-networking system watched at least a portion of a program; by the one or more computers of the social-networking system, determining that the user intended to watch the program; by the one or more computers of the social-networking system, generating a story in response to the determination; and by the one or more computers of the social-networking system, publishing the story to the social-networking system a predetermined amount of time after receiving the indication. 2. The method of claim 1, wherein determining that the user intended to watch the program comprises: starting a timer in response to receiving the indication; and inferring that the user intended to watch the program when an amount of time on the timer exceeds a second predetermined amount of time. 3. The method of claim 1, wherein the story comprises a post indicating that the user watched the program. 4. The method of claim 1, wherein the story comprises an advertisement of the program. 5. The method of claim 2, wherein the predetermined amount of time is greater than the second predetermined amount of time. 6. The method of claim 1, further comprising, by the one or more computers of the social-networking system, removing the story from a timeline of the user upon receiving a second indication that the user desires to remove the story. 7. The method of claim 1, further comprising, by the one or more computers of the social-networking system, providing an option for display on a display device operable to allow the user to change a privacy setting after the story is published to the social-networking system. 8. One or more computer-readable non-transitory storage media in one or more computing systems, the media embodying logic that is operable when executed to: receive an indication that a user of the social-networking system watched at least a portion of a program; determine that the user intended to watch the program; generate a story in response to the determination; and publish the story to the social-networking system a predetermined amount of time after receiving the indication. 9. The media of claim 8, wherein the logic is further operable to determine that the user intended to watch the program by: starting a timer in response to receiving the indication; and inferring that the user intended to watch the program when an amount of time on the timer exceeds a second predetermined amount of time. 10. The media of claim 8, wherein the story comprises a post indicating that the user watched the program. 11. The media of claim 8, wherein the story comprises an advertisement of the program. 12. The media of claim 9, wherein the predetermined amount of time is greater than the second predetermined amount of time. 13. The media of claim 8, wherein the logic is further operable to remove the story from a timeline of the user upon receiving a second indication that the user desires to remove the story. 14. The media of claim 8, wherein the logic is further operable to provide an option for display on a display device operable to allow the user to change a privacy setting after the story is published to the social-networking system. 15. A system comprising: one or more memory devices; and a processor communicatively coupled to the one or more memory devices, the processor operable to: receive an indication that a user of the social-networking system watched at least a portion of a program; determine that the user intended to watch the program; generate a story in response to the determination; and publish the story to the social-networking system a predetermined amount of time after receiving the indication. 16. The system of claim 15, wherein the processor is further operable to determine that the user intended to watch the program by: starting a timer in response to receiving the indication; and inferring that the user intended to watch the program when an amount of time on the timer exceeds a second predetermined amount of time. 17. The system of claim 15, wherein the story comprises a post indicating that the user watched the program. 18. The system of claim 15, wherein the story comprises an advertisement of the program. 19. The system of claim 16, wherein the predetermined amount of time is greater than the second predetermined amount of time. 20. The system of claim 15, wherein the processor is further operable to remove the story from a timeline of the user upon receiving a second indication that the user desires to remove the story.
2,400
8,710
8,710
15,197,927
2,482
The present disclosure generally relates to a gaze tracking device. Gaze tracking is a process of measuring either the point of regard or the motion of an eye relatively to the head of a person. A gaze tracking device is a device capable of measuring eye positions and eye movement. In order to track the gaze of a person, infra-red light is projected into the user's eye. Utilizing the primary Purkinje reflection and the pupil-masked reflection, the position of the eye of the user is determined. The gaze tracking devices running such a tracking method offer a limited field of view due to the illumination scheme combined with the geometry of the reflected images. It is proposed a gaze tracking device embedding a light-field camera. Such a gaze tracking device may be embedded in a head mounted device.
1. A gaze tracking device comprising: a plurality of light sources arranged to project infra-red light on a surface of an eye of a user of said gaze tracking device and a light-field camera for capturing the infra-red light reflected off the surface of the eye of the user. 2. The gaze tracking device according to claim 1, wherein the light sources are located in a periphery of a field of view of the eye of the user. 3. The gaze tracking device according to claim 1, wherein the light-field camera is located in a periphery of a field of view of the eye of the user. 4. The gaze tracking device according to claim 1, wherein the light sources emit a polarized infra-red light. 5. The gaze tracking device according to claim 1, wherein at least a micro-lens of a micro-lens array of the light-field camera is equipped with a polarizing filter. 6. A head mounted device comprising at least one gaze tracking device comprising: a plurality of light sources arranged to project infra-red light on a surface of an eye of a user of said gaze tracking device and a light-field camera for capturing the infra-red light reflected off the surface of the eye of the user. 7. The head mounted device according to claim 6, wherein the light sources are located on a rim of a frame of the head mounted device. 8. The head mounted device according to claim 6, wherein the light-field camera is located on the rim of the frame of the head mounted device. 9. The head mounted device according to claim 8, wherein the light-field camera is embedded on a side-piece of the frame of the head mounted device.
The present disclosure generally relates to a gaze tracking device. Gaze tracking is a process of measuring either the point of regard or the motion of an eye relatively to the head of a person. A gaze tracking device is a device capable of measuring eye positions and eye movement. In order to track the gaze of a person, infra-red light is projected into the user's eye. Utilizing the primary Purkinje reflection and the pupil-masked reflection, the position of the eye of the user is determined. The gaze tracking devices running such a tracking method offer a limited field of view due to the illumination scheme combined with the geometry of the reflected images. It is proposed a gaze tracking device embedding a light-field camera. Such a gaze tracking device may be embedded in a head mounted device.1. A gaze tracking device comprising: a plurality of light sources arranged to project infra-red light on a surface of an eye of a user of said gaze tracking device and a light-field camera for capturing the infra-red light reflected off the surface of the eye of the user. 2. The gaze tracking device according to claim 1, wherein the light sources are located in a periphery of a field of view of the eye of the user. 3. The gaze tracking device according to claim 1, wherein the light-field camera is located in a periphery of a field of view of the eye of the user. 4. The gaze tracking device according to claim 1, wherein the light sources emit a polarized infra-red light. 5. The gaze tracking device according to claim 1, wherein at least a micro-lens of a micro-lens array of the light-field camera is equipped with a polarizing filter. 6. A head mounted device comprising at least one gaze tracking device comprising: a plurality of light sources arranged to project infra-red light on a surface of an eye of a user of said gaze tracking device and a light-field camera for capturing the infra-red light reflected off the surface of the eye of the user. 7. The head mounted device according to claim 6, wherein the light sources are located on a rim of a frame of the head mounted device. 8. The head mounted device according to claim 6, wherein the light-field camera is located on the rim of the frame of the head mounted device. 9. The head mounted device according to claim 8, wherein the light-field camera is embedded on a side-piece of the frame of the head mounted device.
2,400
8,711
8,711
15,235,990
2,425
Systems and methods for determining the location of advertisements in multimedia assets are disclosed. A method includes obtaining an audio signature corresponding to a time period of a multimedia asset, identifying a match between the obtained audio signature and one or more stored audio signatures, comparing programming data of the multimedia assets of the obtained audio signature and the matching audio signatures, and determining whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures. Another method includes identifying matches between a plurality of obtained audio signatures and a plurality of stored audio signatures, and determining whether consecutive time periods of the multimedia asset contain an advertisement based on a number of consecutive matching audio signatures of the plurality of stored audio signatures.
1. A method comprising: obtaining an audio signature corresponding to a time period of a multimedia asset; identifying a match between the obtained audio signature and one or more stored audio signatures, the stored audio signatures corresponding to time periods of a plurality of other multimedia assets; comparing programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures; and determining whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures. 2. The method of claim 1, wherein the obtaining comprises applying an audio fingerprinting function to an audio data file representing the audio of the multimedia asset during the time period to create the audio signature. 3. The method of claim 1, wherein the multimedia asset comprises a television program. 4. The method of claim 1, wherein the identifying comprises: generating a database containing the one or more stored audio signatures; and comparing the obtained audio signature to the one or more stored audio signatures in the database to identify the match. 5. The method of claim 1, wherein the programming data comprises one or more categories of data selected from a group consisting of genre data, asset title data, episode title data, asset description data, channel data, and time data. 6. The method of claim 1, wherein the determining comprises: determining that the time period of the multimedia asset contains an advertisement when asset title data of the multimedia asset of the obtained audio signature differs from asset title data of the multimedia asset of the one or more matching audio signatures. 7. The method of claim 1, wherein the determining comprises: determining that the time period of the multimedia asset contains an advertisement when channel data of the multimedia asset of the obtained audio signature differs from channel data of the multimedia asset of the one or more matching audio signatures. 8. The method of claim 1, further comprising, when it is determined that the time period of the multimedia asset contains an advertisement: aligning video data for the time period of the obtained audio signature with video data for the time periods of the one or more matching audio signatures; comparing video data for a time period preceding the time period of the obtained audio signature with video data for one or more time periods preceding respective time periods of the one or more matching audio signatures; and identifying a beginning of the advertisement when the video data for the time period preceding the time period of the obtained audio signature is sufficiently different from the video data for the time period preceding one or more time periods preceding respective time periods of the one or more matching audio signatures. 9. A method comprising: obtaining a plurality of audio signatures corresponding to consecutive time periods of the multimedia asset; identifying matches between the obtained audio signatures and a plurality of stored audio signatures, the stored audio signatures corresponding to consecutive time periods of a plurality of other multimedia assets; and determining whether the consecutive time periods of the multimedia asset contain an advertisement based on a number of consecutive matching audio signatures of the plurality of stored audio signatures. 10. The method of claim 9, wherein the obtaining comprises applying an audio fingerprinting function to consecutive segments of an audio data file representing the audio of the multimedia asset during the consecutive time periods to create the plurality of audio signatures. 11. The method of claim 9, wherein the multimedia asset comprises a television program. 12. The method of claim 9, wherein the identifying comprises: generating a database containing the plurality of stored audio signatures; and comparing the obtained audio signatures to the plurality of stored audio signatures in the database to identify the matches. 13. The method of claim 9, wherein the determining comprises: determining that the consecutive time periods of the multimedia asset contain an advertisement when a number of the plurality of matching audio signatures is greater than a first predetermined number and less than a second predetermined number. 14. The method of claim 9, further comprising, when it is determined that the time period of the multimedia asset contains an advertisement: aligning video data for the time period of the obtained audio signature with video data for the time periods of the one or more matching audio signatures; comparing video data for a time period preceding the time period of the obtained audio signature with video data for one or more time periods preceding respective time periods of the one or more matching audio signatures; and identifying a beginning of the advertisement when the video data for the time period preceding the time period of the obtained audio signature is sufficiently different from the video data for the time period preceding one or more time periods preceding respective time periods of the one or more matching audio signatures. 15. A system comprising: a receiver connected to receive audio and video data from a multimedia stream; a computer memory containing a database of one or more stored audio signatures, the stored audio signatures corresponding to time periods of a plurality of multimedia assets; and a processor in communication with the receiver and the computer memory, the processor programmed to: obtain an audio signature corresponding to a time period of a multimedia asset in the multimedia stream; identify a match between the obtained audio signature and the one or more stored audio signatures; compare programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures; and determine whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures. 16. The system of claim 15, wherein the processor is programmed to apply an audio fingerprinting function to the audio data of the multimedia asset during the time period to create the audio signature. 17. The system of claim 15, wherein the multimedia asset comprises a television program. 18. The system of claim 15, wherein the programming data comprises one or more categories of data selected from a group consisting of genre data, asset title data, episode title data, asset description data, channel data, and time data. 19. The system of claim 15, wherein the processor is programmed to determine that the time period of the multimedia asset contains an advertisement when asset title data of the multimedia asset of the obtained audio signature differs from asset title data of the multimedia asset of the one or more matching audio signatures. 20. The system of claim 15, wherein the processor is programmed to determine that the time period of the multimedia asset contains an advertisement when channel data of the multimedia asset of the obtained audio signature differs from channel data of the multimedia asset of the one or more matching audio signatures. 21. The system of claim 15, wherein when the processor determines that the time period of the multimedia asset contains an advertisement, the processor is further programmed to: align the video data for the time period of the obtained audio signature with video data for the time periods of the one or more matching audio signatures; compare video data for a time period preceding the time period of the obtained audio signature with video data for one or more time periods preceding respective time periods of the one or more matching audio signatures; and identify a beginning of the advertisement when the video data for the time period preceding the time period of the obtained audio signature is sufficiently different from the video data for the time period preceding one or more time periods preceding respective time periods of the one or more matching audio signatures. 22. A non-transitory computer readable medium containing computer instructions, the instructions causing a computer to: obtain an audio signature corresponding to a time period of a multimedia asset; identify a match between the obtained audio signature and one or more stored audio signatures, the stored audio signatures corresponding to time periods of a plurality of other multimedia assets; compare programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures; and determine whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures.
Systems and methods for determining the location of advertisements in multimedia assets are disclosed. A method includes obtaining an audio signature corresponding to a time period of a multimedia asset, identifying a match between the obtained audio signature and one or more stored audio signatures, comparing programming data of the multimedia assets of the obtained audio signature and the matching audio signatures, and determining whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures. Another method includes identifying matches between a plurality of obtained audio signatures and a plurality of stored audio signatures, and determining whether consecutive time periods of the multimedia asset contain an advertisement based on a number of consecutive matching audio signatures of the plurality of stored audio signatures.1. A method comprising: obtaining an audio signature corresponding to a time period of a multimedia asset; identifying a match between the obtained audio signature and one or more stored audio signatures, the stored audio signatures corresponding to time periods of a plurality of other multimedia assets; comparing programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures; and determining whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures. 2. The method of claim 1, wherein the obtaining comprises applying an audio fingerprinting function to an audio data file representing the audio of the multimedia asset during the time period to create the audio signature. 3. The method of claim 1, wherein the multimedia asset comprises a television program. 4. The method of claim 1, wherein the identifying comprises: generating a database containing the one or more stored audio signatures; and comparing the obtained audio signature to the one or more stored audio signatures in the database to identify the match. 5. The method of claim 1, wherein the programming data comprises one or more categories of data selected from a group consisting of genre data, asset title data, episode title data, asset description data, channel data, and time data. 6. The method of claim 1, wherein the determining comprises: determining that the time period of the multimedia asset contains an advertisement when asset title data of the multimedia asset of the obtained audio signature differs from asset title data of the multimedia asset of the one or more matching audio signatures. 7. The method of claim 1, wherein the determining comprises: determining that the time period of the multimedia asset contains an advertisement when channel data of the multimedia asset of the obtained audio signature differs from channel data of the multimedia asset of the one or more matching audio signatures. 8. The method of claim 1, further comprising, when it is determined that the time period of the multimedia asset contains an advertisement: aligning video data for the time period of the obtained audio signature with video data for the time periods of the one or more matching audio signatures; comparing video data for a time period preceding the time period of the obtained audio signature with video data for one or more time periods preceding respective time periods of the one or more matching audio signatures; and identifying a beginning of the advertisement when the video data for the time period preceding the time period of the obtained audio signature is sufficiently different from the video data for the time period preceding one or more time periods preceding respective time periods of the one or more matching audio signatures. 9. A method comprising: obtaining a plurality of audio signatures corresponding to consecutive time periods of the multimedia asset; identifying matches between the obtained audio signatures and a plurality of stored audio signatures, the stored audio signatures corresponding to consecutive time periods of a plurality of other multimedia assets; and determining whether the consecutive time periods of the multimedia asset contain an advertisement based on a number of consecutive matching audio signatures of the plurality of stored audio signatures. 10. The method of claim 9, wherein the obtaining comprises applying an audio fingerprinting function to consecutive segments of an audio data file representing the audio of the multimedia asset during the consecutive time periods to create the plurality of audio signatures. 11. The method of claim 9, wherein the multimedia asset comprises a television program. 12. The method of claim 9, wherein the identifying comprises: generating a database containing the plurality of stored audio signatures; and comparing the obtained audio signatures to the plurality of stored audio signatures in the database to identify the matches. 13. The method of claim 9, wherein the determining comprises: determining that the consecutive time periods of the multimedia asset contain an advertisement when a number of the plurality of matching audio signatures is greater than a first predetermined number and less than a second predetermined number. 14. The method of claim 9, further comprising, when it is determined that the time period of the multimedia asset contains an advertisement: aligning video data for the time period of the obtained audio signature with video data for the time periods of the one or more matching audio signatures; comparing video data for a time period preceding the time period of the obtained audio signature with video data for one or more time periods preceding respective time periods of the one or more matching audio signatures; and identifying a beginning of the advertisement when the video data for the time period preceding the time period of the obtained audio signature is sufficiently different from the video data for the time period preceding one or more time periods preceding respective time periods of the one or more matching audio signatures. 15. A system comprising: a receiver connected to receive audio and video data from a multimedia stream; a computer memory containing a database of one or more stored audio signatures, the stored audio signatures corresponding to time periods of a plurality of multimedia assets; and a processor in communication with the receiver and the computer memory, the processor programmed to: obtain an audio signature corresponding to a time period of a multimedia asset in the multimedia stream; identify a match between the obtained audio signature and the one or more stored audio signatures; compare programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures; and determine whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures. 16. The system of claim 15, wherein the processor is programmed to apply an audio fingerprinting function to the audio data of the multimedia asset during the time period to create the audio signature. 17. The system of claim 15, wherein the multimedia asset comprises a television program. 18. The system of claim 15, wherein the programming data comprises one or more categories of data selected from a group consisting of genre data, asset title data, episode title data, asset description data, channel data, and time data. 19. The system of claim 15, wherein the processor is programmed to determine that the time period of the multimedia asset contains an advertisement when asset title data of the multimedia asset of the obtained audio signature differs from asset title data of the multimedia asset of the one or more matching audio signatures. 20. The system of claim 15, wherein the processor is programmed to determine that the time period of the multimedia asset contains an advertisement when channel data of the multimedia asset of the obtained audio signature differs from channel data of the multimedia asset of the one or more matching audio signatures. 21. The system of claim 15, wherein when the processor determines that the time period of the multimedia asset contains an advertisement, the processor is further programmed to: align the video data for the time period of the obtained audio signature with video data for the time periods of the one or more matching audio signatures; compare video data for a time period preceding the time period of the obtained audio signature with video data for one or more time periods preceding respective time periods of the one or more matching audio signatures; and identify a beginning of the advertisement when the video data for the time period preceding the time period of the obtained audio signature is sufficiently different from the video data for the time period preceding one or more time periods preceding respective time periods of the one or more matching audio signatures. 22. A non-transitory computer readable medium containing computer instructions, the instructions causing a computer to: obtain an audio signature corresponding to a time period of a multimedia asset; identify a match between the obtained audio signature and one or more stored audio signatures, the stored audio signatures corresponding to time periods of a plurality of other multimedia assets; compare programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures; and determine whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures.
2,400
8,712
8,712
14,649,704
2,483
The present technology relates to an encoding device, an encoding method, a decoding device, and a decoding method capable of improving the coding efficiency of an image of a plurality of viewpoints. A motion parallax prediction/compensation unit sets first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current coding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a list (L 0 ) in first order and sets the first image specifying information and the second image specifying information in a list (L 1 ) in second order that is different from the first order. The motion parallax prediction/compensation unit and a calculation unit generate coded data by coding the current coding image based on the lists (L 0 and L 1 ). The present technology, for example, can be applied to an encoding device that codes a 3D image and the like.
1. An encoding device comprising: a setting unit that sets first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current coding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and sets the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and an encoding unit that generates coded data by coding the current coding image based on the first reference list and the second reference list set by the setting unit. 2. The encoding device according to claim 1, wherein the setting unit sets the first image specifying information and the second image specifying information in the first reference list in order of the first image specifying information and the second image specifying information and sets the first image specifying information and the second image specifying information in the second reference list in order of the second image specifying information and the first image specifying information. 3. The encoding device according to claim 1, further comprising: a transmission unit that transmits identification information identifying viewpoints, which is assigned to the viewpoints of the first image, the second image, and the current coding image such that values are sequentially increased from the viewpoint present most in the first direction, and the coded data generated by the encoding unit, wherein the setting unit sets an image of a viewpoint to which the identification information having a value smaller than the identification information of the current coding image is assigned as the first image and sets an image of a viewpoint to which the identification information having a value larger than the identification information of the current coding image is assigned as the second image based on the identification information. 4. The encoding device according to claim 3, wherein the setting unit sets the first reference list and the second reference list based on order reliability information identifying that the viewpoint identification information is assigned to the viewpoints of the first image, the second image, and the current coding image such that values are sequentially increased from the viewpoint present most in the first direction. 5. The encoding device according to claim 3, wherein the setting unit sets the first image specifying information in the first reference list and the second reference list in order of largest to smallest value of the identification information and sets the second image specifying information in the first reference list and the second reference list in order of smallest to largest value of the identification information. 6. An encoding method using an encoding device, the encoding method comprising: a setting step of setting first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current coding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and setting the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and a coding step of generating coded data by coding the current coding image based on the first reference list and the second reference list set in the setting step of the first image specifying information and the second image specifying information. 7. A decoding device comprising: a setting unit that sets first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current decoding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and sets the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and a decoding unit that decodes coded data of the current decoding image based on the first reference list and the second reference list set by the setting unit. 8. The decoding device according to claim 7, wherein the setting unit sets the first image specifying information and the second image specifying information in the first reference list in order of the first image specifying information and the second image specifying information and sets the first image specifying information and the second image specifying information in the second reference list in order of the second image specifying information and the first image specifying information. 9. The decoding device according to claim 7, wherein the setting unit, based on identification information identifying viewpoints, which is assigned to the viewpoints of the first image, the second image, and the current decoding image such that values are sequentially increased from the viewpoint present most in the first direction, sets an image of a viewpoint to which the identification information having a value smaller than the identification information of the current decoding image is assigned as the first image and sets an image of a viewpoint to which the identification information having a value larger than the identification information of the current decoding image is assigned as the second image. 10. The decoding device according to claim 9, wherein the setting unit sets the first reference list and the second reference list based on order reliability information identifying that the viewpoint identification information is assigned to the viewpoints of the first image, the second image, and the current decoding image such that values are sequentially increased from the viewpoint present most in the first direction. 11. The decoding device according to claim 9, wherein the setting unit sets the first image specifying information in the first reference list and the second reference list in order of largest to smallest value of the identification information and sets the second image specifying information in the first reference list and the second reference list in order of smallest to largest value of the identification information. 12. A decoding method using a decoding device, the decoding method comprising: a setting step of setting first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current decoding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and setting the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and a decoding step of decoding coded data of the current decoding image based on the first reference list and the second reference list set in the setting step of the first image specifying information and the second image specifying information.
The present technology relates to an encoding device, an encoding method, a decoding device, and a decoding method capable of improving the coding efficiency of an image of a plurality of viewpoints. A motion parallax prediction/compensation unit sets first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current coding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a list (L 0 ) in first order and sets the first image specifying information and the second image specifying information in a list (L 1 ) in second order that is different from the first order. The motion parallax prediction/compensation unit and a calculation unit generate coded data by coding the current coding image based on the lists (L 0 and L 1 ). The present technology, for example, can be applied to an encoding device that codes a 3D image and the like.1. An encoding device comprising: a setting unit that sets first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current coding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and sets the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and an encoding unit that generates coded data by coding the current coding image based on the first reference list and the second reference list set by the setting unit. 2. The encoding device according to claim 1, wherein the setting unit sets the first image specifying information and the second image specifying information in the first reference list in order of the first image specifying information and the second image specifying information and sets the first image specifying information and the second image specifying information in the second reference list in order of the second image specifying information and the first image specifying information. 3. The encoding device according to claim 1, further comprising: a transmission unit that transmits identification information identifying viewpoints, which is assigned to the viewpoints of the first image, the second image, and the current coding image such that values are sequentially increased from the viewpoint present most in the first direction, and the coded data generated by the encoding unit, wherein the setting unit sets an image of a viewpoint to which the identification information having a value smaller than the identification information of the current coding image is assigned as the first image and sets an image of a viewpoint to which the identification information having a value larger than the identification information of the current coding image is assigned as the second image based on the identification information. 4. The encoding device according to claim 3, wherein the setting unit sets the first reference list and the second reference list based on order reliability information identifying that the viewpoint identification information is assigned to the viewpoints of the first image, the second image, and the current coding image such that values are sequentially increased from the viewpoint present most in the first direction. 5. The encoding device according to claim 3, wherein the setting unit sets the first image specifying information in the first reference list and the second reference list in order of largest to smallest value of the identification information and sets the second image specifying information in the first reference list and the second reference list in order of smallest to largest value of the identification information. 6. An encoding method using an encoding device, the encoding method comprising: a setting step of setting first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current coding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and setting the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and a coding step of generating coded data by coding the current coding image based on the first reference list and the second reference list set in the setting step of the first image specifying information and the second image specifying information. 7. A decoding device comprising: a setting unit that sets first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current decoding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and sets the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and a decoding unit that decodes coded data of the current decoding image based on the first reference list and the second reference list set by the setting unit. 8. The decoding device according to claim 7, wherein the setting unit sets the first image specifying information and the second image specifying information in the first reference list in order of the first image specifying information and the second image specifying information and sets the first image specifying information and the second image specifying information in the second reference list in order of the second image specifying information and the first image specifying information. 9. The decoding device according to claim 7, wherein the setting unit, based on identification information identifying viewpoints, which is assigned to the viewpoints of the first image, the second image, and the current decoding image such that values are sequentially increased from the viewpoint present most in the first direction, sets an image of a viewpoint to which the identification information having a value smaller than the identification information of the current decoding image is assigned as the first image and sets an image of a viewpoint to which the identification information having a value larger than the identification information of the current decoding image is assigned as the second image. 10. The decoding device according to claim 9, wherein the setting unit sets the first reference list and the second reference list based on order reliability information identifying that the viewpoint identification information is assigned to the viewpoints of the first image, the second image, and the current decoding image such that values are sequentially increased from the viewpoint present most in the first direction. 11. The decoding device according to claim 9, wherein the setting unit sets the first image specifying information in the first reference list and the second reference list in order of largest to smallest value of the identification information and sets the second image specifying information in the first reference list and the second reference list in order of smallest to largest value of the identification information. 12. A decoding method using a decoding device, the decoding method comprising: a setting step of setting first image specifying information specifying a first image of a viewpoint present in a first direction from a viewpoint of a current decoding image and second image specifying information specifying a second image of a viewpoint present in a second direction opposite to the first direction in a first reference list in first order and setting the first image specifying information and the second image specifying information in a second reference list in second order that is different from the first order; and a decoding step of decoding coded data of the current decoding image based on the first reference list and the second reference list set in the setting step of the first image specifying information and the second image specifying information.
2,400
8,713
8,713
14,680,293
2,485
An apparatus for use in inspecting a wire segment is provided. The apparatus includes a guide tube sized to receive the wire segment, and an array of mirrors positioned about the guide tube. Each mirror in the array is oriented such that a reflection of the wire segment in the array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point.
1. An apparatus for use in inspecting a wire segment, said apparatus comprising: a guide tube sized to receive the wire segment; and an array of mirrors positioned about said guide tube, wherein each mirror in said array is oriented such that a reflection of the wire segment in said array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point. 2. The apparatus in accordance with claim 1, wherein said array of mirrors comprises at least three mirrors spaced at regular intervals about said guide tube. 3. The apparatus in accordance with claim 1, wherein said array of mirrors is oriented such that the reflection includes an image of a first inspection zone and a second inspection zone of the wire segment therein, wherein the inspection zones are defined at different lengths along the wire segment. 4. The apparatus in accordance with claim 3, wherein each mirror in said array has a length such that the reflection from a single mirror includes the image of the first and second inspection zones when viewed from the single vantage point. 5. The apparatus in accordance with claim 3, wherein said array of mirrors comprises: a first plurality of mirrors oriented such that the image of the first inspection zone is in a first reflection from said first plurality of mirrors when viewed from the single vantage point; and a second plurality of mirrors oriented such that the image of the second inspection zone is in a second reflection from said second plurality of mirrors when viewed from the single vantage point, wherein mirrors in said first plurality are offset from mirrors in said second plurality relative to the single vantage point. 6. The apparatus in accordance with claim 5, wherein said first plurality of mirrors is positioned at a shorter distance from the single vantage point than said second plurality of mirrors, said first plurality of mirrors comprising a plurality of groups of mirrors spaced at regular intervals about said guide tube, wherein mirrors in each group are oriented such that a length of a first optical path from the first inspection zone to the single vantage point is substantially similar to a length of a second optical path from the second inspection zone to the single vantage point. 7. The apparatus in accordance with claim 5, wherein each mirror in said first plurality of mirrors includes a reflective face having a truncated rhomboid-shaped profile such that the second reflection from said second plurality of mirrors is visible between adjacent mirrors in said first plurality when viewed from the single vantage point. 8. The apparatus in accordance with claim 5, wherein said first plurality of mirrors is oriented such that a first optical path from the first inspection zone to the single vantage point has an at least partially helical trajectory relative to a centerline of said guide tube. 9. The apparatus in accordance with claim 5, wherein said first and second pluralities of mirrors each comprise four mirrors spaced at regular intervals about said guide tube. 10. A system for use in inspecting a wire segment, said system comprising: a guide tube sized to receive the wire segment; an array of mirrors positioned about said guide tube, wherein each mirror in said array is oriented such that a reflection of the wire segment in said array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point; and a visual imaging device positioned at the single vantage point, said visual imaging device configured to capture at least one image of the reflection of the wire segment. 11. The system in accordance with claim 10, wherein said array of mirrors is positioned adjacent to an insertion portion of said guide tube, said visual imaging device configured to capture a plurality of images of the wire segment in the reflection at different time intervals as the wire segment is inserted through said guide tube. 12. The system in accordance with claim 11, wherein the wire segment includes a first inspection zone and a second inspection zone defined at different lengths along the wire segment, said visual imaging device configured to capture at least one image as the first inspection zone is substantially aligned with said array of mirrors, and configured to capture at least one image as the second inspection zone is substantially aligned with said array of mirrors. 13. The system in accordance with claim 10, wherein said array of mirrors is oriented such that the reflection includes an image of a first inspection zone and a second inspection zone of the wire segment therein, wherein the inspection zones are defined at different lengths along the wire segment. 14. The system in accordance with claim 13, wherein each mirror in said array has a length such that the reflection from a single mirror includes the image of the first and second inspection zones when viewed from the single vantage point. 15. A method of inspecting a wire segment, said method comprising: positioning the wire segment within a guide tube; orienting mirrors in an array of mirrors positioned about the guide tube such that a reflection of the wire segment from each mirror in the array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point; and determining defects in the wire segment from the reflection of the at least a portion of the wire segment. 16. The method in accordance with claim 15 further comprising capturing at least one image of the reflection of the wire segment, wherein the at least one image is captured from the single vantage point. 17. The method in accordance with claim 16 further comprising positioning the array of mirrors adjacent to an insertion portion of the guide tube, wherein a plurality of images of the wire segment in the reflection are captured at different time intervals as the wire segment is inserted through the guide tube. 18. The method in accordance with claim 15, wherein orienting mirrors in an array comprises orienting the mirrors such that the reflection includes an image of a first inspection zone and a second inspection zone of the wire segment therein, wherein each inspection zone is defined at different lengths along the wire segment. 19. The method in accordance with claim 18, wherein orienting mirrors in an array comprises: orienting a first plurality of mirrors such that the image of the first inspection zone is in a first reflection from the first plurality of mirrors when viewed from the single vantage point; and orienting a second plurality of mirrors such that the image of the second inspection zone is in a second reflection from the second plurality of mirrors when viewed from the single vantage point, wherein mirrors in the first plurality are offset from mirrors in the second plurality relative to the single vantage point. 20. The method in accordance with claim 19 further comprising: positioning the first plurality of mirrors at a shorter distance from the single vantage point than the second plurality of mirrors, the first plurality of mirrors including a plurality of groups of mirrors spaced at regular intervals about the guide tube; and orienting mirrors in each group such that a length of a first optical path from the first inspection zone to the single vantage point is substantially similar to a length of a second optical path from the second inspection zone to the single vantage point.
An apparatus for use in inspecting a wire segment is provided. The apparatus includes a guide tube sized to receive the wire segment, and an array of mirrors positioned about the guide tube. Each mirror in the array is oriented such that a reflection of the wire segment in the array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point.1. An apparatus for use in inspecting a wire segment, said apparatus comprising: a guide tube sized to receive the wire segment; and an array of mirrors positioned about said guide tube, wherein each mirror in said array is oriented such that a reflection of the wire segment in said array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point. 2. The apparatus in accordance with claim 1, wherein said array of mirrors comprises at least three mirrors spaced at regular intervals about said guide tube. 3. The apparatus in accordance with claim 1, wherein said array of mirrors is oriented such that the reflection includes an image of a first inspection zone and a second inspection zone of the wire segment therein, wherein the inspection zones are defined at different lengths along the wire segment. 4. The apparatus in accordance with claim 3, wherein each mirror in said array has a length such that the reflection from a single mirror includes the image of the first and second inspection zones when viewed from the single vantage point. 5. The apparatus in accordance with claim 3, wherein said array of mirrors comprises: a first plurality of mirrors oriented such that the image of the first inspection zone is in a first reflection from said first plurality of mirrors when viewed from the single vantage point; and a second plurality of mirrors oriented such that the image of the second inspection zone is in a second reflection from said second plurality of mirrors when viewed from the single vantage point, wherein mirrors in said first plurality are offset from mirrors in said second plurality relative to the single vantage point. 6. The apparatus in accordance with claim 5, wherein said first plurality of mirrors is positioned at a shorter distance from the single vantage point than said second plurality of mirrors, said first plurality of mirrors comprising a plurality of groups of mirrors spaced at regular intervals about said guide tube, wherein mirrors in each group are oriented such that a length of a first optical path from the first inspection zone to the single vantage point is substantially similar to a length of a second optical path from the second inspection zone to the single vantage point. 7. The apparatus in accordance with claim 5, wherein each mirror in said first plurality of mirrors includes a reflective face having a truncated rhomboid-shaped profile such that the second reflection from said second plurality of mirrors is visible between adjacent mirrors in said first plurality when viewed from the single vantage point. 8. The apparatus in accordance with claim 5, wherein said first plurality of mirrors is oriented such that a first optical path from the first inspection zone to the single vantage point has an at least partially helical trajectory relative to a centerline of said guide tube. 9. The apparatus in accordance with claim 5, wherein said first and second pluralities of mirrors each comprise four mirrors spaced at regular intervals about said guide tube. 10. A system for use in inspecting a wire segment, said system comprising: a guide tube sized to receive the wire segment; an array of mirrors positioned about said guide tube, wherein each mirror in said array is oriented such that a reflection of the wire segment in said array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point; and a visual imaging device positioned at the single vantage point, said visual imaging device configured to capture at least one image of the reflection of the wire segment. 11. The system in accordance with claim 10, wherein said array of mirrors is positioned adjacent to an insertion portion of said guide tube, said visual imaging device configured to capture a plurality of images of the wire segment in the reflection at different time intervals as the wire segment is inserted through said guide tube. 12. The system in accordance with claim 11, wherein the wire segment includes a first inspection zone and a second inspection zone defined at different lengths along the wire segment, said visual imaging device configured to capture at least one image as the first inspection zone is substantially aligned with said array of mirrors, and configured to capture at least one image as the second inspection zone is substantially aligned with said array of mirrors. 13. The system in accordance with claim 10, wherein said array of mirrors is oriented such that the reflection includes an image of a first inspection zone and a second inspection zone of the wire segment therein, wherein the inspection zones are defined at different lengths along the wire segment. 14. The system in accordance with claim 13, wherein each mirror in said array has a length such that the reflection from a single mirror includes the image of the first and second inspection zones when viewed from the single vantage point. 15. A method of inspecting a wire segment, said method comprising: positioning the wire segment within a guide tube; orienting mirrors in an array of mirrors positioned about the guide tube such that a reflection of the wire segment from each mirror in the array of mirrors forms a circumferential view of at least a portion of the wire segment, and such that the reflection from each mirror is within a field of view from a single vantage point; and determining defects in the wire segment from the reflection of the at least a portion of the wire segment. 16. The method in accordance with claim 15 further comprising capturing at least one image of the reflection of the wire segment, wherein the at least one image is captured from the single vantage point. 17. The method in accordance with claim 16 further comprising positioning the array of mirrors adjacent to an insertion portion of the guide tube, wherein a plurality of images of the wire segment in the reflection are captured at different time intervals as the wire segment is inserted through the guide tube. 18. The method in accordance with claim 15, wherein orienting mirrors in an array comprises orienting the mirrors such that the reflection includes an image of a first inspection zone and a second inspection zone of the wire segment therein, wherein each inspection zone is defined at different lengths along the wire segment. 19. The method in accordance with claim 18, wherein orienting mirrors in an array comprises: orienting a first plurality of mirrors such that the image of the first inspection zone is in a first reflection from the first plurality of mirrors when viewed from the single vantage point; and orienting a second plurality of mirrors such that the image of the second inspection zone is in a second reflection from the second plurality of mirrors when viewed from the single vantage point, wherein mirrors in the first plurality are offset from mirrors in the second plurality relative to the single vantage point. 20. The method in accordance with claim 19 further comprising: positioning the first plurality of mirrors at a shorter distance from the single vantage point than the second plurality of mirrors, the first plurality of mirrors including a plurality of groups of mirrors spaced at regular intervals about the guide tube; and orienting mirrors in each group such that a length of a first optical path from the first inspection zone to the single vantage point is substantially similar to a length of a second optical path from the second inspection zone to the single vantage point.
2,400
8,714
8,714
15,089,537
2,416
Systems and methods for generating and broadcasting a dynamic identifier are presented. Based on the current context and rules established for accessing personal information, a dynamic identifier corresponding to a computer user is dynamically generated and provided to a computing device corresponding to the computer user. The computing device may broadcast the dynamic identifier to others. Upon receipt of a dynamic identifier, a party wishing to determine information regarding the broadcasting party must query an information service with the dynamic identifier. According to a set of rules and/or permissions established for the target computer user (broadcasting the dynamic identifier), accessible information is identified and returned to the requesting party.
1. A computer-implemented method for broadcasting an identifier, the method comprising: obtaining a first value as a current dynamic identifier corresponding to a computer user; broadcasting the current dynamic identifier as an identity of the computer user; repeatedly: dynamically obtaining a subsequent value for the current dynamic identifier correspond to the computer user according to a current context; and broadcasting the current dynamic identifier as the identity of the computer user; wherein the first value and each subsequent value are distinct values. 2. The computer-implemented method of claim 1 further comprising: continually monitoring for a triggering event; wherein each repetition of the steps of obtaining a subsequent value for the current dynamic identifier and broadcasting the current dynamic identifier is conditioned upon the detection of a triggering event by the continuous monitoring. 3. The computer-implemented method of claim 2, wherein a triggering event comprises the passage of a period of time. 4. The computer-implemented method of claim 2, wherein a triggering event comprises a threshold change in geo-location of the computer user. 5. The computer-implemented method of claim 2, wherein a triggering event comprises entry in or exit from a predetermined area. 6. The computer-implemented method of claim 2, wherein a triggering event comprises a time of day. 7. The computer-implemented method of claim 2, wherein a triggering event comprises a day of week. 8. The computer-implemented method of claim 2, wherein a triggering event comprises a calendar event of the computer user. 9. The computer-implemented method of claim 1 further comprising: determining a first dynamic context for the computer user; and wherein obtaining the first value as the current dynamic identifier corresponding to the computer user comprises obtaining the first value according to the first dynamic context for the computer user. 10. The computer-implemented method of claim 9 further comprising: determining a subsequent dynamic context for the computer user; and wherein obtaining the subsequent value as the current dynamic identifier corresponding to the computer user comprises obtaining the subsequent value according to the subsequent dynamic context for the computer user. 11. The computer-implemented method of claim 10, wherein the first dynamic context and the subsequent dynamic context comprise any one or more of a current time, a current date, a current day of week, a current geo-location of the corresponding computer user, calendar information of the corresponding user, and current network connection factors. 12. The computer-implemented method of claim 1, wherein the first value of the dynamic identifier and each subsequent value of the dynamic identifier are obtained from a remote source. 13. A computer-implemented method for providing a dynamic identifier to a user, the method comprising: receiving a dynamic identifier request for a new dynamic identifier for a target computer user, the dynamic identifier request comprising information identifying the target computer user and current context information regarding the target computer user; determining a new dynamic identifier for the target computer user according to the current context information of the target computer user; associating the dynamic identifier with the target computer user in a data store; and returning the dynamic identifier to the computer user via a computing device associated with the computer user. 14. The computer-implemented method of claim 13, further comprising: receiving an information request from a requesting computer user for information of the target computer user; determining accessible information of the target computer user according to access permissions established for the target computer user; aggregate the accessible information into an information response; and return the information response to the requesting computer user. 15. The computer-implemented method of claim 14, further comprising determining accessible information of the target computer user according to access permissions established for the target computer user and according to the current context information regarding the target computer user. 16. A computer system for providing an information service process, the system comprising a processor and a memory, wherein the processor executes instructions stored in the memory as part of or in conjunction with additional components to provide the information service process, the additional components comprising: an information service module, wherein in execution the information service module: receives a dynamic identifier request from a target computer user; obtains a dynamically generated dynamic identifier from a dynamic identifier generator; and returns the dynamically generated dynamic identifier to the target computer user in response to the identifier request; and a dynamic identifier generator that, in execution, dynamically generates a dynamic identifier for a target computer user on behalf of the information service module, and stores the dynamically generated dynamic identifier in data record in a data store in association with the target computer user. 17. The computer system of claim 16, wherein in execution the information service module further: receives an information request from a requesting computing user regarding the target computer user as identified according to the dynamic identifier of the target computer user; obtains accessible information of the target computer user that is accessible to the requesting computer user; generates an information response comprising the accessible information of the target computer user; and returns the information response to the requesting computer user. 18. The computer system of claim 17: wherein the dynamic identifier request from the target computer user comprises current context information regarding the target computer user; and wherein the dynamic identifier generator dynamically generates the dynamic identifier for the target computer user according to current context information regarding the target computer user. 19. The computer system of claim 18 further comprising: an information access evaluator that, in execution, determines the accessible information of the target computer user according to access permissions established for the target computer user; wherein the information service module obtains the accessible information of the target computer user according to the determination of the accessible information of the target computer user by the information access evaluator. 20. The computer system of claim 19, wherein information access evaluator determines the accessible information of the target computer user according to access permissions established for the target computer user and according to the current context information of the target computer user.
Systems and methods for generating and broadcasting a dynamic identifier are presented. Based on the current context and rules established for accessing personal information, a dynamic identifier corresponding to a computer user is dynamically generated and provided to a computing device corresponding to the computer user. The computing device may broadcast the dynamic identifier to others. Upon receipt of a dynamic identifier, a party wishing to determine information regarding the broadcasting party must query an information service with the dynamic identifier. According to a set of rules and/or permissions established for the target computer user (broadcasting the dynamic identifier), accessible information is identified and returned to the requesting party.1. A computer-implemented method for broadcasting an identifier, the method comprising: obtaining a first value as a current dynamic identifier corresponding to a computer user; broadcasting the current dynamic identifier as an identity of the computer user; repeatedly: dynamically obtaining a subsequent value for the current dynamic identifier correspond to the computer user according to a current context; and broadcasting the current dynamic identifier as the identity of the computer user; wherein the first value and each subsequent value are distinct values. 2. The computer-implemented method of claim 1 further comprising: continually monitoring for a triggering event; wherein each repetition of the steps of obtaining a subsequent value for the current dynamic identifier and broadcasting the current dynamic identifier is conditioned upon the detection of a triggering event by the continuous monitoring. 3. The computer-implemented method of claim 2, wherein a triggering event comprises the passage of a period of time. 4. The computer-implemented method of claim 2, wherein a triggering event comprises a threshold change in geo-location of the computer user. 5. The computer-implemented method of claim 2, wherein a triggering event comprises entry in or exit from a predetermined area. 6. The computer-implemented method of claim 2, wherein a triggering event comprises a time of day. 7. The computer-implemented method of claim 2, wherein a triggering event comprises a day of week. 8. The computer-implemented method of claim 2, wherein a triggering event comprises a calendar event of the computer user. 9. The computer-implemented method of claim 1 further comprising: determining a first dynamic context for the computer user; and wherein obtaining the first value as the current dynamic identifier corresponding to the computer user comprises obtaining the first value according to the first dynamic context for the computer user. 10. The computer-implemented method of claim 9 further comprising: determining a subsequent dynamic context for the computer user; and wherein obtaining the subsequent value as the current dynamic identifier corresponding to the computer user comprises obtaining the subsequent value according to the subsequent dynamic context for the computer user. 11. The computer-implemented method of claim 10, wherein the first dynamic context and the subsequent dynamic context comprise any one or more of a current time, a current date, a current day of week, a current geo-location of the corresponding computer user, calendar information of the corresponding user, and current network connection factors. 12. The computer-implemented method of claim 1, wherein the first value of the dynamic identifier and each subsequent value of the dynamic identifier are obtained from a remote source. 13. A computer-implemented method for providing a dynamic identifier to a user, the method comprising: receiving a dynamic identifier request for a new dynamic identifier for a target computer user, the dynamic identifier request comprising information identifying the target computer user and current context information regarding the target computer user; determining a new dynamic identifier for the target computer user according to the current context information of the target computer user; associating the dynamic identifier with the target computer user in a data store; and returning the dynamic identifier to the computer user via a computing device associated with the computer user. 14. The computer-implemented method of claim 13, further comprising: receiving an information request from a requesting computer user for information of the target computer user; determining accessible information of the target computer user according to access permissions established for the target computer user; aggregate the accessible information into an information response; and return the information response to the requesting computer user. 15. The computer-implemented method of claim 14, further comprising determining accessible information of the target computer user according to access permissions established for the target computer user and according to the current context information regarding the target computer user. 16. A computer system for providing an information service process, the system comprising a processor and a memory, wherein the processor executes instructions stored in the memory as part of or in conjunction with additional components to provide the information service process, the additional components comprising: an information service module, wherein in execution the information service module: receives a dynamic identifier request from a target computer user; obtains a dynamically generated dynamic identifier from a dynamic identifier generator; and returns the dynamically generated dynamic identifier to the target computer user in response to the identifier request; and a dynamic identifier generator that, in execution, dynamically generates a dynamic identifier for a target computer user on behalf of the information service module, and stores the dynamically generated dynamic identifier in data record in a data store in association with the target computer user. 17. The computer system of claim 16, wherein in execution the information service module further: receives an information request from a requesting computing user regarding the target computer user as identified according to the dynamic identifier of the target computer user; obtains accessible information of the target computer user that is accessible to the requesting computer user; generates an information response comprising the accessible information of the target computer user; and returns the information response to the requesting computer user. 18. The computer system of claim 17: wherein the dynamic identifier request from the target computer user comprises current context information regarding the target computer user; and wherein the dynamic identifier generator dynamically generates the dynamic identifier for the target computer user according to current context information regarding the target computer user. 19. The computer system of claim 18 further comprising: an information access evaluator that, in execution, determines the accessible information of the target computer user according to access permissions established for the target computer user; wherein the information service module obtains the accessible information of the target computer user according to the determination of the accessible information of the target computer user by the information access evaluator. 20. The computer system of claim 19, wherein information access evaluator determines the accessible information of the target computer user according to access permissions established for the target computer user and according to the current context information of the target computer user.
2,400
8,715
8,715
13,921,017
2,481
Systems and methods described herein compress video data using image block matching. A server is configured to access a reference frame of an image in a video, separate the reference frame into a plurality of reference blocks of pixels, calculate a hash value for each of the plurality of reference blocks of pixels, receive a current frame of an image in the video, separate the current frame into a plurality of current blocks of pixels, and calculate a hash value for each of the plurality of current blocks of pixels. Further, the server is configured to compare the reference frame hash values with the current frame hash values, identify a hash value in the reference frame that matches a hash value in the current frame, and store the indication that the hash value in the reference frame matches the hash value in the current frame.
1. A system comprising a server for communicating with a client, the server being configured to: access a reference frame of an image in a video; separate the reference frame into a plurality of reference blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of reference blocks of pixels; receive a current frame of an image in the video; separate the current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values associated with the reference frame with the hash values associated with the current frame; identify a hash value in the reference frame that matches a hash value in the current frame; and store information indicating that the hash value in the reference frame matches the hash value in the current frame for matching blocks of pixels. 2. The system of claim 1, wherein the information includes a motion vector to represent an offset in time and distance between the reference block of pixels and a current block of pixels corresponding to the matching hash value. 3. The system of claim 1, wherein each reference block of pixels is associated with a different pixel offset. 4. The system of claim 3, wherein a value of each pixel within a reference block of pixels is used in the hash function to calculate a hash value for a corresponding pixel offset. 5. The system of claim 1, wherein the calculation of the hash values comprises: using a summed area table at each pixel offset in the reference frame to calculate sums of pixels within a corresponding reference block of pixels; and using a sum value from the calculated sums as the hashing function to calculate hash values for each of the reference blocks of pixels. 6. The system of claim 1, wherein dimensions of a block of pixels are a power of two for each dimension. 7. The system of claim 1, further comprising a plurality of processors, and wherein the plurality of processors are programmed to calculate, in parallel, hash values for some number of the plurality of reference blocks. 8. A method for image block matching, the method comprising: accessing a reference frame of an image in a video; separating the reference frame into a plurality of reference blocks of pixels; calculating, using a hash function, a hash value for each of the plurality of reference blocks of pixels; receiving a current frame of an image in the video; separating the current frame into a plurality of current blocks of pixels; calculating, using the hash function, a hash value for each of the plurality of current blocks of pixels; comparing the hash values associated with the reference frame with the hash values associated with the current frame; identifying a hash value in the reference frame that matches a hash value in the current frame; and storing information indicating that the hash value in the reference frame matches the hash value in the current frame for matching blocks of pixels. 9. The method of claim 8, wherein the information includes a motion vector to represent an offset in time and distance between the reference block of pixels and a current block of pixels corresponding to the matching hash value. 10. The method of claim 8, wherein each reference block of pixels is associated with a different pixel offset. 11. The method of claim 10, wherein a value of each pixel within a reference block of pixels is used in the hash function to calculate a hash value for a corresponding pixel offset. 12. The method of claim 8, wherein the calculating of the hash value comprises: using a summed area table at each pixel offset in the reference frame to calculate sums of pixels within a corresponding reference block of pixels; and using a sum value from the calculated sums as the hashing function to calculate hash values for each of the reference blocks of pixels. 13. The method of claim 8, wherein dimensions of a block of pixels are a power of two for each dimension. 14. The method of claim 8, wherein the hash values for some number of the plurality of reference blocks are calculated in parallel by a plurality of processors. 15. At least one computer-readable storage medium having computer-executable instructions embodied thereon, wherein, when executed by at least one processor, the computer-executable instructions cause the at least one processor to: access a reference frame of an image in a video; separate the reference frame into a plurality of reference blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of reference blocks of pixels; receive a current frame of an image in the video; separate the current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values associated with the reference frame with the hash values associated with the current frame; identify a hash value in the reference frame that matches a hash value in the current frame; and store information indicating that the hash value in the reference frame matches the hash value in the current frame for matching blocks of pixels. 16. The at least one computer-readable storage medium of claim 15, wherein the information includes a motion vector to represent an offset in time and distance between the reference block of pixels and a current block of pixels corresponding to the matching hash value. 17. The at least one computer-readable storage medium of claim 15, wherein each reference block of pixels is associated with a different pixel offset. 18. The at least one computer-readable storage medium of claim 17, wherein a value of each pixel within a reference block of pixels is used in the hash function to calculate a hash value for a corresponding pixel offset. 19. The at least one computer-readable storage medium of claim 15, wherein the calculation of the hash value comprises: using a summed area table at each pixel offset in the reference frame to calculate sums of pixels within a corresponding reference block of pixels; and using a sum value from the calculated sums as the hashing function to calculate hash values for each of the reference blocks of pixels. 20. The at least one computer-readable storage medium of claim 15, wherein dimensions of a block of pixels are a power of two for each dimension.
Systems and methods described herein compress video data using image block matching. A server is configured to access a reference frame of an image in a video, separate the reference frame into a plurality of reference blocks of pixels, calculate a hash value for each of the plurality of reference blocks of pixels, receive a current frame of an image in the video, separate the current frame into a plurality of current blocks of pixels, and calculate a hash value for each of the plurality of current blocks of pixels. Further, the server is configured to compare the reference frame hash values with the current frame hash values, identify a hash value in the reference frame that matches a hash value in the current frame, and store the indication that the hash value in the reference frame matches the hash value in the current frame.1. A system comprising a server for communicating with a client, the server being configured to: access a reference frame of an image in a video; separate the reference frame into a plurality of reference blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of reference blocks of pixels; receive a current frame of an image in the video; separate the current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values associated with the reference frame with the hash values associated with the current frame; identify a hash value in the reference frame that matches a hash value in the current frame; and store information indicating that the hash value in the reference frame matches the hash value in the current frame for matching blocks of pixels. 2. The system of claim 1, wherein the information includes a motion vector to represent an offset in time and distance between the reference block of pixels and a current block of pixels corresponding to the matching hash value. 3. The system of claim 1, wherein each reference block of pixels is associated with a different pixel offset. 4. The system of claim 3, wherein a value of each pixel within a reference block of pixels is used in the hash function to calculate a hash value for a corresponding pixel offset. 5. The system of claim 1, wherein the calculation of the hash values comprises: using a summed area table at each pixel offset in the reference frame to calculate sums of pixels within a corresponding reference block of pixels; and using a sum value from the calculated sums as the hashing function to calculate hash values for each of the reference blocks of pixels. 6. The system of claim 1, wherein dimensions of a block of pixels are a power of two for each dimension. 7. The system of claim 1, further comprising a plurality of processors, and wherein the plurality of processors are programmed to calculate, in parallel, hash values for some number of the plurality of reference blocks. 8. A method for image block matching, the method comprising: accessing a reference frame of an image in a video; separating the reference frame into a plurality of reference blocks of pixels; calculating, using a hash function, a hash value for each of the plurality of reference blocks of pixels; receiving a current frame of an image in the video; separating the current frame into a plurality of current blocks of pixels; calculating, using the hash function, a hash value for each of the plurality of current blocks of pixels; comparing the hash values associated with the reference frame with the hash values associated with the current frame; identifying a hash value in the reference frame that matches a hash value in the current frame; and storing information indicating that the hash value in the reference frame matches the hash value in the current frame for matching blocks of pixels. 9. The method of claim 8, wherein the information includes a motion vector to represent an offset in time and distance between the reference block of pixels and a current block of pixels corresponding to the matching hash value. 10. The method of claim 8, wherein each reference block of pixels is associated with a different pixel offset. 11. The method of claim 10, wherein a value of each pixel within a reference block of pixels is used in the hash function to calculate a hash value for a corresponding pixel offset. 12. The method of claim 8, wherein the calculating of the hash value comprises: using a summed area table at each pixel offset in the reference frame to calculate sums of pixels within a corresponding reference block of pixels; and using a sum value from the calculated sums as the hashing function to calculate hash values for each of the reference blocks of pixels. 13. The method of claim 8, wherein dimensions of a block of pixels are a power of two for each dimension. 14. The method of claim 8, wherein the hash values for some number of the plurality of reference blocks are calculated in parallel by a plurality of processors. 15. At least one computer-readable storage medium having computer-executable instructions embodied thereon, wherein, when executed by at least one processor, the computer-executable instructions cause the at least one processor to: access a reference frame of an image in a video; separate the reference frame into a plurality of reference blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of reference blocks of pixels; receive a current frame of an image in the video; separate the current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values associated with the reference frame with the hash values associated with the current frame; identify a hash value in the reference frame that matches a hash value in the current frame; and store information indicating that the hash value in the reference frame matches the hash value in the current frame for matching blocks of pixels. 16. The at least one computer-readable storage medium of claim 15, wherein the information includes a motion vector to represent an offset in time and distance between the reference block of pixels and a current block of pixels corresponding to the matching hash value. 17. The at least one computer-readable storage medium of claim 15, wherein each reference block of pixels is associated with a different pixel offset. 18. The at least one computer-readable storage medium of claim 17, wherein a value of each pixel within a reference block of pixels is used in the hash function to calculate a hash value for a corresponding pixel offset. 19. The at least one computer-readable storage medium of claim 15, wherein the calculation of the hash value comprises: using a summed area table at each pixel offset in the reference frame to calculate sums of pixels within a corresponding reference block of pixels; and using a sum value from the calculated sums as the hashing function to calculate hash values for each of the reference blocks of pixels. 20. The at least one computer-readable storage medium of claim 15, wherein dimensions of a block of pixels are a power of two for each dimension.
2,400
8,716
8,716
15,041,745
2,447
A resource such as a server derives multiple streams of data based on particular content. Each of the multiple streams of data is encoded to enable play back of the content according to a different level of quality. The server transmits the multiple streams of data of differing levels of quality on a multicast link downstream to one or more intermediate nodes that, in turn, distribute the streams of data to end users. For example, an intermediate node retrieves a respective stream of data from the multiple streams of data and forwards the selected stream of data over a second portion of the multicast link to a respective client device. The intermediate node can transmit a different stream of data to the respective client device depending on available bandwidth. The client device plays back the transmitted stream of data to produce a rendition of the particular content.
1. A method comprising: via computer processor hardware, performing operations of: establishing a multicast link at a distribution node; receiving multiple streams of data transmitted over the multicast link from a server resource, each of the multiple streams of data encoded to playback a rendition of corresponding content according to a different level of quality; and distributing the multiple streams of data from the distribution node to multiple communication devices. 2. The method as in claim 1, wherein distributing the multiple streams of data from the distribution node to the multiple communication devices includes: from a first communication device, receiving selection of a first stream of data amongst the multiple streams of data in the multicast link; and in response to receiving the selection, transmitting the first stream of data to the first communication device. 3. The method as in claim 2 further comprising: from the first communication device, receiving selection of a second stream of data amongst the multiple streams of data in the multicast link; and in lieu of transmitting the first stream of data to the first communication device, transmitting the second stream of data to the first communication device. 4. The method as in claim 3, wherein transmitting the first stream of data to the first communication device includes transmitting a first sequence of playback data encoded according to a first playback bit rate to the first communication device; and wherein transmitting the second stream of data to the first communication device includes transmitting a second sequence of playback data encoded according to a second playback bit rate to the first communication device, the first sequence of the playback data encoded from a first portion of the corresponding content, the second sequence of playback data encoded from a second portion of the corresponding content following the first portion. 5. The method as in claim 1, wherein the multiple streams of data are encoded in accordance with different playback bit rates, the method further comprising: receiving metadata over the multicast link, the metadata facilitating switchover of playing back the multiple streams of data at the different bit rates on a respective playback device in communication with the distribution node. 6. The method as in claim 1, wherein receiving the multiple streams of data over the multicast link includes receiving the multiple streams of data as time delayed with respect to each other. 7. The method as in claim 2, wherein portions of the first stream of data include first tag information to indicate respective segments of the corresponding content to which tagged portions in the first stream of data pertain; wherein portions of the second stream of data include second tag information to indicate respective segments of the corresponding content to which tagged portions in the second stream of data pertain. 8. The method as in claim 7 further comprising: utilizing the first tag information and second tag information as a basis to interleave tagged portions of the first stream of data with the second stream of data for playback of a contiguous sequence of segments of the corresponding content on a playback device. 9. The method as in claim 1 further comprising: receiving channel map information, the channel map information specifying availability and level of quality information associated with the streams of data transmitted in the multicast link; and forwarding the channel map information to a playback device, a user of the playback device making a selection of a particular stream of data of the multiple streams of data in the multicast link. 10. The method as in claim 2 further comprising: in response to detecting an inability to forward the first stream of data to the playback device at a sufficient rate due to network congestion occurring between a node receiving the multiple streams of data over the multicast link and the playback device, transmitting the second stream of data in the multiple streams of data to the playback device in lieu of transmitting the first stream of data to the playback device. 11. A method comprising: via computer processor hardware, executing operations of: receiving multiple streams of data derived from corresponding content, each of the multiple streams of data encoded to play back a rendition of the corresponding content according to a different level of quality; and transmitting the multiple streams of data over a multicast link to a downstream node in a network for playback of the corresponding content at different levels of quality. 12. The method as in claim 11 further comprising: encoding the multiple streams of data in accordance with different bit rates, each of the different bit rates supporting play back of the corresponding content according to a different respective level of quality; and transmitting metadata in the multicast link to facilitate switchover of playing back the multiple streams of data at the different bit rates on downstream playback devices. 13. The method as in claim 11, wherein the multiple streams of data includes a first stream of data and a second stream of data; and wherein transmitting the multiple streams of data over the multicast link includes time delaying the second stream of data with respect to the first stream of data. 14. The method as in claim 11 further comprising: tagging portions of a first stream of data of the multiple streams of data to indicate respective segments of the corresponding content to which the tagged portions in the first stream of data pertain; and tagging portions of the second stream of data to indicate respective segments of the corresponding content to which the tagged portions in the second stream of data pertain. 15. The method as in claim 11 further comprising: receiving channel map information, the channel map information specifying availability and corresponding level of quality information associated with each of the streams of data transmitted in the multicast link; and distributing the channel map information to a playback device for playback of the streams of data transmitted on the multicast link. 16. The method as in claim 15, wherein the channel map information specifies bit rates associated with each of the multiple streams of data in the multicast link. 17. The method as in claim 11 further comprising: dynamically varying, over time, which of the multiple streams of data at the different levels of quality are transmitted over the multicast link. 18. The method as in claim 11 further comprising: in response to occurrence of a condition in which a downstream decoder initiates playback of a rendition of the corresponding content based on a first stream of data in the multicast link and then transitions to playback of a rendition of the corresponding content based on a second stream of data in the multicast link, transmitting an encoded portion of the corresponding content in an out-of-band channel with respect to the multicast link to the downstream decoder to support a substantially seamless playback of the corresponding content during the transition. 19. The method as in claim 11 further comprising: deriving a first stream of data from the corresponding content, the first stream of data encoded according to a first level of quality; deriving a second stream of data from the corresponding content, the second stream of data encoded according to a second level of quality, the second level of quality lower than the first level of quality; and wherein transmitting the multiple streams of data includes transmitting the first stream of data and the second stream of data over the multicast link to the downstream node. 20. The method as in claim 19, wherein deriving the first stream of data includes converting each of multiple segments of the corresponding content into a respective grouping of data in the first stream of data, each respective grouping of data in the first stream of data including metadata indicating a respective segment of the corresponding content to which the respective group of data in the first stream of data pertains; and wherein deriving the second stream of data includes converting each of the multiple segments of the corresponding content into a respective grouping of data in the second stream of data, each respective grouping of data in the second stream of data including metadata indicating a respective segment of the corresponding content to which the respective group of data in the second stream of data pertains. 21. A method comprising: via computer processor hardware, executing operations of: in response to receiving a request to play back content on a playback device, accessing a multicast link including multiple streams of data transmitted from a server resource over a network, each of the multiple streams of data in the multicast link encoded to play back a rendition of content according to a different level of quality; receiving, over the network, a stream of data from the multicast link; and decoding the received stream of data to play back a rendition of the content on the playback device. 22. The method as in claim 20, wherein the received stream of data is a first stream of data, the method further comprising: in response to detecting an inability to receive the first stream of data from the multicast link at a threshold bit rate, selecting a second stream of data from the multicast link, the second stream of data encoded to play back the content at a different level of quality than the first stream of data. 23. The method as in claim 22, wherein detecting the inability to receive the stream of data from the multicast link includes detecting network congestion and an inability to receive the first stream of data at a sufficient data rate to play back the content on the playback device; wherein selecting the second stream of data includes communicating with a downstream server node in a network that receives the multicast link from an origin server, the downstream server node serving the first stream of data to the playback device; and the method further comprising receiving the second stream of data from the downstream server node. 24. The method as in claim 20, wherein decoding the received stream of data to play back the rendition of the content on the playback device includes: utilizing synchronous tags in the received stream of data to identify an order of playing back segments of the content. 25. The method as in claim 20, wherein decoding the received stream of data includes: utilizing synchronization tags in the received stream of data to identify an order of playing back segments of the content in the received stream of data. 26. The method as in claim 25 further comprising: receiving an encoded portion of the content in an out-of-band channel with respect to the multicast link; and utilizing the encoded portion of the content received on the out-of-band channel to transition between playing back the first stream of data and the second stream of data on the playback device. 27. The method as in claim 20 further comprising: interleaving play back of groupings of data from a first stream of data and a second stream of data received from the multicast link, the interleaved groupings of data from the first stream of data and the second stream of data corresponding to a contiguous sequence of segments in the content, the groupings of data from the first stream of data supporting play back of a different level of quality than the groupings of data in the second stream of data. 28. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by a processing device, causes the processing device to perform operations of: producing multiple streams of data, each of the multiple streams of data encoded to play back a rendition of content according to a different level of quality; establishing a multicast link on which to distribute the multiple streams of data in a network to each of multiple clients; and transmitting the multiple streams of data over the multicast link to a downstream node in the network for playback of the content at different levels of quality by the multiple clients.
A resource such as a server derives multiple streams of data based on particular content. Each of the multiple streams of data is encoded to enable play back of the content according to a different level of quality. The server transmits the multiple streams of data of differing levels of quality on a multicast link downstream to one or more intermediate nodes that, in turn, distribute the streams of data to end users. For example, an intermediate node retrieves a respective stream of data from the multiple streams of data and forwards the selected stream of data over a second portion of the multicast link to a respective client device. The intermediate node can transmit a different stream of data to the respective client device depending on available bandwidth. The client device plays back the transmitted stream of data to produce a rendition of the particular content.1. A method comprising: via computer processor hardware, performing operations of: establishing a multicast link at a distribution node; receiving multiple streams of data transmitted over the multicast link from a server resource, each of the multiple streams of data encoded to playback a rendition of corresponding content according to a different level of quality; and distributing the multiple streams of data from the distribution node to multiple communication devices. 2. The method as in claim 1, wherein distributing the multiple streams of data from the distribution node to the multiple communication devices includes: from a first communication device, receiving selection of a first stream of data amongst the multiple streams of data in the multicast link; and in response to receiving the selection, transmitting the first stream of data to the first communication device. 3. The method as in claim 2 further comprising: from the first communication device, receiving selection of a second stream of data amongst the multiple streams of data in the multicast link; and in lieu of transmitting the first stream of data to the first communication device, transmitting the second stream of data to the first communication device. 4. The method as in claim 3, wherein transmitting the first stream of data to the first communication device includes transmitting a first sequence of playback data encoded according to a first playback bit rate to the first communication device; and wherein transmitting the second stream of data to the first communication device includes transmitting a second sequence of playback data encoded according to a second playback bit rate to the first communication device, the first sequence of the playback data encoded from a first portion of the corresponding content, the second sequence of playback data encoded from a second portion of the corresponding content following the first portion. 5. The method as in claim 1, wherein the multiple streams of data are encoded in accordance with different playback bit rates, the method further comprising: receiving metadata over the multicast link, the metadata facilitating switchover of playing back the multiple streams of data at the different bit rates on a respective playback device in communication with the distribution node. 6. The method as in claim 1, wherein receiving the multiple streams of data over the multicast link includes receiving the multiple streams of data as time delayed with respect to each other. 7. The method as in claim 2, wherein portions of the first stream of data include first tag information to indicate respective segments of the corresponding content to which tagged portions in the first stream of data pertain; wherein portions of the second stream of data include second tag information to indicate respective segments of the corresponding content to which tagged portions in the second stream of data pertain. 8. The method as in claim 7 further comprising: utilizing the first tag information and second tag information as a basis to interleave tagged portions of the first stream of data with the second stream of data for playback of a contiguous sequence of segments of the corresponding content on a playback device. 9. The method as in claim 1 further comprising: receiving channel map information, the channel map information specifying availability and level of quality information associated with the streams of data transmitted in the multicast link; and forwarding the channel map information to a playback device, a user of the playback device making a selection of a particular stream of data of the multiple streams of data in the multicast link. 10. The method as in claim 2 further comprising: in response to detecting an inability to forward the first stream of data to the playback device at a sufficient rate due to network congestion occurring between a node receiving the multiple streams of data over the multicast link and the playback device, transmitting the second stream of data in the multiple streams of data to the playback device in lieu of transmitting the first stream of data to the playback device. 11. A method comprising: via computer processor hardware, executing operations of: receiving multiple streams of data derived from corresponding content, each of the multiple streams of data encoded to play back a rendition of the corresponding content according to a different level of quality; and transmitting the multiple streams of data over a multicast link to a downstream node in a network for playback of the corresponding content at different levels of quality. 12. The method as in claim 11 further comprising: encoding the multiple streams of data in accordance with different bit rates, each of the different bit rates supporting play back of the corresponding content according to a different respective level of quality; and transmitting metadata in the multicast link to facilitate switchover of playing back the multiple streams of data at the different bit rates on downstream playback devices. 13. The method as in claim 11, wherein the multiple streams of data includes a first stream of data and a second stream of data; and wherein transmitting the multiple streams of data over the multicast link includes time delaying the second stream of data with respect to the first stream of data. 14. The method as in claim 11 further comprising: tagging portions of a first stream of data of the multiple streams of data to indicate respective segments of the corresponding content to which the tagged portions in the first stream of data pertain; and tagging portions of the second stream of data to indicate respective segments of the corresponding content to which the tagged portions in the second stream of data pertain. 15. The method as in claim 11 further comprising: receiving channel map information, the channel map information specifying availability and corresponding level of quality information associated with each of the streams of data transmitted in the multicast link; and distributing the channel map information to a playback device for playback of the streams of data transmitted on the multicast link. 16. The method as in claim 15, wherein the channel map information specifies bit rates associated with each of the multiple streams of data in the multicast link. 17. The method as in claim 11 further comprising: dynamically varying, over time, which of the multiple streams of data at the different levels of quality are transmitted over the multicast link. 18. The method as in claim 11 further comprising: in response to occurrence of a condition in which a downstream decoder initiates playback of a rendition of the corresponding content based on a first stream of data in the multicast link and then transitions to playback of a rendition of the corresponding content based on a second stream of data in the multicast link, transmitting an encoded portion of the corresponding content in an out-of-band channel with respect to the multicast link to the downstream decoder to support a substantially seamless playback of the corresponding content during the transition. 19. The method as in claim 11 further comprising: deriving a first stream of data from the corresponding content, the first stream of data encoded according to a first level of quality; deriving a second stream of data from the corresponding content, the second stream of data encoded according to a second level of quality, the second level of quality lower than the first level of quality; and wherein transmitting the multiple streams of data includes transmitting the first stream of data and the second stream of data over the multicast link to the downstream node. 20. The method as in claim 19, wherein deriving the first stream of data includes converting each of multiple segments of the corresponding content into a respective grouping of data in the first stream of data, each respective grouping of data in the first stream of data including metadata indicating a respective segment of the corresponding content to which the respective group of data in the first stream of data pertains; and wherein deriving the second stream of data includes converting each of the multiple segments of the corresponding content into a respective grouping of data in the second stream of data, each respective grouping of data in the second stream of data including metadata indicating a respective segment of the corresponding content to which the respective group of data in the second stream of data pertains. 21. A method comprising: via computer processor hardware, executing operations of: in response to receiving a request to play back content on a playback device, accessing a multicast link including multiple streams of data transmitted from a server resource over a network, each of the multiple streams of data in the multicast link encoded to play back a rendition of content according to a different level of quality; receiving, over the network, a stream of data from the multicast link; and decoding the received stream of data to play back a rendition of the content on the playback device. 22. The method as in claim 20, wherein the received stream of data is a first stream of data, the method further comprising: in response to detecting an inability to receive the first stream of data from the multicast link at a threshold bit rate, selecting a second stream of data from the multicast link, the second stream of data encoded to play back the content at a different level of quality than the first stream of data. 23. The method as in claim 22, wherein detecting the inability to receive the stream of data from the multicast link includes detecting network congestion and an inability to receive the first stream of data at a sufficient data rate to play back the content on the playback device; wherein selecting the second stream of data includes communicating with a downstream server node in a network that receives the multicast link from an origin server, the downstream server node serving the first stream of data to the playback device; and the method further comprising receiving the second stream of data from the downstream server node. 24. The method as in claim 20, wherein decoding the received stream of data to play back the rendition of the content on the playback device includes: utilizing synchronous tags in the received stream of data to identify an order of playing back segments of the content. 25. The method as in claim 20, wherein decoding the received stream of data includes: utilizing synchronization tags in the received stream of data to identify an order of playing back segments of the content in the received stream of data. 26. The method as in claim 25 further comprising: receiving an encoded portion of the content in an out-of-band channel with respect to the multicast link; and utilizing the encoded portion of the content received on the out-of-band channel to transition between playing back the first stream of data and the second stream of data on the playback device. 27. The method as in claim 20 further comprising: interleaving play back of groupings of data from a first stream of data and a second stream of data received from the multicast link, the interleaved groupings of data from the first stream of data and the second stream of data corresponding to a contiguous sequence of segments in the content, the groupings of data from the first stream of data supporting play back of a different level of quality than the groupings of data in the second stream of data. 28. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by a processing device, causes the processing device to perform operations of: producing multiple streams of data, each of the multiple streams of data encoded to play back a rendition of content according to a different level of quality; establishing a multicast link on which to distribute the multiple streams of data in a network to each of multiple clients; and transmitting the multiple streams of data over the multicast link to a downstream node in the network for playback of the content at different levels of quality by the multiple clients.
2,400
8,717
8,717
16,031,283
2,413
A wireless communication system includes an electrically powered window mounted air conditioning unit including a power cord attachable to an electrically powered wall outlet. A small cell wireless communication device is attached to or located within the electrically powered window mounted air conditioning unit. The small cell wireless communication device is configured to be powered through the power cord of the electrically powered window mounted air conditioning unit. The small cell wireless communication device includes at least one antenna for receiving and transmitting wireless information. The small cell wireless communication device is configured to communicate with a nearby wireless data communication router, wherein the wireless data communication router is configured to provide backhaul communication capabilities for the small cell wireless communication device. The small cell wireless communication device is configured to provide wireless communication capabilities for mobile wireless communication devices.
1-6. (canceled) 7. A wireless communication system configured to increase network capacity of a communications network, comprising: a window mounted air condition unit; and a small cell wireless communication device affixed to said window mounted air conditioning unit, the small cell wireless communication device configured to increase network capacity of a communications network in order to allow communications with multiple other devices and to receive power through the window mounted air conditioning unit. 8. The wireless communication system of claim 7, wherein the small cell wireless communication device is configured to communicate with a nearby wireless data communication router, wherein the wireless data communication router is configured to provide backhaul communication capabilities for the small cell wireless communication device. 9. The wireless communication system of claim 7, wherein the small cell wireless communication device is configured to provide cellular communication for mobile cellular communication devices. 10. The system of claim 7, wherein the small cell wireless communication device is configured to join a mesh network of a plurality of small cell wireless communication devices. 11. The wireless communication system of claim 7, wherein the small cell wireless communication device is configured to be installed within the air conditioning unit. 12. The wireless communication system of claim 7, wherein an owner of the communication router is remunerated for the use of the communication router by an owner of the small cell wireless communication device. 13. The wireless communication system of claim 7, wherein the small cell wireless communication device includes a global positioning system. 14. The wireless communication system of claim 7, wherein the small cell wireless communication device includes a camera. 15-20. (canceled)
A wireless communication system includes an electrically powered window mounted air conditioning unit including a power cord attachable to an electrically powered wall outlet. A small cell wireless communication device is attached to or located within the electrically powered window mounted air conditioning unit. The small cell wireless communication device is configured to be powered through the power cord of the electrically powered window mounted air conditioning unit. The small cell wireless communication device includes at least one antenna for receiving and transmitting wireless information. The small cell wireless communication device is configured to communicate with a nearby wireless data communication router, wherein the wireless data communication router is configured to provide backhaul communication capabilities for the small cell wireless communication device. The small cell wireless communication device is configured to provide wireless communication capabilities for mobile wireless communication devices.1-6. (canceled) 7. A wireless communication system configured to increase network capacity of a communications network, comprising: a window mounted air condition unit; and a small cell wireless communication device affixed to said window mounted air conditioning unit, the small cell wireless communication device configured to increase network capacity of a communications network in order to allow communications with multiple other devices and to receive power through the window mounted air conditioning unit. 8. The wireless communication system of claim 7, wherein the small cell wireless communication device is configured to communicate with a nearby wireless data communication router, wherein the wireless data communication router is configured to provide backhaul communication capabilities for the small cell wireless communication device. 9. The wireless communication system of claim 7, wherein the small cell wireless communication device is configured to provide cellular communication for mobile cellular communication devices. 10. The system of claim 7, wherein the small cell wireless communication device is configured to join a mesh network of a plurality of small cell wireless communication devices. 11. The wireless communication system of claim 7, wherein the small cell wireless communication device is configured to be installed within the air conditioning unit. 12. The wireless communication system of claim 7, wherein an owner of the communication router is remunerated for the use of the communication router by an owner of the small cell wireless communication device. 13. The wireless communication system of claim 7, wherein the small cell wireless communication device includes a global positioning system. 14. The wireless communication system of claim 7, wherein the small cell wireless communication device includes a camera. 15-20. (canceled)
2,400
8,718
8,718
15,420,239
2,487
A vision system of a vehicle includes a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle. A display device is operable to display images for viewing by a driver of the vehicle. The plurality of cameras includes a master camera and at least one slave camera. The at least one slave camera communicates a signal to the master slave camera representative of image data captured by the at least one slave camera. The master camera includes an image signal processor for processing image data captured by at least the master camera. The master camera includes a view generator operable to generate images for display by the display device, with the generated images derived from image data captured by the master camera and the signal communicated by the at least one slave camera.
1. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle; a display device disposed in the vehicle and operable to display images for viewing by a driver of the vehicle; wherein each camera of said plurality of cameras captures respective image data; wherein said plurality of cameras comprises a master camera and at least one slave camera; wherein said at least one slave camera communicates to said master slave camera the image data captured by the respective slave camera; wherein said master camera comprises a view generator operable to generate images for display by said display device; wherein said view generator of said master camera receives image data captured by said master camera and receives image data captured by said at least one slave camera; and wherein the images generated by said view generator are derived from image data captured by said master camera and from image data received from said at least one slave camera. 2. The vision system of claim 1, wherein said master camera comprises an image signal processor for processing image data captured by at least said master camera. 3. The vision system of claim 1, wherein said at least one slave camera includes an image signal processor for processing image data captured by said at least one slave camera before communicating the image data to said master camera. 4. The vision system of claim 1, wherein said at least one slave camera comprises an encryptor that encrypts the image data that is communicated by said at least one slave camera. 5. The vision system of claim 4, wherein said master camera comprises a decryptor that decrypts the image data received from said at least one slave camera. 6. The vision system of claim 1, wherein the captured image data is communicated from said at least one slave camera to said master camera via an Ethernet communication. 7. The vision system of claim 1, wherein the images generated by said view generator of said master camera are communicated to said display device via an Ethernet communication. 8. The vision system of claim 1, wherein said at least one slave camera comprises at least three slave cameras. 9. The vision system of claim 8, wherein said master camera and said at least three slave cameras combine to have a field of view around the vehicle. 10. The vision system of claim 9, wherein said view generator generates a surround view image that is derived from image data captured by said master camera and from image data received from said at least three slave cameras. 11. The vision system of claim 8, wherein each of said slave cameras comprises an encryptor that encrypts the image data that is communicated by said at least one slave camera. 12. The vision system of claim 11, wherein said master camera comprises at least one decryptor that decrypts the image data received from said slave cameras. 13. The vision system of claim 12, wherein said master camera comprises a plurality of decryptors that each decrypts image data received from a respective one of said slave cameras. 14. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle; a display device disposed in the vehicle and operable to display images for viewing by a driver of the vehicle; wherein each camera of said plurality of cameras captures respective image data; wherein said plurality of cameras comprises a master camera and at least three slave cameras; wherein said slave cameras communicate to said master slave camera the image data captured by the respective slave cameras; wherein said master camera comprises an image signal processor for processing image data captured by at least said master camera; wherein each of said slave cameras includes an image signal processor for processing image data captured by the respective slave camera before communicating the image data to said master camera; wherein said master camera comprises a view generator operable to generate images for display by said display device; wherein said view generator of said master camera receives image data captured by said master camera and receives image data captured by said slave cameras; and wherein the images generated by said view generator are derived from image data captured by said master camera and from image data received from said slave cameras. 15. The vision system of claim 14, wherein the captured image data is communicated from said slave cameras to said master camera via Ethernet communications. 16. The vision system of claim 14, wherein the images generated by said view generator of said master camera are communicated to said display device via an Ethernet communication. 17. The vision system of claim 14, wherein said master camera and said at least three slave cameras combine to have a field of view around the vehicle, and wherein said view generator generates a surround view image that is derived from image data captured by said master camera and from image data received from said at least three slave cameras. 18. The vision system of claim 14, wherein each of said slave cameras comprises an encryptor that encrypts the image data that is communicated by said at least one slave camera, and wherein said master camera comprises at least one decryptor that decrypts the image data received from said slave cameras. 19. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle; a display device disposed in the vehicle and operable to display images for viewing by a driver of the vehicle; wherein each camera of said plurality of cameras captures respective image data; wherein said plurality of cameras comprises a master camera and at least three slave cameras; wherein said master camera and said at least three slave cameras combine to have a field of view around the vehicle; wherein said slave cameras communicate to said master slave camera the image data captured by the respective slave cameras; wherein said master camera comprises an image signal processor for processing image data captured by at least said master camera; wherein each of said slave cameras includes an image signal processor for processing image data captured by the respective slave camera before communicating the image data to said master camera; wherein each of said slave cameras comprises an encryptor that encrypts the processed image data that is communicated by said at least one slave camera, and wherein said master camera comprises at least one decryptor that decrypts the communicated image data received from said slave cameras; wherein said master camera comprises a view generator operable to generate images for display by said display device; wherein said view generator of said master camera receives image data captured by said master camera and receives image data captured by said slave cameras; wherein the images generated by said view generator are derived from image data captured by said master camera and from image data received from said slave cameras; and wherein said view generator generates a surround view image that is derived from image data captured by said master camera and from image data received from said at least three slave cameras. 20. The vision system of claim 19, wherein the captured image data is communicated from each of said slave cameras to said master camera via a respective Ethernet communication, and wherein the images generated by said view generator of said master camera are communicated to said display device via an Ethernet communication.
A vision system of a vehicle includes a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle. A display device is operable to display images for viewing by a driver of the vehicle. The plurality of cameras includes a master camera and at least one slave camera. The at least one slave camera communicates a signal to the master slave camera representative of image data captured by the at least one slave camera. The master camera includes an image signal processor for processing image data captured by at least the master camera. The master camera includes a view generator operable to generate images for display by the display device, with the generated images derived from image data captured by the master camera and the signal communicated by the at least one slave camera.1. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle; a display device disposed in the vehicle and operable to display images for viewing by a driver of the vehicle; wherein each camera of said plurality of cameras captures respective image data; wherein said plurality of cameras comprises a master camera and at least one slave camera; wherein said at least one slave camera communicates to said master slave camera the image data captured by the respective slave camera; wherein said master camera comprises a view generator operable to generate images for display by said display device; wherein said view generator of said master camera receives image data captured by said master camera and receives image data captured by said at least one slave camera; and wherein the images generated by said view generator are derived from image data captured by said master camera and from image data received from said at least one slave camera. 2. The vision system of claim 1, wherein said master camera comprises an image signal processor for processing image data captured by at least said master camera. 3. The vision system of claim 1, wherein said at least one slave camera includes an image signal processor for processing image data captured by said at least one slave camera before communicating the image data to said master camera. 4. The vision system of claim 1, wherein said at least one slave camera comprises an encryptor that encrypts the image data that is communicated by said at least one slave camera. 5. The vision system of claim 4, wherein said master camera comprises a decryptor that decrypts the image data received from said at least one slave camera. 6. The vision system of claim 1, wherein the captured image data is communicated from said at least one slave camera to said master camera via an Ethernet communication. 7. The vision system of claim 1, wherein the images generated by said view generator of said master camera are communicated to said display device via an Ethernet communication. 8. The vision system of claim 1, wherein said at least one slave camera comprises at least three slave cameras. 9. The vision system of claim 8, wherein said master camera and said at least three slave cameras combine to have a field of view around the vehicle. 10. The vision system of claim 9, wherein said view generator generates a surround view image that is derived from image data captured by said master camera and from image data received from said at least three slave cameras. 11. The vision system of claim 8, wherein each of said slave cameras comprises an encryptor that encrypts the image data that is communicated by said at least one slave camera. 12. The vision system of claim 11, wherein said master camera comprises at least one decryptor that decrypts the image data received from said slave cameras. 13. The vision system of claim 12, wherein said master camera comprises a plurality of decryptors that each decrypts image data received from a respective one of said slave cameras. 14. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle; a display device disposed in the vehicle and operable to display images for viewing by a driver of the vehicle; wherein each camera of said plurality of cameras captures respective image data; wherein said plurality of cameras comprises a master camera and at least three slave cameras; wherein said slave cameras communicate to said master slave camera the image data captured by the respective slave cameras; wherein said master camera comprises an image signal processor for processing image data captured by at least said master camera; wherein each of said slave cameras includes an image signal processor for processing image data captured by the respective slave camera before communicating the image data to said master camera; wherein said master camera comprises a view generator operable to generate images for display by said display device; wherein said view generator of said master camera receives image data captured by said master camera and receives image data captured by said slave cameras; and wherein the images generated by said view generator are derived from image data captured by said master camera and from image data received from said slave cameras. 15. The vision system of claim 14, wherein the captured image data is communicated from said slave cameras to said master camera via Ethernet communications. 16. The vision system of claim 14, wherein the images generated by said view generator of said master camera are communicated to said display device via an Ethernet communication. 17. The vision system of claim 14, wherein said master camera and said at least three slave cameras combine to have a field of view around the vehicle, and wherein said view generator generates a surround view image that is derived from image data captured by said master camera and from image data received from said at least three slave cameras. 18. The vision system of claim 14, wherein each of said slave cameras comprises an encryptor that encrypts the image data that is communicated by said at least one slave camera, and wherein said master camera comprises at least one decryptor that decrypts the image data received from said slave cameras. 19. A vision system for a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having a field of view exterior of the vehicle; a display device disposed in the vehicle and operable to display images for viewing by a driver of the vehicle; wherein each camera of said plurality of cameras captures respective image data; wherein said plurality of cameras comprises a master camera and at least three slave cameras; wherein said master camera and said at least three slave cameras combine to have a field of view around the vehicle; wherein said slave cameras communicate to said master slave camera the image data captured by the respective slave cameras; wherein said master camera comprises an image signal processor for processing image data captured by at least said master camera; wherein each of said slave cameras includes an image signal processor for processing image data captured by the respective slave camera before communicating the image data to said master camera; wherein each of said slave cameras comprises an encryptor that encrypts the processed image data that is communicated by said at least one slave camera, and wherein said master camera comprises at least one decryptor that decrypts the communicated image data received from said slave cameras; wherein said master camera comprises a view generator operable to generate images for display by said display device; wherein said view generator of said master camera receives image data captured by said master camera and receives image data captured by said slave cameras; wherein the images generated by said view generator are derived from image data captured by said master camera and from image data received from said slave cameras; and wherein said view generator generates a surround view image that is derived from image data captured by said master camera and from image data received from said at least three slave cameras. 20. The vision system of claim 19, wherein the captured image data is communicated from each of said slave cameras to said master camera via a respective Ethernet communication, and wherein the images generated by said view generator of said master camera are communicated to said display device via an Ethernet communication.
2,400
8,719
8,719
16,175,550
2,422
Embodiments relate to systems and methods for sample image capture using integrated control. A digital microscope or other imaging device can be associated with a sample chamber containing cell, tissue, or other sample material. The chamber can be configured to operate using a variety of environmental variables, including gas concentration, temperature, humidity, and others. The imaging device can be configured to operate using a variety of imaging variables, including magnification, focal length, illumination, and others. A central system control module can be used to configure the settings of those hardware elements, as well as others, to set up and carry out an image capture event. The system control module can be operated to control the physical, optical, chemical, and/or other parameters of the overall imaging environment from one central control point. The variables used to produce the image capture can be configured to dynamically variable during the media capture event.
1-22. (canceled) 23. An imaging system, comprising: a chamber having a set of environmental settings, the set of environmental settings comprising at least one of: a temperature of the chamber, a humidity of the chamber, a pressure of the chamber, or a concentration of gas within the chamber; an imaging device for imaging a sample within the chamber, the imaging device having a set of imaging parameters, the set of imaging parameters comprising at least one of: a magnification setting, a focal length setting, a resolution setting, an illumination setting, a monochrome setting, a color setting, a fluorescent stain setting, a transparency setting, or a phase setting; a system controller operatively connected to the chamber and the imaging device and configured to individually and simultaneously change one or more of the set of environmental settings or the set of imaging parameters. 24. The imaging system of claim 23, wherein the set of environmental settings additionally comprises an introduction of one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 25. The imaging system of claim 23, wherein the set of environmental settings additionally comprises a regulation of one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 26. The imaging system of claim 23, wherein the chamber comprises a sealed chamber enclosing a sample plate. 27. The system of claim 23, wherein the imaging device comprises a microscope. 28. The system of claim 27, wherein the microscope comprises a digital imaging microscope. 29. An imaging system, comprising: one or more processors; and one or more hardware storage devices having stored thereon computer readable media that, when executed by the one or more processors, configure the imaging system to: initiate a system controller operatively connected to a chamber and to an imaging device; receive, at the system controller, a set of initial environmental settings for the chamber, the set of initial environmental settings comprising at least one of a temperature of the chamber, a humidity of the chamber, a pressure of the chamber, or a concentration of gas within the chamber; receive, at the system controller, a set of initial imaging parameters for operating the imaging device, the set of initial imaging parameters comprising at least one of a magnification setting, a focal length setting, a resolution setting, an illumination setting, a monochrome setting, a color setting, a fluorescent stain setting, a transparency setting, or a phase setting; initiate, sequentially or simultaneously via the system controller, the set of initial environmental settings at the chamber and the set of initial imaging parameters to operate the imaging device; receive, at the system controller, a triggering event and at least one of a set of changed environmental settings or a set of changed imaging parameters; and in response to the triggering event, dynamically update the set of initial environmental settings to the set of changed environmental settings or the set of initial imaging parameters to the set of changed imaging parameters, wherein the set of changed environmental settings comprises at least one of a changed temperature of the chamber, a changed humidity of the chamber, a changed pressure of the chamber, or a changed concentration of gas within the chamber, and wherein the set of changed imaging parameters comprises at least one of a changed magnification setting, a changed focal length setting, a changed resolution setting, a changed illumination setting, a changed monochrome setting, a changed color setting, a changed fluorescent stain setting, a changed transparency setting, or a changed phase setting. 30. The imaging system of claim 29, wherein the computer readable media further configure the imaging system to introduce or regulate, via the system controller, one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 31. The imaging system of claim 30, wherein the imaging system introduces or regulates, via the system controller, the one or more reagents, growth factors, or other adjuvants in response to the triggering event. 32. The imaging system of claim 29, wherein the computer readable media further configure the imaging system to initiate, via the system controller, an image capture event for a sample in the chamber. 33. The imaging system of claim 32, wherein the computer readable media further configure the imaging system to capture media from the image capture event via the imaging device. 34. The imaging system of claim 32, wherein in response to the image capture event, the computer readable media further configure the imaging system to introduce or regulate, via the system controller, one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 35. The imaging system of claim 29, wherein the set of changed imaging parameters is the changed illumination setting, the changed illumination setting comprising a changed illumination type or a changed illumination intensity. 36. A method, comprising: invoking a system controller operatively connected to a chamber and an imaging device; initiating, via the system controller, a set of initial environmental settings associated with physical conditions of the chamber; initiating, via the system controller, a set of initial imaging parameters associated with operation of the imaging device; initiating, via the system controller, an image capture event for a sample in the chamber; in response to executing the image capture event, dynamically updating the set of initial environmental settings to a set of changed environmental settings or the set of initial imaging parameters to a set of changed imaging parameters; and capturing media from the image capture event, via the imaging device. 37. The method of claim 36, wherein the set of initial environmental settings comprising at least one of a temperature of the chamber, a humidity of the chamber, a pressure of the chamber, or a concentration of gas within the chamber, and wherein the set of changed environmental settings comprises at least one of a changed temperature of the chamber, a changed humidity of the chamber, a changed pressure of the chamber, or a changed concentration of gas within the chamber. 38. The method of claim 36, wherein the set of initial imaging parameters comprising at least one of a magnification setting, a focal length setting, a resolution setting, an illumination setting, a monochrome setting, a color setting, a fluorescent stain setting, a transparency setting, or a phase setting, and wherein the set of changed imaging parameters comprises at least one of a changed magnification setting, a changed focal length setting, a changed resolution setting, a changed illumination setting, a changed monochrome setting, a changed color setting, a changed fluorescent stain setting, a changed transparency setting, or a changed phase setting. 39. The method of claim 36, wherein the image capture event comprises a video capture of contents of the chamber. 40. The method of claim 39, wherein the video capture comprises a time-lapse video capture. 41. The method of claim 39, wherein one or more of the set of changed imaging parameters or the set of changed environmental settings are recorded in a textual strip located at the bottom of the frames comprising the video capture. 42. The method of claim 36, wherein one or more of the set of changed imaging parameters or the set of changed environmental settings are recorded in the captured media for the image capture event. 43. The method of claim 36, further comprising introducing or regulating, via the system controller, one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber.
Embodiments relate to systems and methods for sample image capture using integrated control. A digital microscope or other imaging device can be associated with a sample chamber containing cell, tissue, or other sample material. The chamber can be configured to operate using a variety of environmental variables, including gas concentration, temperature, humidity, and others. The imaging device can be configured to operate using a variety of imaging variables, including magnification, focal length, illumination, and others. A central system control module can be used to configure the settings of those hardware elements, as well as others, to set up and carry out an image capture event. The system control module can be operated to control the physical, optical, chemical, and/or other parameters of the overall imaging environment from one central control point. The variables used to produce the image capture can be configured to dynamically variable during the media capture event.1-22. (canceled) 23. An imaging system, comprising: a chamber having a set of environmental settings, the set of environmental settings comprising at least one of: a temperature of the chamber, a humidity of the chamber, a pressure of the chamber, or a concentration of gas within the chamber; an imaging device for imaging a sample within the chamber, the imaging device having a set of imaging parameters, the set of imaging parameters comprising at least one of: a magnification setting, a focal length setting, a resolution setting, an illumination setting, a monochrome setting, a color setting, a fluorescent stain setting, a transparency setting, or a phase setting; a system controller operatively connected to the chamber and the imaging device and configured to individually and simultaneously change one or more of the set of environmental settings or the set of imaging parameters. 24. The imaging system of claim 23, wherein the set of environmental settings additionally comprises an introduction of one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 25. The imaging system of claim 23, wherein the set of environmental settings additionally comprises a regulation of one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 26. The imaging system of claim 23, wherein the chamber comprises a sealed chamber enclosing a sample plate. 27. The system of claim 23, wherein the imaging device comprises a microscope. 28. The system of claim 27, wherein the microscope comprises a digital imaging microscope. 29. An imaging system, comprising: one or more processors; and one or more hardware storage devices having stored thereon computer readable media that, when executed by the one or more processors, configure the imaging system to: initiate a system controller operatively connected to a chamber and to an imaging device; receive, at the system controller, a set of initial environmental settings for the chamber, the set of initial environmental settings comprising at least one of a temperature of the chamber, a humidity of the chamber, a pressure of the chamber, or a concentration of gas within the chamber; receive, at the system controller, a set of initial imaging parameters for operating the imaging device, the set of initial imaging parameters comprising at least one of a magnification setting, a focal length setting, a resolution setting, an illumination setting, a monochrome setting, a color setting, a fluorescent stain setting, a transparency setting, or a phase setting; initiate, sequentially or simultaneously via the system controller, the set of initial environmental settings at the chamber and the set of initial imaging parameters to operate the imaging device; receive, at the system controller, a triggering event and at least one of a set of changed environmental settings or a set of changed imaging parameters; and in response to the triggering event, dynamically update the set of initial environmental settings to the set of changed environmental settings or the set of initial imaging parameters to the set of changed imaging parameters, wherein the set of changed environmental settings comprises at least one of a changed temperature of the chamber, a changed humidity of the chamber, a changed pressure of the chamber, or a changed concentration of gas within the chamber, and wherein the set of changed imaging parameters comprises at least one of a changed magnification setting, a changed focal length setting, a changed resolution setting, a changed illumination setting, a changed monochrome setting, a changed color setting, a changed fluorescent stain setting, a changed transparency setting, or a changed phase setting. 30. The imaging system of claim 29, wherein the computer readable media further configure the imaging system to introduce or regulate, via the system controller, one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 31. The imaging system of claim 30, wherein the imaging system introduces or regulates, via the system controller, the one or more reagents, growth factors, or other adjuvants in response to the triggering event. 32. The imaging system of claim 29, wherein the computer readable media further configure the imaging system to initiate, via the system controller, an image capture event for a sample in the chamber. 33. The imaging system of claim 32, wherein the computer readable media further configure the imaging system to capture media from the image capture event via the imaging device. 34. The imaging system of claim 32, wherein in response to the image capture event, the computer readable media further configure the imaging system to introduce or regulate, via the system controller, one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber. 35. The imaging system of claim 29, wherein the set of changed imaging parameters is the changed illumination setting, the changed illumination setting comprising a changed illumination type or a changed illumination intensity. 36. A method, comprising: invoking a system controller operatively connected to a chamber and an imaging device; initiating, via the system controller, a set of initial environmental settings associated with physical conditions of the chamber; initiating, via the system controller, a set of initial imaging parameters associated with operation of the imaging device; initiating, via the system controller, an image capture event for a sample in the chamber; in response to executing the image capture event, dynamically updating the set of initial environmental settings to a set of changed environmental settings or the set of initial imaging parameters to a set of changed imaging parameters; and capturing media from the image capture event, via the imaging device. 37. The method of claim 36, wherein the set of initial environmental settings comprising at least one of a temperature of the chamber, a humidity of the chamber, a pressure of the chamber, or a concentration of gas within the chamber, and wherein the set of changed environmental settings comprises at least one of a changed temperature of the chamber, a changed humidity of the chamber, a changed pressure of the chamber, or a changed concentration of gas within the chamber. 38. The method of claim 36, wherein the set of initial imaging parameters comprising at least one of a magnification setting, a focal length setting, a resolution setting, an illumination setting, a monochrome setting, a color setting, a fluorescent stain setting, a transparency setting, or a phase setting, and wherein the set of changed imaging parameters comprises at least one of a changed magnification setting, a changed focal length setting, a changed resolution setting, a changed illumination setting, a changed monochrome setting, a changed color setting, a changed fluorescent stain setting, a changed transparency setting, or a changed phase setting. 39. The method of claim 36, wherein the image capture event comprises a video capture of contents of the chamber. 40. The method of claim 39, wherein the video capture comprises a time-lapse video capture. 41. The method of claim 39, wherein one or more of the set of changed imaging parameters or the set of changed environmental settings are recorded in a textual strip located at the bottom of the frames comprising the video capture. 42. The method of claim 36, wherein one or more of the set of changed imaging parameters or the set of changed environmental settings are recorded in the captured media for the image capture event. 43. The method of claim 36, further comprising introducing or regulating, via the system controller, one or more reagents, growth factors, or other adjuvants for stimulating or modifying a growth of a sample within the chamber.
2,400
8,720
8,720
15,441,788
2,495
A client device is fabricated using a semiconductor fabrication process. One or more uncontrollable random physical processes in the semiconductor fabrication process can cause small differences between the client device and other client devices. When the client device is presented with a challenge from a server device, the client device generates a random response that depends on its physical properties. The server device stores this random response as a part of a virtual PUF circuitry storage device having other random responses from the other client devices. The server device uses the random response of the client device stored in the virtual PUF circuitry storage device for one or more encryption algorithms to encrypt information to be provided to the client device.
1. A server device within a client-server device communication system, the server device comprising: a virtual physical unclonable function (PUF) circuitry storage device that stores a virtual mapping of a plurality of PUF circuitry of a plurality client devices within the client-server device communication system; and encryption circuitry configured to: query the virtual PUF circuitry storage device with a first challenge for a first response from among the virtual mapping corresponding to a client device from among the plurality of client devices, generate a second challenge by increasing or decreasing the first challenge by a challenge coefficient, and query the virtual PUF circuitry storage device with the second challenge for a second response from among the virtual mapping corresponding to the client device, and wherein the encryption circuitry comprises: a first logical gate configured to perform a logical operation between a first message from among a plurality of messages and the first response to provide a first encrypted message, and a second logical gate configured to perform the logical operation between a second message from among the plurality of messages and the second response to provide a second encrypted message. 2. The server device of claim 1, wherein the server device is configured to provide the first encrypted message and the second encrypted message to the client device. 3. The server device of claim 1, wherein the server device is configured to: query a second PUF circuitry of the client device with a third challenge for a third response, and wherein the virtual PUF circuitry storage device is configured to store the third response as part of the virtual mapping of the plurality of PUF circuitry. 4. The server device of claim 3, wherein the third challenge represents a request to read information corresponding to a plurality of memory cells from the second PUF circuitry which is read from the plurality of memory cells by the second PUF circuitry when the plurality of memory cells is operating in an unprogrammed mode of operation. 5. The server device of claim 1, wherein the virtual mapping of the plurality of PUF circuitry comprises: a listing, a table, a file, or a database of a plurality of challenge-response pairs of the plurality of client devices. 6. The server device of claim 5, wherein the listing, the table, the file, or the database of the plurality of challenge-response pairs is indexed to identifying information corresponding to the plurality of client devices. 7. The server device of claim 1, wherein the encryption circuitry further comprises: counting circuitry, and wherein the encryption circuitry is configured to generate the second challenge by increasing or decreasing the first challenge by a value of stored in the counting circuitry. 8. The server device of claim 1, wherein a bit-length of the first response is equal to a bit-length of the first message. 9. The server device of claim 1, wherein the one or more first logical gates comprise: a first exclusive OR gate configured to perform a logical exclusive OR operation between the first message and the first response to provide the first encrypted message, and wherein the one or more second logical gates comprise: a second exclusive OR gate configured to perform the logical exclusive OR operation between the second message and the second response to provide the second encrypted message. 10. A method for operating a server device within a client-server device communication system, the method comprising: storing a virtual mapping of a plurality of physical unclonable function (PUF) circuitry of a plurality client devices within the client-server device communication system; querying, using a first challenge, for a first response from among the virtual mapping corresponding to a client device from among the plurality of client devices; generating a second challenge by increasing or decreasing the first challenge by a challenge coefficient; querying, using the second challenge, for a second response from among the virtual mapping corresponding to the client device; and performing a logical operation between a first message from among a plurality of messages and the first response to provide a first encrypted message and between a second message from among the plurality of messages and the second response to provide a second encrypted message. 11. The method of claim 10, further comprising: providing the first encrypted message and the second encrypted message to the client device. 12. The method of claim 10, further comprising: querying a second PUF circuitry of the client device with a third challenge for a third response, and wherein the storing comprises: storing the third response as part of the virtual mapping of the plurality of PUF circuitry. 13. The method of claim 12, wherein the third challenge represents a request to read information corresponding to a plurality of memory cells from the second PUF circuitry which is read from the plurality of memory cells by the second PUF circuitry when the plurality of memory cells is operating in an unprogrammed mode of operation. 14. The method of claim 10, wherein the storing comprises: storing the virtual mapping of the plurality of PUF circuitry as a listing, a table, a file, or a database of a plurality of challenge-response pairs of the plurality of client devices. 15. The method of claim 14, wherein the storing further comprises: indexing the listing, the table, the file, or the database of the plurality of challenge-response pairs to identifying information corresponding to the plurality of client devices. 16. The method of claim 10, wherein the generating comprises: generating the second challenge by increasing or decreasing the first challenge by a value of stored in counting circuitry. 17. The method of claim 10, wherein a bit-length of the first response is equal to a bit-length of the first message. 18. The method of claim 10, wherein the performing comprises: performing a logical exclusive OR operation between the first message and the first response to provide the first encrypted message and between the second message and the second response to provide the second encrypted message. 19. A server device of a client-server device communication system, the server device comprising: a virtual physical unclonable function (PUF) circuitry storage device that stores a plurality of responses received from a plurality of client devices, each of the plurality of responses being received in response to a first challenge provided by the server device to read a plurality of PUF circuitry of the plurality of client devices; encryption circuitry configured to: query the PUF circuitry with a second challenge for a first response from among the plurality of responses corresponding to a client device from among the plurality of client devices, generate a third challenge by increasing or decreasing the second challenge by a challenge coefficient, query the PUF circuitry with the third challenge for a second response from among the plurality of responses corresponding to the client device, utilize the first response as a first seed to an encryption algorithm to encrypt a first message from among a plurality of messages, and utilize the second response as a second seed to the encryption algorithm to encrypt a second message from among the plurality of messages. 20. The server device of claim 19, wherein the virtual PUF circuitry storage device stores the plurality of responses as a listing, a table, a file, or a database of a plurality of challenge-response pairs of the plurality of client devices. 21. The server device of claim 20, wherein the listing, the table, the file, or the database of the plurality of challenge-response pairs is indexed to identifying information corresponding to the plurality of client devices. 22. The server device of claim 19, wherein the encryption circuitry comprises: counting circuitry, and wherein the encryption circuitry is configured to generate the second challenge by increasing or decreasing the first challenge by a value of stored in the counting circuitry.
A client device is fabricated using a semiconductor fabrication process. One or more uncontrollable random physical processes in the semiconductor fabrication process can cause small differences between the client device and other client devices. When the client device is presented with a challenge from a server device, the client device generates a random response that depends on its physical properties. The server device stores this random response as a part of a virtual PUF circuitry storage device having other random responses from the other client devices. The server device uses the random response of the client device stored in the virtual PUF circuitry storage device for one or more encryption algorithms to encrypt information to be provided to the client device.1. A server device within a client-server device communication system, the server device comprising: a virtual physical unclonable function (PUF) circuitry storage device that stores a virtual mapping of a plurality of PUF circuitry of a plurality client devices within the client-server device communication system; and encryption circuitry configured to: query the virtual PUF circuitry storage device with a first challenge for a first response from among the virtual mapping corresponding to a client device from among the plurality of client devices, generate a second challenge by increasing or decreasing the first challenge by a challenge coefficient, and query the virtual PUF circuitry storage device with the second challenge for a second response from among the virtual mapping corresponding to the client device, and wherein the encryption circuitry comprises: a first logical gate configured to perform a logical operation between a first message from among a plurality of messages and the first response to provide a first encrypted message, and a second logical gate configured to perform the logical operation between a second message from among the plurality of messages and the second response to provide a second encrypted message. 2. The server device of claim 1, wherein the server device is configured to provide the first encrypted message and the second encrypted message to the client device. 3. The server device of claim 1, wherein the server device is configured to: query a second PUF circuitry of the client device with a third challenge for a third response, and wherein the virtual PUF circuitry storage device is configured to store the third response as part of the virtual mapping of the plurality of PUF circuitry. 4. The server device of claim 3, wherein the third challenge represents a request to read information corresponding to a plurality of memory cells from the second PUF circuitry which is read from the plurality of memory cells by the second PUF circuitry when the plurality of memory cells is operating in an unprogrammed mode of operation. 5. The server device of claim 1, wherein the virtual mapping of the plurality of PUF circuitry comprises: a listing, a table, a file, or a database of a plurality of challenge-response pairs of the plurality of client devices. 6. The server device of claim 5, wherein the listing, the table, the file, or the database of the plurality of challenge-response pairs is indexed to identifying information corresponding to the plurality of client devices. 7. The server device of claim 1, wherein the encryption circuitry further comprises: counting circuitry, and wherein the encryption circuitry is configured to generate the second challenge by increasing or decreasing the first challenge by a value of stored in the counting circuitry. 8. The server device of claim 1, wherein a bit-length of the first response is equal to a bit-length of the first message. 9. The server device of claim 1, wherein the one or more first logical gates comprise: a first exclusive OR gate configured to perform a logical exclusive OR operation between the first message and the first response to provide the first encrypted message, and wherein the one or more second logical gates comprise: a second exclusive OR gate configured to perform the logical exclusive OR operation between the second message and the second response to provide the second encrypted message. 10. A method for operating a server device within a client-server device communication system, the method comprising: storing a virtual mapping of a plurality of physical unclonable function (PUF) circuitry of a plurality client devices within the client-server device communication system; querying, using a first challenge, for a first response from among the virtual mapping corresponding to a client device from among the plurality of client devices; generating a second challenge by increasing or decreasing the first challenge by a challenge coefficient; querying, using the second challenge, for a second response from among the virtual mapping corresponding to the client device; and performing a logical operation between a first message from among a plurality of messages and the first response to provide a first encrypted message and between a second message from among the plurality of messages and the second response to provide a second encrypted message. 11. The method of claim 10, further comprising: providing the first encrypted message and the second encrypted message to the client device. 12. The method of claim 10, further comprising: querying a second PUF circuitry of the client device with a third challenge for a third response, and wherein the storing comprises: storing the third response as part of the virtual mapping of the plurality of PUF circuitry. 13. The method of claim 12, wherein the third challenge represents a request to read information corresponding to a plurality of memory cells from the second PUF circuitry which is read from the plurality of memory cells by the second PUF circuitry when the plurality of memory cells is operating in an unprogrammed mode of operation. 14. The method of claim 10, wherein the storing comprises: storing the virtual mapping of the plurality of PUF circuitry as a listing, a table, a file, or a database of a plurality of challenge-response pairs of the plurality of client devices. 15. The method of claim 14, wherein the storing further comprises: indexing the listing, the table, the file, or the database of the plurality of challenge-response pairs to identifying information corresponding to the plurality of client devices. 16. The method of claim 10, wherein the generating comprises: generating the second challenge by increasing or decreasing the first challenge by a value of stored in counting circuitry. 17. The method of claim 10, wherein a bit-length of the first response is equal to a bit-length of the first message. 18. The method of claim 10, wherein the performing comprises: performing a logical exclusive OR operation between the first message and the first response to provide the first encrypted message and between the second message and the second response to provide the second encrypted message. 19. A server device of a client-server device communication system, the server device comprising: a virtual physical unclonable function (PUF) circuitry storage device that stores a plurality of responses received from a plurality of client devices, each of the plurality of responses being received in response to a first challenge provided by the server device to read a plurality of PUF circuitry of the plurality of client devices; encryption circuitry configured to: query the PUF circuitry with a second challenge for a first response from among the plurality of responses corresponding to a client device from among the plurality of client devices, generate a third challenge by increasing or decreasing the second challenge by a challenge coefficient, query the PUF circuitry with the third challenge for a second response from among the plurality of responses corresponding to the client device, utilize the first response as a first seed to an encryption algorithm to encrypt a first message from among a plurality of messages, and utilize the second response as a second seed to the encryption algorithm to encrypt a second message from among the plurality of messages. 20. The server device of claim 19, wherein the virtual PUF circuitry storage device stores the plurality of responses as a listing, a table, a file, or a database of a plurality of challenge-response pairs of the plurality of client devices. 21. The server device of claim 20, wherein the listing, the table, the file, or the database of the plurality of challenge-response pairs is indexed to identifying information corresponding to the plurality of client devices. 22. The server device of claim 19, wherein the encryption circuitry comprises: counting circuitry, and wherein the encryption circuitry is configured to generate the second challenge by increasing or decreasing the first challenge by a value of stored in the counting circuitry.
2,400
8,721
8,721
13,525,973
2,476
A method is provided for performing a random access procedure in a mobile communication system. The method includes receiving a random access response message from a Base Station (BS); transmitting a message including a Cell-Radio Network Temporary Identifier (C-RNTI) to the BS, if the C-RNTI exists; and determining that a contention for the random access procedure is resolved successfully, when User Equipment (UE)-specific control information addressable by the C-RNTI is received from the BS.
1. A method for performing a random access procedure in a mobile communication system, the method comprising: receiving a random access response message from a Base Station (BS); transmitting a message including a Cell-Radio Network Temporary Identifier (C-RNTI) to the BS, if the C-RNTI exists; and determining that a contention for the random access procedure is resolved successfully, when User Equipment (UE)-specific control information addressable by the C-RNTI is received from the BS.
A method is provided for performing a random access procedure in a mobile communication system. The method includes receiving a random access response message from a Base Station (BS); transmitting a message including a Cell-Radio Network Temporary Identifier (C-RNTI) to the BS, if the C-RNTI exists; and determining that a contention for the random access procedure is resolved successfully, when User Equipment (UE)-specific control information addressable by the C-RNTI is received from the BS.1. A method for performing a random access procedure in a mobile communication system, the method comprising: receiving a random access response message from a Base Station (BS); transmitting a message including a Cell-Radio Network Temporary Identifier (C-RNTI) to the BS, if the C-RNTI exists; and determining that a contention for the random access procedure is resolved successfully, when User Equipment (UE)-specific control information addressable by the C-RNTI is received from the BS.
2,400
8,722
8,722
14,262,123
2,454
Embodiments of the present invention provide systems, methods, and computer storage media for facilitating user-centric identity management. In this regard, various aspects of identity management are designed to be more transparent to users to bolster user assurance with respect to “behind-the-scenes” procedures of identity management. Generally, indications of data flow between service providers, identity providers, and/or user devices can be provided to the user device for presentation to the user. As a result, visual representations of data flow, notifications of data flow, or the like, can be presented to the user to expose various aspects of identity management. In some embodiments, users may be able to control aspects of identity management, for example, by confirming or preventing data flow between providers.
1. One or more computer storage media storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising: prior to accessing one or more resources stored in association with an identity provider, providing an indication from a service provider to a user device that access to the one or more resources is to be provided to a service provider; and communicating with the identity provider to access the one or more resources. 2. The one or more computer storage media of claim 1, wherein the identity provider manages identity information for a plurality of users. 3. The one or more computer storage media of claim 1, wherein the service provider provides at least one service to the user device. 4. The one or more computer storage media of claim 1, wherein the identity provider and the service provider are associated with different organizations. 5. The one or more computer storage media of claim 1 further comprising providing to the user device a scope of the one or more resources that are to be accessed. 6. The one or more computer storage media of claim 1, wherein the one or more resources comprise user data associated with a user of the user device. 7. The one or more computer storage media of claim 1 further comprising using an access token to obtain access to the one or more resources. 8. The one or more computer storage media of claim 1 further comprising: obtaining the one or more resources; and providing an indication to the user device that the one or more resources have been received by the service provider. 9. The one or more computer storage media of claim 1, wherein the indication that access to the one or more resources is to be provided to the service provider enables a user to confirm the provision of the one or more resources from the identity provider to the service provider. 10. The one or more computer storage media of claim 1, wherein the indication that access to the one or more resources is to be provided to the service provider enables a user to prevent the provision of the one or more resources from the identity provider to the service provider. 11. A computerized method comprising: in accordance with a first communication between a service provider that provides a service to a user device and a third-party identity provider that authorizes access to resources associated with a user of the user device, providing an indication of the first communication to the user device to expose the first communication between the service provider and the third-party identity provider to the user of the user device; and in accordance with a second communication between the service provider and the third-party identity provider, providing an indication of the second communication to the user device to expose the second communication between the service provider and the third-party identity provider to the user of the user device, wherein the first communication and the second communication between the service provider and the third-party identity provider facilitate access to one or more resources stored in association with the third-party identity provider being provided to the service provider. 12. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises a request for an access token. 13. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises provision of an access token. 14. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises a request for access to the one or more resources. 15. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises communication of the one or more resources. 16. The method of claim 11, wherein the indication of the first communication and the indication of the second communication are provided by the service provider to the user device. 17. A system comprising: one or more processors; and one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to: communicate data to a user device for use in rendering a visual representation of at least a portion of a data flow between the user device, a service provider, and an identity provider, wherein the service provider provides a service to the user device and the identity provider authenticates a user of the user device and authorizes the service provider to access resources stored in association with the identity provider; and communicate to the user device an indication of a set of one or more resources provided to or to be provided to the service provider from the identity provider in accordance with the identity provider authorizing access to the service provider. 18. The system of claim 17, wherein the visual representation includes at least a representation of the user device, the service provider, and the identity provider. 19. The system of claim 17, wherein the indication of the set of the one or more resources comprises images, videos, media, social network posts, user profile data, or a combination thereof. 20. The system of claim 17 further comprising access a data store that includes a mapping of the identity provider to a resource scope to identify the set of the one or more resources provided to or to be provided to the service provider from the identity provider.
Embodiments of the present invention provide systems, methods, and computer storage media for facilitating user-centric identity management. In this regard, various aspects of identity management are designed to be more transparent to users to bolster user assurance with respect to “behind-the-scenes” procedures of identity management. Generally, indications of data flow between service providers, identity providers, and/or user devices can be provided to the user device for presentation to the user. As a result, visual representations of data flow, notifications of data flow, or the like, can be presented to the user to expose various aspects of identity management. In some embodiments, users may be able to control aspects of identity management, for example, by confirming or preventing data flow between providers.1. One or more computer storage media storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising: prior to accessing one or more resources stored in association with an identity provider, providing an indication from a service provider to a user device that access to the one or more resources is to be provided to a service provider; and communicating with the identity provider to access the one or more resources. 2. The one or more computer storage media of claim 1, wherein the identity provider manages identity information for a plurality of users. 3. The one or more computer storage media of claim 1, wherein the service provider provides at least one service to the user device. 4. The one or more computer storage media of claim 1, wherein the identity provider and the service provider are associated with different organizations. 5. The one or more computer storage media of claim 1 further comprising providing to the user device a scope of the one or more resources that are to be accessed. 6. The one or more computer storage media of claim 1, wherein the one or more resources comprise user data associated with a user of the user device. 7. The one or more computer storage media of claim 1 further comprising using an access token to obtain access to the one or more resources. 8. The one or more computer storage media of claim 1 further comprising: obtaining the one or more resources; and providing an indication to the user device that the one or more resources have been received by the service provider. 9. The one or more computer storage media of claim 1, wherein the indication that access to the one or more resources is to be provided to the service provider enables a user to confirm the provision of the one or more resources from the identity provider to the service provider. 10. The one or more computer storage media of claim 1, wherein the indication that access to the one or more resources is to be provided to the service provider enables a user to prevent the provision of the one or more resources from the identity provider to the service provider. 11. A computerized method comprising: in accordance with a first communication between a service provider that provides a service to a user device and a third-party identity provider that authorizes access to resources associated with a user of the user device, providing an indication of the first communication to the user device to expose the first communication between the service provider and the third-party identity provider to the user of the user device; and in accordance with a second communication between the service provider and the third-party identity provider, providing an indication of the second communication to the user device to expose the second communication between the service provider and the third-party identity provider to the user of the user device, wherein the first communication and the second communication between the service provider and the third-party identity provider facilitate access to one or more resources stored in association with the third-party identity provider being provided to the service provider. 12. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises a request for an access token. 13. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises provision of an access token. 14. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises a request for access to the one or more resources. 15. The method of claim 11, wherein one of the first communication or the second communication between the service provider and the third-party identity provider comprises communication of the one or more resources. 16. The method of claim 11, wherein the indication of the first communication and the indication of the second communication are provided by the service provider to the user device. 17. A system comprising: one or more processors; and one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to: communicate data to a user device for use in rendering a visual representation of at least a portion of a data flow between the user device, a service provider, and an identity provider, wherein the service provider provides a service to the user device and the identity provider authenticates a user of the user device and authorizes the service provider to access resources stored in association with the identity provider; and communicate to the user device an indication of a set of one or more resources provided to or to be provided to the service provider from the identity provider in accordance with the identity provider authorizing access to the service provider. 18. The system of claim 17, wherein the visual representation includes at least a representation of the user device, the service provider, and the identity provider. 19. The system of claim 17, wherein the indication of the set of the one or more resources comprises images, videos, media, social network posts, user profile data, or a combination thereof. 20. The system of claim 17 further comprising access a data store that includes a mapping of the identity provider to a resource scope to identify the set of the one or more resources provided to or to be provided to the service provider from the identity provider.
2,400
8,723
8,723
15,465,014
2,413
A system includes a processor configured to send data, for transmission to a remote computer, to a local wireless device in communication with a vehicle computer including the processor, the sending responsive to a determination that a remote cellular connection cannot be established via a vehicle modem, and the data including an instruction for the device to transmit the data to the remote computer.
1. A system comprising: a processor configured to: send data, for transmission to a remote computer, to a local wireless device in communication with a vehicle computer including the processor, the sending responsive to a determination that a remote cellular connection cannot be established via a vehicle modem, and the data including an instruction for the device to transmit the data to the remote computer. 2. The system of claim 1, wherein the processor is configured to send an instruction to the device to delete the data, responsive to a successful transmission of the data by a cellular modem in communication with the process. 3. The system of claim 1, wherein the processor is configured to send an instruction to the device to delete the data, responsive to a successful transmission of the data by the vehicle computer using a local Wi-Fi connection. 4. The system of claim 3, wherein the processor is configured to query the remote computer to determine if the data was already transmitted by the wireless device, responsive to having sent the data to the local wireless device and in advance of transmitting the data via the vehicle modem upon re-establishment of the remote cellular connection. 5. The system of claim 4, wherein the query includes a request for an identifier associated with a data set most-recently received by the remote computer with regards to a specific vehicle identifier. 6. The system of claim 5, wherein the determination that the data was already transmitted is based on comparison of the identifier received responsive to the query with an identifier stored by the processor with respect to the data. 7. The system of claim 1, wherein the data is also sent responsive to detection of a condition pre-designated as a reporting event. 8. The system of claim 7, wherein the reporting event includes a vehicle shut-down. 9. The system of claim 7, wherein the reporting event includes a fuel level falling below a predetermined level. 10. The system of claim 7, wherein the reporting event includes detection of a condition pre-designated as a maintenance condition. 11. A system comprising: a processor configured to: search for both a local user wireless device and a local Wi-Fi connection, responsive to a determination that a cellular connection is unavailable for use in transmitting a data request to a remote server; send the data request to the local wireless device, responsive to a determination that the local Wi-Fi connection is unavailable; attempt to use a first available of the cellular connection and the local Wi-Fi connection, to send the data request; and instruct the local wireless device to delete the data request, responsive to successfully sending the data request via the cellular or local Wi-Fi connection. 12. The system of claim 11, wherein the local wireless device is an occupant wireless device. 13. The system of claim 11, wherein the local wireless device is a device passing by a vehicle including the processor, previously unpaired with a vehicle computer. 14. The system of claim 11, wherein the processor is configured to use only local Wi-Fi connections meeting predetermined specifications to send the data request. 15. The system of claim 14, wherein the specification includes a requirement for a secure connection. 16. The system of claim 14, wherein the processor is configured to encrypt the data request before sending the request to the remote server through the local Wi-Fi connection. 17. The system of claim 11, wherein the processor is configured to query the remote server to determine if the data was already transmitted by the wireless device, responsive to having sent the data to the local wireless device and in advance of transmitting the data via the first available of the cellular connection and the local Wi-Fi connection. 18. The system of claim 17, wherein the query includes a request for an identifier associated with a data set most-recently received by the remote server with regards to a specific vehicle identifier. 19. The system of claim 18, wherein the determination that the data was already transmitted is based on comparison of the identifier received responsive to the query with an identifier stored by the processor with respect to the data. 20. A computer-implemented method comprising: packaging vehicle data for remote wireless transmission, responsive to a determination that a predefined vehicle-reporting condition is met; sending the data to a locally, wirelessly connected mobile device, responsive to a determination that a cellular signal, received by a vehicle modem, is below a predefined threshold level when transmission of the vehicle data is attempted by the modem; and instructing the mobile device to transmit the data to a remote computing system.
A system includes a processor configured to send data, for transmission to a remote computer, to a local wireless device in communication with a vehicle computer including the processor, the sending responsive to a determination that a remote cellular connection cannot be established via a vehicle modem, and the data including an instruction for the device to transmit the data to the remote computer.1. A system comprising: a processor configured to: send data, for transmission to a remote computer, to a local wireless device in communication with a vehicle computer including the processor, the sending responsive to a determination that a remote cellular connection cannot be established via a vehicle modem, and the data including an instruction for the device to transmit the data to the remote computer. 2. The system of claim 1, wherein the processor is configured to send an instruction to the device to delete the data, responsive to a successful transmission of the data by a cellular modem in communication with the process. 3. The system of claim 1, wherein the processor is configured to send an instruction to the device to delete the data, responsive to a successful transmission of the data by the vehicle computer using a local Wi-Fi connection. 4. The system of claim 3, wherein the processor is configured to query the remote computer to determine if the data was already transmitted by the wireless device, responsive to having sent the data to the local wireless device and in advance of transmitting the data via the vehicle modem upon re-establishment of the remote cellular connection. 5. The system of claim 4, wherein the query includes a request for an identifier associated with a data set most-recently received by the remote computer with regards to a specific vehicle identifier. 6. The system of claim 5, wherein the determination that the data was already transmitted is based on comparison of the identifier received responsive to the query with an identifier stored by the processor with respect to the data. 7. The system of claim 1, wherein the data is also sent responsive to detection of a condition pre-designated as a reporting event. 8. The system of claim 7, wherein the reporting event includes a vehicle shut-down. 9. The system of claim 7, wherein the reporting event includes a fuel level falling below a predetermined level. 10. The system of claim 7, wherein the reporting event includes detection of a condition pre-designated as a maintenance condition. 11. A system comprising: a processor configured to: search for both a local user wireless device and a local Wi-Fi connection, responsive to a determination that a cellular connection is unavailable for use in transmitting a data request to a remote server; send the data request to the local wireless device, responsive to a determination that the local Wi-Fi connection is unavailable; attempt to use a first available of the cellular connection and the local Wi-Fi connection, to send the data request; and instruct the local wireless device to delete the data request, responsive to successfully sending the data request via the cellular or local Wi-Fi connection. 12. The system of claim 11, wherein the local wireless device is an occupant wireless device. 13. The system of claim 11, wherein the local wireless device is a device passing by a vehicle including the processor, previously unpaired with a vehicle computer. 14. The system of claim 11, wherein the processor is configured to use only local Wi-Fi connections meeting predetermined specifications to send the data request. 15. The system of claim 14, wherein the specification includes a requirement for a secure connection. 16. The system of claim 14, wherein the processor is configured to encrypt the data request before sending the request to the remote server through the local Wi-Fi connection. 17. The system of claim 11, wherein the processor is configured to query the remote server to determine if the data was already transmitted by the wireless device, responsive to having sent the data to the local wireless device and in advance of transmitting the data via the first available of the cellular connection and the local Wi-Fi connection. 18. The system of claim 17, wherein the query includes a request for an identifier associated with a data set most-recently received by the remote server with regards to a specific vehicle identifier. 19. The system of claim 18, wherein the determination that the data was already transmitted is based on comparison of the identifier received responsive to the query with an identifier stored by the processor with respect to the data. 20. A computer-implemented method comprising: packaging vehicle data for remote wireless transmission, responsive to a determination that a predefined vehicle-reporting condition is met; sending the data to a locally, wirelessly connected mobile device, responsive to a determination that a cellular signal, received by a vehicle modem, is below a predefined threshold level when transmission of the vehicle data is attempted by the modem; and instructing the mobile device to transmit the data to a remote computing system.
2,400
8,724
8,724
15,142,545
2,487
A computerized method and system of validating a check at presentment for payment includes executing imaging software and decoding software stored in a computer memory housed in a computer, generating pixel data from the encoded indicia on the instrument, digitizing the pixel data to generate digital pixel data, storing the digital pixel data in the memory, generating a data set by decoding the digital pixel data, and transmitting the data set to a server over a network, wherein the server is configured to execute validation software to determine if the negotiable instrument has been previously presented for payment. The computer then receives a validation indicator back from said server to display on the computer.
1. A system for determining if a negotiable instrument bearing an encoded indicia has been previously presented for payment, the system comprising: a computer comprising: memory; a processor executing imaging software and decoding software stored in said memory; a camera comprising an image reader assembly configured to generate pixel data from the encoded indicia on the instrument, wherein the imaging software processes said pixel data to generate digital pixel data and stores the digital pixel data in said memory, wherein said processor executes said decoding software by receiving said digital pixel data from said memory and generates a data set from the encoded indicia; a transceiver in bi-directional communication with a server on a network, said server comprising a database and validation software, said transceiver transmitting said data set to said server over the network; wherein said server is configured to execute said validation software to determine if the negotiable instrument has been previously presented for payment. 2. A system according to claim 1, wherein said computer further comprises a display and said server transmits a validation indicator over the network to the computer for outputting on the display. 3. A system according to claim 2, wherein said validation indicator comprises data indicating if the negotiable instrument has been previously presented for payment. 4. A system according to claim 1, wherein said encoded indicia is a QR code and said data set transmitted to the server comprises at least a portion of information within the indicia. 5. A system according to claim 4, wherein said data set comprises an identification number corresponding to said negotiable instrument and the amount payable by said negotiable instrument. 6. A system according to claim 4, wherein said encoded indicia comprises payor information in addition to said data set transmitted to said server. 7. A system according to claim 6, wherein the system transmits a debit command to a payor issuing the negotiable instrument upon a determination that the negotiable instrument has not be presented for payment previously. 8. A system according to claim 7, wherein said imaging software generating said digital pixel data stores said digital pixel data in addressed frames of data, and said data set comprises at least an addressed subset of said frames of data. 9. A system according to claim 1, wherein said computer is a mobile computer or a smart device. 10. A computer program product for confirming that a negotiable instrument is valid for payment, the computer program product comprising: a set of computer instructions stored on non-transitory computer readable media housed in a computer, said instructions configured to be executed by a processor to implement a decoding process in regard to an image of an encoded indicia on the negotiable instrument, wherein said computer instructions comprise: an imaging module that (i) activates a camera in the computer to capture an image of the encoded indicia, (ii) generates a set of digital pixel data corresponding to said encoded indicia, and (iii) stores said digital pixel data in addressed memory locations in the computer; a decoding module that processes at least a portion of the digital pixel data to generate a data set corresponding to a respective portion of digital pixel data stored in memory; and a transmission module configured to execute a data transmission via a network in communication with said computer, the data transmission sending said data set to a remote server that validates the negotiable instrument for payment; a second set of computer instructions stored on said non-transitory computer readable media and executable by said processor to (i) receive via said network a validation indicator from said remote server and (ii) display said validation indicator on said computer. 11. A computer program product according to claim 10, further configured to establish a field of view for the camera in the computer. 12. A computer program product according to claim 10, wherein said imaging module is configured to process either one dimensional or two dimensional encoded indicia. 13. A computer program product according to claim 10, wherein said encoded indicia comprises banking information, negotiable instrument identifiers, and/or amounts payable by the negotiable instrument. 14. A computer program product according to claim 10, wherein said negotiable instrument is a check. 15. A computerized method of validating a check at presentment, the method comprising: executing imaging software and decoding software stored in a computer memory housed in a computer; generating pixel data from the encoded indicia on the instrument, digitizing said pixel data to generate digital pixel data storing the digital pixel data in said memory, generating a data set by decoding said digital pixel data; transmitting said data set to a server over a network, wherein the server is configured to execute validation software to determine if the negotiable instrument has been previously presented for payment; receiving a validation indicator back from said server to display on the computer. 16. A computerized method according to claim 15, wherein said server populates a database of negotiable instruments upon a first presentation for payment. 17. A computerized method according to claim 16, wherein said server searches the database for previous instances of presentation for payment and transmits said validation indicator back to the computer via the network. 18. A computerized method according to claim 15, further comprising, prior to executing said imaging software and said decoding software, entering a type code for the negotiable instrument, said type codes corresponding to respective checks, money orders, and draft orders. 19. A computerized method according to claim 15, wherein generating said data set comprises extracting a subset of said digital pixel data for transmission to the server. 20. A computerized method according to claim 15, wherein said server is a local computer or a remote computer.
A computerized method and system of validating a check at presentment for payment includes executing imaging software and decoding software stored in a computer memory housed in a computer, generating pixel data from the encoded indicia on the instrument, digitizing the pixel data to generate digital pixel data, storing the digital pixel data in the memory, generating a data set by decoding the digital pixel data, and transmitting the data set to a server over a network, wherein the server is configured to execute validation software to determine if the negotiable instrument has been previously presented for payment. The computer then receives a validation indicator back from said server to display on the computer.1. A system for determining if a negotiable instrument bearing an encoded indicia has been previously presented for payment, the system comprising: a computer comprising: memory; a processor executing imaging software and decoding software stored in said memory; a camera comprising an image reader assembly configured to generate pixel data from the encoded indicia on the instrument, wherein the imaging software processes said pixel data to generate digital pixel data and stores the digital pixel data in said memory, wherein said processor executes said decoding software by receiving said digital pixel data from said memory and generates a data set from the encoded indicia; a transceiver in bi-directional communication with a server on a network, said server comprising a database and validation software, said transceiver transmitting said data set to said server over the network; wherein said server is configured to execute said validation software to determine if the negotiable instrument has been previously presented for payment. 2. A system according to claim 1, wherein said computer further comprises a display and said server transmits a validation indicator over the network to the computer for outputting on the display. 3. A system according to claim 2, wherein said validation indicator comprises data indicating if the negotiable instrument has been previously presented for payment. 4. A system according to claim 1, wherein said encoded indicia is a QR code and said data set transmitted to the server comprises at least a portion of information within the indicia. 5. A system according to claim 4, wherein said data set comprises an identification number corresponding to said negotiable instrument and the amount payable by said negotiable instrument. 6. A system according to claim 4, wherein said encoded indicia comprises payor information in addition to said data set transmitted to said server. 7. A system according to claim 6, wherein the system transmits a debit command to a payor issuing the negotiable instrument upon a determination that the negotiable instrument has not be presented for payment previously. 8. A system according to claim 7, wherein said imaging software generating said digital pixel data stores said digital pixel data in addressed frames of data, and said data set comprises at least an addressed subset of said frames of data. 9. A system according to claim 1, wherein said computer is a mobile computer or a smart device. 10. A computer program product for confirming that a negotiable instrument is valid for payment, the computer program product comprising: a set of computer instructions stored on non-transitory computer readable media housed in a computer, said instructions configured to be executed by a processor to implement a decoding process in regard to an image of an encoded indicia on the negotiable instrument, wherein said computer instructions comprise: an imaging module that (i) activates a camera in the computer to capture an image of the encoded indicia, (ii) generates a set of digital pixel data corresponding to said encoded indicia, and (iii) stores said digital pixel data in addressed memory locations in the computer; a decoding module that processes at least a portion of the digital pixel data to generate a data set corresponding to a respective portion of digital pixel data stored in memory; and a transmission module configured to execute a data transmission via a network in communication with said computer, the data transmission sending said data set to a remote server that validates the negotiable instrument for payment; a second set of computer instructions stored on said non-transitory computer readable media and executable by said processor to (i) receive via said network a validation indicator from said remote server and (ii) display said validation indicator on said computer. 11. A computer program product according to claim 10, further configured to establish a field of view for the camera in the computer. 12. A computer program product according to claim 10, wherein said imaging module is configured to process either one dimensional or two dimensional encoded indicia. 13. A computer program product according to claim 10, wherein said encoded indicia comprises banking information, negotiable instrument identifiers, and/or amounts payable by the negotiable instrument. 14. A computer program product according to claim 10, wherein said negotiable instrument is a check. 15. A computerized method of validating a check at presentment, the method comprising: executing imaging software and decoding software stored in a computer memory housed in a computer; generating pixel data from the encoded indicia on the instrument, digitizing said pixel data to generate digital pixel data storing the digital pixel data in said memory, generating a data set by decoding said digital pixel data; transmitting said data set to a server over a network, wherein the server is configured to execute validation software to determine if the negotiable instrument has been previously presented for payment; receiving a validation indicator back from said server to display on the computer. 16. A computerized method according to claim 15, wherein said server populates a database of negotiable instruments upon a first presentation for payment. 17. A computerized method according to claim 16, wherein said server searches the database for previous instances of presentation for payment and transmits said validation indicator back to the computer via the network. 18. A computerized method according to claim 15, further comprising, prior to executing said imaging software and said decoding software, entering a type code for the negotiable instrument, said type codes corresponding to respective checks, money orders, and draft orders. 19. A computerized method according to claim 15, wherein generating said data set comprises extracting a subset of said digital pixel data for transmission to the server. 20. A computerized method according to claim 15, wherein said server is a local computer or a remote computer.
2,400
8,725
8,725
15,373,427
2,413
Certain aspects relate to methods and apparatus for a flexible transmission unit and acknowledgement feedback timeline for low-latency communication. As described herein, a UE may receive, within a subframe a first portion of a downlink control region scheduling at least a first data unit, wherein the subframe comprises at least two TTIs and wherein the subframe comprises the downlink control region, a data region, and an uplink control region, receive the first data unit in a first TTI of the data region, receive a second data unit in a second TTI of the data region, and separately acknowledge receipt of the first and second data units. According to aspects, the acknowledgment for the first data unit may occur in the same subframe as the transmission of the first data unit. A BS may perform corresponding operations.
1. A method for wireless communication, comprising: receiving, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; receiving the first data unit in a first TTI of the data region; receiving a second data unit in a second TTI of the data region; and separately acknowledging receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 2. The method of claim 1, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 3. The method of claim 1, wherein the first control portion schedules the second data unit. 4. The method of claim 1, further comprising: receiving, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 5. The method of claim 1, wherein the separately acknowledging comprises: transmitting acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 6. The method of claim 1, further comprising: dynamically receiving, in the first control region, an indication of a second control region of the downlink control region. 7. The method of claim 6, wherein the second control region schedules the second data unit. 8. A method for wireless communication, comprising: transmitting, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; transmitting the first data unit in a first TTI of the data region; transmitting a second data unit in a second TTI of the data region; and receiving separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 9. The method of claim 8, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 10. The method of claim 8, wherein the first control portion schedules the second data unit. 11. The method of claim 8, further comprising: transmitting, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 12. The method of claim 8, wherein receiving the separate acknowledgements comprises: receiving acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 13. The method of claim 8, further comprising: dynamically transmitting, in the first control region, an indication of a second control region of the downlink control region. 14. The method of claim 13, wherein the second control region schedules the second data unit. 15. An apparatus for wireless communication, comprising: means for receiving, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; means for receiving the first data unit in a first TTI of the data region; means for receiving a second data unit in a second TTI of the data region; and means for separately acknowledging receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 16. The apparatus of claim 15, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 17. The apparatus of claim 15, wherein the first control portion schedules the second data unit. 18. The apparatus of claim 15, further comprising: means for receiving, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 19. The apparatus of claim 15, wherein the means for separately acknowledging comprises: means for transmitting acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 20. The apparatus of claim 15, further comprising: means for dynamically receiving, in the first control region, an indication of a second control region of the downlink control region. 21. The apparatus of claim 20, wherein the second control region schedules the second data unit. 22. An apparatus for wireless communication, comprising: means for transmitting, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; means for transmitting the first data unit in a first TTI of the data region; means for transmitting a second data unit in a second TTI of the data region; and means for receiving separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 23. The apparatus of claim 22, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 24. The apparatus of claim 22, wherein the first control portion schedules the second data unit. 25. The apparatus of claim 22, further comprising: means for transmitting, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 26. The apparatus of claim 22, wherein the means for receiving the separate acknowledgements comprises: means for receiving acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 27. The apparatus of claim 22, further comprising: means for dynamically transmitting, in the first control region, an indication of a second control region of the downlink control region. 28. The apparatus of claim 27, wherein the second control region schedules the second data unit. 29. An apparatus for wireless communication, comprising a processor and a memory coupled to the at least one processor, wherein the at least one processor is configured to: receive, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; receive the first data unit in a first TTI of the data region; receive a second data unit in a second TTI of the data region; and separately acknowledge receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 30. An apparatus for wireless communication, comprising a processor and a memory coupled to the at least one processor, wherein the at least one processor is configured to: transmit, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; transmit the first data unit in a first TTI of the data region; transmit a second data unit in a second TTI of the data region; and receive separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 31. A computer readable medium for wireless communication having computer-executable instructions stored thereon for: receiving, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; receiving the first data unit in a first TTI of the data region; receiving a second data unit in a second TTI of the data region; and separately acknowledging receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 32. A computer readable medium for wireless communication having computer-executable instructions stored thereon for: transmitting, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; transmitting the first data unit in a first TTI of the data region; transmitting a second data unit in a second TTI of the data region; and receiving separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region.
Certain aspects relate to methods and apparatus for a flexible transmission unit and acknowledgement feedback timeline for low-latency communication. As described herein, a UE may receive, within a subframe a first portion of a downlink control region scheduling at least a first data unit, wherein the subframe comprises at least two TTIs and wherein the subframe comprises the downlink control region, a data region, and an uplink control region, receive the first data unit in a first TTI of the data region, receive a second data unit in a second TTI of the data region, and separately acknowledge receipt of the first and second data units. According to aspects, the acknowledgment for the first data unit may occur in the same subframe as the transmission of the first data unit. A BS may perform corresponding operations.1. A method for wireless communication, comprising: receiving, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; receiving the first data unit in a first TTI of the data region; receiving a second data unit in a second TTI of the data region; and separately acknowledging receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 2. The method of claim 1, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 3. The method of claim 1, wherein the first control portion schedules the second data unit. 4. The method of claim 1, further comprising: receiving, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 5. The method of claim 1, wherein the separately acknowledging comprises: transmitting acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 6. The method of claim 1, further comprising: dynamically receiving, in the first control region, an indication of a second control region of the downlink control region. 7. The method of claim 6, wherein the second control region schedules the second data unit. 8. A method for wireless communication, comprising: transmitting, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; transmitting the first data unit in a first TTI of the data region; transmitting a second data unit in a second TTI of the data region; and receiving separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 9. The method of claim 8, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 10. The method of claim 8, wherein the first control portion schedules the second data unit. 11. The method of claim 8, further comprising: transmitting, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 12. The method of claim 8, wherein receiving the separate acknowledgements comprises: receiving acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 13. The method of claim 8, further comprising: dynamically transmitting, in the first control region, an indication of a second control region of the downlink control region. 14. The method of claim 13, wherein the second control region schedules the second data unit. 15. An apparatus for wireless communication, comprising: means for receiving, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; means for receiving the first data unit in a first TTI of the data region; means for receiving a second data unit in a second TTI of the data region; and means for separately acknowledging receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 16. The apparatus of claim 15, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 17. The apparatus of claim 15, wherein the first control portion schedules the second data unit. 18. The apparatus of claim 15, further comprising: means for receiving, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 19. The apparatus of claim 15, wherein the means for separately acknowledging comprises: means for transmitting acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 20. The apparatus of claim 15, further comprising: means for dynamically receiving, in the first control region, an indication of a second control region of the downlink control region. 21. The apparatus of claim 20, wherein the second control region schedules the second data unit. 22. An apparatus for wireless communication, comprising: means for transmitting, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; means for transmitting the first data unit in a first TTI of the data region; means for transmitting a second data unit in a second TTI of the data region; and means for receiving separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 23. The apparatus of claim 22, wherein the first and second data units in the subframe correspond to a first and second hybrid automatic repeat request (HARQ) process, respectively. 24. The apparatus of claim 22, wherein the first control portion schedules the second data unit. 25. The apparatus of claim 22, further comprising: means for transmitting, within the subframe, a second control portion of the downlink control region scheduling the second data unit. 26. The apparatus of claim 22, wherein the means for receiving the separate acknowledgements comprises: means for receiving acknowledgments/negative acknowledgments (ACKs/NACKs) for the first and second data units in different subframes. 27. The apparatus of claim 22, further comprising: means for dynamically transmitting, in the first control region, an indication of a second control region of the downlink control region. 28. The apparatus of claim 27, wherein the second control region schedules the second data unit. 29. An apparatus for wireless communication, comprising a processor and a memory coupled to the at least one processor, wherein the at least one processor is configured to: receive, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; receive the first data unit in a first TTI of the data region; receive a second data unit in a second TTI of the data region; and separately acknowledge receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 30. An apparatus for wireless communication, comprising a processor and a memory coupled to the at least one processor, wherein the at least one processor is configured to: transmit, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; transmit the first data unit in a first TTI of the data region; transmit a second data unit in a second TTI of the data region; and receive separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 31. A computer readable medium for wireless communication having computer-executable instructions stored thereon for: receiving, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be received in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein each subframe comprises the downlink control region, a data region, and an uplink control region; receiving the first data unit in a first TTI of the data region; receiving a second data unit in a second TTI of the data region; and separately acknowledging receipt of the first and second data units, wherein the first data unit is acknowledged in the uplink control region. 32. A computer readable medium for wireless communication having computer-executable instructions stored thereon for: transmitting, within a subframe, a first portion of a downlink control region scheduling at least a first data unit to be transmitting in the subframe, wherein the subframe comprises at least two transmission time intervals (TTIs) and wherein the subframe comprises the downlink control region, a data region, and an uplink control region; transmitting the first data unit in a first TTI of the data region; transmitting a second data unit in a second TTI of the data region; and receiving separate acknowledgements for the first and second data units, wherein the first data unit is acknowledged in the uplink control region.
2,400
8,726
8,726
16,276,005
2,419
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are disclosed herein. In some embodiments, the payment terminal and the mobile device conduct a mutual authentication process that, if successful, produces a session key which can be used to encrypt sensitive data to be exchanged between the payment terminal and the mobile device. Payment and loyalty information can be securely communicated from the mobile device to the payment terminal using the session key. This can be done automatically, without waiting for the user to initiate a transaction, to shorten the overall transaction time. The transaction can also be completed without any user interaction with the mobile device, increasing the user's convenience since the mobile device can be left in the user's pocket, purse, vehicle, etc.
1-19. (canceled) 20. A fuel payment method, comprising: storing payment information in a memory of a fuel dispenser; executing a mutual authentication process for the fuel dispenser and a mobile device, and, in response to successful completion of the mutual authentication process, producing a session key; after producing the session key, receiving a request at the fuel dispenser to initiate a transaction for a user to purchase fuel; encrypting authorization information using the session key and transmitting the encrypted authorization information from the fuel dispenser to the mobile device; receiving, at the fuel dispenser from the mobile device, a validation result in response to the transmitted encrypted authorization information; in response to the received validation result being positive, executing the requested transaction using the stored payment information stored and then allowing fuel to be dispensed; and in response to the received validation result being negative, denying the requested transaction and not allowing fuel to be dispensed using the stored payment information. 21. The method of claim 20, wherein the request is either wirelessly received from the mobile device or is received via a user interface element attached to the fuel dispenser. 22. The method of claim 20, wherein unsuccessful completion of the mutual authentication process does not result in production of the session key and results in the fuel dispenser preventing the mobile device from conducting the transaction with the fuel dispenser. 23. A payment processing terminal, comprising: a wireless communication interface configured to detect presence of a mobile device within an effective wireless communication range of the wireless communication interface; and a processor configured to, in response to the wireless communication interface detecting the presence of the mobile device, cause: initiation of a mutual authentication process to authenticate the mobile device and the terminal with each other for secure communication therebetween, production of a session key in response to completion of the mutual authentication process in which the mobile device and the terminal are successfully mutually authenticated with each other for secure communication therebetween, and after the production of the session key, receive from the mobile device a request for a transaction and receive from the mobile device payment data for the transaction, the payment data being encrypted using the session key. 24. The terminal of claim 23, wherein the wireless communication interface and the processor are integrated with a dispenser configured to dispense a good to a user. 25. The terminal of claim 24, wherein the processor is further configured to, after the receipt of the payment data, cause the dispenser to dispense the good to a user associated with the mobile device. 26. The terminal of claim 24, wherein the processor is further configured to, in response to unsuccessful mutual authentication of the mobile device and the terminal with each other, prevent the dispenser from dispensing the good to a user associated with the mobile device. 27. The terminal of claim 24, wherein the good includes one of fuel, food, drink, and cash. 28. The terminal of claim 23, wherein the wireless communication interface configured to detect presence of the mobile device includes the wireless communication interface polling for presence of the mobile device and detecting the presence. 29. The terminal of claim 23, wherein the processor is configured to, in response to the wireless communication interface detecting the presence of the mobile device within the effective wireless communication range, initiate the mutual authentication process automatically without user input to the mobile device or to the terminal. 30. The terminal of claim 23, wherein the processor is further configured to, in response to the receipt of the request for the transaction, cause transmission of customer loyalty data to the mobile device using the wireless communication interface, the customer loyalty data being encrypted using the session key. 31. A mobile device, comprising: a wireless communication interface configured to detect presence of a payment terminal within an effective wireless communication range of the wireless communication interface; and a processor configured to, in response to the wireless communication interface detecting the presence of the terminal, cause: initiation of a mutual authentication process to authenticate the mobile device and the terminal with each other for secure communication therebetween, production of a session key in response to completion of the mutual authentication process in which the mobile device and the terminal are successfully mutually authenticated with each other for secure communication therebetween, and after the production of the session key, transmission to the terminal a request for a transaction and transmission to the terminal payment data for the transaction, the payment data being encrypted using the session key. 32. The mobile device of claim 31, wherein the wireless communication interface configured to detect presence of the terminal includes the wireless communication interface polling for presence of the terminal and detecting the presence. 33. The mobile device of claim 31, wherein the processor is configured to, in response to the wireless communication interface detecting the presence of the mobile device within the effective wireless communication range, initiate the mutual authentication process automatically without user input to the mobile device or to the terminal. 34. The mobile device of claim 31, wherein, in response to the transmission of the request for the transaction, the wireless communication interface is configured to receive customer loyalty data from the terminal, the customer loyalty data being encrypted using the session key. 35. The mobile device of claim 31, wherein the processor is further configured to, before the wireless communication interface detects the presence of the terminal, cause a prompt to be provided to a user to provide an input pre-authorizing the detecting. 36. The mobile device of claim 35, wherein the input includes at least one of user installation of an application on the mobile device, user loading of payment information onto the mobile device, and user loading of customer loyalty information onto the mobile device. 37. The mobile device of claim 31, wherein the terminal is integrated with a dispenser configured to dispense a good to a user. 38. The mobile device of claim 37, wherein the good includes one of fuel, food, drink, and cash. 39. The mobile device of claim 37, wherein the terminal is configured to, in response to receipt of the payment data, dispense the good to a user associated with the mobile device.
Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are disclosed herein. In some embodiments, the payment terminal and the mobile device conduct a mutual authentication process that, if successful, produces a session key which can be used to encrypt sensitive data to be exchanged between the payment terminal and the mobile device. Payment and loyalty information can be securely communicated from the mobile device to the payment terminal using the session key. This can be done automatically, without waiting for the user to initiate a transaction, to shorten the overall transaction time. The transaction can also be completed without any user interaction with the mobile device, increasing the user's convenience since the mobile device can be left in the user's pocket, purse, vehicle, etc.1-19. (canceled) 20. A fuel payment method, comprising: storing payment information in a memory of a fuel dispenser; executing a mutual authentication process for the fuel dispenser and a mobile device, and, in response to successful completion of the mutual authentication process, producing a session key; after producing the session key, receiving a request at the fuel dispenser to initiate a transaction for a user to purchase fuel; encrypting authorization information using the session key and transmitting the encrypted authorization information from the fuel dispenser to the mobile device; receiving, at the fuel dispenser from the mobile device, a validation result in response to the transmitted encrypted authorization information; in response to the received validation result being positive, executing the requested transaction using the stored payment information stored and then allowing fuel to be dispensed; and in response to the received validation result being negative, denying the requested transaction and not allowing fuel to be dispensed using the stored payment information. 21. The method of claim 20, wherein the request is either wirelessly received from the mobile device or is received via a user interface element attached to the fuel dispenser. 22. The method of claim 20, wherein unsuccessful completion of the mutual authentication process does not result in production of the session key and results in the fuel dispenser preventing the mobile device from conducting the transaction with the fuel dispenser. 23. A payment processing terminal, comprising: a wireless communication interface configured to detect presence of a mobile device within an effective wireless communication range of the wireless communication interface; and a processor configured to, in response to the wireless communication interface detecting the presence of the mobile device, cause: initiation of a mutual authentication process to authenticate the mobile device and the terminal with each other for secure communication therebetween, production of a session key in response to completion of the mutual authentication process in which the mobile device and the terminal are successfully mutually authenticated with each other for secure communication therebetween, and after the production of the session key, receive from the mobile device a request for a transaction and receive from the mobile device payment data for the transaction, the payment data being encrypted using the session key. 24. The terminal of claim 23, wherein the wireless communication interface and the processor are integrated with a dispenser configured to dispense a good to a user. 25. The terminal of claim 24, wherein the processor is further configured to, after the receipt of the payment data, cause the dispenser to dispense the good to a user associated with the mobile device. 26. The terminal of claim 24, wherein the processor is further configured to, in response to unsuccessful mutual authentication of the mobile device and the terminal with each other, prevent the dispenser from dispensing the good to a user associated with the mobile device. 27. The terminal of claim 24, wherein the good includes one of fuel, food, drink, and cash. 28. The terminal of claim 23, wherein the wireless communication interface configured to detect presence of the mobile device includes the wireless communication interface polling for presence of the mobile device and detecting the presence. 29. The terminal of claim 23, wherein the processor is configured to, in response to the wireless communication interface detecting the presence of the mobile device within the effective wireless communication range, initiate the mutual authentication process automatically without user input to the mobile device or to the terminal. 30. The terminal of claim 23, wherein the processor is further configured to, in response to the receipt of the request for the transaction, cause transmission of customer loyalty data to the mobile device using the wireless communication interface, the customer loyalty data being encrypted using the session key. 31. A mobile device, comprising: a wireless communication interface configured to detect presence of a payment terminal within an effective wireless communication range of the wireless communication interface; and a processor configured to, in response to the wireless communication interface detecting the presence of the terminal, cause: initiation of a mutual authentication process to authenticate the mobile device and the terminal with each other for secure communication therebetween, production of a session key in response to completion of the mutual authentication process in which the mobile device and the terminal are successfully mutually authenticated with each other for secure communication therebetween, and after the production of the session key, transmission to the terminal a request for a transaction and transmission to the terminal payment data for the transaction, the payment data being encrypted using the session key. 32. The mobile device of claim 31, wherein the wireless communication interface configured to detect presence of the terminal includes the wireless communication interface polling for presence of the terminal and detecting the presence. 33. The mobile device of claim 31, wherein the processor is configured to, in response to the wireless communication interface detecting the presence of the mobile device within the effective wireless communication range, initiate the mutual authentication process automatically without user input to the mobile device or to the terminal. 34. The mobile device of claim 31, wherein, in response to the transmission of the request for the transaction, the wireless communication interface is configured to receive customer loyalty data from the terminal, the customer loyalty data being encrypted using the session key. 35. The mobile device of claim 31, wherein the processor is further configured to, before the wireless communication interface detects the presence of the terminal, cause a prompt to be provided to a user to provide an input pre-authorizing the detecting. 36. The mobile device of claim 35, wherein the input includes at least one of user installation of an application on the mobile device, user loading of payment information onto the mobile device, and user loading of customer loyalty information onto the mobile device. 37. The mobile device of claim 31, wherein the terminal is integrated with a dispenser configured to dispense a good to a user. 38. The mobile device of claim 37, wherein the good includes one of fuel, food, drink, and cash. 39. The mobile device of claim 37, wherein the terminal is configured to, in response to receipt of the payment data, dispense the good to a user associated with the mobile device.
2,400
8,727
8,727
15,037,107
2,463
Methods and apparatus are disclosed for enabling a narrowband MTC device to operate in a legacy LTE system having a wider system bandwidth. The physical downlink control channel for a narrow-band MTC device, also referred to as low-complexity physical downlink control channel (LC-PDCCH), has reduced bandwidth resource and can support no more than 6 physical resource blocks. The present application discloses how to allocate physical resource blocks (PRBs) for LC-PDCCH and physical downlink shared channel (PDSCH). The PRB allocation methods disclosed herein allow the MTC devices to derive the frequency location of the PDSCH PRBs from the frequency location of the LC-PDCCH PRBs and to soft-combine LC-PDCCH transmissions and PDSCH transmissions for performance improvement.
1-24. (canceled) 25. A method, performed by a base station, for scheduling data transmission to a wireless device and for transmitting data to the wireless device, the method comprising: allocating a first physical resource block (PRB) group for a physical downlink control channel; signaling, to the wireless device, an indication of a frequency location of the first PRB group for the physical downlink control channel; transmitting the physical downlink control channel in the allocated first PRB group to the wireless device; and transmitting a physical downlink shared channel in a second PRB group that is allocated for the physical downlink shared channel to the wireless device. 26. The method of claim 25: wherein the indication indicates a set of PRB of groups; further comprising allocating in a deterministic way which PRB group out of the set is the first PRB group. 27. The method of claim 25, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 28. The method of claim 25, wherein signaling the indication comprises using radio resource control signaling. 29. The method of claim 25, wherein the transmitting the physical downlink control channel and the transmitting the physical downlink shared channel are separated by a guard period. 30. The method of claim 29, wherein the guard period is a subframe. 31. A method for receiving, by a wireless device, transmissions from a base station, the method comprising: receiving an indication of a frequency location of a first physical resource block (PRB) group from the base station; receiving a physical downlink control channel transmitted in the first PRB group from the base station; and receiving a physical downlink shared channel transmitted in a second PRB group from the base station. 32. The method of claim 31: wherein the indication indicates a set of PRB groups; further comprising selecting, by the wireless device in a deterministic way, which PRB group is the first PRB group. 33. The method of claim 31, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 34. The method of claim 31, wherein the receiving the indication comprises receiving the indication using radio resource control signaling. 35. The method of claim 31, wherein the receiving the physical downlink control channel and the receiving the physical downlink shared channel are separated by a guard period. 36. The method of claim 35, wherein the guard period is a subframe. 37. A base station for scheduling data transmission for a wireless device and transmitting data to the wireless device, the base station comprising: processing circuitry configured to allocate a first physical resource block (PRB) group for a physical downlink control channel; a transceiver configured to: signal an indication of a frequency location of the first PRB group for the physical downlink control channel to the wireless device; transmit the physical downlink control channel in the allocated first PRB group to the wireless device; and transmit a physical downlink shared channel in a second PRB group that is allocated for the physical downlink shared channel to the wireless device. 38. The base station of claim 37: wherein the indication indicates a set of PRB of groups; and wherein the processing circuitry is configured to allocate in a deterministic way which PRB group out of the set is the first PRB group. 39. The base station of claim 37, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 40. The base station of claim 37, wherein the transceiver is configured to signal the indication using radio resource control signaling. 41. The base station of claim 37, wherein the transceiver is configured to separate the transmitting the physical downlink control channel and transmitting the physical downlink shared channel by a guard period. 42. The base station of claim 41, wherein the guard period is a subframe. 43. A wireless device for receiving transmissions from a base station, comprising: a transceiver configured to: receive an indication of a frequency location of a first physical resource block (PRB) from the base station; receive a physical downlink control channel transmitted in the first PRB group from the base station; and receive a physical downlink shared channel transmitted in a second PRB group from the base station. 44. The wireless device of claim 43: wherein the indication indicates a set of PRB groups; and wherein the wireless device further comprises processing circuitry configured to select in a deterministic way which PRB group is the first PRB group. 45. The wireless device of claim 43, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 46. The wireless device of claim 43, wherein the transceiver is configured to receive the indication using radio resource control signaling. 47. The wireless device of claim 43, wherein the reception of the physical downlink control channel and the reception of the physical downlink shared channel are separated by a guard period. 48. The wireless device of claim 47, wherein the guard period is a subframe.
Methods and apparatus are disclosed for enabling a narrowband MTC device to operate in a legacy LTE system having a wider system bandwidth. The physical downlink control channel for a narrow-band MTC device, also referred to as low-complexity physical downlink control channel (LC-PDCCH), has reduced bandwidth resource and can support no more than 6 physical resource blocks. The present application discloses how to allocate physical resource blocks (PRBs) for LC-PDCCH and physical downlink shared channel (PDSCH). The PRB allocation methods disclosed herein allow the MTC devices to derive the frequency location of the PDSCH PRBs from the frequency location of the LC-PDCCH PRBs and to soft-combine LC-PDCCH transmissions and PDSCH transmissions for performance improvement.1-24. (canceled) 25. A method, performed by a base station, for scheduling data transmission to a wireless device and for transmitting data to the wireless device, the method comprising: allocating a first physical resource block (PRB) group for a physical downlink control channel; signaling, to the wireless device, an indication of a frequency location of the first PRB group for the physical downlink control channel; transmitting the physical downlink control channel in the allocated first PRB group to the wireless device; and transmitting a physical downlink shared channel in a second PRB group that is allocated for the physical downlink shared channel to the wireless device. 26. The method of claim 25: wherein the indication indicates a set of PRB of groups; further comprising allocating in a deterministic way which PRB group out of the set is the first PRB group. 27. The method of claim 25, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 28. The method of claim 25, wherein signaling the indication comprises using radio resource control signaling. 29. The method of claim 25, wherein the transmitting the physical downlink control channel and the transmitting the physical downlink shared channel are separated by a guard period. 30. The method of claim 29, wherein the guard period is a subframe. 31. A method for receiving, by a wireless device, transmissions from a base station, the method comprising: receiving an indication of a frequency location of a first physical resource block (PRB) group from the base station; receiving a physical downlink control channel transmitted in the first PRB group from the base station; and receiving a physical downlink shared channel transmitted in a second PRB group from the base station. 32. The method of claim 31: wherein the indication indicates a set of PRB groups; further comprising selecting, by the wireless device in a deterministic way, which PRB group is the first PRB group. 33. The method of claim 31, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 34. The method of claim 31, wherein the receiving the indication comprises receiving the indication using radio resource control signaling. 35. The method of claim 31, wherein the receiving the physical downlink control channel and the receiving the physical downlink shared channel are separated by a guard period. 36. The method of claim 35, wherein the guard period is a subframe. 37. A base station for scheduling data transmission for a wireless device and transmitting data to the wireless device, the base station comprising: processing circuitry configured to allocate a first physical resource block (PRB) group for a physical downlink control channel; a transceiver configured to: signal an indication of a frequency location of the first PRB group for the physical downlink control channel to the wireless device; transmit the physical downlink control channel in the allocated first PRB group to the wireless device; and transmit a physical downlink shared channel in a second PRB group that is allocated for the physical downlink shared channel to the wireless device. 38. The base station of claim 37: wherein the indication indicates a set of PRB of groups; and wherein the processing circuitry is configured to allocate in a deterministic way which PRB group out of the set is the first PRB group. 39. The base station of claim 37, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 40. The base station of claim 37, wherein the transceiver is configured to signal the indication using radio resource control signaling. 41. The base station of claim 37, wherein the transceiver is configured to separate the transmitting the physical downlink control channel and transmitting the physical downlink shared channel by a guard period. 42. The base station of claim 41, wherein the guard period is a subframe. 43. A wireless device for receiving transmissions from a base station, comprising: a transceiver configured to: receive an indication of a frequency location of a first physical resource block (PRB) from the base station; receive a physical downlink control channel transmitted in the first PRB group from the base station; and receive a physical downlink shared channel transmitted in a second PRB group from the base station. 44. The wireless device of claim 43: wherein the indication indicates a set of PRB groups; and wherein the wireless device further comprises processing circuitry configured to select in a deterministic way which PRB group is the first PRB group. 45. The wireless device of claim 43, wherein the frequency location of the first PRB group indicates the frequency location of the second PRB group. 46. The wireless device of claim 43, wherein the transceiver is configured to receive the indication using radio resource control signaling. 47. The wireless device of claim 43, wherein the reception of the physical downlink control channel and the reception of the physical downlink shared channel are separated by a guard period. 48. The wireless device of claim 47, wherein the guard period is a subframe.
2,400
8,728
8,728
15,380,321
2,423
A system and method for playing back video feeds includes determining from the video feeds a subset of currently available video feeds, determining a playback layout based on the number of currently available video feeds and playing back the subset of currently available video feeds within the playback layout. The system and method further includes determining at least one change in availability in a given video feed of the plurality of video feeds, updating the subset of currently available video feeds based on the at least one change, updating the playback layout based on the updated subset of currently available video feeds and playing back the updated subset of currently available video feeds within the updated playback layout.
1. A computer-implemented method for playing back a plurality of video feeds, the method comprising: determining from the plurality of video feeds a subset of currently available video feeds; determining a playback layout based on the number of currently available video feeds; playing back the subset of currently available video feeds within the playback layout; determining at least one change in availability in a given video feed of the plurality of video feeds; updating the subset of currently available video feeds based on the at least one change; updating the playback layout based on the updated subset of currently available video feeds; and playing back the updated subset of currently available video feeds within the updated playback layout. 2. The method of claim 1, wherein determining the at least one change in availability in a given video feed of the plurality of video feeds comprises discovering the start of video of interest within the given video feed; and wherein updating the subset of currently available video feeds based on the at least one change comprises adding the given video feed to the subset of currently available video feeds. 3. The method of claim 1, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; and wherein updating the subset of currently available video feeds based on the at least one change comprises removing at the first temporal position the given video feed from the subset of currently available video feeds. 4. The method of claim 3, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a resumption in video of interest within the video feed at a second temporal position being later than the first temporal position; and wherein updating the subset of currently available video feeds based on the second change further comprises re-adding at the second temporal position the given video feed to the subset of currently available video feeds. 5. The method of claim 1, wherein determining at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; wherein updating the subset of currently available video feeds based on the at least one change comprises: removing at the first temporal position the given video feed from the subset of currently available video feeds; determining whether the subset of currently available video feeds after the removing is empty; if the subset is empty, determining a second temporal position corresponding to the temporally nearest start in video of interest within at least one of any one of the plurality of video feeds; adding at the second temporal position the at least one video feed having the temporally nearest start in capturing of video to the subset of currently available video feeds; and wherein updating the playback layout based on the updated subset of currently available video feeds comprises choosing a matrix of display sub-regions corresponding to the number available video feeds after the removing or the adding. 6. The method of claim 2, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture device over an interval of time; wherein video of interest corresponds to availability of recorded video; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 7. The method of claim 2, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture over an interval of time and one or more events detected within the intermittently recorded video; wherein video of interest corresponds to availability of recorded video and the presence of a detected event; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 8. The method of claim 1, wherein each of the plurality of video feeds is associated to a metadata entry indicating a plurality of temporal positions of starts in video of interest for its associated video feed and a plurality of temporal positions of breaks in video of interest for its associated video feed. 9. The method of claim 1, wherein the playback layout defines a matrix of display sub-regions; and wherein playing back the currently available video feeds comprises playing back each currently available video feed within one of the display sub-regions. 10. The method of claim 9, wherein playing back the updated subset of currently available video feeds within the updated playback layout comprises visually displaying the currently available feeds according to the updated playback layout. 11. The method of claim 9, wherein playing back the updated subset of currently available video feeds according to the updated playback layout comprises populating sub-regions of the frame area of an exported video file with the currently available video feeds. 12. A system for playing back a plurality of video feeds, the system comprising: a processor; a computer-readable storage device storing program instructions that when executed by the processor, cause the system to perform operations comprising: determining from the plurality of video feeds a subset of currently available video feeds; determining a playback layout based on the number of currently available video feeds; playing back the subset of currently available video feeds within the playback layout; determining at least one change in availability in a given video feed of the plurality of video feeds; updating the subset of currently available video feeds based on the at least one change; updating the playback layout based on the updated subset of currently available video feeds; and playing back the updated subset of currently available video feeds within the updated playback layout. 13. The system of claim 12, wherein determining the at least one change in availability in a given video feed of the plurality of video feeds comprises discovering the start of video of interest within the given video feed; and wherein updating the subset of currently available video feeds based on the at least one change comprises adding the given video feed to the subset of currently available video feeds. 14. The system of claim 12, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; and wherein updating the subset of currently available video feeds based on the at least one change comprises removing at the first temporal position the given video feed from the subset of currently available video feeds. 15. The system of claim 14, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a resumption in video of interest within the video feed at a second temporal position being later than the first temporal position; and wherein updating the subset of currently available video feeds based on the second change further comprises re-adding at the second temporal position the given video feed to the subset of currently available video feeds. 16. The system of claim 12, wherein determining at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; wherein updating the subset of currently available video feeds based on the at least one change comprises: removing at the first temporal position the given video feed from the subset of currently available video feeds; determining whether the subset of currently available video feeds after the removing is empty; if the subset is empty, determining a second temporal position corresponding to the temporally nearest start in video of interest within at least one of any one of the plurality of video feeds; adding at the second temporal position the at least one video feed having the temporally nearest start in capturing of video to the subset of currently available video feeds; and wherein updating the playback layout based on the updated subset of currently available video feeds comprises choosing a matrix of display sub-regions corresponding to the number available video feeds after the removing or the adding. 17. The system of claim 13, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture device over an interval of time; wherein video of interest corresponds to availability of recorded video; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 18. The system of claim 13, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture over an interval of time and one or more events detected within the intermittently recorded video; wherein video of interest corresponds to availability of recorded video and the presence of a detected event; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 19. The system of claim 12, wherein each of the plurality of video feeds is associated to a metadata entry indicating a plurality of temporal positions of starts in video of interest for its associated video feed and a plurality of temporal positions of breaks in video of interest for its associated video feed. 20. The system of claim 12, wherein the playback layout defines a matrix of display sub-regions; and wherein playing back the currently available video feeds comprises playing back each currently available video feed within one of the display sub-regions. 21. The system of claim 20, wherein playing back the updated subset of currently available video feeds within the updated playback layout comprises visually displaying the currently available feeds according to the updated playback layout. 22. The system of claim 20, wherein playing back the updated subset of currently available video feeds according to the updated playback layout comprises populating sub-regions of the frame area of an exported video files with the currently available video feeds.
A system and method for playing back video feeds includes determining from the video feeds a subset of currently available video feeds, determining a playback layout based on the number of currently available video feeds and playing back the subset of currently available video feeds within the playback layout. The system and method further includes determining at least one change in availability in a given video feed of the plurality of video feeds, updating the subset of currently available video feeds based on the at least one change, updating the playback layout based on the updated subset of currently available video feeds and playing back the updated subset of currently available video feeds within the updated playback layout.1. A computer-implemented method for playing back a plurality of video feeds, the method comprising: determining from the plurality of video feeds a subset of currently available video feeds; determining a playback layout based on the number of currently available video feeds; playing back the subset of currently available video feeds within the playback layout; determining at least one change in availability in a given video feed of the plurality of video feeds; updating the subset of currently available video feeds based on the at least one change; updating the playback layout based on the updated subset of currently available video feeds; and playing back the updated subset of currently available video feeds within the updated playback layout. 2. The method of claim 1, wherein determining the at least one change in availability in a given video feed of the plurality of video feeds comprises discovering the start of video of interest within the given video feed; and wherein updating the subset of currently available video feeds based on the at least one change comprises adding the given video feed to the subset of currently available video feeds. 3. The method of claim 1, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; and wherein updating the subset of currently available video feeds based on the at least one change comprises removing at the first temporal position the given video feed from the subset of currently available video feeds. 4. The method of claim 3, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a resumption in video of interest within the video feed at a second temporal position being later than the first temporal position; and wherein updating the subset of currently available video feeds based on the second change further comprises re-adding at the second temporal position the given video feed to the subset of currently available video feeds. 5. The method of claim 1, wherein determining at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; wherein updating the subset of currently available video feeds based on the at least one change comprises: removing at the first temporal position the given video feed from the subset of currently available video feeds; determining whether the subset of currently available video feeds after the removing is empty; if the subset is empty, determining a second temporal position corresponding to the temporally nearest start in video of interest within at least one of any one of the plurality of video feeds; adding at the second temporal position the at least one video feed having the temporally nearest start in capturing of video to the subset of currently available video feeds; and wherein updating the playback layout based on the updated subset of currently available video feeds comprises choosing a matrix of display sub-regions corresponding to the number available video feeds after the removing or the adding. 6. The method of claim 2, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture device over an interval of time; wherein video of interest corresponds to availability of recorded video; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 7. The method of claim 2, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture over an interval of time and one or more events detected within the intermittently recorded video; wherein video of interest corresponds to availability of recorded video and the presence of a detected event; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 8. The method of claim 1, wherein each of the plurality of video feeds is associated to a metadata entry indicating a plurality of temporal positions of starts in video of interest for its associated video feed and a plurality of temporal positions of breaks in video of interest for its associated video feed. 9. The method of claim 1, wherein the playback layout defines a matrix of display sub-regions; and wherein playing back the currently available video feeds comprises playing back each currently available video feed within one of the display sub-regions. 10. The method of claim 9, wherein playing back the updated subset of currently available video feeds within the updated playback layout comprises visually displaying the currently available feeds according to the updated playback layout. 11. The method of claim 9, wherein playing back the updated subset of currently available video feeds according to the updated playback layout comprises populating sub-regions of the frame area of an exported video file with the currently available video feeds. 12. A system for playing back a plurality of video feeds, the system comprising: a processor; a computer-readable storage device storing program instructions that when executed by the processor, cause the system to perform operations comprising: determining from the plurality of video feeds a subset of currently available video feeds; determining a playback layout based on the number of currently available video feeds; playing back the subset of currently available video feeds within the playback layout; determining at least one change in availability in a given video feed of the plurality of video feeds; updating the subset of currently available video feeds based on the at least one change; updating the playback layout based on the updated subset of currently available video feeds; and playing back the updated subset of currently available video feeds within the updated playback layout. 13. The system of claim 12, wherein determining the at least one change in availability in a given video feed of the plurality of video feeds comprises discovering the start of video of interest within the given video feed; and wherein updating the subset of currently available video feeds based on the at least one change comprises adding the given video feed to the subset of currently available video feeds. 14. The system of claim 12, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; and wherein updating the subset of currently available video feeds based on the at least one change comprises removing at the first temporal position the given video feed from the subset of currently available video feeds. 15. The system of claim 14, wherein determining the at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a resumption in video of interest within the video feed at a second temporal position being later than the first temporal position; and wherein updating the subset of currently available video feeds based on the second change further comprises re-adding at the second temporal position the given video feed to the subset of currently available video feeds. 16. The system of claim 12, wherein determining at least one change in availability in the given video feed of the plurality of video feeds comprises discovering a break in video of interest within the video feed at a first temporal position; wherein updating the subset of currently available video feeds based on the at least one change comprises: removing at the first temporal position the given video feed from the subset of currently available video feeds; determining whether the subset of currently available video feeds after the removing is empty; if the subset is empty, determining a second temporal position corresponding to the temporally nearest start in video of interest within at least one of any one of the plurality of video feeds; adding at the second temporal position the at least one video feed having the temporally nearest start in capturing of video to the subset of currently available video feeds; and wherein updating the playback layout based on the updated subset of currently available video feeds comprises choosing a matrix of display sub-regions corresponding to the number available video feeds after the removing or the adding. 17. The system of claim 13, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture device over an interval of time; wherein video of interest corresponds to availability of recorded video; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 18. The system of claim 13, wherein each of the plurality of video feeds comprises video intermittently recorded by a corresponding video capture over an interval of time and one or more events detected within the intermittently recorded video; wherein video of interest corresponds to availability of recorded video and the presence of a detected event; and wherein for a given temporal position within the interval of time, the one or more video feeds having video of interest at the given temporal position form the subset of currently available video feeds. 19. The system of claim 12, wherein each of the plurality of video feeds is associated to a metadata entry indicating a plurality of temporal positions of starts in video of interest for its associated video feed and a plurality of temporal positions of breaks in video of interest for its associated video feed. 20. The system of claim 12, wherein the playback layout defines a matrix of display sub-regions; and wherein playing back the currently available video feeds comprises playing back each currently available video feed within one of the display sub-regions. 21. The system of claim 20, wherein playing back the updated subset of currently available video feeds within the updated playback layout comprises visually displaying the currently available feeds according to the updated playback layout. 22. The system of claim 20, wherein playing back the updated subset of currently available video feeds according to the updated playback layout comprises populating sub-regions of the frame area of an exported video files with the currently available video feeds.
2,400
8,729
8,729
16,112,633
2,461
A resource assignment can be received. A first set of time-frequency resources in a subframe can be determined from the resource assignment. A second set of time-frequency resources in the subframe can be determined. The second set of time-frequency resources can be used for a second latency data transmission. The second set of time-frequency resources can overlap with at least a portion of the first set of time-frequency resources. A first latency data transmission in the subframe can be decoded based on the determined first and second set of time-frequency resources. The first latency transmission can have a longer latency than the second latency transmission.
1. A method comprising: receiving a resource assignment; determining a first set of time-frequency resources in a subframe from the resource assignment; determining a second set of time-frequency resources in the subframe, the second set of time-frequency resources used for a second latency data transmission, and the second set of time-frequency resources overlapping with at least a portion of the first set of time-frequency resources; and decoding a first latency data transmission in the subframe based on the determined first and second set of time-frequency resources, where the first latency transmission has a longer latency than the second latency transmission, wherein the subframe is a first subframe, and wherein the method further comprises receiving higher layer signaling in a subframe earlier than the first subframe, where the higher layer comprises a layer higher than a physical layer, and where the higher layer signaling indicates a set of orthogonal frequency multiplexed symbols including time-frequency resources used for the second latency data transmission where a marker signal may be transmitted. 2. The method according to claim 1, further comprising receiving a marker signal, wherein determining the second set of time-frequency resources comprises determining the second set of time-frequency resources based on the marker signal. 3. The method according to claim 2, further comprising determining a modulation and coding scheme value from the resource assignment, wherein decoding comprises decoding the first latency data without accounting for the second set of resources when the modulation and coding scheme value is less than a threshold. 4. The method according to claim 2, wherein receiving the marker signal further comprises receiving the marker signal in a second subframe immediately following the first subframe. 5. The method according to claim 4, wherein receiving the marker signal in the second subframe comprises receiving a control channel as the marker signal in the second subframe, the control channel indicating the presence of second latency data transmission in the first subframe. 6. The method according to claim 2, wherein receiving the marker signal further comprises receiving the marker signal in the subframe containing the first set of time-frequency resources. 7. The method according to claim 6, wherein receiving the marker signal further comprises receiving the marker signal in the at least one orthogonal frequency multiplexed symbol of the subframe. 8. The method according to claim 6, wherein the first set of time-frequency resources comprises a set of resource blocks in the subframe, and wherein receiving the marker signal further comprises receiving the marker signal in at least one resource block of the set of resource blocks. 9. The method according to claim 2, wherein the marker signal indicates the presence or absence of second latency data transmission in the subframe. 10. An apparatus comprising: a transceiver that receives a resource assignment; and a controller coupled to the transceiver, where the controller determines a first set of time-frequency resources in a subframe from the resource assignment, determines a second set of time-frequency resources in the subframe, the second set of time-frequency resources used for a second latency data transmission, and the second set of time-frequency resources overlapping with at least a portion of the first set of time-frequency resources, and decodes a first latency data transmission in the subframe based on the determined first and second set of time-frequency resources, where the first latency transmission has a longer latency than the second latency transmission, wherein the subframe is a first subframe, and wherein the transceiver receives higher layer signaling in a subframe earlier than the first subframe, where the higher layer comprises a layer higher than a physical layer, and where the higher layer signaling indicates a set of orthogonal frequency multiplexed symbols including time-frequency resources used for the second latency data transmission where a marker signal may be transmitted. 11. The apparatus according to claim 10, wherein the transceiver receives a marker signal, wherein the controller determines the second set of time-frequency resources based on the marker signal. 12. The apparatus according to claim 11, wherein the controller determines a modulation and coding scheme value from the resource assignment, and decodes the first latency data without accounting for the second set of resources when the modulation and coding scheme value is less than a threshold. 13. The apparatus according to claim 11, wherein the transceiver receives the marker signal in a second subframe immediately following the first subframe. 14. The apparatus according to claim 13, wherein the transceiver receives a control channel as the marker signal in the second subframe, the control channel indicating the presence of second latency data transmission in the first subframe. 15. The apparatus according to claim 11, wherein the transceiver receives the marker signal in the subframe containing the first set of time-frequency resources. 16. The apparatus according to claim 15, wherein the transceiver receives the marker signal in the at least one orthogonal frequency multiplexed symbol of the subframe. 17. The apparatus according to claim 15, wherein the first set of time-frequency resources comprises a set of resource blocks in the subframe, and wherein the transceiver receives the marker signal in at least one resource block of the set of resource blocks. 18. The apparatus according to claim 11, wherein the marker signal indicates the presence or absence of second latency data transmission in the subframe.
A resource assignment can be received. A first set of time-frequency resources in a subframe can be determined from the resource assignment. A second set of time-frequency resources in the subframe can be determined. The second set of time-frequency resources can be used for a second latency data transmission. The second set of time-frequency resources can overlap with at least a portion of the first set of time-frequency resources. A first latency data transmission in the subframe can be decoded based on the determined first and second set of time-frequency resources. The first latency transmission can have a longer latency than the second latency transmission.1. A method comprising: receiving a resource assignment; determining a first set of time-frequency resources in a subframe from the resource assignment; determining a second set of time-frequency resources in the subframe, the second set of time-frequency resources used for a second latency data transmission, and the second set of time-frequency resources overlapping with at least a portion of the first set of time-frequency resources; and decoding a first latency data transmission in the subframe based on the determined first and second set of time-frequency resources, where the first latency transmission has a longer latency than the second latency transmission, wherein the subframe is a first subframe, and wherein the method further comprises receiving higher layer signaling in a subframe earlier than the first subframe, where the higher layer comprises a layer higher than a physical layer, and where the higher layer signaling indicates a set of orthogonal frequency multiplexed symbols including time-frequency resources used for the second latency data transmission where a marker signal may be transmitted. 2. The method according to claim 1, further comprising receiving a marker signal, wherein determining the second set of time-frequency resources comprises determining the second set of time-frequency resources based on the marker signal. 3. The method according to claim 2, further comprising determining a modulation and coding scheme value from the resource assignment, wherein decoding comprises decoding the first latency data without accounting for the second set of resources when the modulation and coding scheme value is less than a threshold. 4. The method according to claim 2, wherein receiving the marker signal further comprises receiving the marker signal in a second subframe immediately following the first subframe. 5. The method according to claim 4, wherein receiving the marker signal in the second subframe comprises receiving a control channel as the marker signal in the second subframe, the control channel indicating the presence of second latency data transmission in the first subframe. 6. The method according to claim 2, wherein receiving the marker signal further comprises receiving the marker signal in the subframe containing the first set of time-frequency resources. 7. The method according to claim 6, wherein receiving the marker signal further comprises receiving the marker signal in the at least one orthogonal frequency multiplexed symbol of the subframe. 8. The method according to claim 6, wherein the first set of time-frequency resources comprises a set of resource blocks in the subframe, and wherein receiving the marker signal further comprises receiving the marker signal in at least one resource block of the set of resource blocks. 9. The method according to claim 2, wherein the marker signal indicates the presence or absence of second latency data transmission in the subframe. 10. An apparatus comprising: a transceiver that receives a resource assignment; and a controller coupled to the transceiver, where the controller determines a first set of time-frequency resources in a subframe from the resource assignment, determines a second set of time-frequency resources in the subframe, the second set of time-frequency resources used for a second latency data transmission, and the second set of time-frequency resources overlapping with at least a portion of the first set of time-frequency resources, and decodes a first latency data transmission in the subframe based on the determined first and second set of time-frequency resources, where the first latency transmission has a longer latency than the second latency transmission, wherein the subframe is a first subframe, and wherein the transceiver receives higher layer signaling in a subframe earlier than the first subframe, where the higher layer comprises a layer higher than a physical layer, and where the higher layer signaling indicates a set of orthogonal frequency multiplexed symbols including time-frequency resources used for the second latency data transmission where a marker signal may be transmitted. 11. The apparatus according to claim 10, wherein the transceiver receives a marker signal, wherein the controller determines the second set of time-frequency resources based on the marker signal. 12. The apparatus according to claim 11, wherein the controller determines a modulation and coding scheme value from the resource assignment, and decodes the first latency data without accounting for the second set of resources when the modulation and coding scheme value is less than a threshold. 13. The apparatus according to claim 11, wherein the transceiver receives the marker signal in a second subframe immediately following the first subframe. 14. The apparatus according to claim 13, wherein the transceiver receives a control channel as the marker signal in the second subframe, the control channel indicating the presence of second latency data transmission in the first subframe. 15. The apparatus according to claim 11, wherein the transceiver receives the marker signal in the subframe containing the first set of time-frequency resources. 16. The apparatus according to claim 15, wherein the transceiver receives the marker signal in the at least one orthogonal frequency multiplexed symbol of the subframe. 17. The apparatus according to claim 15, wherein the first set of time-frequency resources comprises a set of resource blocks in the subframe, and wherein the transceiver receives the marker signal in at least one resource block of the set of resource blocks. 18. The apparatus according to claim 11, wherein the marker signal indicates the presence or absence of second latency data transmission in the subframe.
2,400
8,730
8,730
14,538,983
2,454
A method is provided in one example embodiment and includes detecting actions taken by users in a computer-implemented matching system and, for each of the detected actions, storing data indicative of the detected action. The method further includes filtering the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system and creating a user action log from the filtered stored data. The user action log includes all of the stored data that matches the selected at least one filter. The at least one filter may include log start time, log end time, type of action, user ID, target user ID, and/or site type. The detected action may include viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and/or performing a matching search using the computer-implemented matching system.
1. A method comprising: detecting actions taken by users in a computer-implemented matching system; for each of the detected actions, storing data indicative of the detected action; filtering the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system; and creating a user action log from the filtered stored data, the user action log comprising a log of all of the stored data that matches the selected at least one filter. 2. The method of claim 1, wherein the storing comprises accumulating the data in a disk array. 3. The method of claim 2 further comprising transferring the accumulated data from the disk array to an analysis cluster. 4. The method of claim 2 further comprising presenting the accumulated data using a presentation type selected by the administrator of the computer-implemented matching system. 5. The method of claim 4, wherein the presentation type comprises one of a user action log, a pie chart, a list, and a graph. 6. The method of claim 1, wherein the at least one filter comprises at least one of log start time, log end time, type of action, user ID, target user ID, and site type. 7. The method of claim 1, wherein the detected action comprises at least one of viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and performing a matching search using the computer-implemented matching system. 8. One or more non-transitory tangible media that includes code for execution and when executed by a processor is operable to perform operations comprising: detecting actions taken by users in a computer-implemented matching system; for each of the detected actions, storing data indicative of the detected action; filtering the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system; and creating a user action log from the filtered stored data, the user action log comprising a log of all of the stored data that matches the selected at least one filter. 9. The media of claim 8, wherein the storing comprises accumulating the data in a disk array. 10. The method of claim 9, wherein the operations further comprise transferring the accumulated data from the disk array to an analysis cluster. 11. The media of claim 9, wherein the operations further comprise presenting the accumulated data using a presentation type selected by the administrator of the computer-implemented matching system. 12. The media of claim 11, wherein the presentation type comprises one of a user action log, a pie chart, a list, and a graph. 13. The media of claim 8, wherein the at least one filter comprises at least one of log start time, log end time, type of action, user ID, target user ID, and site type. 14. The media of claim 8, wherein the detected action comprises at least one of viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and performing a matching search using the computer-implemented matching system. 15. An apparatus, comprising a processor and a memory, wherein the apparatus is configured to: detect actions taken by users in a computer-implemented matching system; for each of the detected actions, store data indicative of the detected action; filter the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system; and create a user action log from the filtered stored data, the user action log comprising a log of all of the stored data that matches the selected at least one filter. 16. The apparatus of claim 15, wherein the storing comprises accumulating the data in a disk array. 17. The apparatus of claim 16 further comprising presenting the accumulated data using a presentation type selected by the administrator of the computer-implemented matching system. 18. The apparatus of claim 17, wherein the presentation type comprises one of a user action log, a pie chart, a list, and a graph. 19. The apparatus of claim 15, wherein the at least one filter comprises at least one of log start time, log end time, type of action, user ID, target user ID, and site type. 20. The apparatus of claim 15, wherein the detected action comprises at least one of viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and performing a matching search using the computer-implemented matching system.
A method is provided in one example embodiment and includes detecting actions taken by users in a computer-implemented matching system and, for each of the detected actions, storing data indicative of the detected action. The method further includes filtering the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system and creating a user action log from the filtered stored data. The user action log includes all of the stored data that matches the selected at least one filter. The at least one filter may include log start time, log end time, type of action, user ID, target user ID, and/or site type. The detected action may include viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and/or performing a matching search using the computer-implemented matching system.1. A method comprising: detecting actions taken by users in a computer-implemented matching system; for each of the detected actions, storing data indicative of the detected action; filtering the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system; and creating a user action log from the filtered stored data, the user action log comprising a log of all of the stored data that matches the selected at least one filter. 2. The method of claim 1, wherein the storing comprises accumulating the data in a disk array. 3. The method of claim 2 further comprising transferring the accumulated data from the disk array to an analysis cluster. 4. The method of claim 2 further comprising presenting the accumulated data using a presentation type selected by the administrator of the computer-implemented matching system. 5. The method of claim 4, wherein the presentation type comprises one of a user action log, a pie chart, a list, and a graph. 6. The method of claim 1, wherein the at least one filter comprises at least one of log start time, log end time, type of action, user ID, target user ID, and site type. 7. The method of claim 1, wherein the detected action comprises at least one of viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and performing a matching search using the computer-implemented matching system. 8. One or more non-transitory tangible media that includes code for execution and when executed by a processor is operable to perform operations comprising: detecting actions taken by users in a computer-implemented matching system; for each of the detected actions, storing data indicative of the detected action; filtering the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system; and creating a user action log from the filtered stored data, the user action log comprising a log of all of the stored data that matches the selected at least one filter. 9. The media of claim 8, wherein the storing comprises accumulating the data in a disk array. 10. The method of claim 9, wherein the operations further comprise transferring the accumulated data from the disk array to an analysis cluster. 11. The media of claim 9, wherein the operations further comprise presenting the accumulated data using a presentation type selected by the administrator of the computer-implemented matching system. 12. The media of claim 11, wherein the presentation type comprises one of a user action log, a pie chart, a list, and a graph. 13. The media of claim 8, wherein the at least one filter comprises at least one of log start time, log end time, type of action, user ID, target user ID, and site type. 14. The media of claim 8, wherein the detected action comprises at least one of viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and performing a matching search using the computer-implemented matching system. 15. An apparatus, comprising a processor and a memory, wherein the apparatus is configured to: detect actions taken by users in a computer-implemented matching system; for each of the detected actions, store data indicative of the detected action; filter the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system; and create a user action log from the filtered stored data, the user action log comprising a log of all of the stored data that matches the selected at least one filter. 16. The apparatus of claim 15, wherein the storing comprises accumulating the data in a disk array. 17. The apparatus of claim 16 further comprising presenting the accumulated data using a presentation type selected by the administrator of the computer-implemented matching system. 18. The apparatus of claim 17, wherein the presentation type comprises one of a user action log, a pie chart, a list, and a graph. 19. The apparatus of claim 15, wherein the at least one filter comprises at least one of log start time, log end time, type of action, user ID, target user ID, and site type. 20. The apparatus of claim 15, wherein the detected action comprises at least one of viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and performing a matching search using the computer-implemented matching system.
2,400
8,731
8,731
14,719,260
2,485
In an example a method of processing video data includes determining a first palette for a first block of video data that is located in a first row of blocks, generating a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded, reinitializing the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block, determining the third palette of the third block based on the re-initialized predictor palette, and coding the third block using the third palette.
1. A method of processing video data, the method comprising: determining a first palette for a first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data; generating a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; reinitializing the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block; determining the third palette of the third block based on the re-initialized predictor palette; and coding the third block using the third palette. 2. The method of claim 1, further comprising: prior to coding the third block, coding the first block and the at least one second block; and generating the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block. 3. The method of claim 1, wherein re-initializing the predictor palette based on the one or more palette entries of the first palette or the initial predictor palette comprises copying the one or entries of the first palette or entries of the initial predictor palette to the predictor palette. 4. The method of claim 1, wherein the first line of blocks is positioned above the second line of blocks in a picture, and wherein the first block is positioned above the third block and one block to the right of the third block. 5. The method of claim 1, wherein the first block comprises a first coded tree block (CTB) and the third block comprises a third CTB. 6. The method of claim 1, wherein the first row of blocks comprises a top row of blocks of a tile and wherein the first block is an initial block of the first row, the method further comprising: determining that a predictor palette for predicting the first palette has zero entries; and determining the first palette without predicting the one or more entries of the first palette. 7. The method of claim 1, further comprising: after coding the third block, determining a number of wavefronts for coding a plurality of third rows of blocks, wherein the plurality of third rows of blocks are divided into a plurality of tiles; based on the number of wavefronts being more than one, resetting a predictor palette associated with each initial block of each of the plurality of rows to zero. 8. The method of claim 7, further comprising: based on the number of wavefronts being one or zero, not resetting the predictor palette associated with each initial block of each of the plurality of rows to zero. 9. The method of claim 1, wherein coding comprises encoding, and wherein encoding the third block using the third palette comprises: determining respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and encoding the index values in an encoded bitstream. 10. The method of claim 1, wherein coding comprises decoding, and wherein decoding the third block using the third palette comprises: obtaining, from an encoded bitstream, respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and determining values for the one or more samples by matching one or more of the respective index values to at least one entry of the palette. 11. A device for processing video data, the device comprising: a memory configured to store a first block of video data, at least one second block of video data and a third block of video data; and one or more processors configured to: determine a first palette for the first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data; generate a predictor palette for constructing at least one second palette of the at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; reinitialize the predictor palette for determining a third palette of the third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block; determine the third palette of the third block based on the re-initialized predictor palette; and code the third block using the third palette. 12. The device of claim 11, wherein the one or more processors are further configured to: prior to coding the third block, code the first block and the at least one second block; generate the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block. 13. The device of claim 11, wherein to re-initialize the predictor palette based on the one or more palette entries of the first palette or the initial predictor palette, the one or more processors are configured to copy the one or entries of the first palette or entries of the initial predictor palette to the predictor palette. 14. The device of claim 11, wherein the first line of blocks is positioned above the second line of blocks in a picture, and wherein the first block is positioned above the third block and one block to the right of the third block. 15. The device of claim 11, wherein the first block comprises a first coded tree block (CTB) and the third block comprises a third CTB. 16. The device of claim 11, wherein the first row of blocks comprises a top row of blocks of a tile and wherein the first block is an initial block of the first row, and wherein the one or more processors are further configured to: determine that a predictor palette for predicting the first palette has zero entries; and determine the first palette without predicting the one or more entries of the first palette. 17. The device of claim 11, wherein the one or more processors are further configured to: after coding the third block, determine a number of wavefronts for coding a plurality of third rows of blocks, wherein the plurality of third rows of blocks are divided into a plurality of tiles; based on the number of wavefronts being more than one, reset a predictor palette associated with each initial block of each of the plurality of rows to zero. 18. The device of claim 17, wherein the one or more processors are further configured to: based on the number of wavefronts being one or zero, not reset the predictor palette associated with each initial block of each of the plurality of rows to zero. 19. The device of claim 1, wherein to code the one or more processors are configured to encode, and wherein to encode the third block using the third palette the one or more processors are configured to: determine respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and encode the index values in an encoded bitstream. 20. The device of claim 19, further comprising a camera configured to capture a picture that includes the block of video data. 21. The device of claim 11, wherein to code the one or more processors are configured to decode, and wherein to decode the third block using the third palette the one or more processors are configured to: obtain, from an encoded bitstream, respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and determine values for the one or more samples by matching one or more of the respective index values to at least one entry of the palette. 22. The device of claim 21, further comprising a display configured to display the decoded block. 23. The device of claim 1, wherein the device comprises at least one of: an integrated circuit; a microprocessor; or a wireless communication device. 24. An apparatus for processing video data, the apparatus comprising: means for determining a first palette for a first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data; means for generating a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; means for reinitializing the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block or an initial predictor palette generated after coding the first block; means for determining the third palette of the third block based on the re-initialized predictor palette; and means for coding the third block using the third palette. 25. The apparatus of claim 24, further comprising: means for coding, prior to coding the third block, the first block and the at least one second block; means for generating the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block. 26. A non-transitory computer-readable medium having instructions stored thereon that, when executed, cause one or more processors to: determine a first palette for a first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data: generate a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; reinitialize the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block; determine the third palette of the third block based on the re-initialized predictor palette; and code the third block using the third palette. 27. The non-transitory computer-readable medium of claim 26, wherein the instructions further cause the one or more processors to: prior to coding the third block, code the first block and the at least one second block; generate the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block.
In an example a method of processing video data includes determining a first palette for a first block of video data that is located in a first row of blocks, generating a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded, reinitializing the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block, determining the third palette of the third block based on the re-initialized predictor palette, and coding the third block using the third palette.1. A method of processing video data, the method comprising: determining a first palette for a first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data; generating a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; reinitializing the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block; determining the third palette of the third block based on the re-initialized predictor palette; and coding the third block using the third palette. 2. The method of claim 1, further comprising: prior to coding the third block, coding the first block and the at least one second block; and generating the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block. 3. The method of claim 1, wherein re-initializing the predictor palette based on the one or more palette entries of the first palette or the initial predictor palette comprises copying the one or entries of the first palette or entries of the initial predictor palette to the predictor palette. 4. The method of claim 1, wherein the first line of blocks is positioned above the second line of blocks in a picture, and wherein the first block is positioned above the third block and one block to the right of the third block. 5. The method of claim 1, wherein the first block comprises a first coded tree block (CTB) and the third block comprises a third CTB. 6. The method of claim 1, wherein the first row of blocks comprises a top row of blocks of a tile and wherein the first block is an initial block of the first row, the method further comprising: determining that a predictor palette for predicting the first palette has zero entries; and determining the first palette without predicting the one or more entries of the first palette. 7. The method of claim 1, further comprising: after coding the third block, determining a number of wavefronts for coding a plurality of third rows of blocks, wherein the plurality of third rows of blocks are divided into a plurality of tiles; based on the number of wavefronts being more than one, resetting a predictor palette associated with each initial block of each of the plurality of rows to zero. 8. The method of claim 7, further comprising: based on the number of wavefronts being one or zero, not resetting the predictor palette associated with each initial block of each of the plurality of rows to zero. 9. The method of claim 1, wherein coding comprises encoding, and wherein encoding the third block using the third palette comprises: determining respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and encoding the index values in an encoded bitstream. 10. The method of claim 1, wherein coding comprises decoding, and wherein decoding the third block using the third palette comprises: obtaining, from an encoded bitstream, respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and determining values for the one or more samples by matching one or more of the respective index values to at least one entry of the palette. 11. A device for processing video data, the device comprising: a memory configured to store a first block of video data, at least one second block of video data and a third block of video data; and one or more processors configured to: determine a first palette for the first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data; generate a predictor palette for constructing at least one second palette of the at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; reinitialize the predictor palette for determining a third palette of the third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block; determine the third palette of the third block based on the re-initialized predictor palette; and code the third block using the third palette. 12. The device of claim 11, wherein the one or more processors are further configured to: prior to coding the third block, code the first block and the at least one second block; generate the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block. 13. The device of claim 11, wherein to re-initialize the predictor palette based on the one or more palette entries of the first palette or the initial predictor palette, the one or more processors are configured to copy the one or entries of the first palette or entries of the initial predictor palette to the predictor palette. 14. The device of claim 11, wherein the first line of blocks is positioned above the second line of blocks in a picture, and wherein the first block is positioned above the third block and one block to the right of the third block. 15. The device of claim 11, wherein the first block comprises a first coded tree block (CTB) and the third block comprises a third CTB. 16. The device of claim 11, wherein the first row of blocks comprises a top row of blocks of a tile and wherein the first block is an initial block of the first row, and wherein the one or more processors are further configured to: determine that a predictor palette for predicting the first palette has zero entries; and determine the first palette without predicting the one or more entries of the first palette. 17. The device of claim 11, wherein the one or more processors are further configured to: after coding the third block, determine a number of wavefronts for coding a plurality of third rows of blocks, wherein the plurality of third rows of blocks are divided into a plurality of tiles; based on the number of wavefronts being more than one, reset a predictor palette associated with each initial block of each of the plurality of rows to zero. 18. The device of claim 17, wherein the one or more processors are further configured to: based on the number of wavefronts being one or zero, not reset the predictor palette associated with each initial block of each of the plurality of rows to zero. 19. The device of claim 1, wherein to code the one or more processors are configured to encode, and wherein to encode the third block using the third palette the one or more processors are configured to: determine respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and encode the index values in an encoded bitstream. 20. The device of claim 19, further comprising a camera configured to capture a picture that includes the block of video data. 21. The device of claim 11, wherein to code the one or more processors are configured to decode, and wherein to decode the third block using the third palette the one or more processors are configured to: obtain, from an encoded bitstream, respective index values for one or more samples of the third block, wherein the respective index values identify an entry of the third palette; and determine values for the one or more samples by matching one or more of the respective index values to at least one entry of the palette. 22. The device of claim 21, further comprising a display configured to display the decoded block. 23. The device of claim 1, wherein the device comprises at least one of: an integrated circuit; a microprocessor; or a wireless communication device. 24. An apparatus for processing video data, the apparatus comprising: means for determining a first palette for a first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data; means for generating a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; means for reinitializing the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block or an initial predictor palette generated after coding the first block; means for determining the third palette of the third block based on the re-initialized predictor palette; and means for coding the third block using the third palette. 25. The apparatus of claim 24, further comprising: means for coding, prior to coding the third block, the first block and the at least one second block; means for generating the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block. 26. A non-transitory computer-readable medium having instructions stored thereon that, when executed, cause one or more processors to: determine a first palette for a first block of video data that is located in a first row of blocks, wherein the first palette comprises one or more palette entries each including a palette index that is associated with a color value for coding the block of video data: generate a predictor palette for constructing at least one second palette of at least one second block of video data in the first row of blocks coded after the first block, wherein the predictor palette includes at least one palette entry from one or more blocks of the first row other than the first block; reinitialize the predictor palette for determining a third palette of a third block of video data that is located in a second row of blocks, wherein re-initializing the predictor palette comprises re-initializing the predictor palette based on the one or more palette entries of the first palette or an initial predictor palette generated after coding the first block; determine the third palette of the third block based on the re-initialized predictor palette; and code the third block using the third palette. 27. The non-transitory computer-readable medium of claim 26, wherein the instructions further cause the one or more processors to: prior to coding the third block, code the first block and the at least one second block; generate the initial predictor palette after coding the first block and one block of the at least one second block, and prior to coding any other block of the at least one second block.
2,400
8,732
8,732
15,657,848
2,492
Systems and methods are described for managing digital rights. Methods may comprise causing an encrypted content asset to be stored at a storage location. The encrypted content asset at the storage location may be accessible by one or more user devices. A transaction may be generated and may comprise an identifier and a decryption key, wherein the decryption key is configured to decrypt at least a portion of the encrypted content asset. The transaction may be caused to be stored in a distributed database, wherein the distributed database is accessible by the one or more user devices using at least the identifier.
1. A method comprising: causing an encrypted content asset to be stored at a storage location, wherein the encrypted content asset at the storage location is accessible by one or more user devices; generating a transaction comprising an identifier and a decryption key, wherein the decryption key is configured to decrypt at least a portion of the encrypted content asset; and causing the transaction to be stored in a distributed database, wherein the distributed database is accessible by the one or more user devices using at least the identifier. 2. The method of claim 1, wherein the storage location comprises a content server accessible by the one or more user devices over a network. 3. The method of claim 1, wherein the storage location comprises a local cache associated with the one or more user devices. 4. The method of claim 1, wherein the transaction further comprises a fee value associated with processing the transaction to store the transaction in the distributed database. 5. The method of claim 1, wherein the transaction further comprises a time lock configured to restrict access to the decryption key based on a time associated with the time lock. 6. The method of claim 1, wherein the identifier is associated with a source of the transaction. 7. The method of claim 1, wherein the transaction comprises an OP RETURN field and the decryption key is associated with an OP RETURN field. 8. The method of claim 1, wherein the distributed database comprises a blockchain. 9. A method comprising: receiving an encrypted content asset; receiving an identifier associated with decryption of the encrypted content asset; determining, based on the identifier, a location of a transaction in a distributed database; receiving, based on access of the transaction in the distributed database using the determined location, information associated with the transaction; and decrypting, using the information associated with the transaction, at least a portion of the encrypted content asset. 10. The method of claim 9, wherein the receiving the encrypted content asset comprises accessing a content server over a network. 11. The method of claim 9, wherein the receiving the encrypted content asset comprises accessing a local cache. 12. The method of claim 9, wherein the information associated with the transaction comprises a decryption key. 13. The method of claim 9, wherein the identifier is associated with a source of the transaction. 14. The method of claim 9, wherein the distributed database comprises a blockchain. 15. The method of claim 9, wherein the determining the location of the transaction in the distributed database comprises searching the distributed database. 16. A method comprising: causing an encrypted content asset to be stored at a storage location, wherein the encrypted content asset at the storage location is accessible by one or more user devices; generating a first transaction comprising a first identifier and a first decryption key, wherein the first decryption key is configured to decrypt at least a first portion of the encrypted content asset; causing the first transaction to be stored in a distributed database, wherein the distributed database is accessible by the one or more user devices using at least the first identifier; generating a second transaction comprising a second identifier and a second decryption key, wherein the second decryption key is configured to decrypt at least a second portion of the encrypted content asset; and causing the second transaction to be stored in the distributed database, wherein the distributed database is accessible by the one or more user devices using at least the second identifier. 17. The method of claim 16, wherein the storage location comprises a content server accessible by the one or more user devices over a network. 18. The method of claim 16, wherein the storage location comprises a local cache associated with the one or more user devices. 19. The method of claim 16, wherein one or more of the first identifier and the second identifier is associated with a source of the first transaction or the second transaction. 20. The method of claim 16, wherein the distributed database comprises a blockchain.
Systems and methods are described for managing digital rights. Methods may comprise causing an encrypted content asset to be stored at a storage location. The encrypted content asset at the storage location may be accessible by one or more user devices. A transaction may be generated and may comprise an identifier and a decryption key, wherein the decryption key is configured to decrypt at least a portion of the encrypted content asset. The transaction may be caused to be stored in a distributed database, wherein the distributed database is accessible by the one or more user devices using at least the identifier.1. A method comprising: causing an encrypted content asset to be stored at a storage location, wherein the encrypted content asset at the storage location is accessible by one or more user devices; generating a transaction comprising an identifier and a decryption key, wherein the decryption key is configured to decrypt at least a portion of the encrypted content asset; and causing the transaction to be stored in a distributed database, wherein the distributed database is accessible by the one or more user devices using at least the identifier. 2. The method of claim 1, wherein the storage location comprises a content server accessible by the one or more user devices over a network. 3. The method of claim 1, wherein the storage location comprises a local cache associated with the one or more user devices. 4. The method of claim 1, wherein the transaction further comprises a fee value associated with processing the transaction to store the transaction in the distributed database. 5. The method of claim 1, wherein the transaction further comprises a time lock configured to restrict access to the decryption key based on a time associated with the time lock. 6. The method of claim 1, wherein the identifier is associated with a source of the transaction. 7. The method of claim 1, wherein the transaction comprises an OP RETURN field and the decryption key is associated with an OP RETURN field. 8. The method of claim 1, wherein the distributed database comprises a blockchain. 9. A method comprising: receiving an encrypted content asset; receiving an identifier associated with decryption of the encrypted content asset; determining, based on the identifier, a location of a transaction in a distributed database; receiving, based on access of the transaction in the distributed database using the determined location, information associated with the transaction; and decrypting, using the information associated with the transaction, at least a portion of the encrypted content asset. 10. The method of claim 9, wherein the receiving the encrypted content asset comprises accessing a content server over a network. 11. The method of claim 9, wherein the receiving the encrypted content asset comprises accessing a local cache. 12. The method of claim 9, wherein the information associated with the transaction comprises a decryption key. 13. The method of claim 9, wherein the identifier is associated with a source of the transaction. 14. The method of claim 9, wherein the distributed database comprises a blockchain. 15. The method of claim 9, wherein the determining the location of the transaction in the distributed database comprises searching the distributed database. 16. A method comprising: causing an encrypted content asset to be stored at a storage location, wherein the encrypted content asset at the storage location is accessible by one or more user devices; generating a first transaction comprising a first identifier and a first decryption key, wherein the first decryption key is configured to decrypt at least a first portion of the encrypted content asset; causing the first transaction to be stored in a distributed database, wherein the distributed database is accessible by the one or more user devices using at least the first identifier; generating a second transaction comprising a second identifier and a second decryption key, wherein the second decryption key is configured to decrypt at least a second portion of the encrypted content asset; and causing the second transaction to be stored in the distributed database, wherein the distributed database is accessible by the one or more user devices using at least the second identifier. 17. The method of claim 16, wherein the storage location comprises a content server accessible by the one or more user devices over a network. 18. The method of claim 16, wherein the storage location comprises a local cache associated with the one or more user devices. 19. The method of claim 16, wherein one or more of the first identifier and the second identifier is associated with a source of the first transaction or the second transaction. 20. The method of claim 16, wherein the distributed database comprises a blockchain.
2,400
8,733
8,733
15,469,361
2,423
According to one implementation, a system for redirecting to content after an interruption includes a computing platform having a hardware processor and a system memory storing a content redirection software code. The hardware processor executes the content redirection software code to track a playout status of a primary content being provided by the system, and detect a pause to playout of the primary content due to receipt of an interrupt content by the system. In addition, the hardware processor executes the content redirection software code to, during playout of the interrupt content by the system, save the playout status of the primary content at the pause. The hardware processor further executes the content redirection software code to detect completion of interrupt content playout by the system, and enable a return to the primary content after the pause.
1. A system comprising: a computing platform including a hardware processor and a system memory; a content redirection software code stored in the system memory; the hardware processor configured to execute the content redirection software code to: track a playout status, including a frame location, of a primary content being provided by the system; detect a pause to playout of the primary content due to receipt of an interrupt content by the system; during playout of the interrupt content by the system, save the playout status, including the frame location, of the primary content at the pause; detect completion of interrupt content playout by the system; and enable a return to the primary content after the pause and resumption of the primary content at the frame location. 2. The system of claim 1, wherein the playout status of the primary content comprises a packet-switched network address of a source of the primary content. 3. The system of claim 2, wherein enabling the return to the primary content comprises navigating to the packet-switched network address of the source of the primary content. 4. The system of claim 1, wherein the frame location coincides with the pause. 5. The system of claim 1, wherein the system comprises a personal communication device including a display, and wherein providing the primary content by the system comprises displaying the primary content on the display. 6. The system of claim 1, wherein the system is a content distribution system comprising at least one content server, and wherein providing the primary content by the system comprises transmitting a programming stream. 7. The system of claim 1, wherein the interrupt content comprises at least one of breaking news, an emergency broadcast, an AMBER alert, a traffic alert, and a weather alert. 8. A method for use by a system including a computing platform having a hardware processor and a system memory storing a content redirection software code, the message comprising: tracking, using the hardware processor, a playout status, including a frame location, of a primary content being provided by the system; detecting, using the hardware processor, a pause to playout of the primary content due to receipt of an interrupt content by the system; during playout of the interrupt content by the system, saving, using the hardware processor, the playout status, including the frame location, of the primary content at the pause; detecting, using the hardware processor, completion of interrupt content playout by the system; and enabling, using the hardware processor, a return to the primary content after the pause and resumption of the primary content at the frame location. 9. The method of claim 8, wherein the playout status of the primary content comprises a packet-switched network address of a source of the primary content. 10. The method of claim 9, wherein enabling the return to the primary content comprises navigating to the packet-switched network address of the source of the primary content. 11. The method of claim 8, wherein the frame location coincides with the pause. 12. The method of claim 8, wherein the system comprises a personal communication device including a display, and wherein providing the primary content by the system comprises displaying the primary content on the display. 13. The method of claim 8, wherein the system is a content distribution system comprising at least one content server, and wherein providing the primary content by the system comprises transmitting a programming stream. 14. The method of claim 8, wherein the interrupt content comprises at least one of breaking news, an emergency broadcast, an AMBER alert, a traffic alert, and a weather alert. 15. A computer-readable non-transitory medium having stored thereon instructions, which when executed by a hardware processor of a system, instantiate a method comprising: tracking a playout status, including a frame location, of a primary content being provided by the system; detecting a pause to playout of the primary content due to receipt of an interrupt content by the system; during playout of the interrupt content by the system, saving the playout status, including the frame location, of the primary content at the pause; detecting completion of interrupt content playout by the system; and enabling a return to the primary content after the pause and resumption of the primary content at the frame location. 16. The computer-readable non-transitory medium of claim 15, wherein the playout status of the primary content comprises a packet-switched network address of a source of the primary content. 17. The computer-readable non-transitory medium of claim 16, wherein enabling the return to the primary content comprises navigating to the packet-switched network address of the source of the primary content. 18. The computer-readable non-transitory medium of claim 15, wherein the frame location coincides with the pause. 19. The computer-readable non-transitory medium of claim 15, wherein the system comprises a personal communication device including a display, and wherein providing the primary content by the system comprises displaying the primary content on the display. 20. The computer-readable non-transitory medium of claim 15, wherein the system is a content distribution system comprising at least one content server, and wherein providing the primary content by the system comprises transmitting a programming stream.
According to one implementation, a system for redirecting to content after an interruption includes a computing platform having a hardware processor and a system memory storing a content redirection software code. The hardware processor executes the content redirection software code to track a playout status of a primary content being provided by the system, and detect a pause to playout of the primary content due to receipt of an interrupt content by the system. In addition, the hardware processor executes the content redirection software code to, during playout of the interrupt content by the system, save the playout status of the primary content at the pause. The hardware processor further executes the content redirection software code to detect completion of interrupt content playout by the system, and enable a return to the primary content after the pause.1. A system comprising: a computing platform including a hardware processor and a system memory; a content redirection software code stored in the system memory; the hardware processor configured to execute the content redirection software code to: track a playout status, including a frame location, of a primary content being provided by the system; detect a pause to playout of the primary content due to receipt of an interrupt content by the system; during playout of the interrupt content by the system, save the playout status, including the frame location, of the primary content at the pause; detect completion of interrupt content playout by the system; and enable a return to the primary content after the pause and resumption of the primary content at the frame location. 2. The system of claim 1, wherein the playout status of the primary content comprises a packet-switched network address of a source of the primary content. 3. The system of claim 2, wherein enabling the return to the primary content comprises navigating to the packet-switched network address of the source of the primary content. 4. The system of claim 1, wherein the frame location coincides with the pause. 5. The system of claim 1, wherein the system comprises a personal communication device including a display, and wherein providing the primary content by the system comprises displaying the primary content on the display. 6. The system of claim 1, wherein the system is a content distribution system comprising at least one content server, and wherein providing the primary content by the system comprises transmitting a programming stream. 7. The system of claim 1, wherein the interrupt content comprises at least one of breaking news, an emergency broadcast, an AMBER alert, a traffic alert, and a weather alert. 8. A method for use by a system including a computing platform having a hardware processor and a system memory storing a content redirection software code, the message comprising: tracking, using the hardware processor, a playout status, including a frame location, of a primary content being provided by the system; detecting, using the hardware processor, a pause to playout of the primary content due to receipt of an interrupt content by the system; during playout of the interrupt content by the system, saving, using the hardware processor, the playout status, including the frame location, of the primary content at the pause; detecting, using the hardware processor, completion of interrupt content playout by the system; and enabling, using the hardware processor, a return to the primary content after the pause and resumption of the primary content at the frame location. 9. The method of claim 8, wherein the playout status of the primary content comprises a packet-switched network address of a source of the primary content. 10. The method of claim 9, wherein enabling the return to the primary content comprises navigating to the packet-switched network address of the source of the primary content. 11. The method of claim 8, wherein the frame location coincides with the pause. 12. The method of claim 8, wherein the system comprises a personal communication device including a display, and wherein providing the primary content by the system comprises displaying the primary content on the display. 13. The method of claim 8, wherein the system is a content distribution system comprising at least one content server, and wherein providing the primary content by the system comprises transmitting a programming stream. 14. The method of claim 8, wherein the interrupt content comprises at least one of breaking news, an emergency broadcast, an AMBER alert, a traffic alert, and a weather alert. 15. A computer-readable non-transitory medium having stored thereon instructions, which when executed by a hardware processor of a system, instantiate a method comprising: tracking a playout status, including a frame location, of a primary content being provided by the system; detecting a pause to playout of the primary content due to receipt of an interrupt content by the system; during playout of the interrupt content by the system, saving the playout status, including the frame location, of the primary content at the pause; detecting completion of interrupt content playout by the system; and enabling a return to the primary content after the pause and resumption of the primary content at the frame location. 16. The computer-readable non-transitory medium of claim 15, wherein the playout status of the primary content comprises a packet-switched network address of a source of the primary content. 17. The computer-readable non-transitory medium of claim 16, wherein enabling the return to the primary content comprises navigating to the packet-switched network address of the source of the primary content. 18. The computer-readable non-transitory medium of claim 15, wherein the frame location coincides with the pause. 19. The computer-readable non-transitory medium of claim 15, wherein the system comprises a personal communication device including a display, and wherein providing the primary content by the system comprises displaying the primary content on the display. 20. The computer-readable non-transitory medium of claim 15, wherein the system is a content distribution system comprising at least one content server, and wherein providing the primary content by the system comprises transmitting a programming stream.
2,400
8,734
8,734
15,884,681
2,486
An image processing device includes a reception section configured to receive an encoded stream set in syntax of the encoded stream in which motion vector (MV) range limit information is encoded in units in which image data have a hierarchical structure and the MV range limit information, the MV range limit information being information about a limit of a value of a vertical direction of an MV for referring to a view different from a view of a current block in an inter-view MV corresponding to the current block, and a decoding section configured to decode the encoded stream received by the reception section using the MV range limit information received by the reception section.
1. (canceled) 2. An image processing device, comprising: circuitry configured to: receive an encoded stream that includes syntaxes in which motion vector (MV) range limit information is encoded, the MV range limit information including a flag indicating whether an inter-view MV corresponding to a current block for referring to a view different from a view of the current block has a range limit in a vertical direction less than a predetermine value in units of luma samples; and decode the received encoded stream based on the flag included in the MV range limit information. 3. The image processing device according to claim 2, wherein the predetermine value is 56 samples. 4. The image processing device according to claim 2, wherein the MV range limit information further includes a value indicating a limit of a range in a vertical positive direction for the inter-view MV. 5. The image processing device according to claim 2, wherein the MV range limit information is set in a sequence parameter set (SPS). 6. The image processing device according to claim 2, wherein the circuitry is further configured to decode the MV range limit information. 7. An image processing method, comprising: receiving, by an image processing device, an encoded stream that includes syntaxes in which motion vector (MV) range limit information is encoded, the MV range limit information including a flag indicating whether an inter-view MV corresponding to a current block for referring to a view different from a view of the current block has a range limit in a vertical direction less than a predetermine value in units of luma samples; and decoding, by the image processing device, the received encoded stream based on the flag included in the MV range limit information. 8. The image processing method according to claim 7, wherein the predetermine value is 56 samples. 9. The image processing method according to claim 7, wherein the MV range limit information further includes a value indicating a limit of a range in a vertical positive direction for the inter-view MV. 10. The image processing method according to claim 7, wherein the MV range limit information is set in a sequence parameter set (SPS). 11. The image processing method according to claim 7, further comprising decoding the MV range limit information.
An image processing device includes a reception section configured to receive an encoded stream set in syntax of the encoded stream in which motion vector (MV) range limit information is encoded in units in which image data have a hierarchical structure and the MV range limit information, the MV range limit information being information about a limit of a value of a vertical direction of an MV for referring to a view different from a view of a current block in an inter-view MV corresponding to the current block, and a decoding section configured to decode the encoded stream received by the reception section using the MV range limit information received by the reception section.1. (canceled) 2. An image processing device, comprising: circuitry configured to: receive an encoded stream that includes syntaxes in which motion vector (MV) range limit information is encoded, the MV range limit information including a flag indicating whether an inter-view MV corresponding to a current block for referring to a view different from a view of the current block has a range limit in a vertical direction less than a predetermine value in units of luma samples; and decode the received encoded stream based on the flag included in the MV range limit information. 3. The image processing device according to claim 2, wherein the predetermine value is 56 samples. 4. The image processing device according to claim 2, wherein the MV range limit information further includes a value indicating a limit of a range in a vertical positive direction for the inter-view MV. 5. The image processing device according to claim 2, wherein the MV range limit information is set in a sequence parameter set (SPS). 6. The image processing device according to claim 2, wherein the circuitry is further configured to decode the MV range limit information. 7. An image processing method, comprising: receiving, by an image processing device, an encoded stream that includes syntaxes in which motion vector (MV) range limit information is encoded, the MV range limit information including a flag indicating whether an inter-view MV corresponding to a current block for referring to a view different from a view of the current block has a range limit in a vertical direction less than a predetermine value in units of luma samples; and decoding, by the image processing device, the received encoded stream based on the flag included in the MV range limit information. 8. The image processing method according to claim 7, wherein the predetermine value is 56 samples. 9. The image processing method according to claim 7, wherein the MV range limit information further includes a value indicating a limit of a range in a vertical positive direction for the inter-view MV. 10. The image processing method according to claim 7, wherein the MV range limit information is set in a sequence parameter set (SPS). 11. The image processing method according to claim 7, further comprising decoding the MV range limit information.
2,400
8,735
8,735
15,456,194
2,483
Systems and methods for detecting screen contents and adaptive enablement of screen content coding modes. Encoding mode decision may be made adaptive to include or exclude screen content coding (SCC) modes. In some embodiments, a screen content decision is based on one or more statistics characterizing a distribution of meaningful colors (e.g., chroma) and/or intensities (e.g., luma) determined for a population of pixels of an input picture. In some embodiments, a screen content decision is based on one or more statistics characterizing the pure flat area of an input picture and the area with extreme sharp edges. Pictures may be encoded according to a mode selection that is adaptive to the screen content decision, for example selecting between encoding modes that include SCC modes, or selecting between encoding modes that exclude SCC modes.
1. An apparatus for video encoding, the apparatus comprising one or more processors to: determine one or more statistics indicative of pixel value distribution within a picture; classify the picture as screen content or non-screen content based on a comparison of the statistics to one or more predetermined thresholds; select coding modes for blocks of the picture from a first set of coding modes including one or more screen content coding modes when the picture is classified as screen content, and from a second set of modes excluding the screen content coding modes when the picture is classified as non-screen content; and generate a bitstream by encoding the blocks of the picture according to their selected coding modes. 2. The apparatus of claim 1, wherein: the statistics comprise a frequency of a pixel value within the picture, and the processors are to determine the frequency for each of a plurality of pixel values spanning a range of possible pixel values; or the statistics comprise variance of the pixel value within a block of the picture, and the processors are to determine the variance for each of the blocks within the picture. 3. The apparatus of claim 2, wherein the pixel value comprises luma. 4. The apparatus of claim 3, wherein the pixel value further comprises chrominance. 5. The apparatus of claim 2, wherein the processors are to: determine a first statistic indicative of the number of the pixel value frequencies that exceed a first frequency threshold; and classify the picture as screen content in response to the first statistic being less than a first category bin count threshold. 6. The apparatus of claim 5, wherein the processors are to: determine a second statistic indicative of a number of the pixel value frequencies that fail to exceed the first frequency threshold, but exceed a second frequency threshold smaller than the first frequency threshold; and classify the picture as screen content in response to a sum of the first and second statistics being less than a cumulative category bin count threshold. 7. The apparatus of claim 6, wherein the processors are to: classify the picture as screen content in response to the sum of the first and second statistics being less the cumulative category bin count threshold when the first statistic exceeds the first category bin count threshold; and classify the picture as non-screen content when the sum of the first and second statistics also exceeds the cumulative category bin count threshold. 8. The apparatus of claim 2, wherein the processors are to: determine a first statistic indicative of a proportion of the blocks satisfying a minimal variance threshold; and classify the picture as non-screen content in response to the first statistic failing to satisfy a first proportion threshold. 9. The apparatus of claim 8, wherein the minimal variance threshold is equal to zero and the first statistic is the proportion of the blocks having zero variance. 10. The apparatus of claim 9, wherein the processors are to: determine a first statistic indicative of the proportion of the blocks satisfying a minimal variance threshold; determine a second statistic indicative of the proportion of the blocks satisfying a large variance threshold; and classify the picture as screen content in response to: the second statistic satisfying a second proportion threshold; and the proportion of blocks satisfying the minimal variance threshold, when summed with the proportion of blocks satisfying the large variance threshold, satisfying a cumulative proportion threshold. 11. The apparatus of claim 10, wherein the processors are to: classify the picture as screen content in response to: the first statistic failing to be less than the first proportion threshold; the second statistic exceeding the second proportion threshold; and the summation of the first and second statistics exceeding the cumulative proportion threshold; and classify the picture as non-screen content in response to: the first statistic being less than the first proportion threshold; or the second statistic failing to exceed the second proportion threshold; or the proportion of blocks satisfying the large variance threshold failing to exceed the data proportion threshold. 12. The apparatus of claim 1, wherein the processors are to: select transform units (TU) for the picture from a first set of TU sizes including two or more TU sizes when the picture is classified as non-screen content, and from a second set of TU sizes including at least one TU size smaller than those included in the first set when the picture is classified as screen content. 13. A computer-implemented method for video encoding, the method comprising; determining one or more statistics indicative of pixel value distribution within a picture; classifying the picture as screen content or non-screen content based on a comparison of the statistics to one or more predetermined thresholds; selecting coding modes for blocks of the picture from a first set of coding modes including one or more screen content coding modes when the picture is classified as screen content, and from a second set of modes excluding the screen content coding modes when the picture is classified as non-screen content; and generating a bitstream by encoding the blocks of the picture according to their selected coding modes. 14. The method of claim 13, wherein: the statistics comprise a frequency of a pixel value within the picture, and determining the statistics further comprises determining the frequency for each of a plurality of pixel values spanning a range of possible pixel values; or the statistics comprise variance of the pixel value within a block of the picture, and determining the statistics further comprises determining the variance for each of the blocks within the picture. 15. The method of claim 14, wherein the pixel value comprises luma. 16. The method of claim 14, wherein: determining the statistics further comprises determining a first statistic indicative of the number of the pixel value frequencies that exceed a first frequency threshold; and classifying the picture farther comprises classifying the picture as screen content in response to the first statistic being less than a first category bin count threshold. 17. The method of claim 16, wherein the processors are to: determining the statistics further comprises determining a second statistic indicative of a number of the pixel value frequencies that fail to exceed the first frequency threshold, but exceed a second frequency threshold smaller than the first frequency threshold; and classifying the picture further comprises classifying the picture as screen content in response to a sum of the first and second statistics being less than a cumulative category bin count threshold. 18. The method of claim 17, wherein classifying the picture further comprises: classifying the picture as screen content in response to the sum of the first and second statistics being less the second cumulative count threshold when the first statistic exceeds the first cumulative count threshold; and classifying the picture as non-screen content when the sum of the first and second statistics also exceeds the second cumulative count threshold. 19. The method of claim 14, wherein: determining the statistics further comprises determining a first statistic indicative of a proportion of the blocks satisfying a minimal variance threshold; and classifying the picture further comprises classifying the picture as non-screen content in response to the first statistic failing to satisfy a first proportion threshold. 20. The method of claim 19, wherein the minimal variance threshold is equal to zero and the first statistic is the proportion of the blocks having zero variance. 21. The method of claim 19, wherein: determining the statistics further comprises: determining a first statistic indicative of the proportion of the blocks satisfying a minimal variance threshold; and determine a second statistic indicative of the proportion of the blocks satisfying a large variance threshold; and classifying the picture farther comprises classifying the picture as screen content in response to: the second statistic satisfying a second proportion threshold; and the proportion of blocks satisfying the minimal variance threshold, when summed with the proportion of blocks satisfying the large variance threshold, satisfying a cumulative proportion threshold. 22. The method of claim 21, wherein classifying the picture further comprises: classifying the picture as screen content in response to: the first statistic failing to be less than the first proportion threshold; the second statistic exceeding the second proportion threshold; and the summation of first and second statistics exceeding the cumulative proportion threshold; and classifying the picture as non-screen content in response to: the first statistic being less than the first proportion threshold; or the second statistic failing to exceed the second proportion threshold; or the proportion of blocks satisfying the large variance threshold failing to exceed the total proportion threshold. 23. The method of claim 13, further comprising: selecting transform units (TU) for the picture from a first set of TU sizes including two or more TU sizes when the picture is classified as non-screen content, and from a second set of TU sizes including at least one TU size small than those included in the first set when the picture is classified as screen content. 24. One or mote non-transitory computer-readable storage medium having a plurality of instructions stored thereon which, when executed on a computing device, cause the computing device to perform a method of video coding, comprising: determining one or more statistics indicative of pixel value distribution within a video picture; classifying the picture as screen content or non-screen content based on a comparison of the statistics to one or more predetermined thresholds; selecting coding modes for blocks of the picture from a first set of coding modes including one or more screen content coding modes when the picture is classified as screen content, and from a second set of modes excluding the screen content coding modes when the picture is classified as non-screen content; and generating a bitstream by encoding the blocks of the picture according to their selected coding modes.
Systems and methods for detecting screen contents and adaptive enablement of screen content coding modes. Encoding mode decision may be made adaptive to include or exclude screen content coding (SCC) modes. In some embodiments, a screen content decision is based on one or more statistics characterizing a distribution of meaningful colors (e.g., chroma) and/or intensities (e.g., luma) determined for a population of pixels of an input picture. In some embodiments, a screen content decision is based on one or more statistics characterizing the pure flat area of an input picture and the area with extreme sharp edges. Pictures may be encoded according to a mode selection that is adaptive to the screen content decision, for example selecting between encoding modes that include SCC modes, or selecting between encoding modes that exclude SCC modes.1. An apparatus for video encoding, the apparatus comprising one or more processors to: determine one or more statistics indicative of pixel value distribution within a picture; classify the picture as screen content or non-screen content based on a comparison of the statistics to one or more predetermined thresholds; select coding modes for blocks of the picture from a first set of coding modes including one or more screen content coding modes when the picture is classified as screen content, and from a second set of modes excluding the screen content coding modes when the picture is classified as non-screen content; and generate a bitstream by encoding the blocks of the picture according to their selected coding modes. 2. The apparatus of claim 1, wherein: the statistics comprise a frequency of a pixel value within the picture, and the processors are to determine the frequency for each of a plurality of pixel values spanning a range of possible pixel values; or the statistics comprise variance of the pixel value within a block of the picture, and the processors are to determine the variance for each of the blocks within the picture. 3. The apparatus of claim 2, wherein the pixel value comprises luma. 4. The apparatus of claim 3, wherein the pixel value further comprises chrominance. 5. The apparatus of claim 2, wherein the processors are to: determine a first statistic indicative of the number of the pixel value frequencies that exceed a first frequency threshold; and classify the picture as screen content in response to the first statistic being less than a first category bin count threshold. 6. The apparatus of claim 5, wherein the processors are to: determine a second statistic indicative of a number of the pixel value frequencies that fail to exceed the first frequency threshold, but exceed a second frequency threshold smaller than the first frequency threshold; and classify the picture as screen content in response to a sum of the first and second statistics being less than a cumulative category bin count threshold. 7. The apparatus of claim 6, wherein the processors are to: classify the picture as screen content in response to the sum of the first and second statistics being less the cumulative category bin count threshold when the first statistic exceeds the first category bin count threshold; and classify the picture as non-screen content when the sum of the first and second statistics also exceeds the cumulative category bin count threshold. 8. The apparatus of claim 2, wherein the processors are to: determine a first statistic indicative of a proportion of the blocks satisfying a minimal variance threshold; and classify the picture as non-screen content in response to the first statistic failing to satisfy a first proportion threshold. 9. The apparatus of claim 8, wherein the minimal variance threshold is equal to zero and the first statistic is the proportion of the blocks having zero variance. 10. The apparatus of claim 9, wherein the processors are to: determine a first statistic indicative of the proportion of the blocks satisfying a minimal variance threshold; determine a second statistic indicative of the proportion of the blocks satisfying a large variance threshold; and classify the picture as screen content in response to: the second statistic satisfying a second proportion threshold; and the proportion of blocks satisfying the minimal variance threshold, when summed with the proportion of blocks satisfying the large variance threshold, satisfying a cumulative proportion threshold. 11. The apparatus of claim 10, wherein the processors are to: classify the picture as screen content in response to: the first statistic failing to be less than the first proportion threshold; the second statistic exceeding the second proportion threshold; and the summation of the first and second statistics exceeding the cumulative proportion threshold; and classify the picture as non-screen content in response to: the first statistic being less than the first proportion threshold; or the second statistic failing to exceed the second proportion threshold; or the proportion of blocks satisfying the large variance threshold failing to exceed the data proportion threshold. 12. The apparatus of claim 1, wherein the processors are to: select transform units (TU) for the picture from a first set of TU sizes including two or more TU sizes when the picture is classified as non-screen content, and from a second set of TU sizes including at least one TU size smaller than those included in the first set when the picture is classified as screen content. 13. A computer-implemented method for video encoding, the method comprising; determining one or more statistics indicative of pixel value distribution within a picture; classifying the picture as screen content or non-screen content based on a comparison of the statistics to one or more predetermined thresholds; selecting coding modes for blocks of the picture from a first set of coding modes including one or more screen content coding modes when the picture is classified as screen content, and from a second set of modes excluding the screen content coding modes when the picture is classified as non-screen content; and generating a bitstream by encoding the blocks of the picture according to their selected coding modes. 14. The method of claim 13, wherein: the statistics comprise a frequency of a pixel value within the picture, and determining the statistics further comprises determining the frequency for each of a plurality of pixel values spanning a range of possible pixel values; or the statistics comprise variance of the pixel value within a block of the picture, and determining the statistics further comprises determining the variance for each of the blocks within the picture. 15. The method of claim 14, wherein the pixel value comprises luma. 16. The method of claim 14, wherein: determining the statistics further comprises determining a first statistic indicative of the number of the pixel value frequencies that exceed a first frequency threshold; and classifying the picture farther comprises classifying the picture as screen content in response to the first statistic being less than a first category bin count threshold. 17. The method of claim 16, wherein the processors are to: determining the statistics further comprises determining a second statistic indicative of a number of the pixel value frequencies that fail to exceed the first frequency threshold, but exceed a second frequency threshold smaller than the first frequency threshold; and classifying the picture further comprises classifying the picture as screen content in response to a sum of the first and second statistics being less than a cumulative category bin count threshold. 18. The method of claim 17, wherein classifying the picture further comprises: classifying the picture as screen content in response to the sum of the first and second statistics being less the second cumulative count threshold when the first statistic exceeds the first cumulative count threshold; and classifying the picture as non-screen content when the sum of the first and second statistics also exceeds the second cumulative count threshold. 19. The method of claim 14, wherein: determining the statistics further comprises determining a first statistic indicative of a proportion of the blocks satisfying a minimal variance threshold; and classifying the picture further comprises classifying the picture as non-screen content in response to the first statistic failing to satisfy a first proportion threshold. 20. The method of claim 19, wherein the minimal variance threshold is equal to zero and the first statistic is the proportion of the blocks having zero variance. 21. The method of claim 19, wherein: determining the statistics further comprises: determining a first statistic indicative of the proportion of the blocks satisfying a minimal variance threshold; and determine a second statistic indicative of the proportion of the blocks satisfying a large variance threshold; and classifying the picture farther comprises classifying the picture as screen content in response to: the second statistic satisfying a second proportion threshold; and the proportion of blocks satisfying the minimal variance threshold, when summed with the proportion of blocks satisfying the large variance threshold, satisfying a cumulative proportion threshold. 22. The method of claim 21, wherein classifying the picture further comprises: classifying the picture as screen content in response to: the first statistic failing to be less than the first proportion threshold; the second statistic exceeding the second proportion threshold; and the summation of first and second statistics exceeding the cumulative proportion threshold; and classifying the picture as non-screen content in response to: the first statistic being less than the first proportion threshold; or the second statistic failing to exceed the second proportion threshold; or the proportion of blocks satisfying the large variance threshold failing to exceed the total proportion threshold. 23. The method of claim 13, further comprising: selecting transform units (TU) for the picture from a first set of TU sizes including two or more TU sizes when the picture is classified as non-screen content, and from a second set of TU sizes including at least one TU size small than those included in the first set when the picture is classified as screen content. 24. One or mote non-transitory computer-readable storage medium having a plurality of instructions stored thereon which, when executed on a computing device, cause the computing device to perform a method of video coding, comprising: determining one or more statistics indicative of pixel value distribution within a video picture; classifying the picture as screen content or non-screen content based on a comparison of the statistics to one or more predetermined thresholds; selecting coding modes for blocks of the picture from a first set of coding modes including one or more screen content coding modes when the picture is classified as screen content, and from a second set of modes excluding the screen content coding modes when the picture is classified as non-screen content; and generating a bitstream by encoding the blocks of the picture according to their selected coding modes.
2,400
8,736
8,736
15,517,474
2,437
A communication device comprises a container environment with a plurality of containers each having one or more applications and each being connectable to a network slice, and a container manager configured to control communication between the applications and the network slices, wherein the container manager prohibits communication between a first application in a first container and a second application in a second container.
1. A device, comprising: a container environment comprising a plurality of containers each having one or more applications and each being connectable to a network slice; and a container manager configured to control communication between the applications and the network slices, wherein the container manager prohibits communication between a first application in a first container and a second application in a second container. 2. The device of claim 1, further comprising device resources, wherein the container manager controls access of applications to the device resources. 3. The device of claim 2, wherein applications in different containers share the device resources. 4. The device of claim 1, wherein each container is associated with exactly one network slice at a time. 5. The device of claim 4, wherein the association between the container and the network slice comprises using a dedicated access point name (APN) for the network slice. 6. The device of claim 4, wherein the association between the container and the network slice comprises using encrypted communication between the container and the network slice via a shared access point name (APN). 7. The device of claim 4, wherein the association between the container and the network slice comprises using tunneling between the container and the network slice. 8. The device of claim 1, wherein each container uses its own electronic subscriber identity module (eSIM) to access credentials for authentication and/or authorization. 9. The device of claim 1, wherein at least two of the containers use the same electronic subscriber identity module (eSIM) to access credentials for authentication and/or authorization. 10. The device of claim 1, wherein at least two of the network slices are served by the same operator. 11. The device of claim 1, wherein at least one of the network slices corresponds to a virtual operator. 12. The device of claim 1, wherein the container manager defines rules per container and controls communication between containers such that communication is allowed between applications in the same container and is prohibited between applications in different containers. 13. The device of claim 1, further comprising device resources, wherein each of the containers has a container configuration policy that governs access by the container to the device resources. 14. The device of claim 1, wherein the containers operate in parallel. 15. The device of claim 1, further comprising: a device operating system; and a plurality of container operating systems each associated with a corresponding container among the plurality of containers. 16. The device of claim 1, wherein the container manager comprises: a register comprising information that identifies an association between containers and network slices; interfaces towards containers and network slices; and memory storing coded instructions that when executed by the container manager processor cause the container manager to: receive a manifest for a container via the network slice interface; generate at least one container as defined by the manifest; generate a rule set for the generated container according to constraints in the manifest; establish a connection between the generated container and a corresponding network slice; and control communication between the generated container and the corresponding network slice according to the generated rule set. 17. The device of claim 16, wherein the instructions cause the container manager to store the manifest in the container slice register together with the generated rule set. 18. The device of claim 16, wherein the instructions cause the container manager to maintain a container focus pointer indicating an entry in the container slice register based on focus provided by an operator/user, and to give priority to the indicated entry when evaluating the rule set. 19. A method of managing containers in a device comprising a container environment and a container manager, the container environment comprising a plurality of containers each comprising one or more applications, each container being connectable to a network slice, the method comprising: receiving a manifest for a container via the network slice interface; generating a container according to the manifest; generating a rule set for the generated container according to constraints in the manifest; establishing a connection between the generated container and a corresponding network slice; and controlling communication between the generated container and the corresponding network slice according to the generated rule set. 20. The method of claim 19, further comprising storing the manifest in a container slice register. 21. The method of claim 19, further comprising maintaining a container focus pointer indicating an entry in the container slice register based on focus provided by an operator/user, and to give priority to the indicated entry when evaluating the rule set. 22. A method of operating a communication device, comprising: providing a container environment comprising a plurality of containers each having one or more applications and each being connectable to a network slice; and operating a container manager to control communication between the applications and the network slices, wherein the container manager prohibits communication between a first application in a first container and a second application in a second container. 23. The method of claim 22, wherein the communication device further comprises device resources, and the method further comprises operating the container manager to control access of applications to the device resources. 24. The method of claim 23, wherein applications in different containers share the device resources. 25. The method of claim 22, wherein each container is associated with exactly one network slice at a time. 26. The method of claim 25, wherein the association between the container and the network slice comprises using a dedicated access point name (APN) for the network slice. 27. The method of claim 25, wherein the association between the container and the network slice comprises using encrypted communication between the container and the network slice via a shared access point name (APN). 28. The method of claim 25, wherein the association between the container and the network slice comprises using tunneling between the container and the network slice. 29. The method of claim 22, wherein each container uses its own electronic subscriber identity module to access credentials for authentication and/or authorization. 30. The method of claim 22, wherein at least two of the containers use the same electronic subscriber identity module to access credentials for authentication and/or authorization. 31. The method of claim 22, wherein at least two of the network slices are served by the same operator. 32. The method of claim 22, wherein at least one of the network slices corresponds to a virtual operator. 33. The method of claim 22, wherein the container manager defines rules per container and controls communication between containers such that communication is allowed between applications in the same container and is prohibited between applications in different containers. 34. The method of claim 22, wherein the wireless device further comprises device resources, wherein each of the containers has a container configuration policy that governs access by the container to the device resources. 35. The method of claim 22, wherein the containers operate in parallel. 36. The method of claim 22, further comprising: receiving a manifest for a container via the network slice interface; generating at least one container as defined by the manifest; generating a rule set for the generated container according to constraints in the manifest; establishing a connection between the generated container and a corresponding network slice; and controlling communication between the generated container and the corresponding network slice according to the generated rule set. 37. The method of claim 36, further comprising storing the manifest in the container slice register together with the generated rule set. 38. The method of claim 36, further comprising maintaining a container focus pointer indicating an entry in the container slice register based on focus provided by an operator/user, and to give priority to the indicated entry when evaluating the rule set.
A communication device comprises a container environment with a plurality of containers each having one or more applications and each being connectable to a network slice, and a container manager configured to control communication between the applications and the network slices, wherein the container manager prohibits communication between a first application in a first container and a second application in a second container.1. A device, comprising: a container environment comprising a plurality of containers each having one or more applications and each being connectable to a network slice; and a container manager configured to control communication between the applications and the network slices, wherein the container manager prohibits communication between a first application in a first container and a second application in a second container. 2. The device of claim 1, further comprising device resources, wherein the container manager controls access of applications to the device resources. 3. The device of claim 2, wherein applications in different containers share the device resources. 4. The device of claim 1, wherein each container is associated with exactly one network slice at a time. 5. The device of claim 4, wherein the association between the container and the network slice comprises using a dedicated access point name (APN) for the network slice. 6. The device of claim 4, wherein the association between the container and the network slice comprises using encrypted communication between the container and the network slice via a shared access point name (APN). 7. The device of claim 4, wherein the association between the container and the network slice comprises using tunneling between the container and the network slice. 8. The device of claim 1, wherein each container uses its own electronic subscriber identity module (eSIM) to access credentials for authentication and/or authorization. 9. The device of claim 1, wherein at least two of the containers use the same electronic subscriber identity module (eSIM) to access credentials for authentication and/or authorization. 10. The device of claim 1, wherein at least two of the network slices are served by the same operator. 11. The device of claim 1, wherein at least one of the network slices corresponds to a virtual operator. 12. The device of claim 1, wherein the container manager defines rules per container and controls communication between containers such that communication is allowed between applications in the same container and is prohibited between applications in different containers. 13. The device of claim 1, further comprising device resources, wherein each of the containers has a container configuration policy that governs access by the container to the device resources. 14. The device of claim 1, wherein the containers operate in parallel. 15. The device of claim 1, further comprising: a device operating system; and a plurality of container operating systems each associated with a corresponding container among the plurality of containers. 16. The device of claim 1, wherein the container manager comprises: a register comprising information that identifies an association between containers and network slices; interfaces towards containers and network slices; and memory storing coded instructions that when executed by the container manager processor cause the container manager to: receive a manifest for a container via the network slice interface; generate at least one container as defined by the manifest; generate a rule set for the generated container according to constraints in the manifest; establish a connection between the generated container and a corresponding network slice; and control communication between the generated container and the corresponding network slice according to the generated rule set. 17. The device of claim 16, wherein the instructions cause the container manager to store the manifest in the container slice register together with the generated rule set. 18. The device of claim 16, wherein the instructions cause the container manager to maintain a container focus pointer indicating an entry in the container slice register based on focus provided by an operator/user, and to give priority to the indicated entry when evaluating the rule set. 19. A method of managing containers in a device comprising a container environment and a container manager, the container environment comprising a plurality of containers each comprising one or more applications, each container being connectable to a network slice, the method comprising: receiving a manifest for a container via the network slice interface; generating a container according to the manifest; generating a rule set for the generated container according to constraints in the manifest; establishing a connection between the generated container and a corresponding network slice; and controlling communication between the generated container and the corresponding network slice according to the generated rule set. 20. The method of claim 19, further comprising storing the manifest in a container slice register. 21. The method of claim 19, further comprising maintaining a container focus pointer indicating an entry in the container slice register based on focus provided by an operator/user, and to give priority to the indicated entry when evaluating the rule set. 22. A method of operating a communication device, comprising: providing a container environment comprising a plurality of containers each having one or more applications and each being connectable to a network slice; and operating a container manager to control communication between the applications and the network slices, wherein the container manager prohibits communication between a first application in a first container and a second application in a second container. 23. The method of claim 22, wherein the communication device further comprises device resources, and the method further comprises operating the container manager to control access of applications to the device resources. 24. The method of claim 23, wherein applications in different containers share the device resources. 25. The method of claim 22, wherein each container is associated with exactly one network slice at a time. 26. The method of claim 25, wherein the association between the container and the network slice comprises using a dedicated access point name (APN) for the network slice. 27. The method of claim 25, wherein the association between the container and the network slice comprises using encrypted communication between the container and the network slice via a shared access point name (APN). 28. The method of claim 25, wherein the association between the container and the network slice comprises using tunneling between the container and the network slice. 29. The method of claim 22, wherein each container uses its own electronic subscriber identity module to access credentials for authentication and/or authorization. 30. The method of claim 22, wherein at least two of the containers use the same electronic subscriber identity module to access credentials for authentication and/or authorization. 31. The method of claim 22, wherein at least two of the network slices are served by the same operator. 32. The method of claim 22, wherein at least one of the network slices corresponds to a virtual operator. 33. The method of claim 22, wherein the container manager defines rules per container and controls communication between containers such that communication is allowed between applications in the same container and is prohibited between applications in different containers. 34. The method of claim 22, wherein the wireless device further comprises device resources, wherein each of the containers has a container configuration policy that governs access by the container to the device resources. 35. The method of claim 22, wherein the containers operate in parallel. 36. The method of claim 22, further comprising: receiving a manifest for a container via the network slice interface; generating at least one container as defined by the manifest; generating a rule set for the generated container according to constraints in the manifest; establishing a connection between the generated container and a corresponding network slice; and controlling communication between the generated container and the corresponding network slice according to the generated rule set. 37. The method of claim 36, further comprising storing the manifest in the container slice register together with the generated rule set. 38. The method of claim 36, further comprising maintaining a container focus pointer indicating an entry in the container slice register based on focus provided by an operator/user, and to give priority to the indicated entry when evaluating the rule set.
2,400
8,737
8,737
15,368,390
2,449
Systems, software, and methods for managing traditional (i.e., TCP/IP-based), non-traditional, and traditional-non-traditional hybrid networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device, application or service on a network. In another example, information related to at least one aspect of the network is obtained by a network management device through connection to a non-TCP/IP network, or by way of a gateway device or application, at least one applicable management policy is identified, and the identified policy is used to manage at least one aspect of the network's operation. In another example, devices, applications or services presenting various behaviors under various scenarios are evaluated and placed under management.
1. A network management system comprising: a network management device processor operably connected to a network infrastructure, the network management device processor executing a first discovery application to interrogate a network connected device, the network management processor executing a plurality of database discovery applications each configured to discover a different operating characteristic of databases on network connected devices; the network management device processor being further configured to: identify information about a discovered network device that indicate a database may be on each network connected device that responds to an initial interrogation by the network management processor; select and execute a first of the plurality of database discovery applications for gathering first information about a database operating on each network connected device that responds to the interrogation; use the first information to select and execute a second of the plurality of database discovery applications for gathering second information about each database identified by the first information; and iterate the selection and execution of additional of the plurality of database discovery applications wherein selection of each additional database discovery application is based on information gathered by a previously executed one of the plurality of database discovery applications. 2. The network management system of claim 1 wherein the network management device processor operates to configure a port mapping operation to interrogate a range of ports including one or more ports associated with database usage. 3. The network management system of claim 1 wherein selection of the first of the plurality of database discovery applications is dependent on one or more port numbers identified by the interrogation. 4. The network management system of claim 3 wherein the first information comprises a database type and selection of the second of the plurality of database discovery applications is dependent on the database type. 5. The network management system of claim 1 wherein the network management device processor operates to gain access to each network connected device that responds to the interrogation using Authorization and Authentication (A&A) materials available thereto. 6. The network management system of claim 1 wherein the plurality of database discover applications includes one or more database discovery applications operable to identify a plurality of database instances operating on the same network connected device. 7. The network management system of claim 1 wherein the network management device processor operates to select and execute database discovery applications configured to identify a database type of a database instance discovered by a previously executed one of the plurality of database discovery applications. 8. The network management system of claim 7 wherein based on the database type, the network management device processor iterates selection and execution of additional of subsequent database discovery applications that are specific to the database type. 9. The network management system of claim 8 wherein iterated selection and execution of additional of subsequent database discovery applications provide additional information that includes at least one of a database name, a database schema, metadata about the database schema, a revision level of the database and one or more aspects of the database that require monitoring or control by the network management device processor. 10. The network management system of claim 7 wherein based on database type, the network management device processor operates to compare the database type with one or more templates, accessible to the network management device processor, wherein each template specifies configurations of a particular database type to be managed by an asset manager operating on the network management device processor and to iterate selection and execution of additional of the plurality of database discovery applications to discover template specified configurations for the database type. 11. The network management system of claim 7 wherein the network management device processor is operable to create a terminal session and issue commands in order to interrogate a schema associated with the database instance. 12. The network management system of claim 11 wherein the network management device processor is operable to issue a show tables command to the database instance. 13. The network management system of claim 12 wherein the network management device processor is operable to issue a describe table command. 14. The network management system of claim 1 further comprising a data storage device, operably connected to the network infrastructure, configured to store the plurality of database discovery applications, the network management device processor being operable to select from the plurality of database discovery applications stored by the data storage device and to execute the selected database discovery application on the network management device processor. 15. The network management system of claim 1 wherein the network connected devices that respond to the interrogation comprise devices connected to different networks. 16. The network management system of claim 1 wherein the network management device processor is further configured to execute a collector application operable to collect, aggregate and manage results of the port mapping operation and to collect aggregate and manage first, second and other information gathered by a previously executed one of the plurality of database discovery applications and to conform data associated with the gathered information to one or more relevant data definition templates associated with characterizing a database. 17. The network management system of claim 16 further comprising the network management device processor executing a classifier application operable to review a data definition template provided by the collector application and to identify, for each database operating on a network connected device, further data usable to place the database under management. 18. The network management system of claim 17 further comprising the network management device processor is further configured to execute a recognizer application operable to review the further data usable to place the network connected device under management and to select a further task specific database discovery application that collects the further data usable to place the database application under management. 19. The network management system of claim 1 wherein the plurality of database discovery applications includes at least one database discovery application operable to communicate with databases using a structured query language (SQL). 20. The network management system of claim 1 wherein the plurality of database specific discovery applications includes at least one database specific discovery application operable to communicate with any one of an Oracle, Sybase, Postgress, MySQL and a Microsoft SQL server to discover database characteristics and manage database instances. 21. A network management method comprising: executing, by a network management device processor operably connected to a network infrastructure, a network management application; executing, by the network management device processor, a first discovery application configured to perform a port mapping operation; parsing, by the network management device processor, the results of the port mapping operation to identify ports that fit a pattern of ports associated with database usage on the network; selecting and executing, by the network management device processor, a first of a plurality of database discovery applications for gathering first information about a database operating on each network connected device that responds to the port mapping operation on a port associated with database usage; receiving, by the network management device processor, from each first database discovery application, the first information; interpreting, by the network management device processor, the first information; selecting and executing, by the network management device processor, based on the first information, a second of the plurality of database discover applications for gathering second information about each database instance identified by the first information; and iterating interpreting, by the network management device processor, information gathered by a previously executed one of the plurality of database discovery applications and selecting and executing, by the network management device processor, subsequent of the plurality of database discovery applications to discover further information about each database instance identified by the first information. 22. The network management method of claim 21 further including configuring the port mapping operation to interrogate a range of ports including ports associated with database usage. 23. The network management method of claim 21 wherein selecting the first of the plurality of database discovery applications is dependent on port number. 24. The network management method of claim 23 wherein the first information comprises a database type and selecting the second of the plurality of database discovery applications is dependent on the database type. 25. The network management method of claim 21 further comprising using Authorization and Authentication (A&A) materials available thereto to gain access to each network connected device that responds to the interrogation. 26. The network management method of claim 21 wherein the plurality of database discover applications includes one or more database discovery applications operable to identify a plurality of database instances operating on the same network connected device. 27. The network management method of claim 21 further including selecting and executing database discovery applications configured to identify a database type of a database instance discovered by a previously executed one of the plurality of database discovery applications. 28. The network management method of claim 27 further including iterating selection and execution of additional of subsequent database discovery applications that are specific to the database type. 29. The network management method of claim 28 wherein iterating selection and execution of additional of subsequent database discovery applications provide additional information that includes at least one of a database name, a database schema, metadata about the database schema, a revision level of the database and one or more aspects of the database that require monitoring or control by the network management device processor. 30. The network management method of claim 27 further including, based on database type, comparing the database type with one or more templates, accessible to the network management device processor, wherein each template specifies configurations of a particular database type to be managed by an asset manager operating on the network management device processor and to iterate selection and execution of additional of the plurality of database discovery applications to discover template specified configurations for the database type. 31. The network management method of claim 27 further including creating a terminal session and issue commands to a schema associated with the database instance. 32. The network management method of claim 31 further including issuing a show tables command to the database instance. 33. The network management method of claim 32 further including issuing a describe table command. 34. The network management method of claim 21 further comprising storing the plurality of database discovery applications in a data storage device operably connected to the network infrastructure, and selecting from the plurality of database discovery applications stored by the data storage device and executing the selected database discovery application on the network management device processor. 35. The network management method of claim 21 further including receiving responses to the port mapping operation from different networks. 36. The network management method of claim 21 further including executing a collector application to collect, aggregate and manage results of the port mapping operation and to collect, aggregate and manage first, second and other information gathered by a previously executed one(s) of the plurality of database discovery applications and conforming data associated with the gathered information to one or more relevant data definition templates associated with characterizing a database. 37. The network management method of claim 36 further comprising executing a classifier application operable to review a data definition template provided by the collector application and to identify, for each database operating on a network connected device, further data usable to place the database under management. 38. The network management method of claim 37 further comprising executing a recognizer application operable to review the further data usable to place the network connected device under management and to select a further task specific database discovery application that collects the further data usable to place the database application under management. 39. The network management method of claim 21 further including at least one database discovery application communicating with databases using a structured query language (SQL). 40. The network management method of claim 21 wherein the plurality of database specific discovery applications includes at least one database specific discovery application operable to communicate with any one of an Oracle, Sybase, Postgress, MySQL and a Microsoft SQL server to discover database characteristics and manage database instances.
Systems, software, and methods for managing traditional (i.e., TCP/IP-based), non-traditional, and traditional-non-traditional hybrid networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device, application or service on a network. In another example, information related to at least one aspect of the network is obtained by a network management device through connection to a non-TCP/IP network, or by way of a gateway device or application, at least one applicable management policy is identified, and the identified policy is used to manage at least one aspect of the network's operation. In another example, devices, applications or services presenting various behaviors under various scenarios are evaluated and placed under management.1. A network management system comprising: a network management device processor operably connected to a network infrastructure, the network management device processor executing a first discovery application to interrogate a network connected device, the network management processor executing a plurality of database discovery applications each configured to discover a different operating characteristic of databases on network connected devices; the network management device processor being further configured to: identify information about a discovered network device that indicate a database may be on each network connected device that responds to an initial interrogation by the network management processor; select and execute a first of the plurality of database discovery applications for gathering first information about a database operating on each network connected device that responds to the interrogation; use the first information to select and execute a second of the plurality of database discovery applications for gathering second information about each database identified by the first information; and iterate the selection and execution of additional of the plurality of database discovery applications wherein selection of each additional database discovery application is based on information gathered by a previously executed one of the plurality of database discovery applications. 2. The network management system of claim 1 wherein the network management device processor operates to configure a port mapping operation to interrogate a range of ports including one or more ports associated with database usage. 3. The network management system of claim 1 wherein selection of the first of the plurality of database discovery applications is dependent on one or more port numbers identified by the interrogation. 4. The network management system of claim 3 wherein the first information comprises a database type and selection of the second of the plurality of database discovery applications is dependent on the database type. 5. The network management system of claim 1 wherein the network management device processor operates to gain access to each network connected device that responds to the interrogation using Authorization and Authentication (A&A) materials available thereto. 6. The network management system of claim 1 wherein the plurality of database discover applications includes one or more database discovery applications operable to identify a plurality of database instances operating on the same network connected device. 7. The network management system of claim 1 wherein the network management device processor operates to select and execute database discovery applications configured to identify a database type of a database instance discovered by a previously executed one of the plurality of database discovery applications. 8. The network management system of claim 7 wherein based on the database type, the network management device processor iterates selection and execution of additional of subsequent database discovery applications that are specific to the database type. 9. The network management system of claim 8 wherein iterated selection and execution of additional of subsequent database discovery applications provide additional information that includes at least one of a database name, a database schema, metadata about the database schema, a revision level of the database and one or more aspects of the database that require monitoring or control by the network management device processor. 10. The network management system of claim 7 wherein based on database type, the network management device processor operates to compare the database type with one or more templates, accessible to the network management device processor, wherein each template specifies configurations of a particular database type to be managed by an asset manager operating on the network management device processor and to iterate selection and execution of additional of the plurality of database discovery applications to discover template specified configurations for the database type. 11. The network management system of claim 7 wherein the network management device processor is operable to create a terminal session and issue commands in order to interrogate a schema associated with the database instance. 12. The network management system of claim 11 wherein the network management device processor is operable to issue a show tables command to the database instance. 13. The network management system of claim 12 wherein the network management device processor is operable to issue a describe table command. 14. The network management system of claim 1 further comprising a data storage device, operably connected to the network infrastructure, configured to store the plurality of database discovery applications, the network management device processor being operable to select from the plurality of database discovery applications stored by the data storage device and to execute the selected database discovery application on the network management device processor. 15. The network management system of claim 1 wherein the network connected devices that respond to the interrogation comprise devices connected to different networks. 16. The network management system of claim 1 wherein the network management device processor is further configured to execute a collector application operable to collect, aggregate and manage results of the port mapping operation and to collect aggregate and manage first, second and other information gathered by a previously executed one of the plurality of database discovery applications and to conform data associated with the gathered information to one or more relevant data definition templates associated with characterizing a database. 17. The network management system of claim 16 further comprising the network management device processor executing a classifier application operable to review a data definition template provided by the collector application and to identify, for each database operating on a network connected device, further data usable to place the database under management. 18. The network management system of claim 17 further comprising the network management device processor is further configured to execute a recognizer application operable to review the further data usable to place the network connected device under management and to select a further task specific database discovery application that collects the further data usable to place the database application under management. 19. The network management system of claim 1 wherein the plurality of database discovery applications includes at least one database discovery application operable to communicate with databases using a structured query language (SQL). 20. The network management system of claim 1 wherein the plurality of database specific discovery applications includes at least one database specific discovery application operable to communicate with any one of an Oracle, Sybase, Postgress, MySQL and a Microsoft SQL server to discover database characteristics and manage database instances. 21. A network management method comprising: executing, by a network management device processor operably connected to a network infrastructure, a network management application; executing, by the network management device processor, a first discovery application configured to perform a port mapping operation; parsing, by the network management device processor, the results of the port mapping operation to identify ports that fit a pattern of ports associated with database usage on the network; selecting and executing, by the network management device processor, a first of a plurality of database discovery applications for gathering first information about a database operating on each network connected device that responds to the port mapping operation on a port associated with database usage; receiving, by the network management device processor, from each first database discovery application, the first information; interpreting, by the network management device processor, the first information; selecting and executing, by the network management device processor, based on the first information, a second of the plurality of database discover applications for gathering second information about each database instance identified by the first information; and iterating interpreting, by the network management device processor, information gathered by a previously executed one of the plurality of database discovery applications and selecting and executing, by the network management device processor, subsequent of the plurality of database discovery applications to discover further information about each database instance identified by the first information. 22. The network management method of claim 21 further including configuring the port mapping operation to interrogate a range of ports including ports associated with database usage. 23. The network management method of claim 21 wherein selecting the first of the plurality of database discovery applications is dependent on port number. 24. The network management method of claim 23 wherein the first information comprises a database type and selecting the second of the plurality of database discovery applications is dependent on the database type. 25. The network management method of claim 21 further comprising using Authorization and Authentication (A&A) materials available thereto to gain access to each network connected device that responds to the interrogation. 26. The network management method of claim 21 wherein the plurality of database discover applications includes one or more database discovery applications operable to identify a plurality of database instances operating on the same network connected device. 27. The network management method of claim 21 further including selecting and executing database discovery applications configured to identify a database type of a database instance discovered by a previously executed one of the plurality of database discovery applications. 28. The network management method of claim 27 further including iterating selection and execution of additional of subsequent database discovery applications that are specific to the database type. 29. The network management method of claim 28 wherein iterating selection and execution of additional of subsequent database discovery applications provide additional information that includes at least one of a database name, a database schema, metadata about the database schema, a revision level of the database and one or more aspects of the database that require monitoring or control by the network management device processor. 30. The network management method of claim 27 further including, based on database type, comparing the database type with one or more templates, accessible to the network management device processor, wherein each template specifies configurations of a particular database type to be managed by an asset manager operating on the network management device processor and to iterate selection and execution of additional of the plurality of database discovery applications to discover template specified configurations for the database type. 31. The network management method of claim 27 further including creating a terminal session and issue commands to a schema associated with the database instance. 32. The network management method of claim 31 further including issuing a show tables command to the database instance. 33. The network management method of claim 32 further including issuing a describe table command. 34. The network management method of claim 21 further comprising storing the plurality of database discovery applications in a data storage device operably connected to the network infrastructure, and selecting from the plurality of database discovery applications stored by the data storage device and executing the selected database discovery application on the network management device processor. 35. The network management method of claim 21 further including receiving responses to the port mapping operation from different networks. 36. The network management method of claim 21 further including executing a collector application to collect, aggregate and manage results of the port mapping operation and to collect, aggregate and manage first, second and other information gathered by a previously executed one(s) of the plurality of database discovery applications and conforming data associated with the gathered information to one or more relevant data definition templates associated with characterizing a database. 37. The network management method of claim 36 further comprising executing a classifier application operable to review a data definition template provided by the collector application and to identify, for each database operating on a network connected device, further data usable to place the database under management. 38. The network management method of claim 37 further comprising executing a recognizer application operable to review the further data usable to place the network connected device under management and to select a further task specific database discovery application that collects the further data usable to place the database application under management. 39. The network management method of claim 21 further including at least one database discovery application communicating with databases using a structured query language (SQL). 40. The network management method of claim 21 wherein the plurality of database specific discovery applications includes at least one database specific discovery application operable to communicate with any one of an Oracle, Sybase, Postgress, MySQL and a Microsoft SQL server to discover database characteristics and manage database instances.
2,400
8,738
8,738
15,327,957
2,467
A method is provided of replacing a first drone base station with a second drone base station, the first drone base station, the method comprising: sending by the first drone base station first pilot signals indicating a cell identifier; receiving by the first drone base station information that the second drone base station is in the vicinity of the first drone base station; sending by the second drone base station second pilot signals which indicate the same cell identifier as the first drone base station; receiving by the first drone base station from the second drone base station an indication to cease to send first pilot signals;and dependent upon receiving by the first drone base station from the second drone base station the indication to cease to send first pilot signals, ceasing by the first drone base station the sending of first pilot signals.
1. A method of replacing a first drone base station with a second drone base station, the method comprising: sending by the first drone base station first pilot signals indicating a cell identifier; receiving by the first drone base station information that the second drone base station is in the vicinity of the first drone base station; sending by the second drone base station second pilot signals which indicate the same cell identifier as the first drone base station; receiving by the first drone base station from the second drone base station an indication to cease to send first pilot signals; and dependent upon receiving by the first drone base station from the second drone base station the indication to cease to send first pilot signals, ceasing by the first drone base station the sending of first pilot signals. 2. A method according to claim 1, further comprising: upon said receiving by the first drone base station information that the second drone base station is in the vicinity, transferring user context information of connections of the first drone base station with user terminals from the first drone base station to the second drone base station; switching uplink user data connections with the plurality of user terminals from the first drone base station to both the first drone base station and the second drone base station, and then switching the uplink user data connections with the plurality of user terminals to the second drone base station but not the first drone base station. 3. A method according to claim 2, in which the switching the uplink user data connections with the plurality of user terminals to the second drone base station but not the first drone base station comprises the second drone base station sending an instruction to the first drone base station to stop uplink reception and the first drone base station sending an acknowledgement. 4. A method according to claim 3, in which the acknowledgement is sent together with user context data of uplink user data that has been received and forwarded by the first drone base station towards a backhaul node. 5. A method according to claim 1, further comprising switching the path for downlink user data from via the first drone base station to via the second drone base station by making use of IP addresses to differentiate between the first and second drone base stations. 6. A method according to claim 5, in which said switching the path for downlink user data is triggered by the second drone base station sending a request for switching the path for downlink user data. 7. A method according to claim 1, in which the second drone base station uses the same radio frequency band as the first base station. 8. A first drone base station configured to be replaced by a second drone base station, the first drone base station comprising: sending logic configured to send first pilot signals indicating a cell identifier; receiving logic configured to receive information that the second drone base station is in the vicinity of the first drone base station, the second base station being configured to send second pilot signals which indicate the same cell identifier as the first drone base station; indication receiving logic configured to receive from the second drone base station an indication to cease to send first pilot signals; and ceasing logic configured to cease the sending of first pilot signals dependent upon receiving from the second drone base station the indication to cease to send first pilot signals. 9. A first drone base station according to claim 8, further comprising: user context information sending logic configured to, upon being informed that the second drone base station is in the vicinity, send user context information of connections with user terminals towards the second drone base station; reception logic configured to receive an instruction to stop uplink reception; and stopping logic configured to, in response, stop uplink user data connections with the plurality of user terminals to the first drone base station and acknowledgement logic configured to send an acknowledgment of the instruction towards the second base station. 10. A first drone base station according to claim 9, comprising user context data sending logic configured to send, together with the acknowledgement, user context data of uplink user data that has been received and forwarded by the first drone base station to a backhaul node. 11. A second drone base station configured to replace a first drone base station that is configured to send first pilot signals indicating a cell identifier, the second drone base station comprising: receiving logic configured to receive a command to fly to a given location in the vicinity of the first drone base station, transmitting logic configured to transmit a signal indicating that the location has been flown to, sending logic configured to send from the second drone base station second pilot signals which indicate the same cell identifier as the first drone base station; indication sending logic configured to send towards the first drone base station an indication to cease to send first pilot signals. 12. A second drone base station according to claim 11, further comprising: reception logic configured to receive user context information from the first drone base station of the connections with the plurality of user terminals, undertaking logic configured to undertake uplink reception, instruction sending logic configured to send towards the first drone base station an instruction to stop uplink reception so as to have the uplink user data connections with the plurality of user terminals with the second drone base station but not with the first drone base station, acknowledgement receiving logic configured to receive from the first base station an acknowledgement of the instruction. 13. A second drone base station according to claim 1, further comprising: logic configured to send an instruction towards a backhaul node to switch the path for downlink user data from via the first drone base station to via the second drone base station by making use of IP addresses to differentiate between the first and second base stations. 14. A controller for controlling drone base station replacement, the controller comprising: receiving logic configured to receive a message indicating that a first drone base station which sends first pilot signals indicating a cell identifier should be replaced; sending logic configured to send a command towards a second drone base station to fly to a given location in the vicinity of the first drone base station, indication receiving logic configured to receive an indication from the second drone base station that the second drone base station has arrived at the given location, indication sending logic configured to send an indication towards the first base station that the second drone base station is now in the vicinity of the first drone base station, the indication being a trigger for the second drone base station, upon sending second pilot signals which indicate the same cell identifier as the first drone base station, to send to the first drone base station an indication to cease to send first pilot signals, and commanding logic configured to command the first drone base station to fly away. 15. A controller according to claim 14, comprising reception logic configured to receive a request from the second drone base station for downlink user data to be sent to the second drone base station instead of the first drone base station by making use of IP addresses to differentiate between the first and second base stations, and switching logic configured to in response to receiving the request switch to sending the downlink user data via the second drone base station.
A method is provided of replacing a first drone base station with a second drone base station, the first drone base station, the method comprising: sending by the first drone base station first pilot signals indicating a cell identifier; receiving by the first drone base station information that the second drone base station is in the vicinity of the first drone base station; sending by the second drone base station second pilot signals which indicate the same cell identifier as the first drone base station; receiving by the first drone base station from the second drone base station an indication to cease to send first pilot signals;and dependent upon receiving by the first drone base station from the second drone base station the indication to cease to send first pilot signals, ceasing by the first drone base station the sending of first pilot signals.1. A method of replacing a first drone base station with a second drone base station, the method comprising: sending by the first drone base station first pilot signals indicating a cell identifier; receiving by the first drone base station information that the second drone base station is in the vicinity of the first drone base station; sending by the second drone base station second pilot signals which indicate the same cell identifier as the first drone base station; receiving by the first drone base station from the second drone base station an indication to cease to send first pilot signals; and dependent upon receiving by the first drone base station from the second drone base station the indication to cease to send first pilot signals, ceasing by the first drone base station the sending of first pilot signals. 2. A method according to claim 1, further comprising: upon said receiving by the first drone base station information that the second drone base station is in the vicinity, transferring user context information of connections of the first drone base station with user terminals from the first drone base station to the second drone base station; switching uplink user data connections with the plurality of user terminals from the first drone base station to both the first drone base station and the second drone base station, and then switching the uplink user data connections with the plurality of user terminals to the second drone base station but not the first drone base station. 3. A method according to claim 2, in which the switching the uplink user data connections with the plurality of user terminals to the second drone base station but not the first drone base station comprises the second drone base station sending an instruction to the first drone base station to stop uplink reception and the first drone base station sending an acknowledgement. 4. A method according to claim 3, in which the acknowledgement is sent together with user context data of uplink user data that has been received and forwarded by the first drone base station towards a backhaul node. 5. A method according to claim 1, further comprising switching the path for downlink user data from via the first drone base station to via the second drone base station by making use of IP addresses to differentiate between the first and second drone base stations. 6. A method according to claim 5, in which said switching the path for downlink user data is triggered by the second drone base station sending a request for switching the path for downlink user data. 7. A method according to claim 1, in which the second drone base station uses the same radio frequency band as the first base station. 8. A first drone base station configured to be replaced by a second drone base station, the first drone base station comprising: sending logic configured to send first pilot signals indicating a cell identifier; receiving logic configured to receive information that the second drone base station is in the vicinity of the first drone base station, the second base station being configured to send second pilot signals which indicate the same cell identifier as the first drone base station; indication receiving logic configured to receive from the second drone base station an indication to cease to send first pilot signals; and ceasing logic configured to cease the sending of first pilot signals dependent upon receiving from the second drone base station the indication to cease to send first pilot signals. 9. A first drone base station according to claim 8, further comprising: user context information sending logic configured to, upon being informed that the second drone base station is in the vicinity, send user context information of connections with user terminals towards the second drone base station; reception logic configured to receive an instruction to stop uplink reception; and stopping logic configured to, in response, stop uplink user data connections with the plurality of user terminals to the first drone base station and acknowledgement logic configured to send an acknowledgment of the instruction towards the second base station. 10. A first drone base station according to claim 9, comprising user context data sending logic configured to send, together with the acknowledgement, user context data of uplink user data that has been received and forwarded by the first drone base station to a backhaul node. 11. A second drone base station configured to replace a first drone base station that is configured to send first pilot signals indicating a cell identifier, the second drone base station comprising: receiving logic configured to receive a command to fly to a given location in the vicinity of the first drone base station, transmitting logic configured to transmit a signal indicating that the location has been flown to, sending logic configured to send from the second drone base station second pilot signals which indicate the same cell identifier as the first drone base station; indication sending logic configured to send towards the first drone base station an indication to cease to send first pilot signals. 12. A second drone base station according to claim 11, further comprising: reception logic configured to receive user context information from the first drone base station of the connections with the plurality of user terminals, undertaking logic configured to undertake uplink reception, instruction sending logic configured to send towards the first drone base station an instruction to stop uplink reception so as to have the uplink user data connections with the plurality of user terminals with the second drone base station but not with the first drone base station, acknowledgement receiving logic configured to receive from the first base station an acknowledgement of the instruction. 13. A second drone base station according to claim 1, further comprising: logic configured to send an instruction towards a backhaul node to switch the path for downlink user data from via the first drone base station to via the second drone base station by making use of IP addresses to differentiate between the first and second base stations. 14. A controller for controlling drone base station replacement, the controller comprising: receiving logic configured to receive a message indicating that a first drone base station which sends first pilot signals indicating a cell identifier should be replaced; sending logic configured to send a command towards a second drone base station to fly to a given location in the vicinity of the first drone base station, indication receiving logic configured to receive an indication from the second drone base station that the second drone base station has arrived at the given location, indication sending logic configured to send an indication towards the first base station that the second drone base station is now in the vicinity of the first drone base station, the indication being a trigger for the second drone base station, upon sending second pilot signals which indicate the same cell identifier as the first drone base station, to send to the first drone base station an indication to cease to send first pilot signals, and commanding logic configured to command the first drone base station to fly away. 15. A controller according to claim 14, comprising reception logic configured to receive a request from the second drone base station for downlink user data to be sent to the second drone base station instead of the first drone base station by making use of IP addresses to differentiate between the first and second base stations, and switching logic configured to in response to receiving the request switch to sending the downlink user data via the second drone base station.
2,400
8,739
8,739
15,834,362
2,468
A system includes a subscription storage that stores an APN for identifying a home base station and the service class available for a UE as subscription information, in correspondence with a mobile terminal identifier for identifying UE; a positional information update request receiver for receiving a positional information update request of UE 70 from an MME; and a positional information response transmitter that extracts the available service class included in the positional information update request, from the subscription storage and transmits a positional information update response included with the extracted service class to MME. With this configuration, it is possible to provide a mobile communication system in which, for a plurality of services of a home base station, the owner of a home base station can set the access right for each of the services, and communication data is transferred based on the set access right.
1. A mobile station in a communication system, wherein the communication system is configured to contain the mobile station; a base station; a core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the mobile station is configured to store a first Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed, the mobile station is configured to transmit a PDN Connectivity Request message containing the first APN to the core network, in order to request an establishment of a PDN connection, the mobile station is configured to receive a response with respect to the PDN Connectivity Request message containing the first APN and establish a first PDN connection with an access control apparatus contained in the base station, and the mobile station is configured to transmit data to and receive data from the network, through the first PDN connection. 2. The mobile station in according to claim 1, wherein the mobile station is configured to store a second APN in correspondence with allowance information indicating that the first connection service is disallowed and the second connection service is allowed, the mobile station is configured to transmit a PDN Connectivity Request message containing the second APN to the core network, in order to request an establishment of a PDN connection, the mobile station is configured to receive a response with respect to the PDN Connectivity Request message containing the second APN and establish a second PDN connection with the access control apparatus contained in the base station, and the mobile station is configured to transmit communication data to and receive communication data from the foreign PDN, by selecting the second PDN connection. 3. The mobile station in according to claim 1, wherein the foreign PDN is an Internet. 4. A position management apparatus with in a core network in a communication system, wherein the communication system is configured to contain a mobile station; a base station; the core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the position management apparatus is configured to store a first Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed, the position management apparatus is configured to receive a PDN Connectivity Request message containing an APN transmitted from the mobile station, the position management apparatus is configured to allow to establish a first PDN connection for the first connection service between the mobile station and an access control apparatus contained in the base station when the APN transmitted from the mobile station and the first APN is identical, the position management apparatus is configured to transmit a bearer establishment request message containing the first APN to the mobile station, the bearer establishment request message being a response to the PDN Connectivity Request message containing the first APN. 5. The position management apparatus in according to claim 4, wherein the position management apparatus is configured to store a second APN in correspondence with allowance information indicating that the first connection service is disallowed and the second connection service is allowed, the position management apparatus is configured to receive a PDN Connectivity Request message containing the APN transmitted from the mobile station, the position management apparatus is configured to allow to establish a second PDN connection for the second connection service between the mobile station and the access control apparatus contained in the base station, and the position management apparatus is configured to transmit a bearer establishment request message containing the second APN to the mobile station, the bearer establishment request message being a response to the PDN Connectivity Request message containing the second APN. 6. The position management apparatus in according to claim 4, wherein the foreign PDN is an Internet. 7. A base station in a communication system, wherein the communication system is configured to contain a mobile station; the base station; a core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the base station is configured to receive a bearer establishment request message containing a first Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed from a position management apparatus within the core network, the bearer establishment request message being a response to a PDN Connectivity Request message transmitted from the mobile station, the base station is configured to establish a first PDN connection for the first connection service with the mobile station. 8. A base station in a communication system, wherein the communication system is configured to contain a mobile station; the base station; a core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the base station is configured to receive a bearer establishment request message containing a second Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed from a position management apparatus within the core network, the bearer establishment request message being a response to a PDN Connectivity Request message transmitted from the mobile station, the base station is configured to establish a second PDN connection for the second connection service with the mobile station. 9. The base station according to claim 7, wherein the foreign PDN is an Internet. 10. The base station according to claim 8, wherein the foreign PDN is an Internet.
A system includes a subscription storage that stores an APN for identifying a home base station and the service class available for a UE as subscription information, in correspondence with a mobile terminal identifier for identifying UE; a positional information update request receiver for receiving a positional information update request of UE 70 from an MME; and a positional information response transmitter that extracts the available service class included in the positional information update request, from the subscription storage and transmits a positional information update response included with the extracted service class to MME. With this configuration, it is possible to provide a mobile communication system in which, for a plurality of services of a home base station, the owner of a home base station can set the access right for each of the services, and communication data is transferred based on the set access right.1. A mobile station in a communication system, wherein the communication system is configured to contain the mobile station; a base station; a core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the mobile station is configured to store a first Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed, the mobile station is configured to transmit a PDN Connectivity Request message containing the first APN to the core network, in order to request an establishment of a PDN connection, the mobile station is configured to receive a response with respect to the PDN Connectivity Request message containing the first APN and establish a first PDN connection with an access control apparatus contained in the base station, and the mobile station is configured to transmit data to and receive data from the network, through the first PDN connection. 2. The mobile station in according to claim 1, wherein the mobile station is configured to store a second APN in correspondence with allowance information indicating that the first connection service is disallowed and the second connection service is allowed, the mobile station is configured to transmit a PDN Connectivity Request message containing the second APN to the core network, in order to request an establishment of a PDN connection, the mobile station is configured to receive a response with respect to the PDN Connectivity Request message containing the second APN and establish a second PDN connection with the access control apparatus contained in the base station, and the mobile station is configured to transmit communication data to and receive communication data from the foreign PDN, by selecting the second PDN connection. 3. The mobile station in according to claim 1, wherein the foreign PDN is an Internet. 4. A position management apparatus with in a core network in a communication system, wherein the communication system is configured to contain a mobile station; a base station; the core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the position management apparatus is configured to store a first Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed, the position management apparatus is configured to receive a PDN Connectivity Request message containing an APN transmitted from the mobile station, the position management apparatus is configured to allow to establish a first PDN connection for the first connection service between the mobile station and an access control apparatus contained in the base station when the APN transmitted from the mobile station and the first APN is identical, the position management apparatus is configured to transmit a bearer establishment request message containing the first APN to the mobile station, the bearer establishment request message being a response to the PDN Connectivity Request message containing the first APN. 5. The position management apparatus in according to claim 4, wherein the position management apparatus is configured to store a second APN in correspondence with allowance information indicating that the first connection service is disallowed and the second connection service is allowed, the position management apparatus is configured to receive a PDN Connectivity Request message containing the APN transmitted from the mobile station, the position management apparatus is configured to allow to establish a second PDN connection for the second connection service between the mobile station and the access control apparatus contained in the base station, and the position management apparatus is configured to transmit a bearer establishment request message containing the second APN to the mobile station, the bearer establishment request message being a response to the PDN Connectivity Request message containing the second APN. 6. The position management apparatus in according to claim 4, wherein the foreign PDN is an Internet. 7. A base station in a communication system, wherein the communication system is configured to contain a mobile station; the base station; a core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the base station is configured to receive a bearer establishment request message containing a first Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed from a position management apparatus within the core network, the bearer establishment request message being a response to a PDN Connectivity Request message transmitted from the mobile station, the base station is configured to establish a first PDN connection for the first connection service with the mobile station. 8. A base station in a communication system, wherein the communication system is configured to contain a mobile station; the base station; a core network; a network with which the mobile station is communicatable via the base station without passing through the core network; and a foreign Packet Data Network (PDN), and the communication system is configured to provide: a first connection service for directly connecting from the base station to the network; and a second connection service for connecting to the foreign PDN without passing through the core network, wherein the base station is configured to receive a bearer establishment request message containing a second Access Point Name (APN) in correspondence with allowance information indicating that the first connection service is allowed and the second connection service is disallowed from a position management apparatus within the core network, the bearer establishment request message being a response to a PDN Connectivity Request message transmitted from the mobile station, the base station is configured to establish a second PDN connection for the second connection service with the mobile station. 9. The base station according to claim 7, wherein the foreign PDN is an Internet. 10. The base station according to claim 8, wherein the foreign PDN is an Internet.
2,400
8,740
8,740
15,008,459
2,439
A system includes first electronic devices and a digital signature carrier. Each of the first electronic devices has a network identifier distinct from another. The digital signature carrier is configured for recording a connective information list. The connective information list includes the network identifiers of all of the first electronic devices. A second electronic device includes a digital signature reader. The second electronic device is configured to read the digital signature carrier by the digital signature reader, extract the connective information list comprising the network identifiers and pair the second electronic device with each of the first electronic devices according to the network identifiers.
1. A system, comprising: a plurality of first electronic devices, each of the first electronic devices having a network identifier distinct from another; and a digital signature carrier, configured for recording a connective information list, the connective information list comprising the network identifiers of all of the first electronic devices; wherein a second electronic device comprising a digital signature reader is configured to read the digital signature carrier by the digital signature reader, extract the connective information list comprising the network identifiers and pair the second electronic device with each of the first electronic devices according to the network identifiers. 2. The system of claim 1, further comprising: a digital signature producer, configured for gathering the network identifier from each of the first electronic devices and integrating the network identifiers of all of the first electronic devices into the digital signature carrier before the first electronic devices are packed as bundle products for sale. 3. The system of claim 2, wherein the digital signature carrier is a barcode label or a Quick Response (QR) code label, the digital signature producer is configured to print the barcode label or the QR code label, and the digital signature carrier is attached to the bundle products. 4. The system, of claim 3, wherein the digital signature reader comprises an image-capturing unit, the image-capturing unit is configured to scan the barcode label or the Quick Response (QR) code label. 5. The system of claim 2, wherein the digital signature carrier is a Near Field Communication (NFC) tag or a Radio Frequency Identification (RFID) tag, the digital signature producer is configured to write the connective information list into the NFC tag or the RFID tag, and the digital signature carrier is attached to the bundle products. 6. The system of claim 5, wherein the digital signature reader comprises a NFC receiver or a RFID receiver, the NFC reader or the RFID reader is configured to read the NFC tag or the RFID tag wirelessly. 7. The system of claim 1, wherein the network identifiers are Media Access Control (MAC) addresses of the first electronic devices. 8. The system of claim 1, wherein the connective information list further records a connective mapping between the first electronic devices. 9. The system of claim 8, wherein the second electronic device is configured to send a connective command to at least two of the first electronic devices according to the connective mapping, the connective command is configured to trigger the at least two of the first electronic devices to be paired with one another. 10. The system of claim 1, wherein during one of the first electronic devices is searching for an available wireless access point, the second electronic device is configured to provide a Service Set Identifier (SSID) to the one of the first electronic devices, the Service Set identifier corresponds to a wireless access point previously connected with the second electronic device. 11. A method, comprising: gathering network identifiers from a plurality of first electronic devices, each of the network identifiers being distinct from another; integrating the network identifiers of all of the first electronic devices into a connective information list recorded in a digital signature carrier; and attaching the digital signature carrier to the first electronic devices. 12. The method of claim 11, wherein the digital signature carrier is integrated and attached to the first electronic devices before the first electronic devices are packed as bundle products for sale. 13. The method of claim 12, wherein the digital signature carrier is a barcode label or a Quick Response (QR) code label, the digital signature producer is configured to print the barcode label or the QR code label, and the digital signature carrier is attached to the bundle products. 14. The method of claim 12, wherein the digital signature carrier is a Near Field Communication (NFC) tag or a Radio Frequency Identification (RFID) tag, the digital signature producer is configured to write the connective information list into the NFC tag or the RFID tag, and the digital signature carrier is attached to the bundle products. 15. The method of claim 11, further comprising: recording a connective mapping between the first electronic devices into the connective information list, wherein at least two of the first electronic devices are triggered to be paired with one another according to the connective mapping. 16. A method, comprising: reading a digital signature carrier attached on a plurality of first electronic devices by a second electronic device, the digital signature carrier recording a connective information list, each of the first electronic devices having a network identifier distinct from another, the connective information list comprising the network identifiers of all of the first electronic devices; and pairing the second electronic device with each of the first electronic devices according to the network identifiers. 17. The method of claim 16, wherein the connective information list further records a connective mapping between the first electronic devices, the method further comprising: sending a connective command from the second electronic device to at least two of the first electronic devices according to the connective mapping; and triggering the at least two of the first electronic devices to be paired with one another according to the connective command. 18. The method of claim 16, further comprising: sending a plurality of first service set identifiers from one of the first electronic devices to the second electronic device after the one of the first electronic devices searches for an available wireless access point; selecting a second service set identifier from the first service set identifiers by the second electronic device, the second Service Set Identifier corresponding to a wireless access point previously connected with the second electronic device; providing the second service set identifier from the second electronic device to the one of the first electronic devices; and forming a wireless connection between the one of the first electronic devices and the wireless access point previously connected with the second electronic device according to the second service set identifier. 19. The method of claim 18, wherein a password or an authentication key to the wireless access point previously connected with the second electronic device is provided along with the second service set identifier from the second electronic device to the one of the first electronic devices. 20. The method of claim 16, wherein the digital signature carrier is a barcode label, a Quick Response (QR) code label, a Near Field Communication (NFC) tag or a Radio Frequency Identification (RFID).
A system includes first electronic devices and a digital signature carrier. Each of the first electronic devices has a network identifier distinct from another. The digital signature carrier is configured for recording a connective information list. The connective information list includes the network identifiers of all of the first electronic devices. A second electronic device includes a digital signature reader. The second electronic device is configured to read the digital signature carrier by the digital signature reader, extract the connective information list comprising the network identifiers and pair the second electronic device with each of the first electronic devices according to the network identifiers.1. A system, comprising: a plurality of first electronic devices, each of the first electronic devices having a network identifier distinct from another; and a digital signature carrier, configured for recording a connective information list, the connective information list comprising the network identifiers of all of the first electronic devices; wherein a second electronic device comprising a digital signature reader is configured to read the digital signature carrier by the digital signature reader, extract the connective information list comprising the network identifiers and pair the second electronic device with each of the first electronic devices according to the network identifiers. 2. The system of claim 1, further comprising: a digital signature producer, configured for gathering the network identifier from each of the first electronic devices and integrating the network identifiers of all of the first electronic devices into the digital signature carrier before the first electronic devices are packed as bundle products for sale. 3. The system of claim 2, wherein the digital signature carrier is a barcode label or a Quick Response (QR) code label, the digital signature producer is configured to print the barcode label or the QR code label, and the digital signature carrier is attached to the bundle products. 4. The system, of claim 3, wherein the digital signature reader comprises an image-capturing unit, the image-capturing unit is configured to scan the barcode label or the Quick Response (QR) code label. 5. The system of claim 2, wherein the digital signature carrier is a Near Field Communication (NFC) tag or a Radio Frequency Identification (RFID) tag, the digital signature producer is configured to write the connective information list into the NFC tag or the RFID tag, and the digital signature carrier is attached to the bundle products. 6. The system of claim 5, wherein the digital signature reader comprises a NFC receiver or a RFID receiver, the NFC reader or the RFID reader is configured to read the NFC tag or the RFID tag wirelessly. 7. The system of claim 1, wherein the network identifiers are Media Access Control (MAC) addresses of the first electronic devices. 8. The system of claim 1, wherein the connective information list further records a connective mapping between the first electronic devices. 9. The system of claim 8, wherein the second electronic device is configured to send a connective command to at least two of the first electronic devices according to the connective mapping, the connective command is configured to trigger the at least two of the first electronic devices to be paired with one another. 10. The system of claim 1, wherein during one of the first electronic devices is searching for an available wireless access point, the second electronic device is configured to provide a Service Set Identifier (SSID) to the one of the first electronic devices, the Service Set identifier corresponds to a wireless access point previously connected with the second electronic device. 11. A method, comprising: gathering network identifiers from a plurality of first electronic devices, each of the network identifiers being distinct from another; integrating the network identifiers of all of the first electronic devices into a connective information list recorded in a digital signature carrier; and attaching the digital signature carrier to the first electronic devices. 12. The method of claim 11, wherein the digital signature carrier is integrated and attached to the first electronic devices before the first electronic devices are packed as bundle products for sale. 13. The method of claim 12, wherein the digital signature carrier is a barcode label or a Quick Response (QR) code label, the digital signature producer is configured to print the barcode label or the QR code label, and the digital signature carrier is attached to the bundle products. 14. The method of claim 12, wherein the digital signature carrier is a Near Field Communication (NFC) tag or a Radio Frequency Identification (RFID) tag, the digital signature producer is configured to write the connective information list into the NFC tag or the RFID tag, and the digital signature carrier is attached to the bundle products. 15. The method of claim 11, further comprising: recording a connective mapping between the first electronic devices into the connective information list, wherein at least two of the first electronic devices are triggered to be paired with one another according to the connective mapping. 16. A method, comprising: reading a digital signature carrier attached on a plurality of first electronic devices by a second electronic device, the digital signature carrier recording a connective information list, each of the first electronic devices having a network identifier distinct from another, the connective information list comprising the network identifiers of all of the first electronic devices; and pairing the second electronic device with each of the first electronic devices according to the network identifiers. 17. The method of claim 16, wherein the connective information list further records a connective mapping between the first electronic devices, the method further comprising: sending a connective command from the second electronic device to at least two of the first electronic devices according to the connective mapping; and triggering the at least two of the first electronic devices to be paired with one another according to the connective command. 18. The method of claim 16, further comprising: sending a plurality of first service set identifiers from one of the first electronic devices to the second electronic device after the one of the first electronic devices searches for an available wireless access point; selecting a second service set identifier from the first service set identifiers by the second electronic device, the second Service Set Identifier corresponding to a wireless access point previously connected with the second electronic device; providing the second service set identifier from the second electronic device to the one of the first electronic devices; and forming a wireless connection between the one of the first electronic devices and the wireless access point previously connected with the second electronic device according to the second service set identifier. 19. The method of claim 18, wherein a password or an authentication key to the wireless access point previously connected with the second electronic device is provided along with the second service set identifier from the second electronic device to the one of the first electronic devices. 20. The method of claim 16, wherein the digital signature carrier is a barcode label, a Quick Response (QR) code label, a Near Field Communication (NFC) tag or a Radio Frequency Identification (RFID).
2,400
8,741
8,741
15,712,344
2,487
Transmitting and receiving 3D video content via an Internet protocol (IP) stream are described. 3D video content may be transmitted in a single IP stream and adjusted by a device associated with a display for rendering the 3D video content in a desired manner. 3D content also may be transmitted in a plurality of IP streams and a device associated with a display for rendering the 3D content may determine which of the plurality of IP streams to decode based upon a mode of operation of the device. A device receiving 3D video content may be configured to adjust the appearance of the content displayed on a display associated with the device. Such adjusting of the appearance may include moving the position of the rendered 3D video content within the display, positioning in band and/or out of band content in front of, behind, or within the rendered 3D video content.
1. A method comprising: determining a first Internet protocol (IP) stream, of a plurality of IP streams, based upon a first mode of operation of an output device; decoding first 3D video content in the first IP stream; outputting the first 3D video content for display on the output device; receiving a user request to adjust the first 3D video content; determining a second IP stream, of the plurality of IP streams, based upon a second mode of operation of the output device and the received user request; decoding second 3D video content in the second IP stream, the second 3D video content being an adjusted version of the first 3D video content; and outputting the second 3D video content for display on the output device.
Transmitting and receiving 3D video content via an Internet protocol (IP) stream are described. 3D video content may be transmitted in a single IP stream and adjusted by a device associated with a display for rendering the 3D video content in a desired manner. 3D content also may be transmitted in a plurality of IP streams and a device associated with a display for rendering the 3D content may determine which of the plurality of IP streams to decode based upon a mode of operation of the device. A device receiving 3D video content may be configured to adjust the appearance of the content displayed on a display associated with the device. Such adjusting of the appearance may include moving the position of the rendered 3D video content within the display, positioning in band and/or out of band content in front of, behind, or within the rendered 3D video content.1. A method comprising: determining a first Internet protocol (IP) stream, of a plurality of IP streams, based upon a first mode of operation of an output device; decoding first 3D video content in the first IP stream; outputting the first 3D video content for display on the output device; receiving a user request to adjust the first 3D video content; determining a second IP stream, of the plurality of IP streams, based upon a second mode of operation of the output device and the received user request; decoding second 3D video content in the second IP stream, the second 3D video content being an adjusted version of the first 3D video content; and outputting the second 3D video content for display on the output device.
2,400
8,742
8,742
15,834,400
2,468
Systems, apparatuses, and methods for implementing real-time, low-latency packetization protocols for live compressed video data are disclosed. A wireless transmitter includes at least a codec and a media access control (MAC) layer unit. In order for the codec to communicate with the MAC layer unit, the codec encodes the compression ratio in a header embedded inside the encoded video stream. The MAC layer unit extracts the compression ratio from the header and determines a modulation coding scheme (MCS) for transferring the video stream based on the compression ratio. The MAC layer unit and the codec also implement a feedback loop such that the MAC layer unit can command the codec to adjust the compression ratio. Since the changes to the video might not be implemented immediately, the MAC layer unit relies on the header to determine when the video data is coming in with the requested compression ratio.
1. A system comprising: a codec configured to store an indication of a compression ratio within a header in each chunk of compressed data; and a media access control (MAC) layer unit configured to: retrieve the indication of the compression ratio from the header of each chunk of compressed data; and determine a modulation coding scheme (MCS) for modulating the compressed data on a wireless link based on the compression ratio. 2. The system as recited in claim 1, wherein the MAC layer unit is further configured to generate a request for the codec to change compression settings for compressing data. 3. The system as recited in claim 2, wherein the MAC layer unit is configured to: monitor a link quality of the wireless link; and send a request for the codec to change compression settings responsive to detecting a change in the link quality of the wireless link. 4. The system as recited in claim 3, wherein the MAC layer unit is configured to generate a request for the codec to increase the compression ratio responsive to detecting a deterioration in the link quality of the wireless link. 5. The system as recited in claim 3, wherein the codec is configured to compress one or more chunks of data using previous compression settings subsequent to receiving the request to change compression settings. 6. The system as recited in claim 1, wherein the MAC layer unit is configured to: modulate the chunk of compressed data with a first MCS level if the compression ratio is above a first threshold; modulate the chunk of compressed data with a second MCS level if the compression ratio is less than or equal to the first threshold, wherein the second MCS level is higher than the first MCS level. 7. The system as recited in claim 6, wherein the MAC layer unit is configured to compare the compression ratio to a plurality of thresholds. 8. A method comprising: storing an indication of a compression ratio within a header in each chunk of compressed data; conveying each chunk of compressed data to a media access control (MAC) layer unit; retrieving, by the MAC layer unit, the indication of the compression ratio from the header of each chunk of compressed data; and determining, by the MAC layer unit, a modulation coding scheme (MCS) for modulating the compressed data on a wireless link based on the compression ratio. 9. The method as recited in claim 8, further comprising generating, by the MAC layer unit, a request for the codec to change compression settings for compressing data. 10. The method as recited in claim 9, further comprising the MAC layer unit: monitoring a link quality of the wireless link; and sending a request for the codec to change compression settings to the codec responsive to detecting a change in the link quality of the wireless link. 11. The method as recited in claim 10, further comprising the MAC layer unit generating a request for the codec to increase the compression ratio responsive to detecting a deterioration in the link quality of the wireless link. 12. The method as recited in claim 10, further comprising the codec compressing one or more chunks of data using previous compression settings subsequent to receiving the request to change compression settings. 13. The method as recited in claim 8, further comprising the MAC layer unit: modulating the chunk of compressed data with a first MCS level if the compression ratio is above a first threshold; modulating the chunk of compressed data with a second MCS level if the compression ratio is less than or equal to the first threshold, wherein the second MCS level is higher than the first MCS level. 14. The method as recited in claim 13, further comprising the MAC layer unit comparing the compression ratio to a plurality of thresholds. 15. A transmitter comprising: a codec configured to: compress video data into a plurality of chunks of compressed data; and store an indication of a compression ratio within a header in each chunk of compressed data; and a media access control (MAC) layer unit configured to: retrieve the indication of the compression ratio from the header of each chunk of compressed data; and determine a modulation coding scheme (MCS) for modulating the compressed data on a wireless link based on the compression ratio. 16. The transmitter as recited in claim 15, wherein the MAC layer unit is further configured to generate a request for the codec to change compression settings for compressing data. 17. The transmitter as recited in claim 16, wherein the MAC layer unit is configured to: monitor a link quality of the wireless link; and send a request for the codec to change compression settings to the codec responsive to detecting a change in the link quality of the wireless link. 18. The transmitter as recited in claim 17, wherein the MAC layer unit is configured to generate a request for the codec to increase the compression ratio responsive to detecting a deterioration in the link quality of the wireless link. 19. The transmitter as recited in claim 17, wherein the codec is configured to compress one or more chunks of data using previous compression settings subsequent to receiving the request to change compression settings. 20. The transmitter as recited in claim 15, wherein the MAC layer unit is configured to: monitor a plurality of parameters during a beamforming training procedure; modulate the chunk of compressed data with a first MCS level if the compression ratio is above a first threshold; modulate the chunk of compressed data with a second MCS level if the compression ratio is less than or equal to the first threshold, wherein the second MCS level is higher than the first MCS level.
Systems, apparatuses, and methods for implementing real-time, low-latency packetization protocols for live compressed video data are disclosed. A wireless transmitter includes at least a codec and a media access control (MAC) layer unit. In order for the codec to communicate with the MAC layer unit, the codec encodes the compression ratio in a header embedded inside the encoded video stream. The MAC layer unit extracts the compression ratio from the header and determines a modulation coding scheme (MCS) for transferring the video stream based on the compression ratio. The MAC layer unit and the codec also implement a feedback loop such that the MAC layer unit can command the codec to adjust the compression ratio. Since the changes to the video might not be implemented immediately, the MAC layer unit relies on the header to determine when the video data is coming in with the requested compression ratio.1. A system comprising: a codec configured to store an indication of a compression ratio within a header in each chunk of compressed data; and a media access control (MAC) layer unit configured to: retrieve the indication of the compression ratio from the header of each chunk of compressed data; and determine a modulation coding scheme (MCS) for modulating the compressed data on a wireless link based on the compression ratio. 2. The system as recited in claim 1, wherein the MAC layer unit is further configured to generate a request for the codec to change compression settings for compressing data. 3. The system as recited in claim 2, wherein the MAC layer unit is configured to: monitor a link quality of the wireless link; and send a request for the codec to change compression settings responsive to detecting a change in the link quality of the wireless link. 4. The system as recited in claim 3, wherein the MAC layer unit is configured to generate a request for the codec to increase the compression ratio responsive to detecting a deterioration in the link quality of the wireless link. 5. The system as recited in claim 3, wherein the codec is configured to compress one or more chunks of data using previous compression settings subsequent to receiving the request to change compression settings. 6. The system as recited in claim 1, wherein the MAC layer unit is configured to: modulate the chunk of compressed data with a first MCS level if the compression ratio is above a first threshold; modulate the chunk of compressed data with a second MCS level if the compression ratio is less than or equal to the first threshold, wherein the second MCS level is higher than the first MCS level. 7. The system as recited in claim 6, wherein the MAC layer unit is configured to compare the compression ratio to a plurality of thresholds. 8. A method comprising: storing an indication of a compression ratio within a header in each chunk of compressed data; conveying each chunk of compressed data to a media access control (MAC) layer unit; retrieving, by the MAC layer unit, the indication of the compression ratio from the header of each chunk of compressed data; and determining, by the MAC layer unit, a modulation coding scheme (MCS) for modulating the compressed data on a wireless link based on the compression ratio. 9. The method as recited in claim 8, further comprising generating, by the MAC layer unit, a request for the codec to change compression settings for compressing data. 10. The method as recited in claim 9, further comprising the MAC layer unit: monitoring a link quality of the wireless link; and sending a request for the codec to change compression settings to the codec responsive to detecting a change in the link quality of the wireless link. 11. The method as recited in claim 10, further comprising the MAC layer unit generating a request for the codec to increase the compression ratio responsive to detecting a deterioration in the link quality of the wireless link. 12. The method as recited in claim 10, further comprising the codec compressing one or more chunks of data using previous compression settings subsequent to receiving the request to change compression settings. 13. The method as recited in claim 8, further comprising the MAC layer unit: modulating the chunk of compressed data with a first MCS level if the compression ratio is above a first threshold; modulating the chunk of compressed data with a second MCS level if the compression ratio is less than or equal to the first threshold, wherein the second MCS level is higher than the first MCS level. 14. The method as recited in claim 13, further comprising the MAC layer unit comparing the compression ratio to a plurality of thresholds. 15. A transmitter comprising: a codec configured to: compress video data into a plurality of chunks of compressed data; and store an indication of a compression ratio within a header in each chunk of compressed data; and a media access control (MAC) layer unit configured to: retrieve the indication of the compression ratio from the header of each chunk of compressed data; and determine a modulation coding scheme (MCS) for modulating the compressed data on a wireless link based on the compression ratio. 16. The transmitter as recited in claim 15, wherein the MAC layer unit is further configured to generate a request for the codec to change compression settings for compressing data. 17. The transmitter as recited in claim 16, wherein the MAC layer unit is configured to: monitor a link quality of the wireless link; and send a request for the codec to change compression settings to the codec responsive to detecting a change in the link quality of the wireless link. 18. The transmitter as recited in claim 17, wherein the MAC layer unit is configured to generate a request for the codec to increase the compression ratio responsive to detecting a deterioration in the link quality of the wireless link. 19. The transmitter as recited in claim 17, wherein the codec is configured to compress one or more chunks of data using previous compression settings subsequent to receiving the request to change compression settings. 20. The transmitter as recited in claim 15, wherein the MAC layer unit is configured to: monitor a plurality of parameters during a beamforming training procedure; modulate the chunk of compressed data with a first MCS level if the compression ratio is above a first threshold; modulate the chunk of compressed data with a second MCS level if the compression ratio is less than or equal to the first threshold, wherein the second MCS level is higher than the first MCS level.
2,400
8,743
8,743
15,331,864
2,485
A device including housing and a sensing module in the housing and configured to detect a lightning-caused inconsistency on an aircraft. The device also includes a data capture module in the housing and configured to capture images of the lightning-caused inconsistency. The device also includes an analysis module in the housing and configured to characterize characteristics of the lightning-caused inconsistency using the images and to compare the characteristics to a preexisting data set.
1. A device comprising: a housing; a sensing module in the housing and configured to detect a lightning-caused inconsistency on an aircraft; a data capture module in the housing and configured to capture images of the lightning-caused inconsistency; and an analysis module in the housing and configured to characterize characteristics of the lightning-caused inconsistency using the images and to compare the characteristics to a preexisting data set. 2. The device of claim 1, wherein the sensing module further includes an additional sensor, wherein the data capture module further configured to capture sensor data from the additional sensor, and wherein the analysis module is further configured to use both the sensor data and the images to characterize characteristics. 3. The device of claim 2, wherein the sensing module further comprises a camera and wherein the additional sensor comprises at least one selected from the group consisting of: a heat sensor, a conductivity sensor, and a micrometer configured to sense a depth of the lightning-caused inconsistency. 4. The device of claim 3, wherein the sensing module is configured to sense heat inconsistencies, metallic aberrations, and structural abnormalities in the aircraft, and wherein the camera captures the images in three dimensions using three-dimensional laser mapping. 5. The device of claim 4, wherein the metallic aberrations comprise at least one of a conductivity change and a mass redistribution. 6. The device of claim 1, wherein the preexisting data set comprises normal conditions of the aircraft. 7. The device of claim 1 further comprising: a display device on the housing and configured to display areas of the lightning-caused inconsistency on the aircraft based on a comparison of the characteristics of the lightning-caused inconsistency to the preexisting data set. 8. The device of claim 1 further comprising: a projector on the housing and configured to project a display of structural configuration information of the aircraft overlaid on areas of the lightning-caused inconsistency on the aircraft based on a comparison of the characteristics to the preexisting data set. 9. The device of claim 8 further comprising: a wireless transmitter in the housing and configured to transmit data for displaying the display as a three-dimensional grid with the structural configuration information of the aircraft on a remote display system. 10. The device of claim 1, wherein the device is one of hand-held or mounted to an autonomous inspection device. 11. The device of claim 1, wherein the device comprises an unmanned aerial vehicle or other autonomously controlled device and the device further comprises: a motor connected the housing; and a lifting system connected to the motor and configured to cause the unmanned aerial vehicle to fly. 12. The device of claim 1, wherein the analysis module is further configured to determine whether the aircraft is airworthy in view of the lightning-caused inconsistency, and to display a recommendation as to whether the lightning-caused inconsistency should be reworked prior to operating the aircraft. 13. The device of claim 1 further comprising: a wireless transmitter in the housing and configured to transmit data regarding the lighting-caused inconsistency to outside inconsistency analysis resources. 14. A method comprising: moving a device around outside surfaces of an aircraft, the device comprising: a housing; a sensing module in the housing and configured to detect a lightning-caused inconsistency on the aircraft; a data capture module in the housing and configured to capture images of the lightning-caused inconsistency; and an analysis module in the housing and configured to characterize characteristics of the lightning-caused inconsistency using the images and to compare the characteristics to a preexisting data set; sensing the lightning-caused inconsistency with the sensing module; scanning the outside surfaces of the aircraft with the data capture module and capturing images of the lightning-caused inconsistency; characterizing, by the analysis module, the characteristics of the lightning-caused inconsistency using the images; comparing, with the analysis module, the characteristics to a pre-existing data set to form a comparison; determining, with the analysis module, whether the aircraft is airworthy based on the comparison, wherein a determination is formed; and transmitting the determination to a remote display device. 15. The method of claim 14, wherein the pre-existing data set comprises nominal structural data regarding the aircraft. 16. The method of claim 14 further comprising: projecting and superimposing, using a projector connected to the housing, a three-dimensional grid over an area of the aircraft where the lightning-caused inconsistency is located. 17. The method of claim 16 further comprising: transmitting, via a transmitter in the housing, the three-dimensional grid for display on the remote display device. 18. The method of claim 14 further comprising: transmitting to the remote display device a recommendation that the aircraft continue to be operated for a predetermined amount of time before the aircraft should receive maintenance for the lightning-caused inconsistency. 19. The method of claim 14 further comprising: transmitting to the remote display device a recommendation regarding limits placed on operation of the aircraft until the aircraft receives maintenance for the lightning-caused inconsistency. 20. The method of claim 14, wherein the device further comprises an unmanned aerial vehicle or other autonomous device, and wherein moving the device comprises flying the unmanned aerial vehicle around the outside surfaces, or moving a robotic arm of a robot to perform a robotic scan of the aircraft.
A device including housing and a sensing module in the housing and configured to detect a lightning-caused inconsistency on an aircraft. The device also includes a data capture module in the housing and configured to capture images of the lightning-caused inconsistency. The device also includes an analysis module in the housing and configured to characterize characteristics of the lightning-caused inconsistency using the images and to compare the characteristics to a preexisting data set.1. A device comprising: a housing; a sensing module in the housing and configured to detect a lightning-caused inconsistency on an aircraft; a data capture module in the housing and configured to capture images of the lightning-caused inconsistency; and an analysis module in the housing and configured to characterize characteristics of the lightning-caused inconsistency using the images and to compare the characteristics to a preexisting data set. 2. The device of claim 1, wherein the sensing module further includes an additional sensor, wherein the data capture module further configured to capture sensor data from the additional sensor, and wherein the analysis module is further configured to use both the sensor data and the images to characterize characteristics. 3. The device of claim 2, wherein the sensing module further comprises a camera and wherein the additional sensor comprises at least one selected from the group consisting of: a heat sensor, a conductivity sensor, and a micrometer configured to sense a depth of the lightning-caused inconsistency. 4. The device of claim 3, wherein the sensing module is configured to sense heat inconsistencies, metallic aberrations, and structural abnormalities in the aircraft, and wherein the camera captures the images in three dimensions using three-dimensional laser mapping. 5. The device of claim 4, wherein the metallic aberrations comprise at least one of a conductivity change and a mass redistribution. 6. The device of claim 1, wherein the preexisting data set comprises normal conditions of the aircraft. 7. The device of claim 1 further comprising: a display device on the housing and configured to display areas of the lightning-caused inconsistency on the aircraft based on a comparison of the characteristics of the lightning-caused inconsistency to the preexisting data set. 8. The device of claim 1 further comprising: a projector on the housing and configured to project a display of structural configuration information of the aircraft overlaid on areas of the lightning-caused inconsistency on the aircraft based on a comparison of the characteristics to the preexisting data set. 9. The device of claim 8 further comprising: a wireless transmitter in the housing and configured to transmit data for displaying the display as a three-dimensional grid with the structural configuration information of the aircraft on a remote display system. 10. The device of claim 1, wherein the device is one of hand-held or mounted to an autonomous inspection device. 11. The device of claim 1, wherein the device comprises an unmanned aerial vehicle or other autonomously controlled device and the device further comprises: a motor connected the housing; and a lifting system connected to the motor and configured to cause the unmanned aerial vehicle to fly. 12. The device of claim 1, wherein the analysis module is further configured to determine whether the aircraft is airworthy in view of the lightning-caused inconsistency, and to display a recommendation as to whether the lightning-caused inconsistency should be reworked prior to operating the aircraft. 13. The device of claim 1 further comprising: a wireless transmitter in the housing and configured to transmit data regarding the lighting-caused inconsistency to outside inconsistency analysis resources. 14. A method comprising: moving a device around outside surfaces of an aircraft, the device comprising: a housing; a sensing module in the housing and configured to detect a lightning-caused inconsistency on the aircraft; a data capture module in the housing and configured to capture images of the lightning-caused inconsistency; and an analysis module in the housing and configured to characterize characteristics of the lightning-caused inconsistency using the images and to compare the characteristics to a preexisting data set; sensing the lightning-caused inconsistency with the sensing module; scanning the outside surfaces of the aircraft with the data capture module and capturing images of the lightning-caused inconsistency; characterizing, by the analysis module, the characteristics of the lightning-caused inconsistency using the images; comparing, with the analysis module, the characteristics to a pre-existing data set to form a comparison; determining, with the analysis module, whether the aircraft is airworthy based on the comparison, wherein a determination is formed; and transmitting the determination to a remote display device. 15. The method of claim 14, wherein the pre-existing data set comprises nominal structural data regarding the aircraft. 16. The method of claim 14 further comprising: projecting and superimposing, using a projector connected to the housing, a three-dimensional grid over an area of the aircraft where the lightning-caused inconsistency is located. 17. The method of claim 16 further comprising: transmitting, via a transmitter in the housing, the three-dimensional grid for display on the remote display device. 18. The method of claim 14 further comprising: transmitting to the remote display device a recommendation that the aircraft continue to be operated for a predetermined amount of time before the aircraft should receive maintenance for the lightning-caused inconsistency. 19. The method of claim 14 further comprising: transmitting to the remote display device a recommendation regarding limits placed on operation of the aircraft until the aircraft receives maintenance for the lightning-caused inconsistency. 20. The method of claim 14, wherein the device further comprises an unmanned aerial vehicle or other autonomous device, and wherein moving the device comprises flying the unmanned aerial vehicle around the outside surfaces, or moving a robotic arm of a robot to perform a robotic scan of the aircraft.
2,400
8,744
8,744
15,945,237
2,483
A wearable device comprises a left view optical stack for a viewer to view left view cinema display images rendered on a cinema display and a right view optical stack for the viewer to view right view cinema display images rendered on the cinema display. The left view cinema display images and the right view cinema display images form stereoscopic cinema images. The wearable device further comprises a left view imager that renders left view device display images, to the viewer, on a device display, and a right view imager that renders right view device display images, to the viewer, on the device display. The left view device display images and the right view device display images form stereoscopic device images complementary to the stereoscopic cinema images.
1. A wearable device, comprising: a left view optical stack for a viewer of the wearable device to view left view cinema display images rendered on a cinema display; a right view optical stack for the viewer to view right view cinema display images rendered on the cinema display; wherein the left view cinema display images as viewed by the viewer through the left view optical stack and the right view cinema display images as viewed by the viewer through the right view optical stack form stereoscopic cinema images; a left view imager that renders left view device display images, to the viewer, on a device display of the wearable device; a right view imager that renders right view device display images, to the viewer, on the device display of the wearable device; wherein the left view device display images as viewed by the viewer through the left view imager and the right view device display images as viewed by the viewer through the right view imager form stereoscopic device images complementary to the stereoscopic cinema images. 2. The wearable device of claim 1, wherein the device display renders the left view device display images by emitting light rays from the left view imager and the right view device display images by emitting light rays from the right view imager. 3. The wearable device of claim 1, wherein the device display represents a virtual display. 4. The wearable device of claim 1, wherein the device display represents a physical display. 5. The wearable device of claim 1, wherein the device display renders the left view device display images and the right view device display images at a single image plane. 6. The wearable device of claim 1, wherein the device display renders the left view device display images and the right view device display images at multiple image planes. 7. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization states. 8. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on a shutter-based mechanism. 9. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization. 10. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on spectral spatial separation. 11. The wearable device of claim 1, wherein the left view optical stack comprises a left dichroic layer that is transparent for a first set of light wavelengths and that is opaque and reflective for a second set of light wavelengths spectrally separated from the first set of light wavelengths; wherein the left view images are rendered with the first set of light wavelengths; and wherein left view light rays with the second set of light wavelengths are emitted by the left view imager onto the left dichroic layer and are reflected by the left dichroic layer toward the viewer's left eye for rendering the left view device display images. 12. A method, comprising: rendering left view cinema display images for a viewer of a wearable device to view through a left view optical stack of the wearable device; rendering right view cinema display images for the viewer to view through a right view optical stack of the wearable device; wherein the left view cinema display images as viewed by the viewer through the left view optical stack and the right view cinema display images as viewed by the viewer through the right view optical stack form stereoscopic cinema images; using a left view imager of the wearable device to render left view device display images, to the viewer, on a device display of the wearable device; using a right view imager of the wearable device to render right view device display images, to the viewer, on the device display; wherein the left view device display images as viewed by the viewer through the left view imager and the right view device display images as viewed by the viewer through the right view imager form stereoscopic device images complementary to the stereoscopic cinema images. 13. The method of claim 12, further comprising: rendering the left view device display images by emitting light rays from the left view imager; rendering the right view device display images by emitting light rays from the right view imager. 14. The method of claim 12, wherein the device display represents a virtual display. 15. The method of claim 12, wherein the device display represents a physical display. 16. The method of claim 12, wherein the left view device display images and the right view device display images are rendered on the device display at a single image plane. 17. The method of claim 12, wherein the left view device display images and the right view device display images are rendered on the device display at multiple image planes. 18. The method of claim 12, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization states. 19. The method of claim 12, wherein the left view cinema display images and the right view device display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on a shutter-based mechanism. 20. The method of claim 12, wherein the left view cinema display images and the right view device display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization.
A wearable device comprises a left view optical stack for a viewer to view left view cinema display images rendered on a cinema display and a right view optical stack for the viewer to view right view cinema display images rendered on the cinema display. The left view cinema display images and the right view cinema display images form stereoscopic cinema images. The wearable device further comprises a left view imager that renders left view device display images, to the viewer, on a device display, and a right view imager that renders right view device display images, to the viewer, on the device display. The left view device display images and the right view device display images form stereoscopic device images complementary to the stereoscopic cinema images.1. A wearable device, comprising: a left view optical stack for a viewer of the wearable device to view left view cinema display images rendered on a cinema display; a right view optical stack for the viewer to view right view cinema display images rendered on the cinema display; wherein the left view cinema display images as viewed by the viewer through the left view optical stack and the right view cinema display images as viewed by the viewer through the right view optical stack form stereoscopic cinema images; a left view imager that renders left view device display images, to the viewer, on a device display of the wearable device; a right view imager that renders right view device display images, to the viewer, on the device display of the wearable device; wherein the left view device display images as viewed by the viewer through the left view imager and the right view device display images as viewed by the viewer through the right view imager form stereoscopic device images complementary to the stereoscopic cinema images. 2. The wearable device of claim 1, wherein the device display renders the left view device display images by emitting light rays from the left view imager and the right view device display images by emitting light rays from the right view imager. 3. The wearable device of claim 1, wherein the device display represents a virtual display. 4. The wearable device of claim 1, wherein the device display represents a physical display. 5. The wearable device of claim 1, wherein the device display renders the left view device display images and the right view device display images at a single image plane. 6. The wearable device of claim 1, wherein the device display renders the left view device display images and the right view device display images at multiple image planes. 7. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization states. 8. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on a shutter-based mechanism. 9. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization. 10. The wearable device of claim 1, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on spectral spatial separation. 11. The wearable device of claim 1, wherein the left view optical stack comprises a left dichroic layer that is transparent for a first set of light wavelengths and that is opaque and reflective for a second set of light wavelengths spectrally separated from the first set of light wavelengths; wherein the left view images are rendered with the first set of light wavelengths; and wherein left view light rays with the second set of light wavelengths are emitted by the left view imager onto the left dichroic layer and are reflected by the left dichroic layer toward the viewer's left eye for rendering the left view device display images. 12. A method, comprising: rendering left view cinema display images for a viewer of a wearable device to view through a left view optical stack of the wearable device; rendering right view cinema display images for the viewer to view through a right view optical stack of the wearable device; wherein the left view cinema display images as viewed by the viewer through the left view optical stack and the right view cinema display images as viewed by the viewer through the right view optical stack form stereoscopic cinema images; using a left view imager of the wearable device to render left view device display images, to the viewer, on a device display of the wearable device; using a right view imager of the wearable device to render right view device display images, to the viewer, on the device display; wherein the left view device display images as viewed by the viewer through the left view imager and the right view device display images as viewed by the viewer through the right view imager form stereoscopic device images complementary to the stereoscopic cinema images. 13. The method of claim 12, further comprising: rendering the left view device display images by emitting light rays from the left view imager; rendering the right view device display images by emitting light rays from the right view imager. 14. The method of claim 12, wherein the device display represents a virtual display. 15. The method of claim 12, wherein the device display represents a physical display. 16. The method of claim 12, wherein the left view device display images and the right view device display images are rendered on the device display at a single image plane. 17. The method of claim 12, wherein the left view device display images and the right view device display images are rendered on the device display at multiple image planes. 18. The method of claim 12, wherein the left view cinema display images and the right view cinema display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization states. 19. The method of claim 12, wherein the left view cinema display images and the right view device display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on a shutter-based mechanism. 20. The method of claim 12, wherein the left view cinema display images and the right view device display images, as rendered on the cinema display, are separated by the left view optical stack and the right view optical stack based on light polarization.
2,400
8,745
8,745
15,756,911
2,425
An aspect of present principles is directed to methods, systems, apparatus and computer executable code for executing instructions to perform at least a media control operation. This may include monitoring provided media content and attention information; determining attention detection based on the attention information; evaluating a filter condition based on the attention detection and additional attention information; and providing the media control operation based on an affirmative determination of the filter condition. The methods, systems and apparatus and computer executable code may further display the media control operation.
1. A method to perform at least one media control operation, the method comprising: monitoring provided media content and attention information; determining attention detection based on the attention information; evaluating a filter condition based on the attention detection and additional attention information; and providing the media control operation based on an affirmative determination of the filter condition. 2. The method of claim 1, further comprising displaying the media control operation. 3. The method of claim 1, wherein the additional attention information is at least one selected from the group of event record information and metadata. 4. The method of claim 3, wherein the event record information includes at least one selected from a group of: time duration, number of observers, type of media content, time information, biometric information, observational patterns, time information, display information, and auxiliary devices. 5. The method of claim 3, wherein the event record information includes at least an event record that includes at least one selected from the group of a time stamp relating to a time of the media content, the media content information at the time of the media content, and at least attention information of at least an observer at the time of the media content. 6. The method of claim 3, wherein the event record information includes a log of a plurality of event records, wherein the log is synchronized with each time stamp of each of the event records. 7. The method of claim 6, wherein the time stamps correspond to times during the media content when the observer gained or lost attention to the media content. 8. The method of claim 1, wherein the attention detection is based on a determination that the observer lost attention to the media content above a threshold. 9. The method of claim 3, wherein the filter condition is determined based on metadata, wherein the metadata is at least one selected from the group of time of day, day of week, weather condition, age or gender of viewers, size of viewing screen, hours of TV watched per day, geographical location, and preference profiles. 10. The method of claim 1, wherein the providing the media control operation is at least one selected from the group of offering or activating the media control operation. 11. A system to perform at least one media control operation, the system comprising: a processing unit configured to monitor provided media content and attention information, the processing unit further configured to evaluate a filter condition based on attention detection and additional attention information; and a memory configured to store information used by the processing unit; wherein the attention detection is determined based on the attention information; wherein the processing unit further provides the media control operation based on an affirmative determination of the filter condition. 12. The system of claim 11, further including a display processor to display the media control operation. 13. The system of claim 11, wherein the additional attention information is at least one selected from the group of event record information and metadata. 14. The system of claim 13, wherein the event record information includes at least one selected from a group of: time duration, number of observers, type of media content, time information, biometric information, observational patterns, time information, display information, and auxiliary devices. 15. The system of claim 13, wherein the event record information includes at least an event record that includes at least one selected from the group of a time stamp relating to a time of the media content, the media content information at the time of the media content, and at least attention information of at least an observer at the time of the media content. 16. The method of claim 13, wherein the event record information includes a log of a plurality of event records, wherein the log is synchronized with each time stamp of each of the event records. 17. The method of claim 16, wherein the time stamps correspond to times during the media content when the observer gained or lost attention to the media content. 18. The system of claim 11, wherein the attention detection is based on a determination that the observer lost attention to the media content above a threshold. 19. The system of claim 13, wherein the filter condition is determined based on metadata, wherein the metadata is at least one selected from the group of time of day, day of week, weather condition, age or gender of viewers, size of viewing screen, hours of TV watched per day, geographical location, and preference profiles. 20. The system of claim 11, wherein the providing the media control operation is at least one selected from the group of offering or activating the media control operation. 21. A non-transitory, tangible computer readable storage medium having computer executable code stored thereon to perform a method, the method comprising: monitoring provided media content and attention information; determining attention detection based on the attention information; evaluating a filter condition based on the attention detection and additional attention information; and providing the media control operation based on an affirmative determination of the filter condition.
An aspect of present principles is directed to methods, systems, apparatus and computer executable code for executing instructions to perform at least a media control operation. This may include monitoring provided media content and attention information; determining attention detection based on the attention information; evaluating a filter condition based on the attention detection and additional attention information; and providing the media control operation based on an affirmative determination of the filter condition. The methods, systems and apparatus and computer executable code may further display the media control operation.1. A method to perform at least one media control operation, the method comprising: monitoring provided media content and attention information; determining attention detection based on the attention information; evaluating a filter condition based on the attention detection and additional attention information; and providing the media control operation based on an affirmative determination of the filter condition. 2. The method of claim 1, further comprising displaying the media control operation. 3. The method of claim 1, wherein the additional attention information is at least one selected from the group of event record information and metadata. 4. The method of claim 3, wherein the event record information includes at least one selected from a group of: time duration, number of observers, type of media content, time information, biometric information, observational patterns, time information, display information, and auxiliary devices. 5. The method of claim 3, wherein the event record information includes at least an event record that includes at least one selected from the group of a time stamp relating to a time of the media content, the media content information at the time of the media content, and at least attention information of at least an observer at the time of the media content. 6. The method of claim 3, wherein the event record information includes a log of a plurality of event records, wherein the log is synchronized with each time stamp of each of the event records. 7. The method of claim 6, wherein the time stamps correspond to times during the media content when the observer gained or lost attention to the media content. 8. The method of claim 1, wherein the attention detection is based on a determination that the observer lost attention to the media content above a threshold. 9. The method of claim 3, wherein the filter condition is determined based on metadata, wherein the metadata is at least one selected from the group of time of day, day of week, weather condition, age or gender of viewers, size of viewing screen, hours of TV watched per day, geographical location, and preference profiles. 10. The method of claim 1, wherein the providing the media control operation is at least one selected from the group of offering or activating the media control operation. 11. A system to perform at least one media control operation, the system comprising: a processing unit configured to monitor provided media content and attention information, the processing unit further configured to evaluate a filter condition based on attention detection and additional attention information; and a memory configured to store information used by the processing unit; wherein the attention detection is determined based on the attention information; wherein the processing unit further provides the media control operation based on an affirmative determination of the filter condition. 12. The system of claim 11, further including a display processor to display the media control operation. 13. The system of claim 11, wherein the additional attention information is at least one selected from the group of event record information and metadata. 14. The system of claim 13, wherein the event record information includes at least one selected from a group of: time duration, number of observers, type of media content, time information, biometric information, observational patterns, time information, display information, and auxiliary devices. 15. The system of claim 13, wherein the event record information includes at least an event record that includes at least one selected from the group of a time stamp relating to a time of the media content, the media content information at the time of the media content, and at least attention information of at least an observer at the time of the media content. 16. The method of claim 13, wherein the event record information includes a log of a plurality of event records, wherein the log is synchronized with each time stamp of each of the event records. 17. The method of claim 16, wherein the time stamps correspond to times during the media content when the observer gained or lost attention to the media content. 18. The system of claim 11, wherein the attention detection is based on a determination that the observer lost attention to the media content above a threshold. 19. The system of claim 13, wherein the filter condition is determined based on metadata, wherein the metadata is at least one selected from the group of time of day, day of week, weather condition, age or gender of viewers, size of viewing screen, hours of TV watched per day, geographical location, and preference profiles. 20. The system of claim 11, wherein the providing the media control operation is at least one selected from the group of offering or activating the media control operation. 21. A non-transitory, tangible computer readable storage medium having computer executable code stored thereon to perform a method, the method comprising: monitoring provided media content and attention information; determining attention detection based on the attention information; evaluating a filter condition based on the attention detection and additional attention information; and providing the media control operation based on an affirmative determination of the filter condition.
2,400
8,746
8,746
14,856,774
2,425
A content management resource transmits a received digital data stream in a respective network data channel to one or more subscribers. The content management resource receives an emergency notification control signal, which indicates occurrence of an emergency message. In response to receiving the emergency notification control signal, the content management resource transmits the emergency message in the digital data channel to the one or more subscribers in lieu of transmitting the received digital data stream of content in the data channel to the one or more subscriber. Thus, a subscriber can tune to a particular channel to play back selected content and be apprised, via receipt of the message over the particular channel, of a corresponding condition such as an emergency.
1. A method comprising: producing first content access information, the first content access information indicating encoded segments of content available for retrieval by a subscriber device; in response to detecting occurrence of an emergency, producing second content access information, the second content access information indicating availability of encoded segments of an emergency notification; and transmitting the second content access information to the subscriber device in the network environment, the second content access information indicating to retrieve the encoded segments of the emergency notification in lieu of indicating to retrieve the encoded segments of content. 2. The method as in claim 1 further comprising: subsequent to playing back a portion of the encoded segments of content, as specified by the second content access information, receiving input from the subscriber device requesting retrieval of the encoded segments of the emergency notification; and in accordance with the input from the subscriber device requesting retrieval of the encoded segments of the emergency notification, initiating transmission of the encoded segments of the emergency notification to the subscriber device over a data channel. 3. The method as in claim 1 further comprising: producing the second content access information to be an update following generation of the first content access information. 4. The method as in claim 1, wherein detecting the occurrence of the emergency includes receiving notification from an emergency notification system of an emergency event, the emergency notification system providing the emergency notification as digital data for broadcast over multiple channels to multiple subscribers including a subscriber operating the subscriber device. 5. The method as in claim 1, wherein the first content access information specifies to play back the encoded segments of content in accordance with a logical playback sequence; and wherein producing the second content access information further comprises: producing the second content access information to substitute a next logical grouping of the encoded segments of content as specified by the first content access information with the encoded segments of the emergency notification. 6. The method as in claim 1 further comprising: producing the first content access information to specify availability of the encoded segments of content at multiple different bit rates; and producing the second content access information to specify availability of the emergency notification at the multiple different bit rates. 7. The method as in claim 1 further comprising: producing the second content access information to support retrieval of the encoded segments of the emergency notification as an adaptive bit rate data stream, a rate of the retrieved adaptive bit rate data stream controlled by input received from the subscriber device. 8. The method as in claim 1, wherein the second content access information indicates an order of playback associated with the encoded segments of emergency notification, the method further comprising: in response to detecting completion of transmitting the encoded segments of the emergency notification, reverting back to transmitting the encoded segments of content to the subscriber. 9. The method as in claim 1 further comprising: in response to receiving the emergency notification, substituting each of multiple digital data streams of content in a multi-stream data channel with an instance of the emergency notification; and transmitting the multi-stream data channel including the instances of the emergency notification digital data stream to multiple subscribers in a network. 10. The method as in claim 1 further comprising: transmitting the encoded segments of the emergency notification as an adaptive bit rate data stream to the subscriber device over a unicast link. 11. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, cause the computer processor hardware to perform operations of: producing first content access information, the first content access information indicating encoded segments of content available for retrieval by a subscriber device; in response to detecting occurrence of an emergency, producing second content access information, the second content access information indicating availability of encoded segments of an emergency notification; and transmitting the second content access information to the subscriber device in the network environment, the second content access information indicating to retrieve the encoded segments of the emergency notification in lieu of indicating to retrieve the encoded segments of content. 12. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: subsequent to playing back a portion of the encoded segments of content, as specified by the second content access information, receiving input from the subscriber device requesting retrieval of the encoded segments of the emergency notification; and in accordance with the input from the subscriber device requesting retrieval of the encoded segments of the emergency notification, initiating transmission of the encoded segments of the emergency notification to the subscriber device over a data channel. 13. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: producing the second content access information to be an update following generation of the first content access information. 14. The computer system as in claim 11, wherein detecting the occurrence of the emergency includes receiving notification from an emergency notification system of an emergency event, the emergency notification system providing the emergency notification as digital data for broadcast over multiple channels to multiple subscribers including a subscriber operating the subscriber device. 15. The computer system as in claim 11, wherein the first content access information specifies to play back the encoded segments of content in accordance with a logical playback sequence; and wherein producing the second content access information further comprises: producing the second content access information to substitute a next logical grouping of the encoded segments of content as specified by the first content access information with the encoded segments of the emergency notification. 16. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: producing the first content access information to specify availability of the encoded segments of content at multiple different bit rates; and producing the second content access information to specify availability of the emergency notification at the multiple different bit rates. 17. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: producing the second content access information to support retrieval of the encoded segments of the emergency notification as an adaptive bit rate data stream, a rate of the retrieved adaptive bit rate data stream controlled by input received from the subscriber device. 18. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: in response to detecting completion of transmitting the encoded segments of the emergency notification, reverting back to transmitting the encoded segments of content to the subscriber. 19. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: in response to receiving the emergency notification, substituting each of multiple digital data streams of content in a multi-stream data channel with an instance of the emergency notification; and transmitting the multi-stream data channel including the instances of the emergency notification digital data stream to multiple subscribers in a network. 20. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: transmitting the encoded segments of the emergency notification as an adaptive bit rate data stream to the subscriber device over a unicast link. 21. A method comprising: receiving a digital data stream of content; transmitting the received digital data stream of content to a subscriber; encoding an emergency notification to be a replacement with respect to the digital stream of content; and based on the subscriber requesting retrieval of specified segments of the emergency notification in lieu of retrieving encoded segments of the received digital data stream of content, transmitting the requested segments of the emergency notification in the data channel to the subscriber. 22. The method as in claim 21 further comprising: encoding segments of the digital data stream of content and the emergency notification in accordance with multiple different bit rates; and transmitting the segments of the digital data stream of content and emergency notification digital data stream over a data channel to the subscriber in accordance with the multiple different bit rates as selected by the subscriber. 23. The method as in claim 22, wherein transmitting the segments of the digital data stream and emergency notification digital data stream includes: transmitting the segments of the emergency notification as an adaptive bit rate data stream. 24. The method as in claim 21 further comprising: generating content access information indicating availability of the emergency notification; and distributing the content access information to the subscriber. 25. The method as in claim 1, wherein the first content access information indicates an order of play back associated with the encoded segments of content; and wherein the second content access information indicates an order of play back associated with the encoded segments of the emergency notification. 26. The method as in claim 25, wherein the second content access information indicates a specific encoded segment of the emergency notification to playback after playback of a corresponding encoded segment of the content.
A content management resource transmits a received digital data stream in a respective network data channel to one or more subscribers. The content management resource receives an emergency notification control signal, which indicates occurrence of an emergency message. In response to receiving the emergency notification control signal, the content management resource transmits the emergency message in the digital data channel to the one or more subscribers in lieu of transmitting the received digital data stream of content in the data channel to the one or more subscriber. Thus, a subscriber can tune to a particular channel to play back selected content and be apprised, via receipt of the message over the particular channel, of a corresponding condition such as an emergency.1. A method comprising: producing first content access information, the first content access information indicating encoded segments of content available for retrieval by a subscriber device; in response to detecting occurrence of an emergency, producing second content access information, the second content access information indicating availability of encoded segments of an emergency notification; and transmitting the second content access information to the subscriber device in the network environment, the second content access information indicating to retrieve the encoded segments of the emergency notification in lieu of indicating to retrieve the encoded segments of content. 2. The method as in claim 1 further comprising: subsequent to playing back a portion of the encoded segments of content, as specified by the second content access information, receiving input from the subscriber device requesting retrieval of the encoded segments of the emergency notification; and in accordance with the input from the subscriber device requesting retrieval of the encoded segments of the emergency notification, initiating transmission of the encoded segments of the emergency notification to the subscriber device over a data channel. 3. The method as in claim 1 further comprising: producing the second content access information to be an update following generation of the first content access information. 4. The method as in claim 1, wherein detecting the occurrence of the emergency includes receiving notification from an emergency notification system of an emergency event, the emergency notification system providing the emergency notification as digital data for broadcast over multiple channels to multiple subscribers including a subscriber operating the subscriber device. 5. The method as in claim 1, wherein the first content access information specifies to play back the encoded segments of content in accordance with a logical playback sequence; and wherein producing the second content access information further comprises: producing the second content access information to substitute a next logical grouping of the encoded segments of content as specified by the first content access information with the encoded segments of the emergency notification. 6. The method as in claim 1 further comprising: producing the first content access information to specify availability of the encoded segments of content at multiple different bit rates; and producing the second content access information to specify availability of the emergency notification at the multiple different bit rates. 7. The method as in claim 1 further comprising: producing the second content access information to support retrieval of the encoded segments of the emergency notification as an adaptive bit rate data stream, a rate of the retrieved adaptive bit rate data stream controlled by input received from the subscriber device. 8. The method as in claim 1, wherein the second content access information indicates an order of playback associated with the encoded segments of emergency notification, the method further comprising: in response to detecting completion of transmitting the encoded segments of the emergency notification, reverting back to transmitting the encoded segments of content to the subscriber. 9. The method as in claim 1 further comprising: in response to receiving the emergency notification, substituting each of multiple digital data streams of content in a multi-stream data channel with an instance of the emergency notification; and transmitting the multi-stream data channel including the instances of the emergency notification digital data stream to multiple subscribers in a network. 10. The method as in claim 1 further comprising: transmitting the encoded segments of the emergency notification as an adaptive bit rate data stream to the subscriber device over a unicast link. 11. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, cause the computer processor hardware to perform operations of: producing first content access information, the first content access information indicating encoded segments of content available for retrieval by a subscriber device; in response to detecting occurrence of an emergency, producing second content access information, the second content access information indicating availability of encoded segments of an emergency notification; and transmitting the second content access information to the subscriber device in the network environment, the second content access information indicating to retrieve the encoded segments of the emergency notification in lieu of indicating to retrieve the encoded segments of content. 12. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: subsequent to playing back a portion of the encoded segments of content, as specified by the second content access information, receiving input from the subscriber device requesting retrieval of the encoded segments of the emergency notification; and in accordance with the input from the subscriber device requesting retrieval of the encoded segments of the emergency notification, initiating transmission of the encoded segments of the emergency notification to the subscriber device over a data channel. 13. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: producing the second content access information to be an update following generation of the first content access information. 14. The computer system as in claim 11, wherein detecting the occurrence of the emergency includes receiving notification from an emergency notification system of an emergency event, the emergency notification system providing the emergency notification as digital data for broadcast over multiple channels to multiple subscribers including a subscriber operating the subscriber device. 15. The computer system as in claim 11, wherein the first content access information specifies to play back the encoded segments of content in accordance with a logical playback sequence; and wherein producing the second content access information further comprises: producing the second content access information to substitute a next logical grouping of the encoded segments of content as specified by the first content access information with the encoded segments of the emergency notification. 16. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: producing the first content access information to specify availability of the encoded segments of content at multiple different bit rates; and producing the second content access information to specify availability of the emergency notification at the multiple different bit rates. 17. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: producing the second content access information to support retrieval of the encoded segments of the emergency notification as an adaptive bit rate data stream, a rate of the retrieved adaptive bit rate data stream controlled by input received from the subscriber device. 18. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: in response to detecting completion of transmitting the encoded segments of the emergency notification, reverting back to transmitting the encoded segments of content to the subscriber. 19. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: in response to receiving the emergency notification, substituting each of multiple digital data streams of content in a multi-stream data channel with an instance of the emergency notification; and transmitting the multi-stream data channel including the instances of the emergency notification digital data stream to multiple subscribers in a network. 20. The computer system as in claim 11, wherein the computer processor hardware further performs operations of: transmitting the encoded segments of the emergency notification as an adaptive bit rate data stream to the subscriber device over a unicast link. 21. A method comprising: receiving a digital data stream of content; transmitting the received digital data stream of content to a subscriber; encoding an emergency notification to be a replacement with respect to the digital stream of content; and based on the subscriber requesting retrieval of specified segments of the emergency notification in lieu of retrieving encoded segments of the received digital data stream of content, transmitting the requested segments of the emergency notification in the data channel to the subscriber. 22. The method as in claim 21 further comprising: encoding segments of the digital data stream of content and the emergency notification in accordance with multiple different bit rates; and transmitting the segments of the digital data stream of content and emergency notification digital data stream over a data channel to the subscriber in accordance with the multiple different bit rates as selected by the subscriber. 23. The method as in claim 22, wherein transmitting the segments of the digital data stream and emergency notification digital data stream includes: transmitting the segments of the emergency notification as an adaptive bit rate data stream. 24. The method as in claim 21 further comprising: generating content access information indicating availability of the emergency notification; and distributing the content access information to the subscriber. 25. The method as in claim 1, wherein the first content access information indicates an order of play back associated with the encoded segments of content; and wherein the second content access information indicates an order of play back associated with the encoded segments of the emergency notification. 26. The method as in claim 25, wherein the second content access information indicates a specific encoded segment of the emergency notification to playback after playback of a corresponding encoded segment of the content.
2,400
8,747
8,747
15,178,361
2,412
A device and corresponding method to determine a buffer status of an application buffer, communicate the buffer status to a baseband processor and determine an activation of a dormancy trigger based on the buffer status of the application buffer. Also, a device and corresponding method to derive an initial inactivity timer value based on a plurality of operational observations for a type of inactivity timer, evaluate a cost function associated with the type of inactivity timer using the initial inactivity timer value and adjust the initial inactivity timer value based on the evaluating of the cost function.
1. A method, comprising: determining, by an application processor of a user equipment (“UE”), a buffer status of an application buffer; communicating, by the application processor, to a baseband processor of the UE the buffer status of the application buffer; and determining, by the baseband processor, an activation of a dormancy trigger based on the buffer status of the application buffer. 2. The method of claim 1, further comprising: activating a back off timer based on a type of application currently active at the application processor, wherein a flow of data to the UE is based on a state of the back off timer. 3. The method of claim 1, further comprising: determining, by the baseband processor, a second buffer status of a baseband buffer, wherein the activation of the dormancy trigger is further based on the second buffer status of the baseband buffer. 4. The method of claim 3, wherein the application buffer and the baseband buffer are each a plurality of buffers. 5. The method of claim 1, wherein the application buffer is a Transmission Control Protocol (TCP) socket buffer. 6. The method of claim 1, wherein the communicating the buffer status, comprises: inserting the buffer status into a trailer of an uplink (UL) data packet that is sent from the application processor to the baseband processor. 7. The method of claim 6, further comprising: stripping, by the baseband processor, the trailer from the data packet to determine the buffer status. 8. A method, comprising: at a baseband processor of a user equipment (“UE”): deriving an initial inactivity timer value based on a plurality of operational observations for a type of inactivity timer; evaluating a cost function associated with the type of inactivity timer using the initial inactivity timer value; and adjusting the initial inactivity timer value based on the evaluating of the cost function. 9. The method of claim 8, further comprising: recording the plurality of operational observations of a user equipment (“UE”) based on the type of inactivity timer. 10. The method of claim 8, wherein the adjusting the initial inactivity timer comprises: determining a correction value for the initial inactivity timer value. 11. The method of claim 10, further comprising: determining whether the correction value is below a threshold value; when the correction value is below the threshold value, operating the UE using the adjusted inactivity timer value; and when the correction value is above the threshold value, further evaluating the cost function associated with the type of inactivity timer using the adjusted inactivity timer value. 12. The method of claim 8, wherein the operational observations include one of application information, inter-RRC connection duration, intra-RRC connection packet duration, a number of RRC connections, mobility information location information, data transmission and reception per connection, or inter-packet arrival time. 13. The method of claim 8, wherein the type of inactivity timer includes one of a fast dormancy (FD) timer, an inactivity time to switch clock from high speed to low speed timer, or an inactivity to trigger a connected state mode change timer. 14. The method of claim 8, wherein the cost function is based on one of minimizing a number of RRC connections during an active time of an application or minimizing a number of clock mode switches. 15. A user equipment (“UE”), comprising: an inactivity timer; and a baseband processor configured to derive an initial inactivity timer value based on a plurality of operational observations for a type of the inactivity timer, evaluate a cost function associated with the type of the inactivity timer using the initial inactivity timer value and adjust the initial inactivity timer value based on the evaluating of the cost function. 16. The UE of claim 15, further comprising: a memory arrangement, wherein baseband processor is further configured to record the plurality of operational observations and store the operational observations in the memory arrangement. 17. The UE of claim 15, wherein the baseband processor is further configured to determine a correction value for the initial inactivity timer value, determine whether the correction value is below a threshold value, when the correction value is below the threshold value, operating the UE using the adjusted inactivity timer value and when the correction value is above the threshold value, further evaluating the cost function associated with the type of inactivity timer using the adjusted inactivity timer value. 18. The UE of claim 15, wherein the operational observations include one of application information, inter-RRC connection duration, intra-RRC connection packet duration, a number of RRC connections, mobility information location information, data transmission and reception per connection, or inter-packet arrival time. 19. The UE of claim 15, wherein the type of inactivity timer includes one of a fast dormancy (FD) timer, an inactivity time to switch clock from high speed to low speed timer, or an inactivity to trigger a connected state mode change timer. 20. The UE of claim 15, wherein the cost function is based on one of minimizing a number of RRC connections during an active time of an application or minimizing a number of clock mode switches.
A device and corresponding method to determine a buffer status of an application buffer, communicate the buffer status to a baseband processor and determine an activation of a dormancy trigger based on the buffer status of the application buffer. Also, a device and corresponding method to derive an initial inactivity timer value based on a plurality of operational observations for a type of inactivity timer, evaluate a cost function associated with the type of inactivity timer using the initial inactivity timer value and adjust the initial inactivity timer value based on the evaluating of the cost function.1. A method, comprising: determining, by an application processor of a user equipment (“UE”), a buffer status of an application buffer; communicating, by the application processor, to a baseband processor of the UE the buffer status of the application buffer; and determining, by the baseband processor, an activation of a dormancy trigger based on the buffer status of the application buffer. 2. The method of claim 1, further comprising: activating a back off timer based on a type of application currently active at the application processor, wherein a flow of data to the UE is based on a state of the back off timer. 3. The method of claim 1, further comprising: determining, by the baseband processor, a second buffer status of a baseband buffer, wherein the activation of the dormancy trigger is further based on the second buffer status of the baseband buffer. 4. The method of claim 3, wherein the application buffer and the baseband buffer are each a plurality of buffers. 5. The method of claim 1, wherein the application buffer is a Transmission Control Protocol (TCP) socket buffer. 6. The method of claim 1, wherein the communicating the buffer status, comprises: inserting the buffer status into a trailer of an uplink (UL) data packet that is sent from the application processor to the baseband processor. 7. The method of claim 6, further comprising: stripping, by the baseband processor, the trailer from the data packet to determine the buffer status. 8. A method, comprising: at a baseband processor of a user equipment (“UE”): deriving an initial inactivity timer value based on a plurality of operational observations for a type of inactivity timer; evaluating a cost function associated with the type of inactivity timer using the initial inactivity timer value; and adjusting the initial inactivity timer value based on the evaluating of the cost function. 9. The method of claim 8, further comprising: recording the plurality of operational observations of a user equipment (“UE”) based on the type of inactivity timer. 10. The method of claim 8, wherein the adjusting the initial inactivity timer comprises: determining a correction value for the initial inactivity timer value. 11. The method of claim 10, further comprising: determining whether the correction value is below a threshold value; when the correction value is below the threshold value, operating the UE using the adjusted inactivity timer value; and when the correction value is above the threshold value, further evaluating the cost function associated with the type of inactivity timer using the adjusted inactivity timer value. 12. The method of claim 8, wherein the operational observations include one of application information, inter-RRC connection duration, intra-RRC connection packet duration, a number of RRC connections, mobility information location information, data transmission and reception per connection, or inter-packet arrival time. 13. The method of claim 8, wherein the type of inactivity timer includes one of a fast dormancy (FD) timer, an inactivity time to switch clock from high speed to low speed timer, or an inactivity to trigger a connected state mode change timer. 14. The method of claim 8, wherein the cost function is based on one of minimizing a number of RRC connections during an active time of an application or minimizing a number of clock mode switches. 15. A user equipment (“UE”), comprising: an inactivity timer; and a baseband processor configured to derive an initial inactivity timer value based on a plurality of operational observations for a type of the inactivity timer, evaluate a cost function associated with the type of the inactivity timer using the initial inactivity timer value and adjust the initial inactivity timer value based on the evaluating of the cost function. 16. The UE of claim 15, further comprising: a memory arrangement, wherein baseband processor is further configured to record the plurality of operational observations and store the operational observations in the memory arrangement. 17. The UE of claim 15, wherein the baseband processor is further configured to determine a correction value for the initial inactivity timer value, determine whether the correction value is below a threshold value, when the correction value is below the threshold value, operating the UE using the adjusted inactivity timer value and when the correction value is above the threshold value, further evaluating the cost function associated with the type of inactivity timer using the adjusted inactivity timer value. 18. The UE of claim 15, wherein the operational observations include one of application information, inter-RRC connection duration, intra-RRC connection packet duration, a number of RRC connections, mobility information location information, data transmission and reception per connection, or inter-packet arrival time. 19. The UE of claim 15, wherein the type of inactivity timer includes one of a fast dormancy (FD) timer, an inactivity time to switch clock from high speed to low speed timer, or an inactivity to trigger a connected state mode change timer. 20. The UE of claim 15, wherein the cost function is based on one of minimizing a number of RRC connections during an active time of an application or minimizing a number of clock mode switches.
2,400
8,748
8,748
13,870,878
2,481
A server accesses a previous frame of an image in a video and obtains hash values for each pixel in the previous frame and creates a hash map that stores each of the hash values. The server receives a current frame of the image and separates the current frame into a plurality of current blocks of pixels. The server calculates, using a hash function, a hash value for each of the current blocks of pixels. The server compares the hash values in the hash map with the hash values associated with the current frame and identifies a hash value in the hash map that matches a hash value in the current frame. The server compresses the current frame for transmission to a client using the identified matching hash values and pre-calculates a new hash map based on the current frame for use in compressing a next frame of the video.
1. A server for remoting a display to a remote client, the server comprising a processor configured to: obtain a hash map comprising pre-calculated hash values for pixel blocks at each pixel offset in the previous frame; receive a current frame of a video; separate the current frame into a plurality of current blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values in the hash map with the hash values associated with the current frame; identify a hash value in the hash map that matches a hash value in the current frame; compress the current frame of the video for transmission to the remote client using the identified matching hash values; and pre-calculate a new hash map based on the current frame for use in compressing a next frame of the video. 2. The server of claim 1, wherein the current block of pixels has dimensions that are a power of two for each dimension. 3. The server of claim 1, wherein each of the current blocks of pixels is associated with a particular pixel in the current frame. 4. The server of claim 3, wherein said processor is further configured to update the hash map with the hash values for each pixel in the current frame once the hash values in the current frame become available. 5. The server of claim 4, wherein the current frame is redefined as a reference frame, and wherein said processor is further configured to: receive a second current frame of the image in the video; separate the second current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels in the second current frame; compare the hash values in the updated hash map with the hash values associated with the second current frame; identify a hash value in the updated hash map that matches a hash value in the current frame; and store information indicating that the hash value in the hash map matches the hash value in the second current frame. 6. The server of claim 4, wherein the updating of the hash map with the hash values for each pixel in the current frame occurs concurrently with comparing the hash values in the hash map with the hash values associated with the current frame. 7. The server of claim 1, wherein the current block of pixels has dimensions that are a power of two for each dimension. 8. A method for image block matching, the method comprising: accessing a previous frame of an image in a video; obtaining hash values for each pixel in the previous frame; creating a hash map that stores each of the hash values for each pixel in the previous frame; receiving a current frame of the image in the video; separating the current frame into a plurality of current blocks of pixels; calculating, using a hash function, a hash value for each of the plurality of current blocks of pixels; comparing the hash values in the hash map with the hash values associated with the current frame; identifying a hash value in the hash map that matches a hash value in the current frame; compressing the current frame of the video for transmission to a client using the identified matching hash values; and pre-calculating a new hash map based on the current frame for use in compressing a next frame of the video. 9. The method of claim 8, wherein the current block of pixels has dimensions that are a power of two for each dimension. 10. The method of claim 8, wherein each of the current blocks of pixels is associated with a particular pixel in the current frame. 11. The method of claim 10, further comprising updating the hash map with the hash values for each pixel in the current frame. 12. The method of claim 8, wherein the current frame is redefined as a reference frame, and wherein the method further comprises: receiving a second current frame of the image in the video; separating the second current frame into a plurality of current blocks of pixels; calculating, using the hash function, a hash value for each of the plurality of current blocks of pixels in the second current frame; comparing the hash values in the updated hash map with the hash values associated with the second current frame; identifying a hash value in the updated hash map that matches a hash value in the current frame; and storing information indicating that the hash value in the hash map matches the hash value in the second current frame. 13. The method of claim 8, wherein the updating of the hash map with the hash values for each pixel in the current frame occurs concurrently with comparing the hash values in the hash map with the hash values associated with the current frame. 14. The method of claim 8, wherein dimensions of a block of pixels are a power of two for each dimension. 15. At least one computer-readable storage medium having computer-executable instructions embodied thereon, wherein, when executed by at least one processor, the computer-executable instructions cause the at least one processor to: access a previous frame of an image in a video; obtain hash values for each pixel in the previous frame; create a hash map that stores each of the hash values for each pixel in the previous frame; receive a current frame of the image in the video; separate the current frame into a plurality of current blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values in the hash map with the hash values associated with the current frame; identify a hash value in the hash map that matches a hash value in the current frame; and compress the current frame of the video for transmission to a client using the identified matching hash values; and pre-calculate a new hash map based on the current frame for use in compressing a next frame of the video. 16. The at least one computer-readable storage medium of claim 15, wherein the hash map is a two-dimensional hash map. 17. The at least one computer-readable storage medium of claim 15, wherein each of the current blocks of pixels is associated with a particular pixel in the current frame. 18. The at least one computer-readable storage medium of claim 17, wherein the computer executable instructions further cause the at least one processor to update the hash map with the hash values for each pixel in the current frame. 19. The at least one computer-readable storage medium of claim 15, wherein the current frame is redefined as a reference frame, and wherein the computer executable instructions further cause the at least one processor to: receive a second current frame of the image in the video; separate the second current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels in the second current frame; compare the hash values in the updated hash map with the hash values associated with the second current frame; identify a hash value in the updated hash map that matches a hash value in the current frame; and store information indicating that the hash value in the hash map matches the hash value in the second current frame. 20. The at least one computer-readable storage medium of claim 15, wherein the updating of the hash map with the hash values for each pixel in the current frame occurs concurrently with comparing the hash values in the hash map with the hash values associated with the current frame.
A server accesses a previous frame of an image in a video and obtains hash values for each pixel in the previous frame and creates a hash map that stores each of the hash values. The server receives a current frame of the image and separates the current frame into a plurality of current blocks of pixels. The server calculates, using a hash function, a hash value for each of the current blocks of pixels. The server compares the hash values in the hash map with the hash values associated with the current frame and identifies a hash value in the hash map that matches a hash value in the current frame. The server compresses the current frame for transmission to a client using the identified matching hash values and pre-calculates a new hash map based on the current frame for use in compressing a next frame of the video.1. A server for remoting a display to a remote client, the server comprising a processor configured to: obtain a hash map comprising pre-calculated hash values for pixel blocks at each pixel offset in the previous frame; receive a current frame of a video; separate the current frame into a plurality of current blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values in the hash map with the hash values associated with the current frame; identify a hash value in the hash map that matches a hash value in the current frame; compress the current frame of the video for transmission to the remote client using the identified matching hash values; and pre-calculate a new hash map based on the current frame for use in compressing a next frame of the video. 2. The server of claim 1, wherein the current block of pixels has dimensions that are a power of two for each dimension. 3. The server of claim 1, wherein each of the current blocks of pixels is associated with a particular pixel in the current frame. 4. The server of claim 3, wherein said processor is further configured to update the hash map with the hash values for each pixel in the current frame once the hash values in the current frame become available. 5. The server of claim 4, wherein the current frame is redefined as a reference frame, and wherein said processor is further configured to: receive a second current frame of the image in the video; separate the second current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels in the second current frame; compare the hash values in the updated hash map with the hash values associated with the second current frame; identify a hash value in the updated hash map that matches a hash value in the current frame; and store information indicating that the hash value in the hash map matches the hash value in the second current frame. 6. The server of claim 4, wherein the updating of the hash map with the hash values for each pixel in the current frame occurs concurrently with comparing the hash values in the hash map with the hash values associated with the current frame. 7. The server of claim 1, wherein the current block of pixels has dimensions that are a power of two for each dimension. 8. A method for image block matching, the method comprising: accessing a previous frame of an image in a video; obtaining hash values for each pixel in the previous frame; creating a hash map that stores each of the hash values for each pixel in the previous frame; receiving a current frame of the image in the video; separating the current frame into a plurality of current blocks of pixels; calculating, using a hash function, a hash value for each of the plurality of current blocks of pixels; comparing the hash values in the hash map with the hash values associated with the current frame; identifying a hash value in the hash map that matches a hash value in the current frame; compressing the current frame of the video for transmission to a client using the identified matching hash values; and pre-calculating a new hash map based on the current frame for use in compressing a next frame of the video. 9. The method of claim 8, wherein the current block of pixels has dimensions that are a power of two for each dimension. 10. The method of claim 8, wherein each of the current blocks of pixels is associated with a particular pixel in the current frame. 11. The method of claim 10, further comprising updating the hash map with the hash values for each pixel in the current frame. 12. The method of claim 8, wherein the current frame is redefined as a reference frame, and wherein the method further comprises: receiving a second current frame of the image in the video; separating the second current frame into a plurality of current blocks of pixels; calculating, using the hash function, a hash value for each of the plurality of current blocks of pixels in the second current frame; comparing the hash values in the updated hash map with the hash values associated with the second current frame; identifying a hash value in the updated hash map that matches a hash value in the current frame; and storing information indicating that the hash value in the hash map matches the hash value in the second current frame. 13. The method of claim 8, wherein the updating of the hash map with the hash values for each pixel in the current frame occurs concurrently with comparing the hash values in the hash map with the hash values associated with the current frame. 14. The method of claim 8, wherein dimensions of a block of pixels are a power of two for each dimension. 15. At least one computer-readable storage medium having computer-executable instructions embodied thereon, wherein, when executed by at least one processor, the computer-executable instructions cause the at least one processor to: access a previous frame of an image in a video; obtain hash values for each pixel in the previous frame; create a hash map that stores each of the hash values for each pixel in the previous frame; receive a current frame of the image in the video; separate the current frame into a plurality of current blocks of pixels; calculate, using a hash function, a hash value for each of the plurality of current blocks of pixels; compare the hash values in the hash map with the hash values associated with the current frame; identify a hash value in the hash map that matches a hash value in the current frame; and compress the current frame of the video for transmission to a client using the identified matching hash values; and pre-calculate a new hash map based on the current frame for use in compressing a next frame of the video. 16. The at least one computer-readable storage medium of claim 15, wherein the hash map is a two-dimensional hash map. 17. The at least one computer-readable storage medium of claim 15, wherein each of the current blocks of pixels is associated with a particular pixel in the current frame. 18. The at least one computer-readable storage medium of claim 17, wherein the computer executable instructions further cause the at least one processor to update the hash map with the hash values for each pixel in the current frame. 19. The at least one computer-readable storage medium of claim 15, wherein the current frame is redefined as a reference frame, and wherein the computer executable instructions further cause the at least one processor to: receive a second current frame of the image in the video; separate the second current frame into a plurality of current blocks of pixels; calculate, using the hash function, a hash value for each of the plurality of current blocks of pixels in the second current frame; compare the hash values in the updated hash map with the hash values associated with the second current frame; identify a hash value in the updated hash map that matches a hash value in the current frame; and store information indicating that the hash value in the hash map matches the hash value in the second current frame. 20. The at least one computer-readable storage medium of claim 15, wherein the updating of the hash map with the hash values for each pixel in the current frame occurs concurrently with comparing the hash values in the hash map with the hash values associated with the current frame.
2,400
8,749
8,749
15,238,744
2,466
An integrated access router includes a modem for communicating with a wireless network. The integrated access router also includes a cellular gateway, comprising a switch for routing data via the modem. The integrated access router also includes a server comprising one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors. The program instructions include a primary networking operating system for providing networking and communication capabilities via an Ethernet connection. The program instructions further include a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system.
1. An integrated access router comprising: a modem for communicating with a wireless network; a cellular gateway, comprising a switch, for routing data via the modem; and a server comprising one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors, the program instructions comprising: a primary networking operating system for providing networking and communication capabilities via an Ethernet connection; and a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system. 2. The integrated access router of claim 1, wherein the cellular gateway is configured to interface with a removable storage device and mount the removable storage device such that router configuration data stored on the removable storage device is accessible by the server; and wherein the primary networking operating system is configured to retrieve the router configuration data from the removable storage device when initializing. 3. The integrated access router of claim 2, wherein the integrated access router is inoperable while the cellular gateway is not interfacing with the removable storage device. 4. The integrated access router of claim 2, wherein the cellular gateway is configured to interface with the removable storage device via a USB interface. 5. The integrated access router of claim 1, wherein networking and communication capabilities via a non-Ethernet connection comprises the integrated access router functioning as a wireless access point. 6. The integrated access router of claim 1, wherein networking and communication capabilities via a non-Ethernet connection comprises one of cellphone tethering, Harris radio tethering, synchronous serial communication, and VoIP. 7. The integrated access router of claim 1, wherein the underlying server operating system comprises Unix and the primary networking operating system comprises Cisco IOS. 8. The integrated access router of claim 1, further comprising a plurality of modems for communications with a plurality of wireless networks, wherein the cellular gateway is configured to automatically switch to one of the plurality of modems based on a network associated with a detected current geographic region. 9. The integrated access router of claim 1, wherein the program instructions further comprise a virtual machine for executing the secondary networking operating system and a hypervisor for monitoring the virtual machine. 10. The integrated access router of claim 9, wherein the virtual machine is further configured to execute one of call management software and WAN acceleration software. 11. A computer program product comprising one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices, the program instructions comprising: a primary networking operating system for providing networking and communication capabilities via an Ethernet connection; and a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system. 12. The computer program product of claim 11, wherein the primary networking operating system is configured to retrieve router configuration data from a removable storage device during initialization. 13. The computer program product of claim 12, wherein the primary networking operating system is configured to be inoperable responsive to being unable to retrieve router configuration data from the removable storage device. 14. The computer program product of claim 11, wherein networking and communication capabilities via a non-Ethernet connection comprises wireless access point functionality. 15. The computer program product of claim 11, wherein networking and communication capabilities via a non-Ethernet connection comprises one of cellphone tethering, Harris radio tethering, synchronous serial communication, and VoIP. 16. The computer program product of claim 11, wherein the underlying server operating system comprises Unix and the primary networking operating system comprises Cisco IOS. 17. The computer program product of claim 11, wherein the program instructions further comprise a virtual machine for executing the secondary networking operating system and a hypervisor for monitoring the virtual machine. 18. The computer program product of claim 17, wherein the virtual machine is further configured to execute one of call management software and WAN acceleration software. 19. A system for routing network data, the system comprising one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors, the program instructions comprising: a primary networking operating system for providing networking and communication capabilities via an Ethernet connection; and a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system. 20. The system of claim 19, wherein the primary networking operating system is configured to retrieve configuration data from a removable storage device during initialization.
An integrated access router includes a modem for communicating with a wireless network. The integrated access router also includes a cellular gateway, comprising a switch for routing data via the modem. The integrated access router also includes a server comprising one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors. The program instructions include a primary networking operating system for providing networking and communication capabilities via an Ethernet connection. The program instructions further include a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system.1. An integrated access router comprising: a modem for communicating with a wireless network; a cellular gateway, comprising a switch, for routing data via the modem; and a server comprising one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors, the program instructions comprising: a primary networking operating system for providing networking and communication capabilities via an Ethernet connection; and a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system. 2. The integrated access router of claim 1, wherein the cellular gateway is configured to interface with a removable storage device and mount the removable storage device such that router configuration data stored on the removable storage device is accessible by the server; and wherein the primary networking operating system is configured to retrieve the router configuration data from the removable storage device when initializing. 3. The integrated access router of claim 2, wherein the integrated access router is inoperable while the cellular gateway is not interfacing with the removable storage device. 4. The integrated access router of claim 2, wherein the cellular gateway is configured to interface with the removable storage device via a USB interface. 5. The integrated access router of claim 1, wherein networking and communication capabilities via a non-Ethernet connection comprises the integrated access router functioning as a wireless access point. 6. The integrated access router of claim 1, wherein networking and communication capabilities via a non-Ethernet connection comprises one of cellphone tethering, Harris radio tethering, synchronous serial communication, and VoIP. 7. The integrated access router of claim 1, wherein the underlying server operating system comprises Unix and the primary networking operating system comprises Cisco IOS. 8. The integrated access router of claim 1, further comprising a plurality of modems for communications with a plurality of wireless networks, wherein the cellular gateway is configured to automatically switch to one of the plurality of modems based on a network associated with a detected current geographic region. 9. The integrated access router of claim 1, wherein the program instructions further comprise a virtual machine for executing the secondary networking operating system and a hypervisor for monitoring the virtual machine. 10. The integrated access router of claim 9, wherein the virtual machine is further configured to execute one of call management software and WAN acceleration software. 11. A computer program product comprising one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices, the program instructions comprising: a primary networking operating system for providing networking and communication capabilities via an Ethernet connection; and a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system. 12. The computer program product of claim 11, wherein the primary networking operating system is configured to retrieve router configuration data from a removable storage device during initialization. 13. The computer program product of claim 12, wherein the primary networking operating system is configured to be inoperable responsive to being unable to retrieve router configuration data from the removable storage device. 14. The computer program product of claim 11, wherein networking and communication capabilities via a non-Ethernet connection comprises wireless access point functionality. 15. The computer program product of claim 11, wherein networking and communication capabilities via a non-Ethernet connection comprises one of cellphone tethering, Harris radio tethering, synchronous serial communication, and VoIP. 16. The computer program product of claim 11, wherein the underlying server operating system comprises Unix and the primary networking operating system comprises Cisco IOS. 17. The computer program product of claim 11, wherein the program instructions further comprise a virtual machine for executing the secondary networking operating system and a hypervisor for monitoring the virtual machine. 18. The computer program product of claim 17, wherein the virtual machine is further configured to execute one of call management software and WAN acceleration software. 19. A system for routing network data, the system comprising one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors, the program instructions comprising: a primary networking operating system for providing networking and communication capabilities via an Ethernet connection; and a secondary networking operating system for extending the capabilities of the primary operating system and providing networking and communication capabilities via a non-Ethernet connection by serving as an intermediary between the primary networking operating system and an underlying server operating system. 20. The system of claim 19, wherein the primary networking operating system is configured to retrieve configuration data from a removable storage device during initialization.
2,400
8,750
8,750
15,910,033
2,482
A monitoring system for monitoring a process includes a housing with a viewing panel. The viewing panel includes a view port. An emitter generates light and illuminates an observation zone of the process. A detector is disposed within the housing and is configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone. A thermal regulation system is configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature.
1. A monitoring system for monitoring a process, comprising: a housing including a viewing panel, the viewing panel including a view port; an emitter configured to generate light and illuminate an observation zone of the process; a detector disposed within the housing, the detector configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone; and a thermal regulation system configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature. 2. The monitoring system of claim 1, wherein the viewing panel includes at least one illumination port formed through the viewing panel. 3. The monitoring system of claim 2, including a plurality of illumination ports formed through the viewing panel. 4. The monitoring system of claim 2, wherein the at least one illumination port is provided with a light transmitting material. 5. The monitoring system of claim 4, wherein the light transmitting material is one or more of borosilicate glasses, quartz glasses, acrylics, and optical grade polymers. 6. The monitoring system of claim 2, wherein the emitter is disposed within the housing, and is configured to generate light through the at least one illumination port. 7. The monitoring system of claim 6, wherein the emitter is configured to generate visible light. 8. The monitoring system of claim 6, wherein the emitter includes at least one LED. 9. The monitoring system of claim 1, wherein the detector includes a photosensitive element. 10. The monitoring system of claim 1, wherein the detector is a CCD. 11. The monitoring system of claim 1, wherein the detector is configured to take and transmit one or both of still images and video. 12. The monitoring system of claim 1, wherein the thermal regulation system includes at least one thermoelectric device. 13. The monitoring system of claim 1, wherein the thermal regulation system heats the section of the housing comprising the viewing panel and cools the section of the housing opposite the viewing panel. 14. The monitoring system of claim 1, wherein the thermal regulation system heats the viewing port to at least about 100° F. 15. The monitoring system of claim 1, wherein the detector is disposed in the section of the housing opposite the viewing panel. 16. The monitoring system of claim 1, wherein the emitter is disposed in the section of the housing comprising the viewing panels. 17. The monitoring system of claim 1, further comprising a controller in communication with the detector and configured to receive and analyze data from the detector to determine one or more of a presence of foam in the observation zone, a level of foam in the observation zone, a rate of change of the level of foam in the observation zone, and the size and number of bubbles in the foam. 18. The monitoring system of claim 1, wherein the view port is one or more of borosilicate glasses, quartz glasses, acrylics, and optical grade polymers. 19. The monitoring system of claim 1, further comprising a power supply disposed within the housing. 20. The monitoring system of claim 19, wherein the housing comprises a first fitting for connecting the power supply to a source of power and a second fitting for connecting the detector to a data transmitting line. 21. The monitoring system of claim 1, wherein the housing is configured to be used in a single-use environment. 22. The monitoring system of claim 21, wherein the single-use environment includes a disposable enclosure and the housing is attachable directly to the enclosure. 23. The monitoring system of claim 22, further comprising a fitting that is attached to the enclosure and the housing. 24. The monitoring system of claim 22, further comprising a pair of fittings. 25. The monitoring system of claim 22, wherein the one of the pair of fitting is configured to receive the housing and the other of the fittings is configured to receive the emitter. 26. The monitoring system of claim 1, configured to attach to and monitor a flow cell. 27. A manufacturing system, comprising: a vessel sized and shaped for containing a manufacturing process; and a monitoring system for monitoring the manufacturing process, comprising: a housing configured to mount to the vessel, the housing including a viewing panel, the viewing panel including a view port; an emitter configured to generate light and illuminate an observation zone of the manufacturing process; a detector disposed within the housing, the detector configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone; and a thermal regulation system configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature. 28. The manufacturing system of claim 27, wherein the monitoring system is attached directly to the vessel. 29. The manufacturing system of claim 27, wherein the monitoring system is attached to the vessel in a spaced apart configuration. 30. The manufacturing system of claim 29, wherein the monitoring system is attached to the vessel with a movable orientation. 31. The manufacturing system of claim 27, wherein the emitter and detector of the monitoring system are separately attached to the vessel. 32. The manufacturing system of claim 27, wherein the emitter and detector of the monitoring system are disposed within the housing. 33. The manufacturing system of claim 27, wherein the manufacturing process includes fermentation. 34. The manufacturing system of claim 27, further comprising a float disposed within the vessel and within the observation zone, wherein the detector is configured to monitor the position of the float and thereby generate data related to the position of the float and the level of a fluid within the vessel. 35. A single-use manufacturing system, comprising: a vessel sized and shaped for containing a manufacturing process; a single-use enclosure sized and shaped to fit within the vessel; a fitting configured to attach to the single-use enclosure; and a monitoring system for monitoring the manufacturing process, comprising: a housing including a viewing panel, the viewing panel including a view port, the housing configured to attach to the fitting; an emitter configured to generate light and illuminate an observation zone of the manufacturing process; a detector disposed within the housing, the detector configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone; and a thermal regulation system configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature. 36. The manufacturing system of claim 35, wherein the emitter and detector of the monitoring system are separately attached to the single-use enclosure. 37. The manufacturing system of claim 35, wherein the emitter and detector of the monitoring system are disposed within the housing. 38. The manufacturing system of claim 35, wherein the manufacturing process includes fermentation. 39. The manufacturing system of claim 35, further comprising a float disposed within the enclosure and within the observation zone, wherein the detector is configured to monitor the position of the float and thereby generate data related to the position of the float and the level of a fluid within the enclosure.
A monitoring system for monitoring a process includes a housing with a viewing panel. The viewing panel includes a view port. An emitter generates light and illuminates an observation zone of the process. A detector is disposed within the housing and is configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone. A thermal regulation system is configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature.1. A monitoring system for monitoring a process, comprising: a housing including a viewing panel, the viewing panel including a view port; an emitter configured to generate light and illuminate an observation zone of the process; a detector disposed within the housing, the detector configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone; and a thermal regulation system configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature. 2. The monitoring system of claim 1, wherein the viewing panel includes at least one illumination port formed through the viewing panel. 3. The monitoring system of claim 2, including a plurality of illumination ports formed through the viewing panel. 4. The monitoring system of claim 2, wherein the at least one illumination port is provided with a light transmitting material. 5. The monitoring system of claim 4, wherein the light transmitting material is one or more of borosilicate glasses, quartz glasses, acrylics, and optical grade polymers. 6. The monitoring system of claim 2, wherein the emitter is disposed within the housing, and is configured to generate light through the at least one illumination port. 7. The monitoring system of claim 6, wherein the emitter is configured to generate visible light. 8. The monitoring system of claim 6, wherein the emitter includes at least one LED. 9. The monitoring system of claim 1, wherein the detector includes a photosensitive element. 10. The monitoring system of claim 1, wherein the detector is a CCD. 11. The monitoring system of claim 1, wherein the detector is configured to take and transmit one or both of still images and video. 12. The monitoring system of claim 1, wherein the thermal regulation system includes at least one thermoelectric device. 13. The monitoring system of claim 1, wherein the thermal regulation system heats the section of the housing comprising the viewing panel and cools the section of the housing opposite the viewing panel. 14. The monitoring system of claim 1, wherein the thermal regulation system heats the viewing port to at least about 100° F. 15. The monitoring system of claim 1, wherein the detector is disposed in the section of the housing opposite the viewing panel. 16. The monitoring system of claim 1, wherein the emitter is disposed in the section of the housing comprising the viewing panels. 17. The monitoring system of claim 1, further comprising a controller in communication with the detector and configured to receive and analyze data from the detector to determine one or more of a presence of foam in the observation zone, a level of foam in the observation zone, a rate of change of the level of foam in the observation zone, and the size and number of bubbles in the foam. 18. The monitoring system of claim 1, wherein the view port is one or more of borosilicate glasses, quartz glasses, acrylics, and optical grade polymers. 19. The monitoring system of claim 1, further comprising a power supply disposed within the housing. 20. The monitoring system of claim 19, wherein the housing comprises a first fitting for connecting the power supply to a source of power and a second fitting for connecting the detector to a data transmitting line. 21. The monitoring system of claim 1, wherein the housing is configured to be used in a single-use environment. 22. The monitoring system of claim 21, wherein the single-use environment includes a disposable enclosure and the housing is attachable directly to the enclosure. 23. The monitoring system of claim 22, further comprising a fitting that is attached to the enclosure and the housing. 24. The monitoring system of claim 22, further comprising a pair of fittings. 25. The monitoring system of claim 22, wherein the one of the pair of fitting is configured to receive the housing and the other of the fittings is configured to receive the emitter. 26. The monitoring system of claim 1, configured to attach to and monitor a flow cell. 27. A manufacturing system, comprising: a vessel sized and shaped for containing a manufacturing process; and a monitoring system for monitoring the manufacturing process, comprising: a housing configured to mount to the vessel, the housing including a viewing panel, the viewing panel including a view port; an emitter configured to generate light and illuminate an observation zone of the manufacturing process; a detector disposed within the housing, the detector configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone; and a thermal regulation system configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature. 28. The manufacturing system of claim 27, wherein the monitoring system is attached directly to the vessel. 29. The manufacturing system of claim 27, wherein the monitoring system is attached to the vessel in a spaced apart configuration. 30. The manufacturing system of claim 29, wherein the monitoring system is attached to the vessel with a movable orientation. 31. The manufacturing system of claim 27, wherein the emitter and detector of the monitoring system are separately attached to the vessel. 32. The manufacturing system of claim 27, wherein the emitter and detector of the monitoring system are disposed within the housing. 33. The manufacturing system of claim 27, wherein the manufacturing process includes fermentation. 34. The manufacturing system of claim 27, further comprising a float disposed within the vessel and within the observation zone, wherein the detector is configured to monitor the position of the float and thereby generate data related to the position of the float and the level of a fluid within the vessel. 35. A single-use manufacturing system, comprising: a vessel sized and shaped for containing a manufacturing process; a single-use enclosure sized and shaped to fit within the vessel; a fitting configured to attach to the single-use enclosure; and a monitoring system for monitoring the manufacturing process, comprising: a housing including a viewing panel, the viewing panel including a view port, the housing configured to attach to the fitting; an emitter configured to generate light and illuminate an observation zone of the manufacturing process; a detector disposed within the housing, the detector configured to detect light entering the housing through the view port and create a plurality of images of the process in the observation zone; and a thermal regulation system configured to generate heat in the vicinity of the viewing panel of the housing so as to increase the temperature of at least the view port above ambient temperature. 36. The manufacturing system of claim 35, wherein the emitter and detector of the monitoring system are separately attached to the single-use enclosure. 37. The manufacturing system of claim 35, wherein the emitter and detector of the monitoring system are disposed within the housing. 38. The manufacturing system of claim 35, wherein the manufacturing process includes fermentation. 39. The manufacturing system of claim 35, further comprising a float disposed within the enclosure and within the observation zone, wherein the detector is configured to monitor the position of the float and thereby generate data related to the position of the float and the level of a fluid within the enclosure.
2,400
8,751
8,751
15,718,813
2,486
Embodiments feature families of rate allocation and rate control methods that utilize advanced processing of past and future frame/field picture statistics and are designed to operate with one or more coding passes. At least two method families include: a family of methods for a rate allocation with picture look-ahead; and a family of methods for average bit rate (ABR) control methods. At least two other methods for each method family are described. For the first family of methods, some methods may involve intra rate control. For the second family of methods, some methods may involve high complexity ABR control and/or low complexity ABR control. These and other embodiments can involve any of the following: spatial coding parameter adaptation, coding prediction, complexity processing, complexity estimation, complexity filtering, bit rate considerations, quality considerations, coding parameter allocation, and/or hierarchical prediction structures, among others.
1. (canceled) 2. A method for decoding a bitstream, the method comprising: receiving, at a decoder comprising one or more processing devices, image frames associated with at least a first temporal scalability level and a second temporal scalability level, wherein image frames of the second temporal scalability level are not used as a reference for motion-compensated prediction of image frames of the first temporal scalability level, wherein at least one frame of the second temporal scalability level is signaled in the bitstream as a disposable frame, and at least one frame of the second temporal scalability level is not signaled in the bitstream as a disposable frame, and wherein at least one frame of the second temporal scalability level is an I-coded picture; discarding, without decoding, all frames of the second temporal scalability level; and decoding frames of the first temporal scalability level. 3. The method of claim 2 wherein the at least one frame of the second temporal scalability level that is not signaled in the bitstream as a disposable frame is used as a reference for motion-compensated prediction. 4. The method of claim 3 wherein the reference is for an image frame of a third temporal scalability level.
Embodiments feature families of rate allocation and rate control methods that utilize advanced processing of past and future frame/field picture statistics and are designed to operate with one or more coding passes. At least two method families include: a family of methods for a rate allocation with picture look-ahead; and a family of methods for average bit rate (ABR) control methods. At least two other methods for each method family are described. For the first family of methods, some methods may involve intra rate control. For the second family of methods, some methods may involve high complexity ABR control and/or low complexity ABR control. These and other embodiments can involve any of the following: spatial coding parameter adaptation, coding prediction, complexity processing, complexity estimation, complexity filtering, bit rate considerations, quality considerations, coding parameter allocation, and/or hierarchical prediction structures, among others.1. (canceled) 2. A method for decoding a bitstream, the method comprising: receiving, at a decoder comprising one or more processing devices, image frames associated with at least a first temporal scalability level and a second temporal scalability level, wherein image frames of the second temporal scalability level are not used as a reference for motion-compensated prediction of image frames of the first temporal scalability level, wherein at least one frame of the second temporal scalability level is signaled in the bitstream as a disposable frame, and at least one frame of the second temporal scalability level is not signaled in the bitstream as a disposable frame, and wherein at least one frame of the second temporal scalability level is an I-coded picture; discarding, without decoding, all frames of the second temporal scalability level; and decoding frames of the first temporal scalability level. 3. The method of claim 2 wherein the at least one frame of the second temporal scalability level that is not signaled in the bitstream as a disposable frame is used as a reference for motion-compensated prediction. 4. The method of claim 3 wherein the reference is for an image frame of a third temporal scalability level.
2,400
8,752
8,752
15,334,730
2,451
A messenger-linked service system and method using a social graph based on a human relationship of a messenger are provided. The messenger-linked service system may include a relationship extraction unit to extract a social graph of a friend relationship of the messenger, a selection unit to select data in the messenger-linked service, and an execution unit to either transmit or to execute a sharing request of the selected data to the friend using the social graph.
1. (canceled) 2. A non-transitory computer-readable medium including computer executable instructions that, when executed by at least one processor included in a smart device of a sender, causes the at least one processor to perform operations comprising: generating, using a first messenger-linked application installed in the smart device of the sender, a first function, the first messenger-linked application associated with at least one messenger service, the first function configured to extract data stored in the first messenger-linked application, or generate data related to the first messenger-linked application; generating, using the first messenger-linked application, a second function configured to call a social graph or a chat history associated with user relationships on the messenger service; receiving, using the first messenger-linked application, a selection of the second function; displaying, in response to the selection of the second function, the social graph or the chat history; and transmitting the extracted data or the generated data to a smart device of a recipient selected from the social graph or the chat history, wherein the extracted data or the generated data is displayed in the smart device of the recipient by a second messenger-linked application installed in the smart device of the recipient. 3. The non-transitory computer-readable medium of claim 2, wherein the smart device of the recipient is configured to: receive the extracted data or the generated data; generate a third function configured to call the second messenger-linked application, in response to the reception of the extracted data or the generated data; receive a selection of the third function; and display, in response to the selection of the third function, the extracted data or the generated data using the called second messenger-linked application. 4. The non-transitory computer-readable medium of claim 2, wherein the displaying comprises: displaying, in response to the selection of the second function, the social graph or the chat history by a messenger application for the messenger service installed in the smart device of the sender. 5. The non-transitory computer-readable medium of claim 2, wherein the displaying the social graph or the chat history comprises: in response to the selection of the second function, extracting the social graph or the chat history from a messenger application for the messenger service installed in the smart device of the sender; and displaying the extracted social graph or the extracted chat history using the first messenger-linked application. 6. The non-transitory computer-readable medium of claim 2, wherein the first messenger-linked application comprises at least one of a card application, a camera application, a schedule application, a photo album application, a calendar application, and an address book application; and the first messenger-linked application and the second messenger-linked application are configured to provide a different service from a messenger application for the messenger service. 7. The non-transitory computer-readable medium of claim 2, wherein the at least one processor is further caused to perform operations including: performing user authentication between the first messenger-linked application and the messenger service, the performing including obtaining a user's consent when the first messenger-linked application is operated. 8. The non-transitory computer-readable medium of claim 2, wherein the transmitting comprises: transmitting an alert with the extracted data or the generated data, the alert including at least one of a push alert, a notification alert, and a chat message for the messenger service. 9. A method related to a messenger linked service, the method comprising: generating, using at least one processor, a first function, the first function configured to, extract data stored in a first messenger-linked application associated with at least one messenger service, or generate data related to the first messenger-linked application; generating, using the at least one processor, a second function configured to call a social graph or a chat history associated with user relationships on the messenger service; receiving, using the at least one processor, a selection of the second function; displaying, using the at least one processor, in response to the selection of the second function, the social graph or the chat history; and transmitting, using the at least one processor, the extracted data or the generated data to a smart device of a recipient selected from the social graph or the chat history, wherein the extracted data or the generated data is displayed in the smart device of the recipient by a second messenger-linked application installed in the smart device of the recipient. 10. The method of claim 8, wherein the smart device of the recipient is configured to: receive the extracted data or the generated data, generate a third function configured to call the second messenger linked application, in response to the reception of the extracted data or the generated data, receive a selection of the third function, and display, in response to the selection of the third function, the extracted data or the generated data using the called second messenger-linked application. 11. The method of claim 9, wherein the displaying comprises: displaying, in response to the selection of the second function, the social graph or the chat history by a messenger application for the messenger service installed in the smart device of the sender. 12. The method of claim 9, wherein the displaying comprises: in response to the selection of the second function, extracting the social graph or the chat history from a messenger application for the messenger service installed in the smart device of the sender; and displaying the extracted social graph or the extracted chat history using the first messenger-linked application. 13. The method of claim 9, wherein the first messenger-linked application comprises at least one of a card application, a camera application, a schedule application, a photo album application, a calendar application, and an address book application; and the first messenger-linked application and the second messenger-linked application are configured to provide a different service from a messenger application for the messenger service. 14. The method of claim 9, further comprising: performing, using the at least one processor, user authentication between the first messenger-linked application and the messenger service, the performing including obtaining a user's consent when the first messenger-linked application is operated. 15. The method of claim 9, wherein the transmitting comprises: transmitting an alert with the extracted data or the generated data, the alert including at least one of a push alert, a notification alert, and a chat message for the messenger service.
A messenger-linked service system and method using a social graph based on a human relationship of a messenger are provided. The messenger-linked service system may include a relationship extraction unit to extract a social graph of a friend relationship of the messenger, a selection unit to select data in the messenger-linked service, and an execution unit to either transmit or to execute a sharing request of the selected data to the friend using the social graph.1. (canceled) 2. A non-transitory computer-readable medium including computer executable instructions that, when executed by at least one processor included in a smart device of a sender, causes the at least one processor to perform operations comprising: generating, using a first messenger-linked application installed in the smart device of the sender, a first function, the first messenger-linked application associated with at least one messenger service, the first function configured to extract data stored in the first messenger-linked application, or generate data related to the first messenger-linked application; generating, using the first messenger-linked application, a second function configured to call a social graph or a chat history associated with user relationships on the messenger service; receiving, using the first messenger-linked application, a selection of the second function; displaying, in response to the selection of the second function, the social graph or the chat history; and transmitting the extracted data or the generated data to a smart device of a recipient selected from the social graph or the chat history, wherein the extracted data or the generated data is displayed in the smart device of the recipient by a second messenger-linked application installed in the smart device of the recipient. 3. The non-transitory computer-readable medium of claim 2, wherein the smart device of the recipient is configured to: receive the extracted data or the generated data; generate a third function configured to call the second messenger-linked application, in response to the reception of the extracted data or the generated data; receive a selection of the third function; and display, in response to the selection of the third function, the extracted data or the generated data using the called second messenger-linked application. 4. The non-transitory computer-readable medium of claim 2, wherein the displaying comprises: displaying, in response to the selection of the second function, the social graph or the chat history by a messenger application for the messenger service installed in the smart device of the sender. 5. The non-transitory computer-readable medium of claim 2, wherein the displaying the social graph or the chat history comprises: in response to the selection of the second function, extracting the social graph or the chat history from a messenger application for the messenger service installed in the smart device of the sender; and displaying the extracted social graph or the extracted chat history using the first messenger-linked application. 6. The non-transitory computer-readable medium of claim 2, wherein the first messenger-linked application comprises at least one of a card application, a camera application, a schedule application, a photo album application, a calendar application, and an address book application; and the first messenger-linked application and the second messenger-linked application are configured to provide a different service from a messenger application for the messenger service. 7. The non-transitory computer-readable medium of claim 2, wherein the at least one processor is further caused to perform operations including: performing user authentication between the first messenger-linked application and the messenger service, the performing including obtaining a user's consent when the first messenger-linked application is operated. 8. The non-transitory computer-readable medium of claim 2, wherein the transmitting comprises: transmitting an alert with the extracted data or the generated data, the alert including at least one of a push alert, a notification alert, and a chat message for the messenger service. 9. A method related to a messenger linked service, the method comprising: generating, using at least one processor, a first function, the first function configured to, extract data stored in a first messenger-linked application associated with at least one messenger service, or generate data related to the first messenger-linked application; generating, using the at least one processor, a second function configured to call a social graph or a chat history associated with user relationships on the messenger service; receiving, using the at least one processor, a selection of the second function; displaying, using the at least one processor, in response to the selection of the second function, the social graph or the chat history; and transmitting, using the at least one processor, the extracted data or the generated data to a smart device of a recipient selected from the social graph or the chat history, wherein the extracted data or the generated data is displayed in the smart device of the recipient by a second messenger-linked application installed in the smart device of the recipient. 10. The method of claim 8, wherein the smart device of the recipient is configured to: receive the extracted data or the generated data, generate a third function configured to call the second messenger linked application, in response to the reception of the extracted data or the generated data, receive a selection of the third function, and display, in response to the selection of the third function, the extracted data or the generated data using the called second messenger-linked application. 11. The method of claim 9, wherein the displaying comprises: displaying, in response to the selection of the second function, the social graph or the chat history by a messenger application for the messenger service installed in the smart device of the sender. 12. The method of claim 9, wherein the displaying comprises: in response to the selection of the second function, extracting the social graph or the chat history from a messenger application for the messenger service installed in the smart device of the sender; and displaying the extracted social graph or the extracted chat history using the first messenger-linked application. 13. The method of claim 9, wherein the first messenger-linked application comprises at least one of a card application, a camera application, a schedule application, a photo album application, a calendar application, and an address book application; and the first messenger-linked application and the second messenger-linked application are configured to provide a different service from a messenger application for the messenger service. 14. The method of claim 9, further comprising: performing, using the at least one processor, user authentication between the first messenger-linked application and the messenger service, the performing including obtaining a user's consent when the first messenger-linked application is operated. 15. The method of claim 9, wherein the transmitting comprises: transmitting an alert with the extracted data or the generated data, the alert including at least one of a push alert, a notification alert, and a chat message for the messenger service.
2,400
8,753
8,753
16,032,426
2,439
A method, a system, and an article are provided for detecting and managing anomalies associated with content presentations. An example computer-implemented method can include: obtaining a stream of data including a record of clicks on a plurality of client devices; aggregating the stream of data to generate a batch click stream for each of the client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the client devices was previously associated with fraudulent clicks; processing each batch click stream using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams includes fraudulent clicks; and facilitating an adjustment of content presentations on the client devices, based on at least one of the detected first anomaly and the detected second anomaly.
1. A computer-implemented method, comprising: obtaining a stream of data comprising a record of clicks by users on a plurality of user client devices; aggregating the stream of data by user client device to generate a batch click stream for each of the user client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the user client devices was previously associated with fraudulent clicks; processing the batch click stream for each user client device using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams comprises fraudulent clicks; and facilitating an adjustment of content presentations on the user client devices, based on at least one of the detected first anomaly and the detected second anomaly. 2. The method of claim 1, wherein the stream of data comprises a real-time click stream. 3. The method of claim 1, wherein the record of clicks comprises a timestamp and a client device identifier. 4. The method of claim 1, wherein processing the stream of data comprises: sending each click record to the real-time anomaly detector when the click record is obtained. 5. The method of claim 1, wherein processing the stream of data comprises: determining that a device blacklist identifies the at least one of the user client devices. 6. The method of claim 1, wherein processing each batch click stream comprises: sending a batch of click records for one of the user client devices to the batch anomaly detector. 7. The method of claim 1, wherein the batch anomaly detector comprises a plurality of detection algorithms, and wherein each detection algorithm is configured to detect at least one distinct anomaly from a plurality of detectable anomalies. 8. The method of claim 7, wherein processing each batch click stream comprises: selecting, for each batch click stream, at least one detection algorithm from the plurality of detection algorithms. 9. The method of claim 1, wherein facilitating the adjustment comprises preventing at least one publisher from presenting content on the user client devices. 10. The method of claim 1, further comprising: identifying at least one of the user client devices as being associated with the second anomaly; and adding the identified at least one of the user client devices to a blacklist. 11. A system, comprising: one or more computer processors programmed to perform operations comprising: obtaining a stream of data comprising a record of clicks by users on a plurality of user client devices; aggregating the stream of data by user client device to generate a batch click stream for each of the user client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the user client devices was previously associated with fraudulent clicks; processing the batch click stream for each user client device using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams comprises fraudulent clicks; and facilitating an adjustment of content presentations on the user client devices, based on at least one of the detected first anomaly and the detected second anomaly. 12. The system of claim 11, wherein the stream of data comprises a real-time click stream. 13. The system of claim 11, wherein processing the stream of data comprises: sending each click record to the real-time anomaly detector when the click record is obtained. 14. The system of claim 11, wherein processing the stream of data comprises: determining that a device blacklist identifies the at least one of the user client devices. 15. The system of claim 11, wherein processing each batch click stream comprises: sending a batch of click records for one of the user client devices to the batch anomaly detector. 16. The system of claim 11, wherein the batch anomaly detector comprises a plurality of detection algorithms, and wherein each detection algorithm is configured to detect at least one distinct anomaly from a plurality of detectable anomalies. 17. The system of claim 16, wherein processing each batch click stream comprises: selecting, for each batch click stream, at least one detection algorithm from the plurality of detection algorithms. 18. The system of claim 11, wherein facilitating the adjustment comprises preventing at least one publisher from presenting content on the user client devices. 19. The system of claim 11, further comprising: identifying at least one of the user client devices as being associated with the second anomaly; and adding the identified at least one of the user client devices to a blacklist. 20. An article, comprising: a non-transitory computer-readable medium having instructions stored thereon that, when executed by one or more computer processors, cause the computer processors to perform operations comprising: obtaining a stream of data comprising a record of clicks by users on a plurality of user client devices; aggregating the stream of data by user client device to generate a batch click stream for each of the user client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the user client devices was previously associated with fraudulent clicks; processing the batch click stream for each user client device using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams comprises fraudulent clicks; and facilitating an adjustment of content presentations on the user client devices, based on at least one of the detected first anomaly and the detected second anomaly.
A method, a system, and an article are provided for detecting and managing anomalies associated with content presentations. An example computer-implemented method can include: obtaining a stream of data including a record of clicks on a plurality of client devices; aggregating the stream of data to generate a batch click stream for each of the client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the client devices was previously associated with fraudulent clicks; processing each batch click stream using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams includes fraudulent clicks; and facilitating an adjustment of content presentations on the client devices, based on at least one of the detected first anomaly and the detected second anomaly.1. A computer-implemented method, comprising: obtaining a stream of data comprising a record of clicks by users on a plurality of user client devices; aggregating the stream of data by user client device to generate a batch click stream for each of the user client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the user client devices was previously associated with fraudulent clicks; processing the batch click stream for each user client device using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams comprises fraudulent clicks; and facilitating an adjustment of content presentations on the user client devices, based on at least one of the detected first anomaly and the detected second anomaly. 2. The method of claim 1, wherein the stream of data comprises a real-time click stream. 3. The method of claim 1, wherein the record of clicks comprises a timestamp and a client device identifier. 4. The method of claim 1, wherein processing the stream of data comprises: sending each click record to the real-time anomaly detector when the click record is obtained. 5. The method of claim 1, wherein processing the stream of data comprises: determining that a device blacklist identifies the at least one of the user client devices. 6. The method of claim 1, wherein processing each batch click stream comprises: sending a batch of click records for one of the user client devices to the batch anomaly detector. 7. The method of claim 1, wherein the batch anomaly detector comprises a plurality of detection algorithms, and wherein each detection algorithm is configured to detect at least one distinct anomaly from a plurality of detectable anomalies. 8. The method of claim 7, wherein processing each batch click stream comprises: selecting, for each batch click stream, at least one detection algorithm from the plurality of detection algorithms. 9. The method of claim 1, wherein facilitating the adjustment comprises preventing at least one publisher from presenting content on the user client devices. 10. The method of claim 1, further comprising: identifying at least one of the user client devices as being associated with the second anomaly; and adding the identified at least one of the user client devices to a blacklist. 11. A system, comprising: one or more computer processors programmed to perform operations comprising: obtaining a stream of data comprising a record of clicks by users on a plurality of user client devices; aggregating the stream of data by user client device to generate a batch click stream for each of the user client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the user client devices was previously associated with fraudulent clicks; processing the batch click stream for each user client device using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams comprises fraudulent clicks; and facilitating an adjustment of content presentations on the user client devices, based on at least one of the detected first anomaly and the detected second anomaly. 12. The system of claim 11, wherein the stream of data comprises a real-time click stream. 13. The system of claim 11, wherein processing the stream of data comprises: sending each click record to the real-time anomaly detector when the click record is obtained. 14. The system of claim 11, wherein processing the stream of data comprises: determining that a device blacklist identifies the at least one of the user client devices. 15. The system of claim 11, wherein processing each batch click stream comprises: sending a batch of click records for one of the user client devices to the batch anomaly detector. 16. The system of claim 11, wherein the batch anomaly detector comprises a plurality of detection algorithms, and wherein each detection algorithm is configured to detect at least one distinct anomaly from a plurality of detectable anomalies. 17. The system of claim 16, wherein processing each batch click stream comprises: selecting, for each batch click stream, at least one detection algorithm from the plurality of detection algorithms. 18. The system of claim 11, wherein facilitating the adjustment comprises preventing at least one publisher from presenting content on the user client devices. 19. The system of claim 11, further comprising: identifying at least one of the user client devices as being associated with the second anomaly; and adding the identified at least one of the user client devices to a blacklist. 20. An article, comprising: a non-transitory computer-readable medium having instructions stored thereon that, when executed by one or more computer processors, cause the computer processors to perform operations comprising: obtaining a stream of data comprising a record of clicks by users on a plurality of user client devices; aggregating the stream of data by user client device to generate a batch click stream for each of the user client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the user client devices was previously associated with fraudulent clicks; processing the batch click stream for each user client device using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams comprises fraudulent clicks; and facilitating an adjustment of content presentations on the user client devices, based on at least one of the detected first anomaly and the detected second anomaly.
2,400
8,754
8,754
15,658,271
2,485
Systems and methods are described herein for monitoring and capturing information associated with target subjects, such as babies. For example, the systems and methods provide a capture device, such as a camera, that captures capture time of flight (TOF) data from a target subject. Using the TOF data, the systems and methods, via a display device associated with (e.g., paired to) the capture device, present information about the target subject, such as information indicating movement of the target subject, information indicating a breathing rate of the target subject, information indicating a heart rate of the target subject, and so on.
1. A baby monitor, comprising: a capture device that monitors a baby, the capture device including: one or more infrared light components; an infrared sensor that captures infrared measurements for the monitored baby; a time of flight (TOF) sensor that captures TOF data for the monitored baby; and a movement determination module that determines a state of movement of the monitored baby based on the TOF data for the monitored baby that is captured by the TOF sensor. 2. The baby monitor of claim 1, further comprising: a display device that displays a visual image of the monitored baby based on data received from the capture device, the display device including: an indication module that causes the display device to: present a first indicator associated with movement of the monitored baby; and present a second indicator associated with breathing of the monitored baby. 3. The baby monitor of claim 1, wherein the TOF sensor captures depth images associated with the monitored baby that include pixels representing distances to one or more areas of the monitored baby. 4. The baby monitor of claim 1, wherein the TOF sensor captures depth images associated with a torso of the monitored baby. 5. The baby monitor of claim 1, wherein the TOF sensor captures depth images associated with one or more limbs of the monitored baby. 6. The baby monitor of claim 1, wherein the capture device includes a stand configured to position the TOF sensor proximate to the monitored baby or a mount configured to attach the capture device to a crib in which the monitored baby is sleeping. 7. The baby monitor of claim 1, wherein the capture device further includes: an RGB camera configured to capture RGB images of the monitored baby; and a microphone configured to capture audio data associated with the monitored baby. 8. A system for presenting images of a monitored baby, the system comprising: a display module that causes a user interface associated with the system to present a visual image of the monitored baby based on RGB data or infrared data captured by one or more image sensors proximate to the monitored baby; a movement determination module that determines a state of movement of the monitored baby based on TOF data for the monitored baby that is captured by a TOF sensor proximate to the monitored baby; and an indication module that causes the user interface to: present a first indicator associated with movement of the monitored baby based on the determined state of movement of the monitored baby; and present a second indicator associated with breathing of the monitored baby based on the determined state of movement of the monitored baby. 9. The system of claim 8, wherein the display module is part of a stand-alone display device that is communicatively paired to a capture device that is positioned proximate to the monitored baby and includes the movement determination module. 10. The system of claim 8, wherein the display module is part of a mobile device that receives data from a capture device that is positioned proximate to the monitored baby and includes the movement determination module. 11. The system of claim 8, wherein the TOF data includes depth images associated with the monitored baby that include pixels representing distances to one or more areas of the monitored baby. 12. The system of claim 8, wherein the indication module presents the first indicator associated with movement of the monitored baby over an image of an area of the monitored baby determined to be moving based on the determined state of movement. 13. The system of claim 8, wherein the indication module presents the second indicator associated with breathing of the monitored baby over an image of a torso of the monitored baby when the monitored baby is determined to be breathing based on the determined state of movement. 14. The system of claim 8, wherein the indication module further presents present a third indicator associated with a heart rate of the monitored baby based on the determined state of movement of the monitored baby. 15. The system of claim 8, further comprising: an alert module that invokes an alert when the determined state of movement falls outside a threshold range of values associated with a suitable breathing rate for the monitored baby. 16. The system of claim 8, further comprising: an alert module that invokes an alert when the determined state of movement falls outside a threshold range of values associated with movement of the monitored baby. 17. The system of claim 8, wherein the movement determination module determines the state of movement of the monitored baby based on determining pixel velocities for one or more areas of the monitored baby that are based on the TOF data. 18. A method performed by a baby monitor, the method comprising: receiving depth image data from a depth image sensor proximate to a target subject; and determining a movement status and breathing status of the target subject based on the received depth image data. 19. The method of claim 18, wherein the received depth image data includes time of flight (TOF) depth images associated with the target subject that include pixels representing distances to one or more areas of the target subject. 20. The method of claim 18, wherein determining a movement status and breathing status of the target subject based on the received depth image data includes determining pixel velocities for pixels representing one or more areas of the target subject that are based on the depth image data.
Systems and methods are described herein for monitoring and capturing information associated with target subjects, such as babies. For example, the systems and methods provide a capture device, such as a camera, that captures capture time of flight (TOF) data from a target subject. Using the TOF data, the systems and methods, via a display device associated with (e.g., paired to) the capture device, present information about the target subject, such as information indicating movement of the target subject, information indicating a breathing rate of the target subject, information indicating a heart rate of the target subject, and so on.1. A baby monitor, comprising: a capture device that monitors a baby, the capture device including: one or more infrared light components; an infrared sensor that captures infrared measurements for the monitored baby; a time of flight (TOF) sensor that captures TOF data for the monitored baby; and a movement determination module that determines a state of movement of the monitored baby based on the TOF data for the monitored baby that is captured by the TOF sensor. 2. The baby monitor of claim 1, further comprising: a display device that displays a visual image of the monitored baby based on data received from the capture device, the display device including: an indication module that causes the display device to: present a first indicator associated with movement of the monitored baby; and present a second indicator associated with breathing of the monitored baby. 3. The baby monitor of claim 1, wherein the TOF sensor captures depth images associated with the monitored baby that include pixels representing distances to one or more areas of the monitored baby. 4. The baby monitor of claim 1, wherein the TOF sensor captures depth images associated with a torso of the monitored baby. 5. The baby monitor of claim 1, wherein the TOF sensor captures depth images associated with one or more limbs of the monitored baby. 6. The baby monitor of claim 1, wherein the capture device includes a stand configured to position the TOF sensor proximate to the monitored baby or a mount configured to attach the capture device to a crib in which the monitored baby is sleeping. 7. The baby monitor of claim 1, wherein the capture device further includes: an RGB camera configured to capture RGB images of the monitored baby; and a microphone configured to capture audio data associated with the monitored baby. 8. A system for presenting images of a monitored baby, the system comprising: a display module that causes a user interface associated with the system to present a visual image of the monitored baby based on RGB data or infrared data captured by one or more image sensors proximate to the monitored baby; a movement determination module that determines a state of movement of the monitored baby based on TOF data for the monitored baby that is captured by a TOF sensor proximate to the monitored baby; and an indication module that causes the user interface to: present a first indicator associated with movement of the monitored baby based on the determined state of movement of the monitored baby; and present a second indicator associated with breathing of the monitored baby based on the determined state of movement of the monitored baby. 9. The system of claim 8, wherein the display module is part of a stand-alone display device that is communicatively paired to a capture device that is positioned proximate to the monitored baby and includes the movement determination module. 10. The system of claim 8, wherein the display module is part of a mobile device that receives data from a capture device that is positioned proximate to the monitored baby and includes the movement determination module. 11. The system of claim 8, wherein the TOF data includes depth images associated with the monitored baby that include pixels representing distances to one or more areas of the monitored baby. 12. The system of claim 8, wherein the indication module presents the first indicator associated with movement of the monitored baby over an image of an area of the monitored baby determined to be moving based on the determined state of movement. 13. The system of claim 8, wherein the indication module presents the second indicator associated with breathing of the monitored baby over an image of a torso of the monitored baby when the monitored baby is determined to be breathing based on the determined state of movement. 14. The system of claim 8, wherein the indication module further presents present a third indicator associated with a heart rate of the monitored baby based on the determined state of movement of the monitored baby. 15. The system of claim 8, further comprising: an alert module that invokes an alert when the determined state of movement falls outside a threshold range of values associated with a suitable breathing rate for the monitored baby. 16. The system of claim 8, further comprising: an alert module that invokes an alert when the determined state of movement falls outside a threshold range of values associated with movement of the monitored baby. 17. The system of claim 8, wherein the movement determination module determines the state of movement of the monitored baby based on determining pixel velocities for one or more areas of the monitored baby that are based on the TOF data. 18. A method performed by a baby monitor, the method comprising: receiving depth image data from a depth image sensor proximate to a target subject; and determining a movement status and breathing status of the target subject based on the received depth image data. 19. The method of claim 18, wherein the received depth image data includes time of flight (TOF) depth images associated with the target subject that include pixels representing distances to one or more areas of the target subject. 20. The method of claim 18, wherein determining a movement status and breathing status of the target subject based on the received depth image data includes determining pixel velocities for pixels representing one or more areas of the target subject that are based on the depth image data.
2,400
8,755
8,755
15,076,703
2,487
A surveillance camera and image data storage system and method are disclosed. The system includes a network of surveillance cameras that generate image data and a storage allocation system implemented at the level of the individual surveillance cameras. The storage allocation system enables the surveillance cameras to distribute storage of their image data across one or more surveillance cameras having excess local storage available within the surveillance cameras. In one embodiment, a primary surveillance camera of the storage allocation system exchanges messages with the other cameras functioning as secondary surveillance cameras to determine the available and required storage resources of each of the cameras, and to store image data across the cameras in response to the determined available and required storage resources. The storage allocation system can also distribute storage of the image data of the cameras to a remote cloud storage system.
1. A surveillance camera and image data storage system, comprising: a network of surveillance cameras generating image data; and a storage allocation system tracking image data storage among the surveillance cameras and enabling the surveillance cameras to store the image data to other surveillance cameras of the network. 2. The system of claim 1, wherein the storage allocation system comprises: one or more surveillance cameras that each include: a device storage resource monitor that determines device storage resources for each of the surveillance cameras. 3. The system of claim 2, wherein each secondary surveillance camera includes device storage for storing image data generated -within each secondary surveillance camera and site virtual storage for storing image data generated by other surveillance cameras. 4. The system of claim 1, wherein the storage allocation system comprises: one or more surveillance cameras that each include: a virtual storage process that stores the image data generated within the surveillance cameras to other surveillance cameras. 5. The system of claim 1, wherein the storage allocation system further comprises: a primary surveillance camera, comprising: a query engine for querying the one or more secondary surveillance cameras for their device storage resources, wherein the query engine maintains available/required storage resources determined from the device storage resources sent from each of the secondary surveillance cameras. 6. The system of claim 5. wherein the primary surveillance camera further comprises a device storage resource monitor that determines device storage resources for the primary surveillance camera. 7. The system of claim 1, wherein the storage allocation system further comprises: a virtual storage controller that directs a virtual storage process within each of the surveillance cameras. 8. The system of claim 7, wherein the virtual storage controller further enables the surveillance cameras to store the image data to a cloud storage system. 9. The system of claim 7, wherein the virtual storage controller enables the surveillance cameras to distribute storage of their image data across one or more surveillance cameras. 10. The system of claim 7, wherein the virtual storage controller is included within a primary surveillance camera. 11. The system of claim 1, wherein the storage allocation system comprises two or more surveillance cameras that each include: a device storage resource monitor that determines device storage resources for each of the surveillance cameras; and a distributed voting process for enabling the surveillance cameras to store the image data to other surveillance cameras of the network based on the device storage resources for each of the surveillance cameras. 12. The system of claim 1, wherein a primary surveillance camera includes device storage for storing image data generated within the primary surveillance camera. 13. A surveillance camera image data storage method, comprising: generating image data with a network of surveillance cameras; tracking image data storage among the surveillance cameras; and enabling the surveillance cameras to store the image data to other surveillance cameras of the network. 14. The method of claim 13, further comprising: the surveillance cameras each determining device storage resources; and storing the image data generated within each surveillance camera to other surveillance cameras based on the determined device storage resources. 15. The method of claim 13, further comprising a primary surveillance camera querying one or more secondary surveillance cameras for their device storage resources and maintaining available/required storage resources determined from the device storage resources sent from each of the secondary surveillance cameras. 16. The method of claim 15, further comprising the primary surveillance camera determining the device storage resources for itself. 17. The method of claim 13, wherein the surveillance cameras further store the image data to a cloud storage system. 18. The method of claim 13, wherein each surveillance camera includes de-vice storage for storing image data generated within each surveillance camera and site virtual storage for storing image data generated by other surveillance cameras. 19. The method of claim 13, wherein enabling the surveillance cameras to store the image data to other surveillance cameras of the network comprises: each of the surveillance cameras functioning as peer-to-peer surveillance cameras; each of the peer-to-peer surveillance cameras determining its own device storage resources; each of the peer-to-peer surveillance cameras implementing a voting protocol at a level of each of the peer-to-peer surveillance cameras; and storing the image data generated within each peer-to-peer surveillance camera to other peer-to-peer surveillance cameras based on the determined device storage resources via the voting protocol.
A surveillance camera and image data storage system and method are disclosed. The system includes a network of surveillance cameras that generate image data and a storage allocation system implemented at the level of the individual surveillance cameras. The storage allocation system enables the surveillance cameras to distribute storage of their image data across one or more surveillance cameras having excess local storage available within the surveillance cameras. In one embodiment, a primary surveillance camera of the storage allocation system exchanges messages with the other cameras functioning as secondary surveillance cameras to determine the available and required storage resources of each of the cameras, and to store image data across the cameras in response to the determined available and required storage resources. The storage allocation system can also distribute storage of the image data of the cameras to a remote cloud storage system.1. A surveillance camera and image data storage system, comprising: a network of surveillance cameras generating image data; and a storage allocation system tracking image data storage among the surveillance cameras and enabling the surveillance cameras to store the image data to other surveillance cameras of the network. 2. The system of claim 1, wherein the storage allocation system comprises: one or more surveillance cameras that each include: a device storage resource monitor that determines device storage resources for each of the surveillance cameras. 3. The system of claim 2, wherein each secondary surveillance camera includes device storage for storing image data generated -within each secondary surveillance camera and site virtual storage for storing image data generated by other surveillance cameras. 4. The system of claim 1, wherein the storage allocation system comprises: one or more surveillance cameras that each include: a virtual storage process that stores the image data generated within the surveillance cameras to other surveillance cameras. 5. The system of claim 1, wherein the storage allocation system further comprises: a primary surveillance camera, comprising: a query engine for querying the one or more secondary surveillance cameras for their device storage resources, wherein the query engine maintains available/required storage resources determined from the device storage resources sent from each of the secondary surveillance cameras. 6. The system of claim 5. wherein the primary surveillance camera further comprises a device storage resource monitor that determines device storage resources for the primary surveillance camera. 7. The system of claim 1, wherein the storage allocation system further comprises: a virtual storage controller that directs a virtual storage process within each of the surveillance cameras. 8. The system of claim 7, wherein the virtual storage controller further enables the surveillance cameras to store the image data to a cloud storage system. 9. The system of claim 7, wherein the virtual storage controller enables the surveillance cameras to distribute storage of their image data across one or more surveillance cameras. 10. The system of claim 7, wherein the virtual storage controller is included within a primary surveillance camera. 11. The system of claim 1, wherein the storage allocation system comprises two or more surveillance cameras that each include: a device storage resource monitor that determines device storage resources for each of the surveillance cameras; and a distributed voting process for enabling the surveillance cameras to store the image data to other surveillance cameras of the network based on the device storage resources for each of the surveillance cameras. 12. The system of claim 1, wherein a primary surveillance camera includes device storage for storing image data generated within the primary surveillance camera. 13. A surveillance camera image data storage method, comprising: generating image data with a network of surveillance cameras; tracking image data storage among the surveillance cameras; and enabling the surveillance cameras to store the image data to other surveillance cameras of the network. 14. The method of claim 13, further comprising: the surveillance cameras each determining device storage resources; and storing the image data generated within each surveillance camera to other surveillance cameras based on the determined device storage resources. 15. The method of claim 13, further comprising a primary surveillance camera querying one or more secondary surveillance cameras for their device storage resources and maintaining available/required storage resources determined from the device storage resources sent from each of the secondary surveillance cameras. 16. The method of claim 15, further comprising the primary surveillance camera determining the device storage resources for itself. 17. The method of claim 13, wherein the surveillance cameras further store the image data to a cloud storage system. 18. The method of claim 13, wherein each surveillance camera includes de-vice storage for storing image data generated within each surveillance camera and site virtual storage for storing image data generated by other surveillance cameras. 19. The method of claim 13, wherein enabling the surveillance cameras to store the image data to other surveillance cameras of the network comprises: each of the surveillance cameras functioning as peer-to-peer surveillance cameras; each of the peer-to-peer surveillance cameras determining its own device storage resources; each of the peer-to-peer surveillance cameras implementing a voting protocol at a level of each of the peer-to-peer surveillance cameras; and storing the image data generated within each peer-to-peer surveillance camera to other peer-to-peer surveillance cameras based on the determined device storage resources via the voting protocol.
2,400
8,756
8,756
14,856,552
2,483
Two-dimensional (2D) color information and 3D-depth information are concurrently obtained from a 2D pixel array. The 2D pixel array is arranged in a first group of a plurality of rows. A second group of rows of the array are operable to generate 2D-color information and pixels of a third group of the array are operable to generate 3D-depth information. The first group of rows comprises a first number of rows, the second group of rows comprises a second number of rows that is equal to or less than the first number of rows, and the third group of rows comprises a third number of rows that is equal to or less than the second number of rows. In an alternating manner, 2D-color information is received from a row selected from the second group of rows and 3D-depth information is received from a row selected from the third group of rows.
1-9. (canceled) 10. An image sensor unit, comprising: a two-dimensional (2D) pixel array arranged in a first group of a plurality of rows, pixels of a second group of rows of the array being operable to generate 2D-color information based on an image of at least one object received by the 2D pixel array, pixels of a third group of the array being operable to generate 3D-depth information of the at least one object, the first group of rows comprising a first number of rows, the second group of rows comprising a second number of rows that is equal to or less than the first number of rows, and the third group of rows comprising a third number of rows that is equal to or less than the second number of rows; and a controller coupled to the 2D pixel array to select in an alternating manner a row from the second group of rows to output the generated 2D-color information based on the image of the at least one object and a row from the third group of rows to output the generated 3D-depth information of the at least one object. 11. The image sensor unit according to claim 10, wherein the row selected from the second group of rows is the same row as the row selected from the third group of rows. 12. The image sensor unit according to claim 10, wherein the row selected from the second group of rows is the different from the row selected from the third group of rows. 13. The image sensor unit according to claim 10, wherein the 3D-depth information comprises triangulation information corresponding to a scanned row of spots of the at least one object. 14. The image sensor unit according to claim 13, wherein the 3D-depth information is based on a linear integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 15. The image sensor unit according to claim 13, wherein the 3D-depth information is based on a logarithmic integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 16. The image sensor unit according to claim 13, wherein the triangulation information comprises timestamp information for the scanned row of spots. 17. The image sensor unit according to claim 13, further comprising a laser light source to illuminate the scanned row of spots. 18. The image sensor unit according to claim 17, wherein the laser light source comprises one of a visible laser light source, a near infrared laser light source, a point light source, a monochromatic illumination source, an X-Y addressable laser light source, or a Micro Electro-Mechanical System (MEMS) based laser scanner. 19. A system, comprising: a two-dimensional (2D) pixel array arranged in a first group of a plurality of rows, pixels of a second group of rows of the array being operable to generate 2D-color information based on an image of at least one object received by the 2D pixel array, pixels of a third group of the array being operable to generate 3D-depth information of the at least one object, the first group of rows comprising a first number of rows, the second group of rows comprising a second number of rows that is equal to or less than the first number of rows, and the third group of rows comprising a third number of rows that is equal to or less than the second number of rows; a controller coupled to the 2D pixel array to select in an alternating manner a row from the second group of rows to output the generated 2D-color information based on the image of the at least one object and a row from the third group of rows to output the generated 3D-depth information of the at least one object; and a display coupled to the 2D pixel array and the controller, the display being operative to display a first image of the at least one object based on the generated 2D-color information and to display a second image of the at least one object based on the generated 3D-depth information. 20. The system according to claim 19, wherein the 3D-depth information comprises triangulation information corresponding to a scanned row of spots of the at least one object, wherein the triangulation information comprises timestamp information for the scanned row of spots. 21. The system according to claim 20, wherein the 3D-depth information is based on a linear integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 22. The system according to claim 20, wherein the 3D-depth information is based on a logarithmic integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 23. The system according to claim 20, further comprising a laser light source to illuminate the scanned row of spots, wherein the laser light source comprises one of a visible laser light source, a near infrared laser light source, a point light source, a monochromatic illumination source, an X-Y addressable laser light source, or a Micro Electro-Mechanical System (MEMS) based laser scanner. 24. The system according to claim 19, wherein the display comprises a touchscreen display. 25. The system according to claim 24, wherein the system comprises part of mobile communication device.
Two-dimensional (2D) color information and 3D-depth information are concurrently obtained from a 2D pixel array. The 2D pixel array is arranged in a first group of a plurality of rows. A second group of rows of the array are operable to generate 2D-color information and pixels of a third group of the array are operable to generate 3D-depth information. The first group of rows comprises a first number of rows, the second group of rows comprises a second number of rows that is equal to or less than the first number of rows, and the third group of rows comprises a third number of rows that is equal to or less than the second number of rows. In an alternating manner, 2D-color information is received from a row selected from the second group of rows and 3D-depth information is received from a row selected from the third group of rows.1-9. (canceled) 10. An image sensor unit, comprising: a two-dimensional (2D) pixel array arranged in a first group of a plurality of rows, pixels of a second group of rows of the array being operable to generate 2D-color information based on an image of at least one object received by the 2D pixel array, pixels of a third group of the array being operable to generate 3D-depth information of the at least one object, the first group of rows comprising a first number of rows, the second group of rows comprising a second number of rows that is equal to or less than the first number of rows, and the third group of rows comprising a third number of rows that is equal to or less than the second number of rows; and a controller coupled to the 2D pixel array to select in an alternating manner a row from the second group of rows to output the generated 2D-color information based on the image of the at least one object and a row from the third group of rows to output the generated 3D-depth information of the at least one object. 11. The image sensor unit according to claim 10, wherein the row selected from the second group of rows is the same row as the row selected from the third group of rows. 12. The image sensor unit according to claim 10, wherein the row selected from the second group of rows is the different from the row selected from the third group of rows. 13. The image sensor unit according to claim 10, wherein the 3D-depth information comprises triangulation information corresponding to a scanned row of spots of the at least one object. 14. The image sensor unit according to claim 13, wherein the 3D-depth information is based on a linear integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 15. The image sensor unit according to claim 13, wherein the 3D-depth information is based on a logarithmic integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 16. The image sensor unit according to claim 13, wherein the triangulation information comprises timestamp information for the scanned row of spots. 17. The image sensor unit according to claim 13, further comprising a laser light source to illuminate the scanned row of spots. 18. The image sensor unit according to claim 17, wherein the laser light source comprises one of a visible laser light source, a near infrared laser light source, a point light source, a monochromatic illumination source, an X-Y addressable laser light source, or a Micro Electro-Mechanical System (MEMS) based laser scanner. 19. A system, comprising: a two-dimensional (2D) pixel array arranged in a first group of a plurality of rows, pixels of a second group of rows of the array being operable to generate 2D-color information based on an image of at least one object received by the 2D pixel array, pixels of a third group of the array being operable to generate 3D-depth information of the at least one object, the first group of rows comprising a first number of rows, the second group of rows comprising a second number of rows that is equal to or less than the first number of rows, and the third group of rows comprising a third number of rows that is equal to or less than the second number of rows; a controller coupled to the 2D pixel array to select in an alternating manner a row from the second group of rows to output the generated 2D-color information based on the image of the at least one object and a row from the third group of rows to output the generated 3D-depth information of the at least one object; and a display coupled to the 2D pixel array and the controller, the display being operative to display a first image of the at least one object based on the generated 2D-color information and to display a second image of the at least one object based on the generated 3D-depth information. 20. The system according to claim 19, wherein the 3D-depth information comprises triangulation information corresponding to a scanned row of spots of the at least one object, wherein the triangulation information comprises timestamp information for the scanned row of spots. 21. The system according to claim 20, wherein the 3D-depth information is based on a linear integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 22. The system according to claim 20, wherein the 3D-depth information is based on a logarithmic integration of photoelectrons generated by the pixels of the row selected from the third group of rows. 23. The system according to claim 20, further comprising a laser light source to illuminate the scanned row of spots, wherein the laser light source comprises one of a visible laser light source, a near infrared laser light source, a point light source, a monochromatic illumination source, an X-Y addressable laser light source, or a Micro Electro-Mechanical System (MEMS) based laser scanner. 24. The system according to claim 19, wherein the display comprises a touchscreen display. 25. The system according to claim 24, wherein the system comprises part of mobile communication device.
2,400
8,757
8,757
15,877,004
2,421
Methods and systems are described for managing blackout restrictions. A user device may retrieve a blackout condition from a blackout device. The blackout device may be a node in plurality of blackout nodes. Each of the blackout nodes may store blackout conditions for different corresponding content. The user device may retrieve the blackout condition from a blackout device associated with content in response to a request for the content. The user device may determine whether information associated with the user device satisfies the blackout condition. If the information satisfies the blackout condition, the requested content may be blocked. Alternative content may be output instead of the requested content.
1. A method comprising: sending, by a user device, data associated with establishing a persistent connection with a blackout information server located remotely from the user device; receiving, by a user device, a request to access content; receiving, via the persistent connection with the blackout information server, a blackout condition associated with the content; determining that the user device satisfies the blackout condition; accessing, based on the user device satisfying the blackout condition, alternative content; and outputting the alternative content. 2. The method of claim 1, wherein the blackout information server is configured for sending blackout information to a plurality of user devices. 3. The method of claim 1, wherein sending data associated with establishing the persistent connection with the blackout information server comprises sending data associated with establishing a websocket connection to the blackout information server, wherein the persistent connection comprises the websocket connection. 4. The method of claim 1, wherein the blackout information server is a node of a plurality of nodes configured for storing blackout information, and wherein each of the plurality of nodes is associated with different content. 5. The method of claim 4, wherein the blackout information server is configured to receive the blackout condition from a blackout managing device configured to manage the plurality of nodes. 6. The method of claim 1, further comprising comparing the blackout condition to provisioning information of the user device, wherein determining that the user device satisfies the blackout condition is based on the comparing of the blackout condition to provisioning information of the user device, and wherein the provisioning information comprises location information associated with one or more of the user device or an account associated with the user device. 7. The method of claim 1, wherein the blackout condition comprises one or more of location information, timing information, and device information for blocking the content. 8. A method comprising: sending data associated with establishing a plurality of persistent connections with a plurality of blackout information servers, wherein each of the plurality of blackout information servers is assigned to a different set of content channels; receiving a request for content associated with a first content channel; determining a first blackout information server of the plurality of blackout information servers that is assigned to the first content channel; determining, based on a first persistent connection of the plurality of persistent connections that is associated with the first blackout information server, blackout information associated with the first content channel; determining, based on the blackout information, whether the request for content satisfies the blackout information; and outputting, based on the determination of whether the request satisfies the blackout information, the content or alternative content. 9. The method of claim 8, wherein each blackout information server of the plurality of blackout information servers has an additional plurality of persistent connections with a plurality of user devices. 10. The method of claim 8, wherein determining the blackout information associated with the first content channel comprises determining that there are no blackout conditions associated with the content. 11. The method of claim 8, wherein determining the blackout information associated with the first content channel comprises determining that a blackout condition is associated with the content. 12. The method of claim 11, further comprising determining that a user device receiving the request for content satisfies the blackout condition, wherein the alternative content is output instead of the content. 13. The method of claim 8, wherein the first blackout information server is configured to keep open the first persistent connection after a response to an initial request is sent via the first persistent connection. 14. The method of claim 8, wherein the first blackout information server is configured to keep open the first persistent connection without receiving an instruction to keep first the persistent connection open. 15. A method comprising: receiving, by a user device, a request to access a content; determining a restriction information server configured to store restriction information associated with the content; determining a status of a persistent connection to the restriction information server; determining, based on the status of the persistent connection to the restriction information server, that the user device satisfies a restriction condition; and blocking, based on the determining that the user satisfies the restriction condition, output of the content. 16. The method of claim 15, wherein the restriction information server is configured for sending restriction information to a plurality of user devices. 17. The method of claim 15, wherein the persistent connection comprises a websocket connection to the restriction information server. 18. The method of claim 15, wherein the restriction information server is a node of a plurality of nodes configured for storing restriction information, and wherein each of the plurality of nodes is associated with different content. 19. The method of claim 18, wherein the restriction information server is configured to receive the restriction condition from a restriction managing device configured to manage the plurality of nodes. 20. The method of claim 15, wherein determining the status of the persistent connection to the restriction information server comprises determining that the persistent connection is one or more of unauthenticated or disconnected.
Methods and systems are described for managing blackout restrictions. A user device may retrieve a blackout condition from a blackout device. The blackout device may be a node in plurality of blackout nodes. Each of the blackout nodes may store blackout conditions for different corresponding content. The user device may retrieve the blackout condition from a blackout device associated with content in response to a request for the content. The user device may determine whether information associated with the user device satisfies the blackout condition. If the information satisfies the blackout condition, the requested content may be blocked. Alternative content may be output instead of the requested content.1. A method comprising: sending, by a user device, data associated with establishing a persistent connection with a blackout information server located remotely from the user device; receiving, by a user device, a request to access content; receiving, via the persistent connection with the blackout information server, a blackout condition associated with the content; determining that the user device satisfies the blackout condition; accessing, based on the user device satisfying the blackout condition, alternative content; and outputting the alternative content. 2. The method of claim 1, wherein the blackout information server is configured for sending blackout information to a plurality of user devices. 3. The method of claim 1, wherein sending data associated with establishing the persistent connection with the blackout information server comprises sending data associated with establishing a websocket connection to the blackout information server, wherein the persistent connection comprises the websocket connection. 4. The method of claim 1, wherein the blackout information server is a node of a plurality of nodes configured for storing blackout information, and wherein each of the plurality of nodes is associated with different content. 5. The method of claim 4, wherein the blackout information server is configured to receive the blackout condition from a blackout managing device configured to manage the plurality of nodes. 6. The method of claim 1, further comprising comparing the blackout condition to provisioning information of the user device, wherein determining that the user device satisfies the blackout condition is based on the comparing of the blackout condition to provisioning information of the user device, and wherein the provisioning information comprises location information associated with one or more of the user device or an account associated with the user device. 7. The method of claim 1, wherein the blackout condition comprises one or more of location information, timing information, and device information for blocking the content. 8. A method comprising: sending data associated with establishing a plurality of persistent connections with a plurality of blackout information servers, wherein each of the plurality of blackout information servers is assigned to a different set of content channels; receiving a request for content associated with a first content channel; determining a first blackout information server of the plurality of blackout information servers that is assigned to the first content channel; determining, based on a first persistent connection of the plurality of persistent connections that is associated with the first blackout information server, blackout information associated with the first content channel; determining, based on the blackout information, whether the request for content satisfies the blackout information; and outputting, based on the determination of whether the request satisfies the blackout information, the content or alternative content. 9. The method of claim 8, wherein each blackout information server of the plurality of blackout information servers has an additional plurality of persistent connections with a plurality of user devices. 10. The method of claim 8, wherein determining the blackout information associated with the first content channel comprises determining that there are no blackout conditions associated with the content. 11. The method of claim 8, wherein determining the blackout information associated with the first content channel comprises determining that a blackout condition is associated with the content. 12. The method of claim 11, further comprising determining that a user device receiving the request for content satisfies the blackout condition, wherein the alternative content is output instead of the content. 13. The method of claim 8, wherein the first blackout information server is configured to keep open the first persistent connection after a response to an initial request is sent via the first persistent connection. 14. The method of claim 8, wherein the first blackout information server is configured to keep open the first persistent connection without receiving an instruction to keep first the persistent connection open. 15. A method comprising: receiving, by a user device, a request to access a content; determining a restriction information server configured to store restriction information associated with the content; determining a status of a persistent connection to the restriction information server; determining, based on the status of the persistent connection to the restriction information server, that the user device satisfies a restriction condition; and blocking, based on the determining that the user satisfies the restriction condition, output of the content. 16. The method of claim 15, wherein the restriction information server is configured for sending restriction information to a plurality of user devices. 17. The method of claim 15, wherein the persistent connection comprises a websocket connection to the restriction information server. 18. The method of claim 15, wherein the restriction information server is a node of a plurality of nodes configured for storing restriction information, and wherein each of the plurality of nodes is associated with different content. 19. The method of claim 18, wherein the restriction information server is configured to receive the restriction condition from a restriction managing device configured to manage the plurality of nodes. 20. The method of claim 15, wherein determining the status of the persistent connection to the restriction information server comprises determining that the persistent connection is one or more of unauthenticated or disconnected.
2,400
8,758
8,758
15,589,738
2,484
According to one embodiment, a computer program product comprises a non-transitory computer readable storage medium having computer program code embodied therewith, where the computer program code is readable and/or executable by a first recording device to cause the first recording device to receive, at the first recording device, a request to record a contiguous television program, store the contiguous television program on the first recording device, receive, at the first recording device, a user request to transfer data from the first recording device to a second recording device, receive, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device, and send to the second recording device from the first recording device the contiguous television program stored on the first recording device.
1. A computer program product comprising a non-transitory computer readable storage medium having computer program code embodied therewith, wherein the computer program code is readable and/or executable by a first recording device to cause the first recording device to: receive, at the first recording device, a request to record a contiguous television program; store the contiguous television program on the first recording device; receive, at the first recording device, a user request to transfer data from the first recording device to a second recording device; receive, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device; and send to the second recording device from the first recording device the contiguous television program stored on the first recording device. 2. The computer program product of claim 1, wherein the first recording device is a digital video recorder (DVR). 3. The computer program product of claim 1, wherein the request to record the contiguous television program includes a request to record a series of programs associated with the contiguous television program. 4. The computer program product of claim 1, wherein the second recording device is a network-accessible peripheral storage system. 5. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to determine an amount of available storage space for the first recording device. 6. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to receive an amount of available storage space for the second recording device. 7. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to output an amount of available storage space of the first recording device and an amount of available storage space of the second recording device. 8. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to receive an instruction to perform the transfer from the first recording device to the second recording device, after outputting an amount of available storage space of the first recording device and an amount of available storage space of the second recording device. 9. The computer program product of claim 1, further comprising computer program code that is readable and/or executable by the first recording device to cause the first recording device to output, on a display, an indication of the contiguous television program in a list of recorded programs. 10. The computer program product of claim 9, further comprising computer program code that is readable and/or executable by the first recording device to cause the first recording device to receive a request to play back the contiguous television program via selection of the indication from the list of recorded programs. 11. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to delete the contiguous television program from the first recording device after sending the contiguous television program to the second recording device. 12. The computer program product of claim 1, further comprising computer program code that is readable and/or executable by the first recording device to cause the first recording device to: receive a request to delete the contiguous television program; and delete the contiguous television program from the first recording device upon receiving the request. 13. A method, comprising: receiving, at a first recording device, a request to record a contiguous television program; storing the contiguous television program on the first recording device; receiving, at the first recording device, a user request to transfer data from the first recording device to a second recording device; receiving, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device; and sending by the first recording device to the second recording device the contiguous television program stored on the first recording device. 14. A first recording device, comprising: at least one processor; and logic integrated with and/or executable by the processor to cause the processor to: receive, at a first recording device, a request to record a contiguous television program; store the contiguous television program on the first recording device; receive, at the first recording device, a user request to transfer data from the first recording device to a second recording device; receive, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device; and send by the first recording device to the second recording device the contiguous television program stored on the first recording device. 15. A first recording device, comprising: a hardware processor for receiving at the first recording device a request to record a television program broadcast, wherein the first recording device is connected to a second recording device; the hardware processor for determining that an available amount of storage space on the first recording device is less than an available amount of storage space on a second recording device; the hardware processor for selecting the second recording device to store a representation of the television program broadcast, in response to the determining; the hardware processor for accessing the representation of the television program broadcast on the second recording device; and the hardware processor for outputting the representation of the television program broadcast accessed on the second recording device. 16. The first recording device of claim 15, wherein the selecting is performed automatically without user input. 17. The first recording device of claim 15, wherein the first recording device and the second recording device are connected by a direct connection. 18. The first recording device of claim 15, wherein the first recording device includes a digital video recorder. 19. The first recording device of claim 15, wherein the second recording device includes a storage unit. 20. The first recording device of claim 15, wherein the first recording device and the second recording device are connected by a wireless connection. 21. The first recording device of claim 15, wherein the first recording device communicates with a content provider over a network. 22. The first recording device of claim 15, wherein the television program broadcast is received utilizing a coaxial cable connection. 23. The first recording device of claim 15, wherein the television program broadcast is received utilizing a satellite transmitter. 24. A method, comprising: receiving at a first recording device a request to record a television program broadcast, wherein the first recording device is connected to a second recording device; determining that an available amount of storage space on the first recording device is less than an available amount of storage space on a second recording device; selecting the second recording device to store a representation of the television program broadcast, in response to the determining; accessing the representation of the television program broadcast on the second recording device; and outputting the representation of the television program broadcast accessed on the second recording device. 25. The method of claim 24, wherein the selecting is performed automatically without user input. 26. The method of claim 24, wherein the first recording device and the second recording device are connected by a direct connection. 27. The method of claim 24, wherein the first recording device includes a digital video recorder. 28. The method of claim 24, wherein the second recording device includes a storage unit. 29. The method of claim 24, wherein the first recording device and the second recording device are connected by a wireless connection. 30. The method of claim 24, wherein the first recording device communicates with a content provider over a network. 31. The method of claim 24, wherein the television program broadcast is received utilizing a coaxial cable connection. 32. The method of claim 24, wherein the television program broadcast is received utilizing a satellite transmitter. 33. A digital video recorder, comprising: a hardware processor for receiving at the digital video recorder a request to record a television program broadcast, wherein the digital video recorder is connected to a second recording device; the hardware processor for determining that an available amount of storage space on the digital video recorder is less than an available amount of storage space on a storage unit separate from the digital video recorder; the hardware processor for selecting the storage unit to store a representation of the television program broadcast, in response to the determining, where the selecting is performed automatically without user input; the hardware processor for accessing the representation of the television program broadcast on the storage unit; and the hardware processor for outputting the representation of the television program broadcast accessed on the storage unit.
According to one embodiment, a computer program product comprises a non-transitory computer readable storage medium having computer program code embodied therewith, where the computer program code is readable and/or executable by a first recording device to cause the first recording device to receive, at the first recording device, a request to record a contiguous television program, store the contiguous television program on the first recording device, receive, at the first recording device, a user request to transfer data from the first recording device to a second recording device, receive, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device, and send to the second recording device from the first recording device the contiguous television program stored on the first recording device.1. A computer program product comprising a non-transitory computer readable storage medium having computer program code embodied therewith, wherein the computer program code is readable and/or executable by a first recording device to cause the first recording device to: receive, at the first recording device, a request to record a contiguous television program; store the contiguous television program on the first recording device; receive, at the first recording device, a user request to transfer data from the first recording device to a second recording device; receive, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device; and send to the second recording device from the first recording device the contiguous television program stored on the first recording device. 2. The computer program product of claim 1, wherein the first recording device is a digital video recorder (DVR). 3. The computer program product of claim 1, wherein the request to record the contiguous television program includes a request to record a series of programs associated with the contiguous television program. 4. The computer program product of claim 1, wherein the second recording device is a network-accessible peripheral storage system. 5. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to determine an amount of available storage space for the first recording device. 6. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to receive an amount of available storage space for the second recording device. 7. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to output an amount of available storage space of the first recording device and an amount of available storage space of the second recording device. 8. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to receive an instruction to perform the transfer from the first recording device to the second recording device, after outputting an amount of available storage space of the first recording device and an amount of available storage space of the second recording device. 9. The computer program product of claim 1, further comprising computer program code that is readable and/or executable by the first recording device to cause the first recording device to output, on a display, an indication of the contiguous television program in a list of recorded programs. 10. The computer program product of claim 9, further comprising computer program code that is readable and/or executable by the first recording device to cause the first recording device to receive a request to play back the contiguous television program via selection of the indication from the list of recorded programs. 11. The computer program product of claim 1, wherein the computer program code is readable and/or executable by the first recording device to cause the first recording device to delete the contiguous television program from the first recording device after sending the contiguous television program to the second recording device. 12. The computer program product of claim 1, further comprising computer program code that is readable and/or executable by the first recording device to cause the first recording device to: receive a request to delete the contiguous television program; and delete the contiguous television program from the first recording device upon receiving the request. 13. A method, comprising: receiving, at a first recording device, a request to record a contiguous television program; storing the contiguous television program on the first recording device; receiving, at the first recording device, a user request to transfer data from the first recording device to a second recording device; receiving, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device; and sending by the first recording device to the second recording device the contiguous television program stored on the first recording device. 14. A first recording device, comprising: at least one processor; and logic integrated with and/or executable by the processor to cause the processor to: receive, at a first recording device, a request to record a contiguous television program; store the contiguous television program on the first recording device; receive, at the first recording device, a user request to transfer data from the first recording device to a second recording device; receive, at the first recording device, a selection of the contiguous television program for transfer from the first recording device to the second recording device; and send by the first recording device to the second recording device the contiguous television program stored on the first recording device. 15. A first recording device, comprising: a hardware processor for receiving at the first recording device a request to record a television program broadcast, wherein the first recording device is connected to a second recording device; the hardware processor for determining that an available amount of storage space on the first recording device is less than an available amount of storage space on a second recording device; the hardware processor for selecting the second recording device to store a representation of the television program broadcast, in response to the determining; the hardware processor for accessing the representation of the television program broadcast on the second recording device; and the hardware processor for outputting the representation of the television program broadcast accessed on the second recording device. 16. The first recording device of claim 15, wherein the selecting is performed automatically without user input. 17. The first recording device of claim 15, wherein the first recording device and the second recording device are connected by a direct connection. 18. The first recording device of claim 15, wherein the first recording device includes a digital video recorder. 19. The first recording device of claim 15, wherein the second recording device includes a storage unit. 20. The first recording device of claim 15, wherein the first recording device and the second recording device are connected by a wireless connection. 21. The first recording device of claim 15, wherein the first recording device communicates with a content provider over a network. 22. The first recording device of claim 15, wherein the television program broadcast is received utilizing a coaxial cable connection. 23. The first recording device of claim 15, wherein the television program broadcast is received utilizing a satellite transmitter. 24. A method, comprising: receiving at a first recording device a request to record a television program broadcast, wherein the first recording device is connected to a second recording device; determining that an available amount of storage space on the first recording device is less than an available amount of storage space on a second recording device; selecting the second recording device to store a representation of the television program broadcast, in response to the determining; accessing the representation of the television program broadcast on the second recording device; and outputting the representation of the television program broadcast accessed on the second recording device. 25. The method of claim 24, wherein the selecting is performed automatically without user input. 26. The method of claim 24, wherein the first recording device and the second recording device are connected by a direct connection. 27. The method of claim 24, wherein the first recording device includes a digital video recorder. 28. The method of claim 24, wherein the second recording device includes a storage unit. 29. The method of claim 24, wherein the first recording device and the second recording device are connected by a wireless connection. 30. The method of claim 24, wherein the first recording device communicates with a content provider over a network. 31. The method of claim 24, wherein the television program broadcast is received utilizing a coaxial cable connection. 32. The method of claim 24, wherein the television program broadcast is received utilizing a satellite transmitter. 33. A digital video recorder, comprising: a hardware processor for receiving at the digital video recorder a request to record a television program broadcast, wherein the digital video recorder is connected to a second recording device; the hardware processor for determining that an available amount of storage space on the digital video recorder is less than an available amount of storage space on a storage unit separate from the digital video recorder; the hardware processor for selecting the storage unit to store a representation of the television program broadcast, in response to the determining, where the selecting is performed automatically without user input; the hardware processor for accessing the representation of the television program broadcast on the storage unit; and the hardware processor for outputting the representation of the television program broadcast accessed on the storage unit.
2,400
8,759
8,759
14,199,457
2,447
The present disclosure provides a method, non-transitory computer readable storage medium, and apparatus that implement an adaptable payload object model. In one embodiment, a payload object is generated using a payload specification that defines a plurality of payload attributes, where the payload object includes the plurality of payload attributes. The plurality of payload attributes of the payload object are populated with message attribute values that are extracted from an incoming message. The plurality of payload attributes of the payload object is validated. In one embodiment, an outgoing message is built that includes the payload object and is forwarded to a destination, such as a subscriber or a charging engine.
1. A method comprising: generating a payload object, wherein the payload object is generated using a message builder associated with a payload specification, the payload specification defines a plurality of payload attributes, and the payload object comprises the plurality of payload attributes; populating the plurality of payload attributes with message attribute values, wherein the message attribute values are extracted from an incoming message; and validating the plurality of payload attributes of the payload object. 2. The method of claim 1, further comprising: building an outgoing message that comprises the payload object; and forwarding the outgoing message to a destination, wherein the destination comprises one of a subscriber and a charging engine. 3. The method of claim 1, further comprising: identifying a message type of the incoming message; determining service product and event information from the incoming message; and instantiating the message builder, based on the message type and service product and event information, wherein the payload specification is retrieved from a repository of payload specifications. 4. The method of claim 3, further comprising: searching the repository for the payload specification, wherein the payload specification is associated with the message type, and the payload specification comprises information that matches the service product and event information. 5. The method of claim 1, wherein the populating comprises identifying a message attribute associated with a first payload attribute of the plurality of payload attributes; extracting a value of the message attribute from the incoming message; and setting the first payload attribute with the value. 6. The method of claim 5, further comprising: determining whether a first data type of the value matches a second data type of the first payload attribute, wherein the first payload attribute is set with the value in response to a determination that the first data type matches the second data type. 7. The method of claim 1, further comprising: discarding the payload object in response to a determination that at least one payload attribute of the plurality of payload attributes is invalid, wherein the at least one payload attribute is invalid in response to determining at least one of: a data type of an extracted message attribute value associated with the at least one payload attribute violates the payload specification, and the at least one payload attribute is a required payload attribute that is populated with an empty value. 8. A non-transitory computer readable storage medium configured to store program instructions that, when executed on a processor, are configured to cause the processor to perform a method comprising: generating a payload object, wherein the payload object is generated using a message builder associated with a payload specification, the payload specification defines a plurality of payload attributes, and the payload object comprises the plurality of payload attributes; populating the plurality of payload attributes with message attribute values, wherein the message attribute values are extracted from an incoming message; and validating the plurality of payload attributes of the payload object. 9. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: building an outgoing message that comprises the payload object; and forwarding the outgoing message to a destination, wherein the destination comprises one of a subscriber and a charging engine. 10. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: identifying a message type of the incoming message; determining service product and event information from the incoming message; and instantiating the message builder, based on the message type and service product and event information, wherein the payload specification is retrieved from a repository of payload specifications. 11. The non-transitory computer readable storage medium of claim 10, wherein the method further comprises: searching the repository for the payload specification, wherein the payload specification is associated with the message type, and the payload specification comprises information that matches the service product and event information. 12. The non-transitory computer readable storage medium of claim 8, wherein the populating comprises identifying a message attribute associated with a first payload attribute of the plurality of payload attributes; extracting a value of the message attribute from the incoming message; and setting the first payload attribute with the value. 13. The non-transitory computer readable storage medium of claim 12, wherein the method further comprises: determining whether a first data type of the value matches a second data type of the first payload attribute, wherein the first payload attribute is set with the value in response to a determination that the first data type matches the second data type. 14. The non-transitory computer readable storage medium of claim 9, wherein the method further comprises: discarding the payload object in response to a determination that at least one payload attribute of the plurality of payload attributes is invalid, wherein the at least one payload attribute is invalid in response to determining at least one of: a data type of an extracted message attribute value associated with the at least one payload attribute violates the payload specification, and the at least one payload attribute that is populated with an empty value violates the payload specification. 15. An apparatus comprising: a processor; and a memory coupled to the processor and configured to store instructions executable by the processor, the instructions configured to implement a payload object generation module configured to generate a payload object, wherein the payload object is generated using a message builder associated with a payload specification, the payload specification defines a plurality of payload attributes, and the payload object comprises the plurality of payload attributes; a payload attribute population module configured to populate the plurality of payload attributes with message attribute values, wherein the message attribute values are extracted from an incoming message; and a payload build module configured to validate the plurality of payload attributes of the payload object. 16. The apparatus of claim 15, wherein the payload build module is further configured to build an outgoing message that comprises the payload object, and forward the outgoing message to a destination, wherein the destination comprises one of a subscriber and a charging engine. 17. The apparatus of claim 15, wherein the payload object generation module is further configured to identify a message type of the incoming message; determine service product and event information from the incoming message; and instantiate the message builder, based on the message type and service product and event information, wherein the payload specification is retrieved from a repository of payload specifications. 18. The apparatus of claim 17, wherein the payload object generation module is further configured to search the repository for the payload specification, wherein the payload specification is associated with the message type, and the payload specification comprises information that matches the service product and event information. 19. The apparatus of claim 15, wherein the payload attribute population module is further configured to identify a message attribute associated with a first payload attribute of the plurality of payload attributes; extract a value of the message attribute from the incoming message; and set the first payload attribute with the value. 20. The apparatus of claim 19, wherein the payload attribute population module is further configured to determine whether a first data type of the value matches a second data type of the first payload attribute, wherein the first payload attribute is set with the value in response to a determination that the first data type matches the second data type.
The present disclosure provides a method, non-transitory computer readable storage medium, and apparatus that implement an adaptable payload object model. In one embodiment, a payload object is generated using a payload specification that defines a plurality of payload attributes, where the payload object includes the plurality of payload attributes. The plurality of payload attributes of the payload object are populated with message attribute values that are extracted from an incoming message. The plurality of payload attributes of the payload object is validated. In one embodiment, an outgoing message is built that includes the payload object and is forwarded to a destination, such as a subscriber or a charging engine.1. A method comprising: generating a payload object, wherein the payload object is generated using a message builder associated with a payload specification, the payload specification defines a plurality of payload attributes, and the payload object comprises the plurality of payload attributes; populating the plurality of payload attributes with message attribute values, wherein the message attribute values are extracted from an incoming message; and validating the plurality of payload attributes of the payload object. 2. The method of claim 1, further comprising: building an outgoing message that comprises the payload object; and forwarding the outgoing message to a destination, wherein the destination comprises one of a subscriber and a charging engine. 3. The method of claim 1, further comprising: identifying a message type of the incoming message; determining service product and event information from the incoming message; and instantiating the message builder, based on the message type and service product and event information, wherein the payload specification is retrieved from a repository of payload specifications. 4. The method of claim 3, further comprising: searching the repository for the payload specification, wherein the payload specification is associated with the message type, and the payload specification comprises information that matches the service product and event information. 5. The method of claim 1, wherein the populating comprises identifying a message attribute associated with a first payload attribute of the plurality of payload attributes; extracting a value of the message attribute from the incoming message; and setting the first payload attribute with the value. 6. The method of claim 5, further comprising: determining whether a first data type of the value matches a second data type of the first payload attribute, wherein the first payload attribute is set with the value in response to a determination that the first data type matches the second data type. 7. The method of claim 1, further comprising: discarding the payload object in response to a determination that at least one payload attribute of the plurality of payload attributes is invalid, wherein the at least one payload attribute is invalid in response to determining at least one of: a data type of an extracted message attribute value associated with the at least one payload attribute violates the payload specification, and the at least one payload attribute is a required payload attribute that is populated with an empty value. 8. A non-transitory computer readable storage medium configured to store program instructions that, when executed on a processor, are configured to cause the processor to perform a method comprising: generating a payload object, wherein the payload object is generated using a message builder associated with a payload specification, the payload specification defines a plurality of payload attributes, and the payload object comprises the plurality of payload attributes; populating the plurality of payload attributes with message attribute values, wherein the message attribute values are extracted from an incoming message; and validating the plurality of payload attributes of the payload object. 9. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: building an outgoing message that comprises the payload object; and forwarding the outgoing message to a destination, wherein the destination comprises one of a subscriber and a charging engine. 10. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: identifying a message type of the incoming message; determining service product and event information from the incoming message; and instantiating the message builder, based on the message type and service product and event information, wherein the payload specification is retrieved from a repository of payload specifications. 11. The non-transitory computer readable storage medium of claim 10, wherein the method further comprises: searching the repository for the payload specification, wherein the payload specification is associated with the message type, and the payload specification comprises information that matches the service product and event information. 12. The non-transitory computer readable storage medium of claim 8, wherein the populating comprises identifying a message attribute associated with a first payload attribute of the plurality of payload attributes; extracting a value of the message attribute from the incoming message; and setting the first payload attribute with the value. 13. The non-transitory computer readable storage medium of claim 12, wherein the method further comprises: determining whether a first data type of the value matches a second data type of the first payload attribute, wherein the first payload attribute is set with the value in response to a determination that the first data type matches the second data type. 14. The non-transitory computer readable storage medium of claim 9, wherein the method further comprises: discarding the payload object in response to a determination that at least one payload attribute of the plurality of payload attributes is invalid, wherein the at least one payload attribute is invalid in response to determining at least one of: a data type of an extracted message attribute value associated with the at least one payload attribute violates the payload specification, and the at least one payload attribute that is populated with an empty value violates the payload specification. 15. An apparatus comprising: a processor; and a memory coupled to the processor and configured to store instructions executable by the processor, the instructions configured to implement a payload object generation module configured to generate a payload object, wherein the payload object is generated using a message builder associated with a payload specification, the payload specification defines a plurality of payload attributes, and the payload object comprises the plurality of payload attributes; a payload attribute population module configured to populate the plurality of payload attributes with message attribute values, wherein the message attribute values are extracted from an incoming message; and a payload build module configured to validate the plurality of payload attributes of the payload object. 16. The apparatus of claim 15, wherein the payload build module is further configured to build an outgoing message that comprises the payload object, and forward the outgoing message to a destination, wherein the destination comprises one of a subscriber and a charging engine. 17. The apparatus of claim 15, wherein the payload object generation module is further configured to identify a message type of the incoming message; determine service product and event information from the incoming message; and instantiate the message builder, based on the message type and service product and event information, wherein the payload specification is retrieved from a repository of payload specifications. 18. The apparatus of claim 17, wherein the payload object generation module is further configured to search the repository for the payload specification, wherein the payload specification is associated with the message type, and the payload specification comprises information that matches the service product and event information. 19. The apparatus of claim 15, wherein the payload attribute population module is further configured to identify a message attribute associated with a first payload attribute of the plurality of payload attributes; extract a value of the message attribute from the incoming message; and set the first payload attribute with the value. 20. The apparatus of claim 19, wherein the payload attribute population module is further configured to determine whether a first data type of the value matches a second data type of the first payload attribute, wherein the first payload attribute is set with the value in response to a determination that the first data type matches the second data type.
2,400
8,760
8,760
14,475,471
2,459
Certain embodiments of the present invention can detect and evaluate new messages at a coordinating device to determine whether to forward the message to a wearable device. In this manner, a server can reduce a number of devices that it is to communicate a message to, while still allowing the message to be availed to multiple devices. Further, certain embodiments relate to coordinating alerts (e.g., audio or haptic alerts) to reduce redundant alerts of a single message amongst spatially clustered devices.
1. A computer-implemented method comprising: detecting, at a coordinating device, a message, wherein the message is generated locally at the coordinating device or received at the coordinating device from a remote source; identifying an app that is subscribed to process the message; enabling the app to process the message; identifying another electronic device, wherein each of the coordinating device and the other electronic device is associated with a same account; and transmitting, from the coordinating device, a signal that includes the processed message to the other electronic device. 2. The method of claim 1, wherein the signal includes an identifier of the app. 3. The method of claim 1, wherein the processing the message includes extracting an incomplete subset of data in the message, and wherein the processed message includes the incomplete subset of data. 4. The method of claim 1, wherein the message is generated locally by another app at the coordinating device. 5. The method of claim 1, wherein the message is indicative of a location of the coordinating device. 6. The method of claim 1, further comprising: detecting, at the coordinating device, another message; determining that no app is subscribed to handle distribution of the message; and in response to determining that no app is subscribed to handle distribution of the message, transmitting a signal that includes the other message to the other electronic device. 7. The method of claim 1, further comprising: detecting, at the coordinating device, another message; identifying another app that is subscribed to handle distribution of the other message; and in response to identifying the other app that is subscribed to handle distribution of the other message, not transmitting a signal corresponding to the other message to the other electronic device. 8. The method of claim 1, wherein the message corresponds to a calendar event or reminder, a text message, an email, or a phone call. 9. The method of claim 1, wherein identifying the app that is subscribed to process the message includes looking up information corresponding to the message in a subscriber structure stored at the coordinating device. 10. The method of claim 9, wherein the information includes an identifier of an app that generated the message or a source of the message. 11. The method of claim 1, further comprising: detecting, at the coordinating device, another message; identifying another app associated with the other message; determining that the other app is identified on a blacklist; and not transmitting a signal corresponding to the other message to the other electronic device. 12. The method of claim 1, further comprising: determining whether the coordinating device is in an active mode; when it is determined that the coordinating device is in the active mode, presenting a coordinating-device alert corresponding to the message at the coordinating device; and when it is determined that the coordinating device is not in the active mode, transmitting a signal to the other electronic device that corresponds to an invitation to present a mobile-device alert corresponding to the message. 13. A computer-implemented method comprising: receiving, at an electronic device, a signal transmitted from a coordinating device, wherein the signal includes data corresponding to an event message generated locally at the coordinating device representing an event or a received message received at the coordinating device from a remote source, and wherein each of the coordinating device and the electronic device is associated with a same account; identifying an app associated with the signal; enabling the app to transform, at the electronic device, the data in the signal into a notification representing the event or the received message; generating a visual notification presentation for the notification; and presenting the visual notification presentation. 14. The method of claim 13, wherein the signal includes an identifier of the app. 15. The method of claim 13, wherein the transforming the data in the signal into the notification includes combining the data with other data stored at the electronic device. 16. The method of claim 13, wherein the signal is indicative of a location of the coordinating device. 17. The method of claim 13, further comprising: receiving, at the electronic device, another signal transmitted by the coordinating device, wherein the other signal includes other data corresponding to another event message generated locally at the coordinating device representing another event or another received message received at the coordinating device from a same or different remote source; identifying another app associated with the other signal; and enabling the other app to transform, at the electronic device, the other data in the other signal into another notification representing the other event or the other received message, wherein the transforming of the data uses a transformation protocol, and wherein the transforming of the other data uses a different transformation protocol. 18. The method of claim 13, wherein the event corresponds to a calendar event or reminder. 19. The method of claim 13, wherein the received message corresponds to a text message, an email, or a phone call. 20. A coordinating device comprising: a connection component configured to transmit communications over one or more communication channels to other devices; one or more processors coupled to the connection component; and a computer-readable storage medium containing instructions, that, when executed by the one or more processors, cause the one or more processors to perform actions including: detecting a message, wherein the message is generated locally at the coordinating device or received, via a communication channel of the one or more communication channels, at the coordinating device from a remote source; identifying an app that is subscribed to process the message; enabling the app to process the message; identifying another electronic device, wherein each of the coordinating device and the other electronic device is associated with a same account; and transmitting, via a same or different communication channel of the one or more communication channels, and from the coordinating device, a signal that includes the processed message to the other electronic device. 21. The coordinating device of claim 20, wherein the signal includes an identifier of the app. 22. The coordinating device of claim 20, wherein the processing the message includes extracting an incomplete subset of data in the message, and wherein the processed message includes the incomplete subset of data. 23. The coordinating device of claim 20, wherein the message is generated locally by another app at the coordinating device. 24. The coordinating device of claim 20, wherein the message is indicative of a location of the coordinating device. 25. The coordinating device of claim 20, wherein the actions further include: detecting another message; determining that no app is subscribed to handle distribution of the other message; and in response to determining that no app is subscribed to handle distribution of the other message, transmitting a signal that includes the other message to the other electronic device. 26. The coordinating device of claim 20, wherein the message corresponds to a calendar event or reminder, a text message, an email, or a phone call. 27. The coordinating device of claim 20, wherein determining that the app is subscribed to process the message includes looking up information corresponding to the message in a subscriber structure stored at the coordinating device. 28. An electronic device comprising: an output component configured to output stimuli; a connection component configured to transmit communications over one or more communication channels to other devices; one or more processors coupled to the output component and the connection component; and a computer-readable storage medium containing instructions, that, when executed by the one or more processors, cause the one or more processors to perform actions including: receiving, via a communication channel of the one or more communication channels, a signal transmitted from a coordinating device, wherein the signal includes data corresponding to an event message generated locally at the coordinating device representing an event or a received message received at the coordinating device from a remote source, and wherein each of the coordinating device and the electronic device is associated with a same account; identifying an app associated with the signal; enabling the app to transform the data in the signal into a notification representing the event or the received message; generating a visual notification presentation for the notification; and presenting the visual notification presentation via the output component. 29. The electronic device of claim 28, wherein the signal includes an identifier of the app. 30. The electronic device of claim 28, wherein the transforming the data in the signal into the notification includes combining the data with other data stored at the electronic device. 31. The electronic device of claim 28, wherein the signal is indicative of a location of the coordinating device. 32. The electronic device of claim 28, wherein the actions further include: receiving another signal transmitted by the coordinating device, wherein the other signal includes other data corresponding to another event message generated locally at the coordinating device representing another event or another received message received at the coordinating device from a same or different remote source; identifying another app associated with the other signal; and enabling the other app to transform the other data in the other signal into another notification representing the other message generated locally at the coordinating device or representing the other event or the other received message, wherein the transforming of the data uses a transformation protocol, and wherein the transforming of the other data uses a different transformation protocol. 33. A coordinating device system comprising: a detection module for detecting a message, wherein the message is generated locally at the coordinating device system or received at the coordinating device system from a remote source; a subscriber detection module for identifying an app that is subscribed to process the message; a notification distribution module for: enabling the app to process the message; and transmitting a signal that includes the processed message to an other electronic device; and a destination identification module for identifying the other electronic device, wherein each of the coordinating device system and the other electronic device is associated with a same account. 34. The coordinating device system of claim 33, wherein the processing the message includes extracting an incomplete subset of data in the message, and wherein the processed message includes the incomplete subset of data. 35. The coordinating device system of claim 33, wherein the message is generated locally by another app at the coordinating device system. 36. The coordinating device system of claim 33, wherein the message is indicative of a location of the coordinating device system. 37. The coordinating device system of claim 33, wherein: the detection module is further for detecting, another message; the subscriber detector module is further for determining that no app is subscribed to handle distribution of the other message; and the notification distribution module is further for transmitting, in response to determining that no app is subscribed to handle distribution of the other message, a signal that includes the other message to the other electronic device. 38. The coordinating device system of claim 33, wherein determining that the app is subscribed to process the message includes looking up information corresponding to the message in a subscriber structure stored at the coordinating device. 39. A system comprising: a detection module for receiving a signal transmitted from a coordinating device, wherein the signal includes data corresponding to an event message generated locally at the coordinating device representing an event or a received message received at the coordinating device from a remote source, and wherein each of the coordinating device and the system is associated with a same account; an app identification module for identifying an app associated with the signal; an other-device distribution module for enabling the app to transform the data in the signal into a notification representing the event or the received message; and an output module for: generating a visual notification presentation for the notification; and presenting the visual notification presentation. 40. The system of claim 39, wherein transforming the data includes retrieving other data stored locally at the system and at least partly expanding the data to include the retrieved other data. 41. A system comprising: a coordinating device system comprising: a coordinating-device detection module for detecting a message, wherein the message is generated locally at the coordinating device system or received at the coordinating device system from a remote source; a coordinating-device subscriber detection module for identifying an app on the coordinating device system that is subscribed to process the message; a coordinating-device notification distribution module for: enabling the app on the coordinating device system to process the message; and transmitting a signal that includes the processed message to another electronic device system; and a coordinating-device destination identification module for identifying the other electronic device system, wherein each of the coordinating device system and the other electronic device system is associated with a same account; and the other electronic device system comprising: an other-device detection module for receiving the signal transmitted from the coordinating device system; an other-device app identification module for identifying an app of the other electronic device system associated with the signal; an other-device distribution module for enabling the app on the other electronic device system to transform data in the signal into a notification representing the message; and an other-device output module for: generating a visual notification presentation for the notification; and presenting the visual notification presentation. 42. A system comprising: a coordinating device comprising: a coordinating-device connection component configured to transmit communications over one or more communication channels to other devices; one or more coordinating-device processors coupled to the coordinating-device connection component; and a coordinating-device computer-readable storage medium containing instructions, that, when executed by the one or more coordinating-device processors, cause the one or more coordinating-device processors to perform actions including: detecting a message, wherein the message is generated locally at the coordinating device or received, via a communication channel of the one or more communication channels, at the coordinating device from a remote source; identifying an app on the coordinating device that is subscribed to process the message; enabling the app on the coordinating device to process the message; identifying another electronic device, wherein each of the coordinating device and the other electronic device is associated with a same account; and transmitting, via a same or different communication channel of the one or more communication channels, and from the coordinating device, a signal that includes the processed message to the other electronic device; and the other electronic device comprising: an other-device output component configured to output stimuli; an other-device connection component configured to transmit communications over one or more other-device communication channels to other devices; one or more other-device processors coupled to the other-device output component and the other-device connection component; and an other-device computer-readable storage medium containing instructions, that, when executed by the one or more other-device processors, cause the one or more other-device processors to perform actions including: receiving the signal transmitted from the coordinating device; identifying an app on the other electronic device associated with the signal; enabling the app on the other electronic device to transform the data in the signal into a notification representing the message; generating a visual notification presentation for the notification; and presenting the visual notification presentation via the other-device output component.
Certain embodiments of the present invention can detect and evaluate new messages at a coordinating device to determine whether to forward the message to a wearable device. In this manner, a server can reduce a number of devices that it is to communicate a message to, while still allowing the message to be availed to multiple devices. Further, certain embodiments relate to coordinating alerts (e.g., audio or haptic alerts) to reduce redundant alerts of a single message amongst spatially clustered devices.1. A computer-implemented method comprising: detecting, at a coordinating device, a message, wherein the message is generated locally at the coordinating device or received at the coordinating device from a remote source; identifying an app that is subscribed to process the message; enabling the app to process the message; identifying another electronic device, wherein each of the coordinating device and the other electronic device is associated with a same account; and transmitting, from the coordinating device, a signal that includes the processed message to the other electronic device. 2. The method of claim 1, wherein the signal includes an identifier of the app. 3. The method of claim 1, wherein the processing the message includes extracting an incomplete subset of data in the message, and wherein the processed message includes the incomplete subset of data. 4. The method of claim 1, wherein the message is generated locally by another app at the coordinating device. 5. The method of claim 1, wherein the message is indicative of a location of the coordinating device. 6. The method of claim 1, further comprising: detecting, at the coordinating device, another message; determining that no app is subscribed to handle distribution of the message; and in response to determining that no app is subscribed to handle distribution of the message, transmitting a signal that includes the other message to the other electronic device. 7. The method of claim 1, further comprising: detecting, at the coordinating device, another message; identifying another app that is subscribed to handle distribution of the other message; and in response to identifying the other app that is subscribed to handle distribution of the other message, not transmitting a signal corresponding to the other message to the other electronic device. 8. The method of claim 1, wherein the message corresponds to a calendar event or reminder, a text message, an email, or a phone call. 9. The method of claim 1, wherein identifying the app that is subscribed to process the message includes looking up information corresponding to the message in a subscriber structure stored at the coordinating device. 10. The method of claim 9, wherein the information includes an identifier of an app that generated the message or a source of the message. 11. The method of claim 1, further comprising: detecting, at the coordinating device, another message; identifying another app associated with the other message; determining that the other app is identified on a blacklist; and not transmitting a signal corresponding to the other message to the other electronic device. 12. The method of claim 1, further comprising: determining whether the coordinating device is in an active mode; when it is determined that the coordinating device is in the active mode, presenting a coordinating-device alert corresponding to the message at the coordinating device; and when it is determined that the coordinating device is not in the active mode, transmitting a signal to the other electronic device that corresponds to an invitation to present a mobile-device alert corresponding to the message. 13. A computer-implemented method comprising: receiving, at an electronic device, a signal transmitted from a coordinating device, wherein the signal includes data corresponding to an event message generated locally at the coordinating device representing an event or a received message received at the coordinating device from a remote source, and wherein each of the coordinating device and the electronic device is associated with a same account; identifying an app associated with the signal; enabling the app to transform, at the electronic device, the data in the signal into a notification representing the event or the received message; generating a visual notification presentation for the notification; and presenting the visual notification presentation. 14. The method of claim 13, wherein the signal includes an identifier of the app. 15. The method of claim 13, wherein the transforming the data in the signal into the notification includes combining the data with other data stored at the electronic device. 16. The method of claim 13, wherein the signal is indicative of a location of the coordinating device. 17. The method of claim 13, further comprising: receiving, at the electronic device, another signal transmitted by the coordinating device, wherein the other signal includes other data corresponding to another event message generated locally at the coordinating device representing another event or another received message received at the coordinating device from a same or different remote source; identifying another app associated with the other signal; and enabling the other app to transform, at the electronic device, the other data in the other signal into another notification representing the other event or the other received message, wherein the transforming of the data uses a transformation protocol, and wherein the transforming of the other data uses a different transformation protocol. 18. The method of claim 13, wherein the event corresponds to a calendar event or reminder. 19. The method of claim 13, wherein the received message corresponds to a text message, an email, or a phone call. 20. A coordinating device comprising: a connection component configured to transmit communications over one or more communication channels to other devices; one or more processors coupled to the connection component; and a computer-readable storage medium containing instructions, that, when executed by the one or more processors, cause the one or more processors to perform actions including: detecting a message, wherein the message is generated locally at the coordinating device or received, via a communication channel of the one or more communication channels, at the coordinating device from a remote source; identifying an app that is subscribed to process the message; enabling the app to process the message; identifying another electronic device, wherein each of the coordinating device and the other electronic device is associated with a same account; and transmitting, via a same or different communication channel of the one or more communication channels, and from the coordinating device, a signal that includes the processed message to the other electronic device. 21. The coordinating device of claim 20, wherein the signal includes an identifier of the app. 22. The coordinating device of claim 20, wherein the processing the message includes extracting an incomplete subset of data in the message, and wherein the processed message includes the incomplete subset of data. 23. The coordinating device of claim 20, wherein the message is generated locally by another app at the coordinating device. 24. The coordinating device of claim 20, wherein the message is indicative of a location of the coordinating device. 25. The coordinating device of claim 20, wherein the actions further include: detecting another message; determining that no app is subscribed to handle distribution of the other message; and in response to determining that no app is subscribed to handle distribution of the other message, transmitting a signal that includes the other message to the other electronic device. 26. The coordinating device of claim 20, wherein the message corresponds to a calendar event or reminder, a text message, an email, or a phone call. 27. The coordinating device of claim 20, wherein determining that the app is subscribed to process the message includes looking up information corresponding to the message in a subscriber structure stored at the coordinating device. 28. An electronic device comprising: an output component configured to output stimuli; a connection component configured to transmit communications over one or more communication channels to other devices; one or more processors coupled to the output component and the connection component; and a computer-readable storage medium containing instructions, that, when executed by the one or more processors, cause the one or more processors to perform actions including: receiving, via a communication channel of the one or more communication channels, a signal transmitted from a coordinating device, wherein the signal includes data corresponding to an event message generated locally at the coordinating device representing an event or a received message received at the coordinating device from a remote source, and wherein each of the coordinating device and the electronic device is associated with a same account; identifying an app associated with the signal; enabling the app to transform the data in the signal into a notification representing the event or the received message; generating a visual notification presentation for the notification; and presenting the visual notification presentation via the output component. 29. The electronic device of claim 28, wherein the signal includes an identifier of the app. 30. The electronic device of claim 28, wherein the transforming the data in the signal into the notification includes combining the data with other data stored at the electronic device. 31. The electronic device of claim 28, wherein the signal is indicative of a location of the coordinating device. 32. The electronic device of claim 28, wherein the actions further include: receiving another signal transmitted by the coordinating device, wherein the other signal includes other data corresponding to another event message generated locally at the coordinating device representing another event or another received message received at the coordinating device from a same or different remote source; identifying another app associated with the other signal; and enabling the other app to transform the other data in the other signal into another notification representing the other message generated locally at the coordinating device or representing the other event or the other received message, wherein the transforming of the data uses a transformation protocol, and wherein the transforming of the other data uses a different transformation protocol. 33. A coordinating device system comprising: a detection module for detecting a message, wherein the message is generated locally at the coordinating device system or received at the coordinating device system from a remote source; a subscriber detection module for identifying an app that is subscribed to process the message; a notification distribution module for: enabling the app to process the message; and transmitting a signal that includes the processed message to an other electronic device; and a destination identification module for identifying the other electronic device, wherein each of the coordinating device system and the other electronic device is associated with a same account. 34. The coordinating device system of claim 33, wherein the processing the message includes extracting an incomplete subset of data in the message, and wherein the processed message includes the incomplete subset of data. 35. The coordinating device system of claim 33, wherein the message is generated locally by another app at the coordinating device system. 36. The coordinating device system of claim 33, wherein the message is indicative of a location of the coordinating device system. 37. The coordinating device system of claim 33, wherein: the detection module is further for detecting, another message; the subscriber detector module is further for determining that no app is subscribed to handle distribution of the other message; and the notification distribution module is further for transmitting, in response to determining that no app is subscribed to handle distribution of the other message, a signal that includes the other message to the other electronic device. 38. The coordinating device system of claim 33, wherein determining that the app is subscribed to process the message includes looking up information corresponding to the message in a subscriber structure stored at the coordinating device. 39. A system comprising: a detection module for receiving a signal transmitted from a coordinating device, wherein the signal includes data corresponding to an event message generated locally at the coordinating device representing an event or a received message received at the coordinating device from a remote source, and wherein each of the coordinating device and the system is associated with a same account; an app identification module for identifying an app associated with the signal; an other-device distribution module for enabling the app to transform the data in the signal into a notification representing the event or the received message; and an output module for: generating a visual notification presentation for the notification; and presenting the visual notification presentation. 40. The system of claim 39, wherein transforming the data includes retrieving other data stored locally at the system and at least partly expanding the data to include the retrieved other data. 41. A system comprising: a coordinating device system comprising: a coordinating-device detection module for detecting a message, wherein the message is generated locally at the coordinating device system or received at the coordinating device system from a remote source; a coordinating-device subscriber detection module for identifying an app on the coordinating device system that is subscribed to process the message; a coordinating-device notification distribution module for: enabling the app on the coordinating device system to process the message; and transmitting a signal that includes the processed message to another electronic device system; and a coordinating-device destination identification module for identifying the other electronic device system, wherein each of the coordinating device system and the other electronic device system is associated with a same account; and the other electronic device system comprising: an other-device detection module for receiving the signal transmitted from the coordinating device system; an other-device app identification module for identifying an app of the other electronic device system associated with the signal; an other-device distribution module for enabling the app on the other electronic device system to transform data in the signal into a notification representing the message; and an other-device output module for: generating a visual notification presentation for the notification; and presenting the visual notification presentation. 42. A system comprising: a coordinating device comprising: a coordinating-device connection component configured to transmit communications over one or more communication channels to other devices; one or more coordinating-device processors coupled to the coordinating-device connection component; and a coordinating-device computer-readable storage medium containing instructions, that, when executed by the one or more coordinating-device processors, cause the one or more coordinating-device processors to perform actions including: detecting a message, wherein the message is generated locally at the coordinating device or received, via a communication channel of the one or more communication channels, at the coordinating device from a remote source; identifying an app on the coordinating device that is subscribed to process the message; enabling the app on the coordinating device to process the message; identifying another electronic device, wherein each of the coordinating device and the other electronic device is associated with a same account; and transmitting, via a same or different communication channel of the one or more communication channels, and from the coordinating device, a signal that includes the processed message to the other electronic device; and the other electronic device comprising: an other-device output component configured to output stimuli; an other-device connection component configured to transmit communications over one or more other-device communication channels to other devices; one or more other-device processors coupled to the other-device output component and the other-device connection component; and an other-device computer-readable storage medium containing instructions, that, when executed by the one or more other-device processors, cause the one or more other-device processors to perform actions including: receiving the signal transmitted from the coordinating device; identifying an app on the other electronic device associated with the signal; enabling the app on the other electronic device to transform the data in the signal into a notification representing the message; generating a visual notification presentation for the notification; and presenting the visual notification presentation via the other-device output component.
2,400
8,761
8,761
14,057,218
2,496
An authentication request message is sent from a first computing device to a second computing device, wherein the first computing device and the second computing device communicate via a machine-to-machine communication protocol, and wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device. A challenge message is received at the first computing device from the second computing device. In response to the challenge message, a session key is computed at the key obfuscation block of the first computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device. Upon generating the session key, the first computing device extracts a value from the challenge message and generates an authentication delegate based on the extracted value. The authentication delegate is sent from the first computing device to a third computing device for verification to allow the first computing device access to the third computing device.
1. A method, comprising: sending an authentication request message from a first computing device to a second computing device, wherein the first computing device and the second computing device communicate via a machine-to-machine communication protocol, and wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; receiving a challenge message at the first computing device from the second computing device; in response to the challenge message, computing a session key at the key obfuscation block of the first computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; upon generating the session key, the first computing device extracting a value from the challenge message and generating an authentication delegate based on the extracted value; and sending the authentication delegate from the first computing device to a third computing device for verification to allow the first computing device access to the third computing device. 2. The method of claim 1, wherein the authentication request also comprises an identity of the first computing device. 3. The method of claim 1, wherein the token comprises a cipher-text that at least contains the identity of the first computing device, the time that the token was issued by the second computing device, and a public key of the first computing device. 4. The method of claim 3, wherein the cipher-text is encrypted with a token key associated with the first computing device. 5. The method of claim 1, wherein the first computing device is issued the token by the second computing device offline. 6. The method of claim 1, wherein the first computing device is issued the token by the second computing device over the machine-to-machine communication protocol. 7. The method of claim 1, wherein the key obfuscation block further comprises a read current authentication token interface. 8. The method of claim 1, wherein the key obfuscation block further comprises a generate public key interface. 9. The method of claim 1, wherein the key obfuscation block further comprises a compute session key interface. 10. The method of claim 1, wherein the key obfuscation block further comprises a write first authentication token interface. 11. The method of claim 1, wherein the key obfuscation block further comprises an update authentication token only interface. 12. The method of claim 1, wherein the key obfuscation block further comprises an update authentication token with code interface. 13. The method of claim 1, further comprising refreshing the secret shared between the first computing device and the second computing device. 14. An article of manufacture comprising a processor-readable storage medium storing one or more software programs which when executed by a processor perform the steps of the method of claim 1. 15. A method, comprising: receiving an authentication request message from a first computing device at a second computing device, wherein the first computing device and the second computing device communicate via a machine-to-machine communication protocol, and wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; decrypting the token and verifying the integrity of the token at the second computing device; upon token integrity verification, computing a session key at the second computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; sending a challenge message to the first computing device from the second computing device; and sending information for authentication delegation from the second computing device to a third computing device to allow the first computing device access to the third computing device. 16. The method of claim 15, wherein the information for authentication delegation comprises an identity of the first computing device and a pair of random numbers chosen by the second computing device. 17. The method of claim 15, further comprising the second computing device removing data associated with the first computing device. 18. An article of manufacture comprising a processor-readable storage medium storing one or more software programs which when executed by a processor perform the steps of the method of claim 15. 19. An apparatus, comprising: a memory; and a processor coupled to the memory, wherein the memory and processor are associated with a first computing device that is in machine-to-machine communication with a second computing device, and wherein the memory and processor are configured to: send an authentication request message from the first computing device to the second computing device, wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; receive a challenge message at the first computing device from the second computing device; in response to the challenge message, compute a session key at the key obfuscation block of the first computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; upon generating the session key, the first computing device extracting a value from the challenge message and generating an authentication delegate based on the extracted value; and sending the authentication delegate from the first computing device to a third computing device for verification to allow the first computing device access to the third computing device. 20. The apparatus of claim 19, wherein the first computing device comprises a client device associated with an electric vehicle. 21. An apparatus, comprising: a memory; and a processor coupled to the memory, wherein the memory and processor are associated with a second computing device that is in machine-to-machine communication with a first computing device, and wherein the memory and processor are configured to: receive an authentication request message from the first computing device at the second computing device, wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; decrypt the token and verify the integrity of the token at the second computing device; upon token integrity verification, compute a session key at the second computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; send a challenge message to the first computing device from the second computing device; and send information for authentication delegation from the second computing device to a third computing device to allow the first computing device access to the third computing device. 22. The apparatus of claim 21, wherein the second computing device comprises an authentication server associated with a grid charging infrastructure. 23. A method, comprising: authenticating a client device associated with an electric vehicle by an authentication server associated with a grid charging infrastructure, wherein the client device and the authentication server communicate via a machine-to-machine communication protocol, and wherein the authentication comprises use of a token issued by the authentication server and stored in a key obfuscation block of the client device, such that, once the client device is authenticated via the token, the client device is able to access a charging station associated with the grid charging infrastructure.
An authentication request message is sent from a first computing device to a second computing device, wherein the first computing device and the second computing device communicate via a machine-to-machine communication protocol, and wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device. A challenge message is received at the first computing device from the second computing device. In response to the challenge message, a session key is computed at the key obfuscation block of the first computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device. Upon generating the session key, the first computing device extracts a value from the challenge message and generates an authentication delegate based on the extracted value. The authentication delegate is sent from the first computing device to a third computing device for verification to allow the first computing device access to the third computing device.1. A method, comprising: sending an authentication request message from a first computing device to a second computing device, wherein the first computing device and the second computing device communicate via a machine-to-machine communication protocol, and wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; receiving a challenge message at the first computing device from the second computing device; in response to the challenge message, computing a session key at the key obfuscation block of the first computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; upon generating the session key, the first computing device extracting a value from the challenge message and generating an authentication delegate based on the extracted value; and sending the authentication delegate from the first computing device to a third computing device for verification to allow the first computing device access to the third computing device. 2. The method of claim 1, wherein the authentication request also comprises an identity of the first computing device. 3. The method of claim 1, wherein the token comprises a cipher-text that at least contains the identity of the first computing device, the time that the token was issued by the second computing device, and a public key of the first computing device. 4. The method of claim 3, wherein the cipher-text is encrypted with a token key associated with the first computing device. 5. The method of claim 1, wherein the first computing device is issued the token by the second computing device offline. 6. The method of claim 1, wherein the first computing device is issued the token by the second computing device over the machine-to-machine communication protocol. 7. The method of claim 1, wherein the key obfuscation block further comprises a read current authentication token interface. 8. The method of claim 1, wherein the key obfuscation block further comprises a generate public key interface. 9. The method of claim 1, wherein the key obfuscation block further comprises a compute session key interface. 10. The method of claim 1, wherein the key obfuscation block further comprises a write first authentication token interface. 11. The method of claim 1, wherein the key obfuscation block further comprises an update authentication token only interface. 12. The method of claim 1, wherein the key obfuscation block further comprises an update authentication token with code interface. 13. The method of claim 1, further comprising refreshing the secret shared between the first computing device and the second computing device. 14. An article of manufacture comprising a processor-readable storage medium storing one or more software programs which when executed by a processor perform the steps of the method of claim 1. 15. A method, comprising: receiving an authentication request message from a first computing device at a second computing device, wherein the first computing device and the second computing device communicate via a machine-to-machine communication protocol, and wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; decrypting the token and verifying the integrity of the token at the second computing device; upon token integrity verification, computing a session key at the second computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; sending a challenge message to the first computing device from the second computing device; and sending information for authentication delegation from the second computing device to a third computing device to allow the first computing device access to the third computing device. 16. The method of claim 15, wherein the information for authentication delegation comprises an identity of the first computing device and a pair of random numbers chosen by the second computing device. 17. The method of claim 15, further comprising the second computing device removing data associated with the first computing device. 18. An article of manufacture comprising a processor-readable storage medium storing one or more software programs which when executed by a processor perform the steps of the method of claim 15. 19. An apparatus, comprising: a memory; and a processor coupled to the memory, wherein the memory and processor are associated with a first computing device that is in machine-to-machine communication with a second computing device, and wherein the memory and processor are configured to: send an authentication request message from the first computing device to the second computing device, wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; receive a challenge message at the first computing device from the second computing device; in response to the challenge message, compute a session key at the key obfuscation block of the first computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; upon generating the session key, the first computing device extracting a value from the challenge message and generating an authentication delegate based on the extracted value; and sending the authentication delegate from the first computing device to a third computing device for verification to allow the first computing device access to the third computing device. 20. The apparatus of claim 19, wherein the first computing device comprises a client device associated with an electric vehicle. 21. An apparatus, comprising: a memory; and a processor coupled to the memory, wherein the memory and processor are associated with a second computing device that is in machine-to-machine communication with a first computing device, and wherein the memory and processor are configured to: receive an authentication request message from the first computing device at the second computing device, wherein the authentication request comprises a token issued by the second computing device and stored in a key obfuscation block of the first computing device; decrypt the token and verify the integrity of the token at the second computing device; upon token integrity verification, compute a session key at the second computing device, wherein the session key is computed based on a secret shared between the first computing device and the second computing device; send a challenge message to the first computing device from the second computing device; and send information for authentication delegation from the second computing device to a third computing device to allow the first computing device access to the third computing device. 22. The apparatus of claim 21, wherein the second computing device comprises an authentication server associated with a grid charging infrastructure. 23. A method, comprising: authenticating a client device associated with an electric vehicle by an authentication server associated with a grid charging infrastructure, wherein the client device and the authentication server communicate via a machine-to-machine communication protocol, and wherein the authentication comprises use of a token issued by the authentication server and stored in a key obfuscation block of the client device, such that, once the client device is authenticated via the token, the client device is able to access a charging station associated with the grid charging infrastructure.
2,400
8,762
8,762
15,332,554
2,486
An optical instrument for capturing stereo images includes two optical devices for producing a real image in each case, two carriages, which are each movable along a predetermined path relative to one of the optical devices, two image sensors, each with a light-sensitive surface for capturing the respective real image, with one of the image sensors in each case being fastened to the carriage, and one reflecting surface in the beam path between the optical device and the image sensor in each case.
1. An optical instrument for capturing stereo images, comprising: two optical devices for producing a real image in each case; two carriages arranged at or near the proximal end of the optical instrument, said carriages each being movable along a predetermined path relative to the optical devices and lockable; two image sensors, each with a light-sensitive surface for capturing the respective real image, with one of the image sensors in each case being fastened to the carriage; one reflecting surface in the beam path between the optical device and the image sensor in each case. 2. The optical instrument according to claim 1, wherein the reflecting surfaces are rigidly connected to the respective image sensor and movable together with the image sensor. 3. The optical instrument according to claim 1, wherein the carriages are movable in a direction parallel to the respective light-sensitive surface of the image sensor. 4. The optical instrument according to claim 1, wherein the light-sensitive surface of the image sensor is arranged parallel to the optical axis of the optical device in each case. 5. The optical instrument according to claim 1, further comprising: two clamping devices for locking respectively one of the carriages in a force-fit manner. 6. The optical instrument according to claim 1, further comprising: at least one setscrew for moving one of the carriages. 7. The optical instrument according to claim 1, further comprising: at least one printed circuit board connected to one of the carriages, with the respective image sensor being fastened to the printed circuit board, the printed circuit board having a flexible curved portion which facilitates a length compensation when moving the carriage. 8. The optical instrument according to claim 1, wherein the optical instrument is an endoscope with a rigid shank. 9. The optical instrument according to claim 1, wherein the optical device comprises at least one rod lens system or another relay lens system. 10. The optical instrument according to claim 1, further comprising: a guide component which is rigidly connected to the optical devices, the guide component having two grooves, in which two parallel straight edge portions, which face away from one another, of at least one of the carriages are guided. 11. The optical instrument according to claim 10, wherein respectively one edge portion from each one of the two carriages is arranged, one next to the other, in each one of the two grooves. 12. The optical instrument according to claim 1, wherein the two image sensors are arranged on sides facing away from one another of the two carriages. 13. A method for adjusting an image sensor of an optical instrument, comprising the following steps: producing an image of an object arranged at a predetermined position; moving the image sensor to a position in which the image sensor captures the image in focus; locking a carriage with the image sensor at the position in which the image sensor captures the image in focus, wherein the image sensor is moved parallel to a light-sensitive surface of the image sensor within the step of movement.
An optical instrument for capturing stereo images includes two optical devices for producing a real image in each case, two carriages, which are each movable along a predetermined path relative to one of the optical devices, two image sensors, each with a light-sensitive surface for capturing the respective real image, with one of the image sensors in each case being fastened to the carriage, and one reflecting surface in the beam path between the optical device and the image sensor in each case.1. An optical instrument for capturing stereo images, comprising: two optical devices for producing a real image in each case; two carriages arranged at or near the proximal end of the optical instrument, said carriages each being movable along a predetermined path relative to the optical devices and lockable; two image sensors, each with a light-sensitive surface for capturing the respective real image, with one of the image sensors in each case being fastened to the carriage; one reflecting surface in the beam path between the optical device and the image sensor in each case. 2. The optical instrument according to claim 1, wherein the reflecting surfaces are rigidly connected to the respective image sensor and movable together with the image sensor. 3. The optical instrument according to claim 1, wherein the carriages are movable in a direction parallel to the respective light-sensitive surface of the image sensor. 4. The optical instrument according to claim 1, wherein the light-sensitive surface of the image sensor is arranged parallel to the optical axis of the optical device in each case. 5. The optical instrument according to claim 1, further comprising: two clamping devices for locking respectively one of the carriages in a force-fit manner. 6. The optical instrument according to claim 1, further comprising: at least one setscrew for moving one of the carriages. 7. The optical instrument according to claim 1, further comprising: at least one printed circuit board connected to one of the carriages, with the respective image sensor being fastened to the printed circuit board, the printed circuit board having a flexible curved portion which facilitates a length compensation when moving the carriage. 8. The optical instrument according to claim 1, wherein the optical instrument is an endoscope with a rigid shank. 9. The optical instrument according to claim 1, wherein the optical device comprises at least one rod lens system or another relay lens system. 10. The optical instrument according to claim 1, further comprising: a guide component which is rigidly connected to the optical devices, the guide component having two grooves, in which two parallel straight edge portions, which face away from one another, of at least one of the carriages are guided. 11. The optical instrument according to claim 10, wherein respectively one edge portion from each one of the two carriages is arranged, one next to the other, in each one of the two grooves. 12. The optical instrument according to claim 1, wherein the two image sensors are arranged on sides facing away from one another of the two carriages. 13. A method for adjusting an image sensor of an optical instrument, comprising the following steps: producing an image of an object arranged at a predetermined position; moving the image sensor to a position in which the image sensor captures the image in focus; locking a carriage with the image sensor at the position in which the image sensor captures the image in focus, wherein the image sensor is moved parallel to a light-sensitive surface of the image sensor within the step of movement.
2,400
8,763
8,763
12,496,606
2,445
To enhance information about connections in a social networking service, embodiments of the invention enable users to reference nodes while posting content to a communication channel. To identify connections within content in the social networking service, users of the social networking service are provided an interface to post content items in communication channels of the social networking service. A trigger received in the interface indicates that a user wishes to identify a connection in the posted content item. Selectable links enable the user to mention another node in the social networking service when posting a content item. As users reference nodes in content items, information about the connections with the referenced nodes is gathered and stored in a database that is indexable and searchable in real-time.
1. A method for gathering information about connections in a social networking service, the method comprising: maintaining in a database a plurality of nodes of a social graph, where at least some of the nodes represent users of the social networking service; maintaining in a database a plurality of connections in the social graph, where each connection represents a connection between two or more nodes in the social graph; maintaining in a database information about one or more of the connections; providing an interface for users of the social networking service to post content items in one or more communication channels of the social networking service; receiving via the interface a posted content item from a user of the social networking service, the posted content item including a link referencing a node of the social graph other than a node of the posting user; and storing in a database information about the connection between the node of the posting user and the node referenced in the posted content item, wherein the stored information is based at least in part on the posted content item. 2. The method of claim 1, wherein the information about the plurality of connections comprises affinity scores. 3. The method of claim 2, further comprising: decreasing the affinity score of the connection with the referenced node as a function of a time-based decay factor. 4. The method of claim 2, wherein the stored information modifies the affinity score. 5. The method of claim 1, wherein the maintained connections comprise direct and indirect connections. 6. The method of claim 1, wherein the stored information influences an affinity with the referenced node. 7. The method of claim 1, wherein the connection between the user and the node did not previously exist, further comprising: generating a connection between the user and the node in the maintained database of the plurality of connections in the social graph; and generating information about the connection in the maintained database of information about the one or more connections, the generated information comprising the updated information. 8. The method of claim 1, wherein the interface posts content items to the communication channel comprising a stream. 9. The method of claim 1, wherein the interface posts content items to the communication channel comprising a wall post. 10. The method of claim 1, wherein the interface posts content items to the communication channel comprising a comment on a posted content item. 11. The method of claim 1, wherein the interface posts content items to the communication channel comprising a mobile application. 12. The method of claim 1, wherein the interface posts content items to the communication channel comprising a notification. 13. The method of claim 1, wherein the interface posts content items to the communication channel comprising a mobile SMS message. 14. The method of claim 1, wherein the interface posts content items to the communication channel comprising a third-party website. 15. The method of claim 1, wherein the interface posts content items to the communication channel comprising an advertising communication channel. 16. The method of claim 1, wherein the referenced node is mapped by the social networking service from several nodes on the social networking service. 17. A method of posting content that identifies connections between nodes in a social networking service, the method comprising: displaying an interface for a user of the social networking service to post content items in one or more communication channels of the social networking service; in response to receiving a user input comprising a trigger, displaying in the interface a list of selectable nodes; receiving a selection of a node from the list of selectable nodes; and displaying in the interface a link to the selected node. 18. The method of claim 17, wherein the list of selectable nodes comprises connections from a social graph of connected nodes, the connections identifying nodes of the social networking service connected to the user in the social graph. 19. The method of claim 17, wherein the link is displayed with a trigger in a rendered graphical representation of the link within the interface. 20. The method of claim 19, wherein the rendered graphical representation comprises a photo of the selected node. 21. The method of claim 17, wherein the link comprises a shorthand description of the node. 22. The method of claim 17, wherein the link comprises the full name of the selected node. 23. The method of claim 17, wherein the list of selectable connections comprise direct and indirect connections. 24. The method of claim 1, wherein the plurality of nodes represent users of the social networking service. 25. The method of claim 1, wherein the referenced node comprises an entity. 26. The method of claim 1, wherein the referenced node comprises a concept. 27. A method of identifying a node in a social networking service, the method comprising: maintaining information in a database about connected nodes, the information comprising data about the nodes and connections between the nodes; receiving posted content from a user of the social networking service, the posted content comprising a trigger and an identifier immediately following the trigger; identifying candidate nodes from the connected nodes in the social networking service, wherein the candidate nodes are identified by matching the identifier to the information maintained about the candidate nodes; providing selectable links corresponding to the candidate nodes; receiving a selection of a link, the selected link identifying a selected node from the candidate nodes; storing the maintained information in the database about the selected node and the connection with the user, wherein the stored information is based at least in part on the posted content. 28. The method of claim 27, wherein the stored information influences an affinity of the user with the selected node. 29. The method of claim 27, wherein the connection between the user and the selected node did not previously exists, further comprising: generating a connection between the user and the selected node in the database of maintained information about the connected nodes; generating information about the connection in the database of maintained information about the connected nodes, the generated information comprising the stored information. 30. The method of claim 27, further comprising: distributing the posted content to the selected node through a particular communication channel based on placement of the trigger and the identifier within the posted content. 31. A system for gathering information about connections in a social networking service, comprising: a node data store configured to maintain a plurality of nodes of a social graph, where at least some of the nodes represent users of the social networking service; a connection data store configured to maintain a plurality of connections in the social graph, each connection representing a connection between two or more nodes in the social graph, the connection data store further configured to maintain information about one or more of the connections; a server configured to provide an interface for users of the social networking service to post content items in one or more communication channels of the social networking service, to receive via the interface a posted content item from a user of the social networking service, the posted content item including a link referencing a node of the social graph other than a node of the posting user, and to store in a database information about the connection between the node of the posting user and the node referenced in the posted content item, wherein the stored information is based at least in part on the posted content item.
To enhance information about connections in a social networking service, embodiments of the invention enable users to reference nodes while posting content to a communication channel. To identify connections within content in the social networking service, users of the social networking service are provided an interface to post content items in communication channels of the social networking service. A trigger received in the interface indicates that a user wishes to identify a connection in the posted content item. Selectable links enable the user to mention another node in the social networking service when posting a content item. As users reference nodes in content items, information about the connections with the referenced nodes is gathered and stored in a database that is indexable and searchable in real-time.1. A method for gathering information about connections in a social networking service, the method comprising: maintaining in a database a plurality of nodes of a social graph, where at least some of the nodes represent users of the social networking service; maintaining in a database a plurality of connections in the social graph, where each connection represents a connection between two or more nodes in the social graph; maintaining in a database information about one or more of the connections; providing an interface for users of the social networking service to post content items in one or more communication channels of the social networking service; receiving via the interface a posted content item from a user of the social networking service, the posted content item including a link referencing a node of the social graph other than a node of the posting user; and storing in a database information about the connection between the node of the posting user and the node referenced in the posted content item, wherein the stored information is based at least in part on the posted content item. 2. The method of claim 1, wherein the information about the plurality of connections comprises affinity scores. 3. The method of claim 2, further comprising: decreasing the affinity score of the connection with the referenced node as a function of a time-based decay factor. 4. The method of claim 2, wherein the stored information modifies the affinity score. 5. The method of claim 1, wherein the maintained connections comprise direct and indirect connections. 6. The method of claim 1, wherein the stored information influences an affinity with the referenced node. 7. The method of claim 1, wherein the connection between the user and the node did not previously exist, further comprising: generating a connection between the user and the node in the maintained database of the plurality of connections in the social graph; and generating information about the connection in the maintained database of information about the one or more connections, the generated information comprising the updated information. 8. The method of claim 1, wherein the interface posts content items to the communication channel comprising a stream. 9. The method of claim 1, wherein the interface posts content items to the communication channel comprising a wall post. 10. The method of claim 1, wherein the interface posts content items to the communication channel comprising a comment on a posted content item. 11. The method of claim 1, wherein the interface posts content items to the communication channel comprising a mobile application. 12. The method of claim 1, wherein the interface posts content items to the communication channel comprising a notification. 13. The method of claim 1, wherein the interface posts content items to the communication channel comprising a mobile SMS message. 14. The method of claim 1, wherein the interface posts content items to the communication channel comprising a third-party website. 15. The method of claim 1, wherein the interface posts content items to the communication channel comprising an advertising communication channel. 16. The method of claim 1, wherein the referenced node is mapped by the social networking service from several nodes on the social networking service. 17. A method of posting content that identifies connections between nodes in a social networking service, the method comprising: displaying an interface for a user of the social networking service to post content items in one or more communication channels of the social networking service; in response to receiving a user input comprising a trigger, displaying in the interface a list of selectable nodes; receiving a selection of a node from the list of selectable nodes; and displaying in the interface a link to the selected node. 18. The method of claim 17, wherein the list of selectable nodes comprises connections from a social graph of connected nodes, the connections identifying nodes of the social networking service connected to the user in the social graph. 19. The method of claim 17, wherein the link is displayed with a trigger in a rendered graphical representation of the link within the interface. 20. The method of claim 19, wherein the rendered graphical representation comprises a photo of the selected node. 21. The method of claim 17, wherein the link comprises a shorthand description of the node. 22. The method of claim 17, wherein the link comprises the full name of the selected node. 23. The method of claim 17, wherein the list of selectable connections comprise direct and indirect connections. 24. The method of claim 1, wherein the plurality of nodes represent users of the social networking service. 25. The method of claim 1, wherein the referenced node comprises an entity. 26. The method of claim 1, wherein the referenced node comprises a concept. 27. A method of identifying a node in a social networking service, the method comprising: maintaining information in a database about connected nodes, the information comprising data about the nodes and connections between the nodes; receiving posted content from a user of the social networking service, the posted content comprising a trigger and an identifier immediately following the trigger; identifying candidate nodes from the connected nodes in the social networking service, wherein the candidate nodes are identified by matching the identifier to the information maintained about the candidate nodes; providing selectable links corresponding to the candidate nodes; receiving a selection of a link, the selected link identifying a selected node from the candidate nodes; storing the maintained information in the database about the selected node and the connection with the user, wherein the stored information is based at least in part on the posted content. 28. The method of claim 27, wherein the stored information influences an affinity of the user with the selected node. 29. The method of claim 27, wherein the connection between the user and the selected node did not previously exists, further comprising: generating a connection between the user and the selected node in the database of maintained information about the connected nodes; generating information about the connection in the database of maintained information about the connected nodes, the generated information comprising the stored information. 30. The method of claim 27, further comprising: distributing the posted content to the selected node through a particular communication channel based on placement of the trigger and the identifier within the posted content. 31. A system for gathering information about connections in a social networking service, comprising: a node data store configured to maintain a plurality of nodes of a social graph, where at least some of the nodes represent users of the social networking service; a connection data store configured to maintain a plurality of connections in the social graph, each connection representing a connection between two or more nodes in the social graph, the connection data store further configured to maintain information about one or more of the connections; a server configured to provide an interface for users of the social networking service to post content items in one or more communication channels of the social networking service, to receive via the interface a posted content item from a user of the social networking service, the posted content item including a link referencing a node of the social graph other than a node of the posting user, and to store in a database information about the connection between the node of the posting user and the node referenced in the posted content item, wherein the stored information is based at least in part on the posted content item.
2,400
8,764
8,764
15,362,060
2,496
One embodiment provides a method, including: performing, at an electronic device, an initial authentication of a user using a first mechanism; entering, using a processor, an authentication session responsive to a successful result of the initial authentication of the user; thereafter detecting, using the processor, presence of the user by a second mechanism; and maintaining, using the processor, the authentication session in response to detecting the presence of the user. Other aspects are described and claimed.
1. A method, comprising: performing, at an electronic device, an initial authentication of a user using a first mechanism; entering, using a processor, an authentication session responsive to a successful result of the initial authentication of the user; thereafter detecting, using the processor, presence of the user by a second mechanism; and maintaining, using the processor, the authentication session in response to detecting the presence of the user. 2. The method of claim 1, wherein the first mechanism is selected from the group consisting of password authentication and biometric authentication. 3. The method of claim 2, wherein the second mechanism is a tracking mechanism. 4. The method of claim 3, wherein the tracking mechanism comprises obtaining tracking data of at least one user characteristic. 5. The method of claim 4, wherein the at least one user characteristic is selected from the group consisting of clothing color, hair color, body outline, and voice characteristic. 6. The method of claim 3, wherein the tracking mechanism comprises receiving presence data from a wearable device associated with the user. 7. The method of claim 1, wherein the first mechanism and the second mechanism are implemented using different hardware components. 8. The method of claim 7, wherein the first mechanism is implemented using at least a camera and wherein the second mechanism is implemented using at least a microphone. 9. The method of claim 1, further comprising: responsive to not detecting the presence of the user by the second mechanism, re-authenticating the user using the first mechanism; and thereafter maintaining the authentication session in response to re-authenticating the user using the first mechanism. 10. The method of claim 1, wherein the authentication session is ended in response to not detecting the presence of the user by the second mechanism. 11. The method of claim 1, wherein the authentication session comprises a continuous authentication session. 12. An electronic device, comprising: an input device; a processor operatively coupled to the input device; and a memory storing code executable by the processor to: perform an initial authentication of a user using a first mechanism; enter an authentication session responsive to a successful result of the initial authentication of the user; thereafter detect presence of the user by a second mechanism; and maintain the authentication session in response to detecting the presence of the user. 13. The electronic device of claim 12, wherein the first mechanism is selected from the group consisting of password authentication and biometric authentication. 14. The electronic device of claim 13, wherein the second mechanism is a tracking mechanism. 15. The electronic device of claim 14, wherein the tracking mechanism comprises obtaining tracking data of at least one user characteristic. 16. The electronic device of claim 15, wherein the at least one user characteristic is selected from the group consisting of clothing color, hair color, body outline, and voice characteristic. 17. The electronic device of claim 14, wherein the tracking mechanism comprises receiving presence data from a wearable device associated with the user. 18. The electronic device of claim 12, wherein the first mechanism and the second mechanism are implemented using different hardware components. 19. The electronic device of claim 18, further comprising a camera and a microphone, wherein the first mechanism is implemented using at least the camera and wherein the second mechanism is implemented using at least the microphone. 20. The electronic device of claim 11, wherein the code is executed by the processor to: responsive to not detecting the presence of the user by the second mechanism, re-authenticate the user using the first mechanism; and thereafter maintain the authentication session in response to re-authenticating the user using the first mechanism. 21. The method of claim 12, wherein the authentication session comprises a continuous authentication session. 22. A program product, comprising: a non-transitory computer readable medium storing code that is executable by a processor, the code comprising: code that performs, at an electronic device, an initial authentication of a user using a first mechanism; code that enters an authentication session responsive to a successful result of the initial authentication of the user; code that thereafter detects presence of the user by a second mechanism; and code that maintains the authentication session in response to detecting the presence of the user.
One embodiment provides a method, including: performing, at an electronic device, an initial authentication of a user using a first mechanism; entering, using a processor, an authentication session responsive to a successful result of the initial authentication of the user; thereafter detecting, using the processor, presence of the user by a second mechanism; and maintaining, using the processor, the authentication session in response to detecting the presence of the user. Other aspects are described and claimed.1. A method, comprising: performing, at an electronic device, an initial authentication of a user using a first mechanism; entering, using a processor, an authentication session responsive to a successful result of the initial authentication of the user; thereafter detecting, using the processor, presence of the user by a second mechanism; and maintaining, using the processor, the authentication session in response to detecting the presence of the user. 2. The method of claim 1, wherein the first mechanism is selected from the group consisting of password authentication and biometric authentication. 3. The method of claim 2, wherein the second mechanism is a tracking mechanism. 4. The method of claim 3, wherein the tracking mechanism comprises obtaining tracking data of at least one user characteristic. 5. The method of claim 4, wherein the at least one user characteristic is selected from the group consisting of clothing color, hair color, body outline, and voice characteristic. 6. The method of claim 3, wherein the tracking mechanism comprises receiving presence data from a wearable device associated with the user. 7. The method of claim 1, wherein the first mechanism and the second mechanism are implemented using different hardware components. 8. The method of claim 7, wherein the first mechanism is implemented using at least a camera and wherein the second mechanism is implemented using at least a microphone. 9. The method of claim 1, further comprising: responsive to not detecting the presence of the user by the second mechanism, re-authenticating the user using the first mechanism; and thereafter maintaining the authentication session in response to re-authenticating the user using the first mechanism. 10. The method of claim 1, wherein the authentication session is ended in response to not detecting the presence of the user by the second mechanism. 11. The method of claim 1, wherein the authentication session comprises a continuous authentication session. 12. An electronic device, comprising: an input device; a processor operatively coupled to the input device; and a memory storing code executable by the processor to: perform an initial authentication of a user using a first mechanism; enter an authentication session responsive to a successful result of the initial authentication of the user; thereafter detect presence of the user by a second mechanism; and maintain the authentication session in response to detecting the presence of the user. 13. The electronic device of claim 12, wherein the first mechanism is selected from the group consisting of password authentication and biometric authentication. 14. The electronic device of claim 13, wherein the second mechanism is a tracking mechanism. 15. The electronic device of claim 14, wherein the tracking mechanism comprises obtaining tracking data of at least one user characteristic. 16. The electronic device of claim 15, wherein the at least one user characteristic is selected from the group consisting of clothing color, hair color, body outline, and voice characteristic. 17. The electronic device of claim 14, wherein the tracking mechanism comprises receiving presence data from a wearable device associated with the user. 18. The electronic device of claim 12, wherein the first mechanism and the second mechanism are implemented using different hardware components. 19. The electronic device of claim 18, further comprising a camera and a microphone, wherein the first mechanism is implemented using at least the camera and wherein the second mechanism is implemented using at least the microphone. 20. The electronic device of claim 11, wherein the code is executed by the processor to: responsive to not detecting the presence of the user by the second mechanism, re-authenticate the user using the first mechanism; and thereafter maintain the authentication session in response to re-authenticating the user using the first mechanism. 21. The method of claim 12, wherein the authentication session comprises a continuous authentication session. 22. A program product, comprising: a non-transitory computer readable medium storing code that is executable by a processor, the code comprising: code that performs, at an electronic device, an initial authentication of a user using a first mechanism; code that enters an authentication session responsive to a successful result of the initial authentication of the user; code that thereafter detects presence of the user by a second mechanism; and code that maintains the authentication session in response to detecting the presence of the user.
2,400
8,765
8,765
15,706,656
2,484
A computer-implemented method obtains a plurality of image files, each corresponding to an image in a video stream and builds a common file from a contiguous grouping of the plurality of image files. The video stream has a plurality of contiguous video segments, each having a first video frame, and the plurality of image files correspond to the plurality of first video frames of the plurality of video segments. The plurality of video segments are of approximately equal duration.
1. A computer-implemented method comprising: (A) obtaining a plurality of images, each of said images corresponding to an image in a video stream; wherein the obtaining in (A) comprises: (a1) logically splitting the video stream into a number of contiguous segments, each segment having a corresponding start point, and each start point having a corresponding video frame associated therewith; and (a2) for each particular segment of the segments, determining a start video frame corresponding substantially to the start point of said particular segment, and forming a particular image corresponding to said start video frame, whereby said plurality of images correspond to said start video frames; (B) forming a common file comprising a contiguous grouping of the plurality of images; and (C) providing said common file. 2. The method of claim 1 wherein said video stream comprises a plurality of contiguous video segments, each of said video segments having a first video frame, and wherein the plurality of images correspond to the plurality of first video frames of the plurality of video segments. 3. The method of claim 2 wherein the plurality of video segments are of approximately equal duration. 4. The method of claim 1 wherein the obtaining in (A) comprises: (a3) determining n distinct locations in the video stream; (a4) determining n video frames F1, F2, . . . , Fn, by, for each location j of said n distinct locations, determining a corresponding video frame Fj, wherein said plurality of images correspond to said n video frames. 5. The method of claim 4 wherein the building in (B) comprises: forming a common file comprising a contiguous grouping of the n video frames F1, F2, . . . , Fn. 6. The method of claim 4 further comprising: determining meta data associated with said n distinct locations in the video stream; and wherein the common file formed in (B) comprises at least some of the meta data. 7. The method of claim 6 wherein the meta data include one or more of: timing information; and location information. 8. The method of claim 6 wherein the meta data comprise meta-data M1, M2, . . . , Mn relating to each of the frames F1, F2, . . . , Fn, where meta data Mj relates to frame Fj, for j=1 to n. 9. A computer-implemented method comprising: (A) determining n distinct locations in a video stream, said video stream comprising n logically contiguous video segments, each of said n locations corresponding to a start position of a corresponding one of said video segments; (B) determining n video frames F1, F2, . . . , Fn, by, for each location j of said n distinct locations, determining a corresponding video frame Fj substantially at or near said location j; and (C) determining n images corresponding to said n video frames; (D) building a common file comprising a contiguous grouping of the n images; and (E) providing said common file. 10. The method of claim 9 wherein the plurality of video segments are of approximately equal duration. 11. The method of claim 9 further comprising: determining meta data associated with said n distinct locations in the video stream, wherein the common file comprises at least some of the meta data. 12. The method of claim 11 wherein the meta data include one or more of: timing information; and location information. 13. The method of claim 11 wherein the meta data comprise meta-data M1, M2, . . . , Mn relating to each of the frames F1, F2, . . . , Fn, where meta data Mj relates to frame Fj, for j=1 to n. 14. A computer-implemented method comprising: (A) obtaining a plurality of images, each of said images corresponding to an image in a video stream; wherein the obtaining in (A) comprises: (A)(1) determining n distinct locations in the video stream; (A)(2) determining n video frames F1, F2, . . . Fn, by, for each location j of said n distinct locations, determining a corresponding video frame Fj, wherein said plurality of images correspond to said n video frames, and (B) building a common file comprising a contiguous grouping of the plurality of images; and (C) providing said common file. 15. The method of claim 14 wherein the building in (B) comprises: building a common file comprising a contiguous grouping of the n video frames F1, F2, F3, . . . , Fn−1, Fn. 16. The method of claim 14 further comprising: determining meta data associated with said n distinct locations in the video stream, wherein the common file comprises at least some of the meta data. 17. The method of claim 16 wherein the meta data includes one or more of: timing information; and location information. 18. The method of claim 16 wherein the meta data comprise meta-data M1, M2, . . . , Mn relating to each of the frames F1, F2, F3, . . . , Fn−1, Fn, where meta data Mj relates to frame Fj, for j=1 to n.
A computer-implemented method obtains a plurality of image files, each corresponding to an image in a video stream and builds a common file from a contiguous grouping of the plurality of image files. The video stream has a plurality of contiguous video segments, each having a first video frame, and the plurality of image files correspond to the plurality of first video frames of the plurality of video segments. The plurality of video segments are of approximately equal duration.1. A computer-implemented method comprising: (A) obtaining a plurality of images, each of said images corresponding to an image in a video stream; wherein the obtaining in (A) comprises: (a1) logically splitting the video stream into a number of contiguous segments, each segment having a corresponding start point, and each start point having a corresponding video frame associated therewith; and (a2) for each particular segment of the segments, determining a start video frame corresponding substantially to the start point of said particular segment, and forming a particular image corresponding to said start video frame, whereby said plurality of images correspond to said start video frames; (B) forming a common file comprising a contiguous grouping of the plurality of images; and (C) providing said common file. 2. The method of claim 1 wherein said video stream comprises a plurality of contiguous video segments, each of said video segments having a first video frame, and wherein the plurality of images correspond to the plurality of first video frames of the plurality of video segments. 3. The method of claim 2 wherein the plurality of video segments are of approximately equal duration. 4. The method of claim 1 wherein the obtaining in (A) comprises: (a3) determining n distinct locations in the video stream; (a4) determining n video frames F1, F2, . . . , Fn, by, for each location j of said n distinct locations, determining a corresponding video frame Fj, wherein said plurality of images correspond to said n video frames. 5. The method of claim 4 wherein the building in (B) comprises: forming a common file comprising a contiguous grouping of the n video frames F1, F2, . . . , Fn. 6. The method of claim 4 further comprising: determining meta data associated with said n distinct locations in the video stream; and wherein the common file formed in (B) comprises at least some of the meta data. 7. The method of claim 6 wherein the meta data include one or more of: timing information; and location information. 8. The method of claim 6 wherein the meta data comprise meta-data M1, M2, . . . , Mn relating to each of the frames F1, F2, . . . , Fn, where meta data Mj relates to frame Fj, for j=1 to n. 9. A computer-implemented method comprising: (A) determining n distinct locations in a video stream, said video stream comprising n logically contiguous video segments, each of said n locations corresponding to a start position of a corresponding one of said video segments; (B) determining n video frames F1, F2, . . . , Fn, by, for each location j of said n distinct locations, determining a corresponding video frame Fj substantially at or near said location j; and (C) determining n images corresponding to said n video frames; (D) building a common file comprising a contiguous grouping of the n images; and (E) providing said common file. 10. The method of claim 9 wherein the plurality of video segments are of approximately equal duration. 11. The method of claim 9 further comprising: determining meta data associated with said n distinct locations in the video stream, wherein the common file comprises at least some of the meta data. 12. The method of claim 11 wherein the meta data include one or more of: timing information; and location information. 13. The method of claim 11 wherein the meta data comprise meta-data M1, M2, . . . , Mn relating to each of the frames F1, F2, . . . , Fn, where meta data Mj relates to frame Fj, for j=1 to n. 14. A computer-implemented method comprising: (A) obtaining a plurality of images, each of said images corresponding to an image in a video stream; wherein the obtaining in (A) comprises: (A)(1) determining n distinct locations in the video stream; (A)(2) determining n video frames F1, F2, . . . Fn, by, for each location j of said n distinct locations, determining a corresponding video frame Fj, wherein said plurality of images correspond to said n video frames, and (B) building a common file comprising a contiguous grouping of the plurality of images; and (C) providing said common file. 15. The method of claim 14 wherein the building in (B) comprises: building a common file comprising a contiguous grouping of the n video frames F1, F2, F3, . . . , Fn−1, Fn. 16. The method of claim 14 further comprising: determining meta data associated with said n distinct locations in the video stream, wherein the common file comprises at least some of the meta data. 17. The method of claim 16 wherein the meta data includes one or more of: timing information; and location information. 18. The method of claim 16 wherein the meta data comprise meta-data M1, M2, . . . , Mn relating to each of the frames F1, F2, F3, . . . , Fn−1, Fn, where meta data Mj relates to frame Fj, for j=1 to n.
2,400
8,766
8,766
15,542,750
2,462
The embodiments herein relate to a method in a policy node for handling a UEs access to a mobile communications network. The policy node comprises policy information for the UEs access rights to the mobile communications network. The policy node obtains, from a subscriber database, subscription information for a subscriber associated with the UE. Based on the subscription information and the policy information, the policy node determines which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. The policy node transmits, to a mobility node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to.
1. A method in a policy node for handling a User Equipment's, UE, access to a mobile communications network, wherein the policy node comprises policy information for the UEs access rights to the mobile communications network, the method comprising: obtaining, from a subscriber database, subscription information for a subscriber associated with the UE; based on the subscription information and the policy information, determining which geographical areas comprised in the mobile communications network the UE is allowed or denied access to; and transmitting, to a mobility node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 2. The method according to claim 1, further comprising: receiving a request message from the mobility node, wherein the request message is a request for the access information. 3. The method according to claim 2, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network and an area identity indicating a logical or geographical region within the network. 4. The method according to claim 1, further comprising: receiving, from the mobility node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 5. The method according to claim 1, further comprising: determining that at least one of the policy information and the subscription information has changed; wherein the policy information and subscription information used in the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is at least one of the changed policy information and changed subscription information; and wherein the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is taken when the policy node has determined that at least one of the policy information and subscription information has changed. 6. The method according to claim 1, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and the access information is per radio access technology and per PLMN identity. 7. The method according to claim 1, wherein the policy node is a Policy and Charging Rules Function, PCRF, node, the subscriber database is a Subscriber Profile Repository, SPR, and the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node. 8. A method in a mobility node for handling a User Equipment's, UE, access to a mobile communications network, the method comprising: receiving, from a policy node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to, wherein the access information is based on subscription information for a subscriber associated with the UE and policy information for the UEs access rights to the mobile communications network; creating handover restriction information based on the received access information from the policy node; and transmitting the handover restriction information to a Radio Access Network, RAN, node. 9. The method according to claim 8, further comprising: creating equivalent network information; and transmitting the created equivalent network information to the UE. 10. The method according to claim 8, further comprising: transmitting a request message to the policy node, wherein the request message is a request for the access information. 11. The method according to claim 10, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network, and an area identity indicating a logical or geographical region within the network. 12. The method according to claim 8, further comprising: transmitting, to the policy node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 13. The method according to claim 8, further comprising: when the access information indicates that UE is not allowed to access a geographical area in the network, determining that the UE's request to access the geographical area in the network should be rejected; and terminating the UE's session towards policy node, wherein the session is associated with access to the region in the network. 14. The method according to claim 8, wherein the access information received from the policy node supersedes access restriction information received from another subscriber database or local configuration associated with access to geographical areas in the mobility node. 15. The method according to claim 8, further comprising: transmitting an acknowledgement message to the policy node, wherein the acknowledgement message acknowledges the receipt of the access information. 16. The method according to claim 8, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and wherein the access information is per radio access technology and per network identity. 17. The method according to claim 8, wherein the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node and wherein the policy node is a Policy and Charging Rules Function, PCRF, node. 18. A policy node for handling a User Equipment's, UE, access to a mobile communications network, wherein the policy node comprises policy information for the UEs access rights to the mobile communications network, the policy node being arranged to: obtain, from a subscriber database, subscription information for a subscriber associated with the UE; based on the subscription information and the policy information, determine which geographical areas comprised in the mobile communications network the UE is allowed or denied access to; and to transmit, to a mobility node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 19. The policy node according to claim 18, being further arranged to: receive a request message from the mobility node, wherein the request message is a request for the access information. 20. The policy node according to claim 19, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network and an area identity indicating a logical or geographical region within the network. 21. The policy node according to claim 18, being further arranged to: receive, from the mobility node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 22. The policy node according to claim 18, being further arranged to: determine that at least one of the policy information and the subscription information has changed; wherein the policy information and subscription information used in the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is at least one of the changed policy information and changed subscription information; and wherein the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is taken when the policy node has determined that at least one of the policy information and subscription information has changed. 23. The policy node according to claim 18, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and the access information is per radio access technology and per PLMN identity. 24. The policy node according to claim 18, wherein the policy node is a Policy and Charging Rules Function, PCRF, node, the subscriber database is a Subscriber Profile Repository, SPR, and the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node. 25. A mobility node for handling a User Equipment's, UE, access to a mobile communications network, the mobility node being arranged to: receive, from a policy node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to, wherein the access information is based on subscription information for a subscriber associated with the UE and policy information for the UEs access rights to the mobile communications network; create handover restriction information based on the received access information from the policy node; and to transmit the handover restriction information to a Radio Access Network, RAN, node. 26. The mobility node according to claim 25, being further arranged to: create equivalent network information; and to transmit the created equivalent network information to the UE. 27. The mobility node according to claim 25, being further arranged to: transmit a request message to the policy node, wherein the request message is a request for the access information. 28. The mobility node according to claim 27, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network, and an area identity indicating a logical or geographical region within the network. 29. The mobility node according to claim 25, being further arranged to: transmit, to the policy node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 30. The mobility node according to claim 25, being further arranged to: when the access information indicates that UE is not allowed to access a geographical area in the network, determine that the UE's request to access the geographical area in the network should be rejected; and to terminate the UE's session towards policy node, wherein the session is associated with access to the region in the network. 31. The mobility node according to claim 25, wherein the access information received from the policy node supersedes access restriction information received from another subscriber database or local configuration associated with access to geographical areas in the mobility node. 32. The mobility node according to claim 25, being further arranged to: transmit an acknowledgement message to the policy node, wherein the acknowledgement message acknowledges the receipt of the access information. 33. The mobility node according to claim 25, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and the access information is per radio access technology and per network identity. 34. The mobility node according to claim 25, wherein the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node and wherein the policy node is a Policy and Charging Rules Function, PCRF, node. 35-38. (canceled)
The embodiments herein relate to a method in a policy node for handling a UEs access to a mobile communications network. The policy node comprises policy information for the UEs access rights to the mobile communications network. The policy node obtains, from a subscriber database, subscription information for a subscriber associated with the UE. Based on the subscription information and the policy information, the policy node determines which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. The policy node transmits, to a mobility node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to.1. A method in a policy node for handling a User Equipment's, UE, access to a mobile communications network, wherein the policy node comprises policy information for the UEs access rights to the mobile communications network, the method comprising: obtaining, from a subscriber database, subscription information for a subscriber associated with the UE; based on the subscription information and the policy information, determining which geographical areas comprised in the mobile communications network the UE is allowed or denied access to; and transmitting, to a mobility node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 2. The method according to claim 1, further comprising: receiving a request message from the mobility node, wherein the request message is a request for the access information. 3. The method according to claim 2, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network and an area identity indicating a logical or geographical region within the network. 4. The method according to claim 1, further comprising: receiving, from the mobility node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 5. The method according to claim 1, further comprising: determining that at least one of the policy information and the subscription information has changed; wherein the policy information and subscription information used in the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is at least one of the changed policy information and changed subscription information; and wherein the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is taken when the policy node has determined that at least one of the policy information and subscription information has changed. 6. The method according to claim 1, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and the access information is per radio access technology and per PLMN identity. 7. The method according to claim 1, wherein the policy node is a Policy and Charging Rules Function, PCRF, node, the subscriber database is a Subscriber Profile Repository, SPR, and the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node. 8. A method in a mobility node for handling a User Equipment's, UE, access to a mobile communications network, the method comprising: receiving, from a policy node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to, wherein the access information is based on subscription information for a subscriber associated with the UE and policy information for the UEs access rights to the mobile communications network; creating handover restriction information based on the received access information from the policy node; and transmitting the handover restriction information to a Radio Access Network, RAN, node. 9. The method according to claim 8, further comprising: creating equivalent network information; and transmitting the created equivalent network information to the UE. 10. The method according to claim 8, further comprising: transmitting a request message to the policy node, wherein the request message is a request for the access information. 11. The method according to claim 10, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network, and an area identity indicating a logical or geographical region within the network. 12. The method according to claim 8, further comprising: transmitting, to the policy node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 13. The method according to claim 8, further comprising: when the access information indicates that UE is not allowed to access a geographical area in the network, determining that the UE's request to access the geographical area in the network should be rejected; and terminating the UE's session towards policy node, wherein the session is associated with access to the region in the network. 14. The method according to claim 8, wherein the access information received from the policy node supersedes access restriction information received from another subscriber database or local configuration associated with access to geographical areas in the mobility node. 15. The method according to claim 8, further comprising: transmitting an acknowledgement message to the policy node, wherein the acknowledgement message acknowledges the receipt of the access information. 16. The method according to claim 8, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and wherein the access information is per radio access technology and per network identity. 17. The method according to claim 8, wherein the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node and wherein the policy node is a Policy and Charging Rules Function, PCRF, node. 18. A policy node for handling a User Equipment's, UE, access to a mobile communications network, wherein the policy node comprises policy information for the UEs access rights to the mobile communications network, the policy node being arranged to: obtain, from a subscriber database, subscription information for a subscriber associated with the UE; based on the subscription information and the policy information, determine which geographical areas comprised in the mobile communications network the UE is allowed or denied access to; and to transmit, to a mobility node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 19. The policy node according to claim 18, being further arranged to: receive a request message from the mobility node, wherein the request message is a request for the access information. 20. The policy node according to claim 19, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network and an area identity indicating a logical or geographical region within the network. 21. The policy node according to claim 18, being further arranged to: receive, from the mobility node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 22. The policy node according to claim 18, being further arranged to: determine that at least one of the policy information and the subscription information has changed; wherein the policy information and subscription information used in the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is at least one of the changed policy information and changed subscription information; and wherein the decision of which geographical areas comprised in the mobile communications network the UE is allowed or denied access to is taken when the policy node has determined that at least one of the policy information and subscription information has changed. 23. The policy node according to claim 18, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and the access information is per radio access technology and per PLMN identity. 24. The policy node according to claim 18, wherein the policy node is a Policy and Charging Rules Function, PCRF, node, the subscriber database is a Subscriber Profile Repository, SPR, and the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node. 25. A mobility node for handling a User Equipment's, UE, access to a mobile communications network, the mobility node being arranged to: receive, from a policy node, access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to, wherein the access information is based on subscription information for a subscriber associated with the UE and policy information for the UEs access rights to the mobile communications network; create handover restriction information based on the received access information from the policy node; and to transmit the handover restriction information to a Radio Access Network, RAN, node. 26. The mobility node according to claim 25, being further arranged to: create equivalent network information; and to transmit the created equivalent network information to the UE. 27. The mobility node according to claim 25, being further arranged to: transmit a request message to the policy node, wherein the request message is a request for the access information. 28. The mobility node according to claim 27, wherein the request message comprises at least one of a UE identity, network identity, information indicating a radio access technology applied by the network, and an area identity indicating a logical or geographical region within the network. 29. The mobility node according to claim 25, being further arranged to: transmit, to the policy node, a support indication which indicates that the mobility node supports reception and handling of access information indicating which geographical areas comprised in the mobile communications network the UE is allowed or denied access to. 30. The mobility node according to claim 25, being further arranged to: when the access information indicates that UE is not allowed to access a geographical area in the network, determine that the UE's request to access the geographical area in the network should be rejected; and to terminate the UE's session towards policy node, wherein the session is associated with access to the region in the network. 31. The mobility node according to claim 25, wherein the access information received from the policy node supersedes access restriction information received from another subscriber database or local configuration associated with access to geographical areas in the mobility node. 32. The mobility node according to claim 25, being further arranged to: transmit an acknowledgement message to the policy node, wherein the acknowledgement message acknowledges the receipt of the access information. 33. The mobility node according to claim 25, wherein the mobile communications network is a Public Land Mobile Network, PLMN, and the access information is per radio access technology and per network identity. 34. The mobility node according to claim 25, wherein the mobility node is a Mobility Management Entity, MME, or a Serving General packet radio service Support Node, SGSN, or a combined MME and SGSN node and wherein the policy node is a Policy and Charging Rules Function, PCRF, node. 35-38. (canceled)
2,400
8,767
8,767
15,894,616
2,414
A switching control module can optimize time division duplexing operations of a distributed antenna system (“DAS”). The switching control module can include a measurement receiver and a processor. The measurement receiver can measure signal powers of downlink signals in a downlink path of the DAS. The processor can determine start times for downlink sub-frames transmitted via the downlink path based on downlink signal powers measured by the measurement receiver exceeding a threshold signal power. The processor can identify a clock setting that controls a timing of switching signals used for switching the DAS between an uplink mode and a downlink mode. The processor can statistically determine a switching time adjustment for the clock setting based on switching time differentials between the clock setting and the start times. The processor can update the clock setting based on the switching time adjustment.
1. A switching control module for a time division duplexing (TDD) communications system comprising a master unit and at least one remote antenna unit that is communicatively coupled to the master unit by an uplink path and a downlink path, the module comprising: a processor coupled to a memory; wherein the processor is configured to send control signals to at least one switch based on switching times controlled by a clock setting, wherein the clock setting is determined by the processor as a function of a downlink:uplink sub-frame ratio and a downlink path signal power measurement; wherein the at least one switch is positioned in the TDD communications system and the control signals instruct the at least one switch to switch the TDD communications system between an uplink mode and a downlink mode. 2. The module of claim 1, wherein the downlink:uplink sub-frame ratio is determined by sampling a signal power of multiple downlink frames in the downlink path. 3. The module of claim 1, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to at least one base station, to b) downlink sub-frames received by the master unit from the at least one base station. 4. The module of claim 1, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to a plurality of base stations, to b) downlink sub-frames received by the master unit from the plurality of base stations. 5. The module of claim 1, further comprising: a measurement receiver configured for measuring a signal power in the downlink path; and a comparator device having an input coupled to the measurement receiver and an output coupled to the processor, wherein the comparator device is configured for comparing a threshold signal power with a power measurement received from the measurement receiver via the input and providing a signal to the processor via the output that is indicative of whether the power measurement exceeds the threshold signal power. 6. The module of claim 1, wherein the memory comprises a plurality of TTD configurations; wherein the processor selects an initial clock setting by selecting a first clock setting associated with a first TTD configuration from the plurality of TTD configuration based on the downlink:uplink sub-frame ratio; wherein the processor calculates a clock setting adjustment statistically from a set of switching time differentials, wherein each switching time differential of the set of switching time differentials is a difference between a start of a respective downlink sub-frame as determined from the downlink path signal power measurement and a time at which a respective one of the control signals is provided to the at least one switch; and wherein the clock setting is determined from the initial clock setting as adjusted by the clock setting adjustment. 7. The module of claim 6, wherein the processor is configured determine the switching time adjustment by: determining start times or end times for respective downlink sub-frames transmitted via the downlink path, wherein the processor determines each start time or end time based on the signal power measured by a measurement receiver exceeding a threshold signal power; and statistically determining the switching time adjustment from multiple switching time differentials, wherein each of the switching time differentials comprises a respective difference between the initial clock setting and a respective start time or end time. 8. A method for controlling a time division duplexing (TDD) communications system comprising a master unit and at least one remote antenna unit that is communicatively coupled to the master unit by an uplink path and a downlink path, the method comprising: determining a clock setting as a function of a downlink:uplink sub-frame ratio and a downlink path signal power measurement; and sending control signals to at least one switch based on switching times controlled by the clock setting; wherein the at least one switch is positioned in the TDD communications system and the control signals instruct the at least one switch to switch the communications system between an uplink mode and a downlink mode. 9. The method of claim 8, wherein the downlink:uplink sub-frame ratio is determined by sampling a signal power of multiple downlink frames in the downlink path. 10. The method of claim 8, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to at least one base station, to b) downlink sub-frames received by the master unit from the at least one base station. 11. The method of claim 8, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to a plurality of base stations, to b) downlink sub-frames received by the master unit from the plurality of base stations. 12. The method of claim 8, further comprising: measuring a signal power in the downlink path with a measurement receiver; and comparing a threshold signal power with a power measurement received from the measurement receiver and providing a signal to a processor that is indicative of whether the power measurement exceeds the threshold signal power. 13. The method of claim 8, further comprising: selecting an initial clock setting by selecting a first clock setting associated with a first TTD configuration from a plurality of TTD configuration stored in a memory based on the downlink:uplink sub-frame ratio; calculating a clock setting adjustment statistically from a set of switching time differentials, wherein each switching time differential of the set of switching time differentials is a difference between a start of a respective downlink sub-frame as determined from the downlink path signal power measurement and a time at which a respective one of the control signals is provided to the at least one switch; and wherein the clock setting is determined from the initial clock setting as adjusted by the clock setting adjustment. 14. The method of claim 13, calculating the clock setting adjustment comprises: determining start times or end times for respective downlink sub-frames transmitted via the downlink path, wherein the processor determines each start time or end time based on the signal power measured by a measurement receiver exceeding a threshold signal power; and statistically determining the switching time adjustment from multiple switching time differentials, wherein each of the switching time differentials comprises a respective difference between the initial clock setting and a respective start time or end time. 15. A time division duplexing (TDD) communications system, the system comprising: a master unit; at least one remote antenna unit that is communicatively coupled to the master unit by an uplink path and a downlink path; at least one switch positioned in the TDD communications system and the control signals instruct the at least one switch to switch the communications system between an uplink mode and a downlink mode; and a switching control module comprising a processor coupled to a memory; wherein the processor is configured to send control signals to at least one switch based on switching times controlled by a clock setting, wherein the clock setting is determined by the processor as a function of a downlink:uplink sub-frame ratio and a downlink path signal power measurement. 16. The system of claim 15, wherein the memory comprises a plurality of TTD configurations; wherein the processor selects an initial clock setting by selecting a first clock setting associated with a first TTD configuration from the plurality of TTD configuration based on the downlink:uplink sub-frame ratio; wherein the processor calculates a clock setting adjustment statistically from a set of switching time differentials, wherein each switching time differential of the set of switching time differentials is a difference between a start of a respective downlink sub-frame as determined from the downlink path signal power measurement and a time at which a respective one of the control signals is provided to the at least one switch; and wherein the clock setting is determined from the initial clock setting as adjusted by the clock setting adjustment. 17. The system of claim 15, wherein the downlink:uplink sub-frame ratio is determined by sampling a signal power of multiple downlink frames in the downlink path. 18. The system of claim 15, wherein the switching control module is located in the at least one remote antenna unit. 19. The system of claim 15, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to at least one base station, to b) downlink sub-frames received by the master unit from the at least one base station. 20. The system of claim 15, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to a plurality of base stations, to b) downlink sub-frames received by the master unit from the plurality of base stations.
A switching control module can optimize time division duplexing operations of a distributed antenna system (“DAS”). The switching control module can include a measurement receiver and a processor. The measurement receiver can measure signal powers of downlink signals in a downlink path of the DAS. The processor can determine start times for downlink sub-frames transmitted via the downlink path based on downlink signal powers measured by the measurement receiver exceeding a threshold signal power. The processor can identify a clock setting that controls a timing of switching signals used for switching the DAS between an uplink mode and a downlink mode. The processor can statistically determine a switching time adjustment for the clock setting based on switching time differentials between the clock setting and the start times. The processor can update the clock setting based on the switching time adjustment.1. A switching control module for a time division duplexing (TDD) communications system comprising a master unit and at least one remote antenna unit that is communicatively coupled to the master unit by an uplink path and a downlink path, the module comprising: a processor coupled to a memory; wherein the processor is configured to send control signals to at least one switch based on switching times controlled by a clock setting, wherein the clock setting is determined by the processor as a function of a downlink:uplink sub-frame ratio and a downlink path signal power measurement; wherein the at least one switch is positioned in the TDD communications system and the control signals instruct the at least one switch to switch the TDD communications system between an uplink mode and a downlink mode. 2. The module of claim 1, wherein the downlink:uplink sub-frame ratio is determined by sampling a signal power of multiple downlink frames in the downlink path. 3. The module of claim 1, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to at least one base station, to b) downlink sub-frames received by the master unit from the at least one base station. 4. The module of claim 1, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to a plurality of base stations, to b) downlink sub-frames received by the master unit from the plurality of base stations. 5. The module of claim 1, further comprising: a measurement receiver configured for measuring a signal power in the downlink path; and a comparator device having an input coupled to the measurement receiver and an output coupled to the processor, wherein the comparator device is configured for comparing a threshold signal power with a power measurement received from the measurement receiver via the input and providing a signal to the processor via the output that is indicative of whether the power measurement exceeds the threshold signal power. 6. The module of claim 1, wherein the memory comprises a plurality of TTD configurations; wherein the processor selects an initial clock setting by selecting a first clock setting associated with a first TTD configuration from the plurality of TTD configuration based on the downlink:uplink sub-frame ratio; wherein the processor calculates a clock setting adjustment statistically from a set of switching time differentials, wherein each switching time differential of the set of switching time differentials is a difference between a start of a respective downlink sub-frame as determined from the downlink path signal power measurement and a time at which a respective one of the control signals is provided to the at least one switch; and wherein the clock setting is determined from the initial clock setting as adjusted by the clock setting adjustment. 7. The module of claim 6, wherein the processor is configured determine the switching time adjustment by: determining start times or end times for respective downlink sub-frames transmitted via the downlink path, wherein the processor determines each start time or end time based on the signal power measured by a measurement receiver exceeding a threshold signal power; and statistically determining the switching time adjustment from multiple switching time differentials, wherein each of the switching time differentials comprises a respective difference between the initial clock setting and a respective start time or end time. 8. A method for controlling a time division duplexing (TDD) communications system comprising a master unit and at least one remote antenna unit that is communicatively coupled to the master unit by an uplink path and a downlink path, the method comprising: determining a clock setting as a function of a downlink:uplink sub-frame ratio and a downlink path signal power measurement; and sending control signals to at least one switch based on switching times controlled by the clock setting; wherein the at least one switch is positioned in the TDD communications system and the control signals instruct the at least one switch to switch the communications system between an uplink mode and a downlink mode. 9. The method of claim 8, wherein the downlink:uplink sub-frame ratio is determined by sampling a signal power of multiple downlink frames in the downlink path. 10. The method of claim 8, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to at least one base station, to b) downlink sub-frames received by the master unit from the at least one base station. 11. The method of claim 8, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to a plurality of base stations, to b) downlink sub-frames received by the master unit from the plurality of base stations. 12. The method of claim 8, further comprising: measuring a signal power in the downlink path with a measurement receiver; and comparing a threshold signal power with a power measurement received from the measurement receiver and providing a signal to a processor that is indicative of whether the power measurement exceeds the threshold signal power. 13. The method of claim 8, further comprising: selecting an initial clock setting by selecting a first clock setting associated with a first TTD configuration from a plurality of TTD configuration stored in a memory based on the downlink:uplink sub-frame ratio; calculating a clock setting adjustment statistically from a set of switching time differentials, wherein each switching time differential of the set of switching time differentials is a difference between a start of a respective downlink sub-frame as determined from the downlink path signal power measurement and a time at which a respective one of the control signals is provided to the at least one switch; and wherein the clock setting is determined from the initial clock setting as adjusted by the clock setting adjustment. 14. The method of claim 13, calculating the clock setting adjustment comprises: determining start times or end times for respective downlink sub-frames transmitted via the downlink path, wherein the processor determines each start time or end time based on the signal power measured by a measurement receiver exceeding a threshold signal power; and statistically determining the switching time adjustment from multiple switching time differentials, wherein each of the switching time differentials comprises a respective difference between the initial clock setting and a respective start time or end time. 15. A time division duplexing (TDD) communications system, the system comprising: a master unit; at least one remote antenna unit that is communicatively coupled to the master unit by an uplink path and a downlink path; at least one switch positioned in the TDD communications system and the control signals instruct the at least one switch to switch the communications system between an uplink mode and a downlink mode; and a switching control module comprising a processor coupled to a memory; wherein the processor is configured to send control signals to at least one switch based on switching times controlled by a clock setting, wherein the clock setting is determined by the processor as a function of a downlink:uplink sub-frame ratio and a downlink path signal power measurement. 16. The system of claim 15, wherein the memory comprises a plurality of TTD configurations; wherein the processor selects an initial clock setting by selecting a first clock setting associated with a first TTD configuration from the plurality of TTD configuration based on the downlink:uplink sub-frame ratio; wherein the processor calculates a clock setting adjustment statistically from a set of switching time differentials, wherein each switching time differential of the set of switching time differentials is a difference between a start of a respective downlink sub-frame as determined from the downlink path signal power measurement and a time at which a respective one of the control signals is provided to the at least one switch; and wherein the clock setting is determined from the initial clock setting as adjusted by the clock setting adjustment. 17. The system of claim 15, wherein the downlink:uplink sub-frame ratio is determined by sampling a signal power of multiple downlink frames in the downlink path. 18. The system of claim 15, wherein the switching control module is located in the at least one remote antenna unit. 19. The system of claim 15, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to at least one base station, to b) downlink sub-frames received by the master unit from the at least one base station. 20. The system of claim 15, wherein the downlink:uplink sub-frame ratio comprises a ratio of: a) uplink sub-frames communicated by the master unit to a plurality of base stations, to b) downlink sub-frames received by the master unit from the plurality of base stations.
2,400
8,768
8,768
14,092,898
2,459
Methods, systems, and computer readable media for routing a Diameter message are disclosed. According to one method, the method occurs at a Diameter routing node. The method includes receiving, from a Diameter routing controller (DRC) via a software defined network (SDN) related interface, Diameter routing information, wherein the Diameter routing information is determined using application layer information. The method also includes routing a Diameter message using the Diameter routing information.
1. A method for routing a Diameter message, the method comprising: at a Diameter routing node: receiving, from a Diameter routing controller (DRC) via a software defined network (SDN) related interface, Diameter routing information, wherein the Diameter routing information is determined using application layer information; and routing a Diameter message using the Diameter routing information. 2. The method of claim 1 wherein the Diameter routing information includes switching information and wherein routing the Diameter message using the Diameter routing information includes switching the Diameter message using the switching information. 3. The method of claim 1 wherein the Diameter routing information is received in response to the Diameter routing node querying the DRC for the Diameter routing information after receiving a Diameter request message for initiating a Diameter session. 4. The method of claim 2 comprising: receiving a second Diameter message associated with the Diameter session; and routing the second Diameter message using the Diameter routing information. 5. The method of claim 1 wherein the Diameter router information is received in response to a network orchestrator or the DRC determining that the Diameter routing node should receive the Diameter routing information based on a current condition or a predicted future condition. 6. The method of claim 1 wherein the SDN related interface includes an OpenFlow protocol interface, a network virtualization using generic routing encapsulation (NVGRE) protocol interface, a virtual extensible LAN (VXLAN) protocol interface, a forwarding and control element separation (ForCES) protocol interface, a locator/ID separation protocol (LISP) interface, an open vSwitch database management (OVSDB) protocol interface, a border gateway protocol (BGP) interface, a BGP link-state (BGP-LS) protocol interface, a path computation element protocol (PCEP) interface, a network configuration (NETCONF) protocol interface, a simple network management protocol (SNMP) interface, or a Diameter protocol interface. 7. The method of claim 1 wherein the DRC includes a policy and charging rules function (PCRF), an offline charging system (OFCS), or a network orchestrator. 8. The method of claim 1 wherein the DRC is configured to communicate with a network orchestrator, wherein the network orchestrator is configured to monitor or predict network conditions and allocate or reallocate various network resources based on the monitored or the predicted network conditions. 9. The method of claim 1 wherein the Diameter routing information includes address information associated with a destination node or a second Diameter routing node, layer 2 information, layer 3 information, layer 4 information, layer 5 information, layer 6 information, layer 7 information, switching information, an Internet protocol (IP) address, port information, a uniform resource identifier (URI), Diameter application layer information, a Diameter realm identifier (ID), a Diameter command code, a Diameter node name, or a fully qualified domain name (FQDN). 10. A system for routing a Diameter message, the system comprising: a Diameter routing node comprising: a software defined network (SDN) related interface configured to receive, from a Diameter routing controller (DRC), Diameter routing information, wherein the Diameter routing information is determined using application layer information; and a routing module configured to route a Diameter message using the Diameter routing information. 11. The system of claim 10 wherein the Diameter routing information includes switching information and wherein the routing module is configured to switch the Diameter message using the switching information. 12. The system of claim 10 wherein the Diameter routing node is configured to receive, prior to receiving the Diameter routing information, a Diameter request message for initiating a Diameter session and to query the DRC for the Diameter routing information. 13. The system of claim 10 wherein the Diameter routing node is configured to receive a second Diameter message associated with the Diameter session and to route the second Diameter message using the Diameter routing information. 14. The system of claim 10 wherein a network orchestrator or the DRC is configured to determine that the Diameter routing node should receive the Diameter routing information based on a current condition or a predicted future condition. 15. The system of claim 10 wherein the SDN related interface includes an OpenFlow protocol interface, a network virtualization using generic routing encapsulation (NVGRE) protocol interface, a virtual extensible LAN (VXLAN) protocol interface, a forwarding and control element separation (ForCES) protocol interface, a locator/ID separation protocol (LISP) interface, an open vSwitch database management (OVSDB) protocol interface, a border gateway protocol (BGP) interface, a BGP link-state (BGP-LS) protocol interface, a path computation element protocol (PCEP) interface, a network configuration (NETCONF) protocol interface, a simple network management protocol (SNMP) interface, or a Diameter protocol interface. 16. The system of claim 10 wherein the DRC includes a policy and charging rules function (PCRF), an offline charging system (OFCS), or a network orchestrator. 17. The system of claim 10 wherein the DRC is configured to communicate with a network orchestrator, wherein the network orchestrator is configured to monitor or predict network conditions and allocate or reallocate various network resources based on the monitored or the predicted network conditions. 18. The system of claim 10 wherein the Diameter routing information includes address information associated with a destination node or a second Diameter routing node, layer 2 information, layer 3 information, layer 4 information, layer 5 information, layer 6 information, layer 7 information, switching information, an Internet protocol (IP) address, port information, a uniform resource identifier (URI), Diameter application layer information, a Diameter realm identifier (ID), a Diameter command code, a Diameter node name, or a fully qualified domain name (FQDN). 19. A non-transitory computer readable medium comprising computer executable instructions embodied in the computer readable medium that when executed by a processor of a computer control the computer to perform steps comprising: receiving, from a Diameter routing controller (DRC) via a software defined network (SDN) related interface, Diameter routing information, wherein the Diameter routing information is determined using application layer information; and routing a Diameter message using the Diameter routing information.
Methods, systems, and computer readable media for routing a Diameter message are disclosed. According to one method, the method occurs at a Diameter routing node. The method includes receiving, from a Diameter routing controller (DRC) via a software defined network (SDN) related interface, Diameter routing information, wherein the Diameter routing information is determined using application layer information. The method also includes routing a Diameter message using the Diameter routing information.1. A method for routing a Diameter message, the method comprising: at a Diameter routing node: receiving, from a Diameter routing controller (DRC) via a software defined network (SDN) related interface, Diameter routing information, wherein the Diameter routing information is determined using application layer information; and routing a Diameter message using the Diameter routing information. 2. The method of claim 1 wherein the Diameter routing information includes switching information and wherein routing the Diameter message using the Diameter routing information includes switching the Diameter message using the switching information. 3. The method of claim 1 wherein the Diameter routing information is received in response to the Diameter routing node querying the DRC for the Diameter routing information after receiving a Diameter request message for initiating a Diameter session. 4. The method of claim 2 comprising: receiving a second Diameter message associated with the Diameter session; and routing the second Diameter message using the Diameter routing information. 5. The method of claim 1 wherein the Diameter router information is received in response to a network orchestrator or the DRC determining that the Diameter routing node should receive the Diameter routing information based on a current condition or a predicted future condition. 6. The method of claim 1 wherein the SDN related interface includes an OpenFlow protocol interface, a network virtualization using generic routing encapsulation (NVGRE) protocol interface, a virtual extensible LAN (VXLAN) protocol interface, a forwarding and control element separation (ForCES) protocol interface, a locator/ID separation protocol (LISP) interface, an open vSwitch database management (OVSDB) protocol interface, a border gateway protocol (BGP) interface, a BGP link-state (BGP-LS) protocol interface, a path computation element protocol (PCEP) interface, a network configuration (NETCONF) protocol interface, a simple network management protocol (SNMP) interface, or a Diameter protocol interface. 7. The method of claim 1 wherein the DRC includes a policy and charging rules function (PCRF), an offline charging system (OFCS), or a network orchestrator. 8. The method of claim 1 wherein the DRC is configured to communicate with a network orchestrator, wherein the network orchestrator is configured to monitor or predict network conditions and allocate or reallocate various network resources based on the monitored or the predicted network conditions. 9. The method of claim 1 wherein the Diameter routing information includes address information associated with a destination node or a second Diameter routing node, layer 2 information, layer 3 information, layer 4 information, layer 5 information, layer 6 information, layer 7 information, switching information, an Internet protocol (IP) address, port information, a uniform resource identifier (URI), Diameter application layer information, a Diameter realm identifier (ID), a Diameter command code, a Diameter node name, or a fully qualified domain name (FQDN). 10. A system for routing a Diameter message, the system comprising: a Diameter routing node comprising: a software defined network (SDN) related interface configured to receive, from a Diameter routing controller (DRC), Diameter routing information, wherein the Diameter routing information is determined using application layer information; and a routing module configured to route a Diameter message using the Diameter routing information. 11. The system of claim 10 wherein the Diameter routing information includes switching information and wherein the routing module is configured to switch the Diameter message using the switching information. 12. The system of claim 10 wherein the Diameter routing node is configured to receive, prior to receiving the Diameter routing information, a Diameter request message for initiating a Diameter session and to query the DRC for the Diameter routing information. 13. The system of claim 10 wherein the Diameter routing node is configured to receive a second Diameter message associated with the Diameter session and to route the second Diameter message using the Diameter routing information. 14. The system of claim 10 wherein a network orchestrator or the DRC is configured to determine that the Diameter routing node should receive the Diameter routing information based on a current condition or a predicted future condition. 15. The system of claim 10 wherein the SDN related interface includes an OpenFlow protocol interface, a network virtualization using generic routing encapsulation (NVGRE) protocol interface, a virtual extensible LAN (VXLAN) protocol interface, a forwarding and control element separation (ForCES) protocol interface, a locator/ID separation protocol (LISP) interface, an open vSwitch database management (OVSDB) protocol interface, a border gateway protocol (BGP) interface, a BGP link-state (BGP-LS) protocol interface, a path computation element protocol (PCEP) interface, a network configuration (NETCONF) protocol interface, a simple network management protocol (SNMP) interface, or a Diameter protocol interface. 16. The system of claim 10 wherein the DRC includes a policy and charging rules function (PCRF), an offline charging system (OFCS), or a network orchestrator. 17. The system of claim 10 wherein the DRC is configured to communicate with a network orchestrator, wherein the network orchestrator is configured to monitor or predict network conditions and allocate or reallocate various network resources based on the monitored or the predicted network conditions. 18. The system of claim 10 wherein the Diameter routing information includes address information associated with a destination node or a second Diameter routing node, layer 2 information, layer 3 information, layer 4 information, layer 5 information, layer 6 information, layer 7 information, switching information, an Internet protocol (IP) address, port information, a uniform resource identifier (URI), Diameter application layer information, a Diameter realm identifier (ID), a Diameter command code, a Diameter node name, or a fully qualified domain name (FQDN). 19. A non-transitory computer readable medium comprising computer executable instructions embodied in the computer readable medium that when executed by a processor of a computer control the computer to perform steps comprising: receiving, from a Diameter routing controller (DRC) via a software defined network (SDN) related interface, Diameter routing information, wherein the Diameter routing information is determined using application layer information; and routing a Diameter message using the Diameter routing information.
2,400
8,769
8,769
15,299,714
2,495
When a UE provides a new request to an S-GW, the S-GW augments DNS requests and provides them to a public DNS, with the augmentation providing indications of the requested function. The public DNS responds by providing the IP address of a simplified P-GW close to the UE location. The P-GW forwards communications to the nearest instance of an endpoint providing the requested service or function. In embodiments, some of the functions of the P-GW are shifted to other devices in the mobile core, devices that are already local. The simplification of the P-GW allows the P-GW to be virtualized and moved to a general-purpose server location. Existing information present in the data path is used to provide encryption of portions of the GTP connection, allowing the location of the P-GW to be optimized in a virtual server data center, as the data path is now secure.
1. A method comprising: receiving, at a serving gateway (S-GW), a request from a user equipment (UE) to access a network resource; preparing, at the S-GW, in response to the received request, an augmented domain name server (DNS) request, the augmentation indicating the desired function of the request; providing, by the S-GW, the augmented DNS request to a public DNS located on a public network; receiving, at the S-GW, from the public DNS an Internet Protocol (IP) address of a closest packet data network (PDN) gateway (P-GW) based on the augmented DNS request; and connecting, by the S-GW, to the P-GW at the received IP address, to develop a flow path from the UE to the S-GW to the closest P-GW. 2. The method of claim 1, wherein the S-GW and the P-GW are in the same network. 3. The method of claim 1, further comprising: performing, by the S-GW, at least one of a charging function, a policy enforcement function and a lawful intercept function on behalf of the P-GW. 4. The method of claim 1, wherein the step of connecting to the P-GW at the received IP address uses a secure GPRS Tunneling Protocol (GTP) format. 5. The method of claim 4, wherein the secure GTP format comprises: an encrypted message packet with added ESP header and ESP trailer which is encapsulated in a GTP header, a UDP header and an IP header. 6. The method of claim 1, wherein the augmented DNS request is in the form of an augmented function concatenated with a fully qualified domain name (FQDN). 7. The method of claim 6, wherein the augmented function includes a desired resource and network type. 8. A serving gateway (S-GW) comprising: a processor; a plurality of network ports coupled to the processor; a packet routing mechanism connected to the plurality of network ports and coupled to the processor; and a memory coupled to the processor and storing programs for execution on the process to cause the processor to prepare an augmented domain name server (DNS) request, the augmentation indicating the desired function of the request in response to receiving a request from a user equipment (UE) to access a network resource; provide the augmented DNS request to a public DNS located on a public network; and connect to a packet data network (PDN) gateway (P-GW) at an IP address provided by the public DNS in response to the provided augmented DNS request, the IP address being of a closest P-GW, to develop a flow path from the UE to the S-GW to the closest P-GW. 9. The S-GW of claim 8, wherein the S-GW and the P-GW are in the same network. 10. The S-GW of claim 8, further comprising: perform at least one of a charging function, a policy enforcement function and a lawful intercept function on behalf of the P-GW. 11. The S-GW of claim 8, wherein the step of connecting to the P-GW at the received IP address uses a secure GPRS Tunneling Protocol (GTP) format. 12. The S-GW of claim 11, wherein the secure GTP format comprises: an encrypted message packet with added ESP header and ESP trailer which is encapsulated in a GTP header, a UDP header and an IP header. 13. The S-GW of claim 8, wherein the augmented DNS request is in the form of an augmented function concatenated with a fully qualified domain name (FQDN). 14. The S-GW of claim 13, wherein the augmented function includes a desired resource and network type. 15. A network comprising: a serving gateway (S-GW)for communicating with a user equipment (UE) including: a processor; a plurality of network ports coupled to the processor; a packet routing mechanism connected to the plurality of network ports and coupled to the processor; and a memory coupled to the processor and storing programs for execution on the process to cause the processor to perform various methods; and a plurality of packet data network (PDN) gateways (P-GWs), the P-GWs being varying distances from the UE, wherein various methods performed by the S-GW processor include: preparing an augmented domain name server (DNS) request, the augmentation indicating the desired function of the request, in response to receiving a request from the (UE) to access a network resource; providing the augmented DNS request to a public DNS located on a public network; and connecting to one of the plurality of P-GWs at an IP address provided by the public DNS in response to the provided augmented DNS request, the IP address being of a closest P-GW, to develop a flow path from the UE to the S-GW to the closest P-GW. 16. The network of claim 15, wherein the S-GW and the P-GW are in the same network. 17. The network of claim 15, the various methods further including: performing at least one of a charging function, a policy enforcement function and a lawful intercept function on behalf of the P-GW. 18. The network of claim 15, wherein connecting to the P-GW at the received IP address uses a secure GPRS Tunneling Protocol (GTP) format. 19. The network of claim 18, wherein the secure GTP format comprises: an encrypted message packet with added ESP header and ESP trailer which is encapsulated in a GTP header, a UDP header and an IP header. 20. The network of claim 15, wherein the augmented DNS request is in the form of an augmented function concatenated with a fully qualified domain name (FQDN). 21. The network of claim 20, wherein the augmented function includes a desired resource and network type. 22. The network of claim 15, wherein at least one of the plurality of P-GWs is a virtual P-GW. 23. The network of claim 22, wherein at least one of the plurality of virtual P-GWs is located in the public network. 24. The network of claim 15, wherein the P-GW includes: a processor; a plurality of network ports coupled to the processor; a packet routing mechanism connected to the plurality of network ports and coupled to the processor; and a memory coupled to the processor and storing programs for execution on the process to cause the processor to communicate with a closest of a plurality of servers or a plurality of access point networks (APNs) located in the public network, with at least one server being closer to and one server being farther from the P-GW or with at least one APN being closer to and one APN being farther from the P-GW.
When a UE provides a new request to an S-GW, the S-GW augments DNS requests and provides them to a public DNS, with the augmentation providing indications of the requested function. The public DNS responds by providing the IP address of a simplified P-GW close to the UE location. The P-GW forwards communications to the nearest instance of an endpoint providing the requested service or function. In embodiments, some of the functions of the P-GW are shifted to other devices in the mobile core, devices that are already local. The simplification of the P-GW allows the P-GW to be virtualized and moved to a general-purpose server location. Existing information present in the data path is used to provide encryption of portions of the GTP connection, allowing the location of the P-GW to be optimized in a virtual server data center, as the data path is now secure.1. A method comprising: receiving, at a serving gateway (S-GW), a request from a user equipment (UE) to access a network resource; preparing, at the S-GW, in response to the received request, an augmented domain name server (DNS) request, the augmentation indicating the desired function of the request; providing, by the S-GW, the augmented DNS request to a public DNS located on a public network; receiving, at the S-GW, from the public DNS an Internet Protocol (IP) address of a closest packet data network (PDN) gateway (P-GW) based on the augmented DNS request; and connecting, by the S-GW, to the P-GW at the received IP address, to develop a flow path from the UE to the S-GW to the closest P-GW. 2. The method of claim 1, wherein the S-GW and the P-GW are in the same network. 3. The method of claim 1, further comprising: performing, by the S-GW, at least one of a charging function, a policy enforcement function and a lawful intercept function on behalf of the P-GW. 4. The method of claim 1, wherein the step of connecting to the P-GW at the received IP address uses a secure GPRS Tunneling Protocol (GTP) format. 5. The method of claim 4, wherein the secure GTP format comprises: an encrypted message packet with added ESP header and ESP trailer which is encapsulated in a GTP header, a UDP header and an IP header. 6. The method of claim 1, wherein the augmented DNS request is in the form of an augmented function concatenated with a fully qualified domain name (FQDN). 7. The method of claim 6, wherein the augmented function includes a desired resource and network type. 8. A serving gateway (S-GW) comprising: a processor; a plurality of network ports coupled to the processor; a packet routing mechanism connected to the plurality of network ports and coupled to the processor; and a memory coupled to the processor and storing programs for execution on the process to cause the processor to prepare an augmented domain name server (DNS) request, the augmentation indicating the desired function of the request in response to receiving a request from a user equipment (UE) to access a network resource; provide the augmented DNS request to a public DNS located on a public network; and connect to a packet data network (PDN) gateway (P-GW) at an IP address provided by the public DNS in response to the provided augmented DNS request, the IP address being of a closest P-GW, to develop a flow path from the UE to the S-GW to the closest P-GW. 9. The S-GW of claim 8, wherein the S-GW and the P-GW are in the same network. 10. The S-GW of claim 8, further comprising: perform at least one of a charging function, a policy enforcement function and a lawful intercept function on behalf of the P-GW. 11. The S-GW of claim 8, wherein the step of connecting to the P-GW at the received IP address uses a secure GPRS Tunneling Protocol (GTP) format. 12. The S-GW of claim 11, wherein the secure GTP format comprises: an encrypted message packet with added ESP header and ESP trailer which is encapsulated in a GTP header, a UDP header and an IP header. 13. The S-GW of claim 8, wherein the augmented DNS request is in the form of an augmented function concatenated with a fully qualified domain name (FQDN). 14. The S-GW of claim 13, wherein the augmented function includes a desired resource and network type. 15. A network comprising: a serving gateway (S-GW)for communicating with a user equipment (UE) including: a processor; a plurality of network ports coupled to the processor; a packet routing mechanism connected to the plurality of network ports and coupled to the processor; and a memory coupled to the processor and storing programs for execution on the process to cause the processor to perform various methods; and a plurality of packet data network (PDN) gateways (P-GWs), the P-GWs being varying distances from the UE, wherein various methods performed by the S-GW processor include: preparing an augmented domain name server (DNS) request, the augmentation indicating the desired function of the request, in response to receiving a request from the (UE) to access a network resource; providing the augmented DNS request to a public DNS located on a public network; and connecting to one of the plurality of P-GWs at an IP address provided by the public DNS in response to the provided augmented DNS request, the IP address being of a closest P-GW, to develop a flow path from the UE to the S-GW to the closest P-GW. 16. The network of claim 15, wherein the S-GW and the P-GW are in the same network. 17. The network of claim 15, the various methods further including: performing at least one of a charging function, a policy enforcement function and a lawful intercept function on behalf of the P-GW. 18. The network of claim 15, wherein connecting to the P-GW at the received IP address uses a secure GPRS Tunneling Protocol (GTP) format. 19. The network of claim 18, wherein the secure GTP format comprises: an encrypted message packet with added ESP header and ESP trailer which is encapsulated in a GTP header, a UDP header and an IP header. 20. The network of claim 15, wherein the augmented DNS request is in the form of an augmented function concatenated with a fully qualified domain name (FQDN). 21. The network of claim 20, wherein the augmented function includes a desired resource and network type. 22. The network of claim 15, wherein at least one of the plurality of P-GWs is a virtual P-GW. 23. The network of claim 22, wherein at least one of the plurality of virtual P-GWs is located in the public network. 24. The network of claim 15, wherein the P-GW includes: a processor; a plurality of network ports coupled to the processor; a packet routing mechanism connected to the plurality of network ports and coupled to the processor; and a memory coupled to the processor and storing programs for execution on the process to cause the processor to communicate with a closest of a plurality of servers or a plurality of access point networks (APNs) located in the public network, with at least one server being closer to and one server being farther from the P-GW or with at least one APN being closer to and one APN being farther from the P-GW.
2,400
8,770
8,770
15,765,805
2,482
There is provided an encoding apparatus, an encoding method, a decoding apparatus, and a decoding method that make it possible to acquire two-dimensional image data of a viewpoint corresponding to a predetermined display image generation method and depth image data without depending upon the viewpoint upon image pickup. A conversion unit generates, from three-dimensional data of an image pickup object, two-dimensional image data of a plurality of viewpoints corresponding to a predetermined display image generation method and depth image data indicative of a position of each of pixels in a depthwise direction of the image pickup object. An encoding unit encodes the two-dimensional image data and the depth image data generated by the conversion unit. A transmission unit transmits the two-dimensional image data and the depth image data encoded by the encoding unit. The present disclosure can be applied, for example, to an encoding apparatus and so forth.
1. An encoding apparatus, comprising: a two-dimensional data generation unit configured to generate, from three-dimensional data of an image pickup object, two-dimensional image data of a plurality of first viewpoints corresponding to a given display image generation method and depth image data indicative of a position of each of pixels in a depthwise direction of the image pickup object with respect to a second viewpoint; an encoding unit configured to encode the two-dimensional image data of the plurality of first viewpoints and the depth image data generated by the two-dimensional data generation unit; and a transmission unit configured to transmit the two-dimensional image data of the plurality of first viewpoints and the depth image data encoded by the encoding unit. 2. (canceled) 3. The encoding apparatus according to claim 1, wherein the plurality of first viewpoints exist at equal distances on a same circle. 4. The encoding apparatus according to claim 1, wherein at least two viewpoints from among the plurality of first viewpoints are lined up in a substantially horizontal direction. 5. The encoding apparatus according to claim 4, wherein the transmission unit transmits information that specifies two viewpoints lined up in a horizontal direction from among the plurality of first viewpoints. 6. The encoding apparatus according to claim 1, wherein the transmission unit transmits the three-dimensional data in an occlusion region from within the two-dimensional image data of the plurality of first viewpoints. 7. The encoding apparatus according to claim 1, wherein the two-dimensional data generation unit generates the two-dimensional image data of the plurality of first viewpoints from the three-dimensional data on the basis of a camera parameter of the plurality of first viewpoints, and generates the depth image data on the basis of a camera parameter of the second viewpoint; and the transmission unit transmits the camera parameters of the plurality of first viewpoints and of the second viewpoint. 8. The encoding apparatus according to claim 1, wherein the number of the given display image generation methods is a plural number. 9. The encoding apparatus according to claim 1, wherein the plurality of first viewpoints and the second viewpoint are same. 10. An encoding method by an encoding apparatus, the encoding method comprising: a two-dimensional data generation step of generating, from three-dimensional data of an image pickup object, two-dimensional image data of a plurality of first viewpoints corresponding to a given display image generation method and depth image data indicative of a position of each of pixels in a depthwise direction of the image pickup object with respect to a second viewpoint; an encoding step of encoding the two-dimensional image data of the plurality of first viewpoints and the depth image data generated by the process of the two-dimensional data generation step; and a transmission step of transmitting the two-dimensional image data of the plurality of first viewpoints and the depth image data encoded by the process of the encoding step. 11. A decoding apparatus, comprising: a reception unit configured to receive encoded data of two-dimensional image data of a plurality of first viewpoints and encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint, generated from three-dimensional data of an image pickup object; a decoding unit configured to decode the encoded data of two-dimensional image data of a plurality of first viewpoints and the encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint; a three-dimensional data generation unit configured to generate three-dimensional data of the image pickup object using the two-dimensional image data of the plurality of first viewpoints and the depth image data obtained as a result of decoding by the decoding unit; and a two-dimensional data generation unit configured to generate two-dimensional image data as display image data by the given display image generation method on the basis of the three-dimensional data generated by the three-dimensional data generation unit. 12. The decoding apparatus according to claim 11, wherein the plurality of first viewpoints exist at equal distances on a same circle. 13. The decoding apparatus according to claim 11, wherein at least two viewpoints from among the plurality of first viewpoints are lined up in a substantially horizontal direction. 14. The decoding apparatus according to claim 13, further comprising: a reception unit that receives information that specifies two viewpoints lined up in a horizontal direction from among the plurality of first viewpoints. 15. The decoding apparatus according to claim 11, wherein the two-dimensional image data of the plurality of first viewpoints and the depth image data are generated from three-dimensional data of the image pickup object generated from two-dimensional image data of a plurality of third viewpoints. 16. The decoding apparatus according to claim 15, wherein the three-dimensional data generation unit generates three-dimensional data of the image pickup object using the two-dimensional image data of the plurality of first viewpoints, the depth image data and three-dimensional data of an occlusion region from within the two-dimensional image data of the plurality of first viewpoints. 17. The decoding apparatus according to claim 11, wherein the three-dimensional data generation unit generates three-dimensional data of the image pickup object on the basis of camera parameters of the plurality of first viewpoints and the second viewpoint. 18. The decoding apparatus according to claim 11, wherein the number of the given display image generation methods is a plural number. 19. The decoding apparatus according to claim 11, wherein the plurality of first viewpoints and the second viewpoint are same. 20. A decoding method by a decoding apparatus, the decoding method comprising: a receiving step of receiving encoded data of two-dimensional image data of a plurality of first viewpoints and encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint, generated from three-dimensional data of an image pickup object; a decoding step of decoding the encoded data of two-dimensional image data of a plurality of first viewpoints and the encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint; a three-dimensional data generation step of generating three-dimensional data of the image pickup object using the two-dimensional image data of the plurality of first viewpoints and the depth image data obtained as a result of decoding by the process of the decoding step; and a two-dimensional data generation step of generating two-dimensional image data as display image data by the given display image generation method on the basis of the three-dimensional data generated by the process of the three-dimensional data generation step.
There is provided an encoding apparatus, an encoding method, a decoding apparatus, and a decoding method that make it possible to acquire two-dimensional image data of a viewpoint corresponding to a predetermined display image generation method and depth image data without depending upon the viewpoint upon image pickup. A conversion unit generates, from three-dimensional data of an image pickup object, two-dimensional image data of a plurality of viewpoints corresponding to a predetermined display image generation method and depth image data indicative of a position of each of pixels in a depthwise direction of the image pickup object. An encoding unit encodes the two-dimensional image data and the depth image data generated by the conversion unit. A transmission unit transmits the two-dimensional image data and the depth image data encoded by the encoding unit. The present disclosure can be applied, for example, to an encoding apparatus and so forth.1. An encoding apparatus, comprising: a two-dimensional data generation unit configured to generate, from three-dimensional data of an image pickup object, two-dimensional image data of a plurality of first viewpoints corresponding to a given display image generation method and depth image data indicative of a position of each of pixels in a depthwise direction of the image pickup object with respect to a second viewpoint; an encoding unit configured to encode the two-dimensional image data of the plurality of first viewpoints and the depth image data generated by the two-dimensional data generation unit; and a transmission unit configured to transmit the two-dimensional image data of the plurality of first viewpoints and the depth image data encoded by the encoding unit. 2. (canceled) 3. The encoding apparatus according to claim 1, wherein the plurality of first viewpoints exist at equal distances on a same circle. 4. The encoding apparatus according to claim 1, wherein at least two viewpoints from among the plurality of first viewpoints are lined up in a substantially horizontal direction. 5. The encoding apparatus according to claim 4, wherein the transmission unit transmits information that specifies two viewpoints lined up in a horizontal direction from among the plurality of first viewpoints. 6. The encoding apparatus according to claim 1, wherein the transmission unit transmits the three-dimensional data in an occlusion region from within the two-dimensional image data of the plurality of first viewpoints. 7. The encoding apparatus according to claim 1, wherein the two-dimensional data generation unit generates the two-dimensional image data of the plurality of first viewpoints from the three-dimensional data on the basis of a camera parameter of the plurality of first viewpoints, and generates the depth image data on the basis of a camera parameter of the second viewpoint; and the transmission unit transmits the camera parameters of the plurality of first viewpoints and of the second viewpoint. 8. The encoding apparatus according to claim 1, wherein the number of the given display image generation methods is a plural number. 9. The encoding apparatus according to claim 1, wherein the plurality of first viewpoints and the second viewpoint are same. 10. An encoding method by an encoding apparatus, the encoding method comprising: a two-dimensional data generation step of generating, from three-dimensional data of an image pickup object, two-dimensional image data of a plurality of first viewpoints corresponding to a given display image generation method and depth image data indicative of a position of each of pixels in a depthwise direction of the image pickup object with respect to a second viewpoint; an encoding step of encoding the two-dimensional image data of the plurality of first viewpoints and the depth image data generated by the process of the two-dimensional data generation step; and a transmission step of transmitting the two-dimensional image data of the plurality of first viewpoints and the depth image data encoded by the process of the encoding step. 11. A decoding apparatus, comprising: a reception unit configured to receive encoded data of two-dimensional image data of a plurality of first viewpoints and encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint, generated from three-dimensional data of an image pickup object; a decoding unit configured to decode the encoded data of two-dimensional image data of a plurality of first viewpoints and the encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint; a three-dimensional data generation unit configured to generate three-dimensional data of the image pickup object using the two-dimensional image data of the plurality of first viewpoints and the depth image data obtained as a result of decoding by the decoding unit; and a two-dimensional data generation unit configured to generate two-dimensional image data as display image data by the given display image generation method on the basis of the three-dimensional data generated by the three-dimensional data generation unit. 12. The decoding apparatus according to claim 11, wherein the plurality of first viewpoints exist at equal distances on a same circle. 13. The decoding apparatus according to claim 11, wherein at least two viewpoints from among the plurality of first viewpoints are lined up in a substantially horizontal direction. 14. The decoding apparatus according to claim 13, further comprising: a reception unit that receives information that specifies two viewpoints lined up in a horizontal direction from among the plurality of first viewpoints. 15. The decoding apparatus according to claim 11, wherein the two-dimensional image data of the plurality of first viewpoints and the depth image data are generated from three-dimensional data of the image pickup object generated from two-dimensional image data of a plurality of third viewpoints. 16. The decoding apparatus according to claim 15, wherein the three-dimensional data generation unit generates three-dimensional data of the image pickup object using the two-dimensional image data of the plurality of first viewpoints, the depth image data and three-dimensional data of an occlusion region from within the two-dimensional image data of the plurality of first viewpoints. 17. The decoding apparatus according to claim 11, wherein the three-dimensional data generation unit generates three-dimensional data of the image pickup object on the basis of camera parameters of the plurality of first viewpoints and the second viewpoint. 18. The decoding apparatus according to claim 11, wherein the number of the given display image generation methods is a plural number. 19. The decoding apparatus according to claim 11, wherein the plurality of first viewpoints and the second viewpoint are same. 20. A decoding method by a decoding apparatus, the decoding method comprising: a receiving step of receiving encoded data of two-dimensional image data of a plurality of first viewpoints and encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint, generated from three-dimensional data of an image pickup object; a decoding step of decoding the encoded data of two-dimensional image data of a plurality of first viewpoints and the encoded data of depth image data indicative of a position of each of pixels in a depthwise direction of an image pickup object with respect to a second viewpoint; a three-dimensional data generation step of generating three-dimensional data of the image pickup object using the two-dimensional image data of the plurality of first viewpoints and the depth image data obtained as a result of decoding by the process of the decoding step; and a two-dimensional data generation step of generating two-dimensional image data as display image data by the given display image generation method on the basis of the three-dimensional data generated by the process of the three-dimensional data generation step.
2,400
8,771
8,771
14,726,109
2,456
A system and method for providing zone-specific media to a user. As a non-limiting example, various aspects of this disclosure provide a system and method that flexibly selects and provides media content (e.g., audio content), where such content is selected based, at least in part, on a user location (e.g., location within a premises).
1. A system for providing media content, the system comprising: at least one module operable to, at least: determine a location of a user within a premises; identify media content based, at least in part, on the determined location; and output the identified media content to at least the determined location. 2. The system of claim 1, wherein the premises comprises a private residence. 3. The system of claim 2, wherein said at least one module is operable to determine the location by, at least in part, operating to determine a zone of the private residence in which the user is located. 4. The system of claim 2, wherein said at least one module is operable to identify the media content by, at least in part, operating to identify advertising media corresponding to the determined zone. 5. The system of claim 1, wherein said at least one module is operable to determine an identity of the user, and wherein said at least one module is operable to identify the media content based, at least in part, on the determined location and the determined identity. 6. A system for providing media, the system comprising: at least one module operable to, at least: determine a location of a user within a premises; receive media content based, at least in part, on the determined location; and output the identified media content to at least the determined location. 7. The system of claim 6, wherein the premises comprises a private residence. 8. The system of claim 7, wherein said at least one module is operable to determine a location by, at least in part, operating to determine a zone of the private residence in which the user is located. 9. The system of claim 8, wherein said received media content comprises audio content corresponding to the determined zone. 10. The system of claim 6, wherein said at least one module is operable to determine an identity of the user, and wherein said at least one module is operable to receive the media content based, at least in part, on the determined location and the determined user identity. 11. A system for providing media, the system comprising: at least one module operable to, at least: determine a location of a user within a premises; communicate information of the determined location to a remote computing system remote from the premises; receive media content from the remote computing system; and output the identified media to at least the determined location. 12. The system of claim 11, wherein the premises comprises a private residence. 13. The system of claim 12, wherein said at least one module is operable to determine the location by, at least in part, operating to determine a zone of the private residence in which the user is located. 14. The system of claim 13, wherein said at least one module is operable to receive media content by, at least in part, operating to receive media content associated with the determined zone. 15. The system of claim 11, wherein the at least one module is operable to: determine an identity of the user; and communicate information of the determined user identity to the remote computing system. 16. The system of claim 15, wherein said at least one module is operable to receive the media content by, at least in part, operating to receive media content associated with the determined zone and the determined user identity. 17. The system of claim 15, wherein said at least one module is operable to determine respective identities of a plurality of users, and determine the identity of the user based, at least in part, on user priority. 18. A system for providing media, the system comprising: at least one module operable to, at least: receive, from a remote system, information identifying a location within a premises; identify media content based, at least in part, on the identified location; and communicate the identified media content to the remote system. 19. The system of claim 18, wherein the premises comprises a private residence. 20. The system of claim 19, wherein said information identifying a location within a premises comprises information identifying a zone within the premises. 21. The system of claim 18, wherein: said at least one module is operable to receive the information by, at least in part, operating to receive the information from the remote system via the Internet; and said at least one module is operable to communicate the identified media content by, at least in part, operating to communicate the identified media content via the Internet. 22. The system of claim 18, wherein said at least one module is operable to identify the media content by operating to search a database based, at least in part, on the received information identifying a location. 23. The system of claim 18, wherein said at least one module is operable to receive, from the remote system, information identifying a user at the location. 24. The system of claim 23, wherein said at least one module is operable to identify the media content based, at least in part, on the information identifying the location and the information identifying the user.
A system and method for providing zone-specific media to a user. As a non-limiting example, various aspects of this disclosure provide a system and method that flexibly selects and provides media content (e.g., audio content), where such content is selected based, at least in part, on a user location (e.g., location within a premises).1. A system for providing media content, the system comprising: at least one module operable to, at least: determine a location of a user within a premises; identify media content based, at least in part, on the determined location; and output the identified media content to at least the determined location. 2. The system of claim 1, wherein the premises comprises a private residence. 3. The system of claim 2, wherein said at least one module is operable to determine the location by, at least in part, operating to determine a zone of the private residence in which the user is located. 4. The system of claim 2, wherein said at least one module is operable to identify the media content by, at least in part, operating to identify advertising media corresponding to the determined zone. 5. The system of claim 1, wherein said at least one module is operable to determine an identity of the user, and wherein said at least one module is operable to identify the media content based, at least in part, on the determined location and the determined identity. 6. A system for providing media, the system comprising: at least one module operable to, at least: determine a location of a user within a premises; receive media content based, at least in part, on the determined location; and output the identified media content to at least the determined location. 7. The system of claim 6, wherein the premises comprises a private residence. 8. The system of claim 7, wherein said at least one module is operable to determine a location by, at least in part, operating to determine a zone of the private residence in which the user is located. 9. The system of claim 8, wherein said received media content comprises audio content corresponding to the determined zone. 10. The system of claim 6, wherein said at least one module is operable to determine an identity of the user, and wherein said at least one module is operable to receive the media content based, at least in part, on the determined location and the determined user identity. 11. A system for providing media, the system comprising: at least one module operable to, at least: determine a location of a user within a premises; communicate information of the determined location to a remote computing system remote from the premises; receive media content from the remote computing system; and output the identified media to at least the determined location. 12. The system of claim 11, wherein the premises comprises a private residence. 13. The system of claim 12, wherein said at least one module is operable to determine the location by, at least in part, operating to determine a zone of the private residence in which the user is located. 14. The system of claim 13, wherein said at least one module is operable to receive media content by, at least in part, operating to receive media content associated with the determined zone. 15. The system of claim 11, wherein the at least one module is operable to: determine an identity of the user; and communicate information of the determined user identity to the remote computing system. 16. The system of claim 15, wherein said at least one module is operable to receive the media content by, at least in part, operating to receive media content associated with the determined zone and the determined user identity. 17. The system of claim 15, wherein said at least one module is operable to determine respective identities of a plurality of users, and determine the identity of the user based, at least in part, on user priority. 18. A system for providing media, the system comprising: at least one module operable to, at least: receive, from a remote system, information identifying a location within a premises; identify media content based, at least in part, on the identified location; and communicate the identified media content to the remote system. 19. The system of claim 18, wherein the premises comprises a private residence. 20. The system of claim 19, wherein said information identifying a location within a premises comprises information identifying a zone within the premises. 21. The system of claim 18, wherein: said at least one module is operable to receive the information by, at least in part, operating to receive the information from the remote system via the Internet; and said at least one module is operable to communicate the identified media content by, at least in part, operating to communicate the identified media content via the Internet. 22. The system of claim 18, wherein said at least one module is operable to identify the media content by operating to search a database based, at least in part, on the received information identifying a location. 23. The system of claim 18, wherein said at least one module is operable to receive, from the remote system, information identifying a user at the location. 24. The system of claim 23, wherein said at least one module is operable to identify the media content based, at least in part, on the information identifying the location and the information identifying the user.
2,400
8,772
8,772
15,285,851
2,447
Real time communication services are used to establish peer-to-peer connection (P2P) between computing devices to selectively share content, such as applications, data, and media. In accordance with the present disclosure, a “Source” and a “Target” are connected in a P2P session or a proxied connection, with each of the Source and Target having a browser that is aware of the other. The Source has a browser extension that allows access to local content, such as, applications, audio and video that are on the Source computing device. To share content, the Source may select a Share button to present a list of local content to share. The Source then makes a selection of the content, which in turn, makes the content available at a browser executing on a computing device(s) of other collaborators in a collaboration session.
1. A method of selectively sharing content between a source computing device and a target computing device, comprising: establishing a connection between the source computing device and the target computing device; launching a first browser at the source computing device, the browser including a screen share extension; receiving a selection of the content within the first browser using the screen share extension; broadcasting the content from the source computing device to the target computing device to make the content available within a second browser at the target computing device; and presenting a first independent view of the content at the source computing device and a second independent view of the content at the target computing device, wherein the first independent view and the second independent view are independently sized and positioned within the first browser and the second browser, respectively. 2. The method of claim 1, further comprising providing a share button at the source computing device to present a list of content to share. 3. The method of claim 2, wherein the first independent view and the second independent are adapted to have an independent transparency. 4. The method of claim 1, wherein the source computing device and the target computing device are the same computing device, wherein the first browser and the second browser are the same browser, and wherein the first independent view and the second independent view are presented in the same browser. 5. The method of claim 1, wherein the target computing device additionally operates as a second source computing device and the source computing device additionally operates as a second target computing device, the method further comprising: sharing second content at the second source computing device with the second target computing device; confirming a selection of the second content at the second source computing device; and making the second content available to the second target computing device in a third independent view presented at the first browser at the second target computing device. 6. The method of claim 5, further comprising presenting the second content in a fourth independent view at the second browser at the second source computing device. 7. The method of claim 6, wherein the third independent view and the fourth independent view each have an independent size, position and transparency. 8. The method of claim 1, further comprising: capturing a first graphical layer displayed in the first independent view or a second graphical layer displayed in the second independent view using a capture tool provided at the first browser or the second browser, respectively; and saving the captured first graphical layer or second graphical layer as an image file on the source computing device or target computing device, respectively. 9. The method of claim 8, further comprising presenting a thumbnail of the captured first graphical layer or the captured second graphical layer in a first gallery in the first browser or second gallery in the second browser, respectively. 10. The method of claim 1, further comprising establishing the connection between the source computing device and the target computing device as a peer-to-peer connection. 11. The method of claim 10, further comprising managing resources of the source computing device or the target computing device over the peer-to-peer connection, wherein the resources comprise hardware components of the source computing device or the target computing device. 12. The method of claim 10, wherein the peer-to-peer connection is provided using WebRTC. 13. The method of claim 1, wherein the first independent view and/or the second independent view provide additional functionalities to a collaborative session between the source computing device and the target computing device. 14. The method of claim 13, further comprising capturing an image of the first independent view and/or the second independent to a file. 15. The method of claim 1, further comprising: broadcasting the content from the source computing device to plural target computing devices to make the content available within a respective second browser at each of the plural target computing devices; and presenting a respective second independent view of the content at each of the target computing devices, wherein the first independent view and each of the respective second independent views are independently sized and positioned within the first browser and each of the second browsers, respectively. 16. A method of selectively sharing content between a first computing device and a second computing device, comprising: establishing a peer-to-peer connection between the first computing device and the second computing device; displaying, in a user interface at the first computing device, a list of sharable content; receiving a selection of the content within the user interface to be shared by the first computing device with the second computing device; broadcasting the content from the first computing device to the second computing device; and presenting a first independent view of the content at the first computing device and a second independent view of the content at the second computing device, wherein the first independent view and the second independent view are independently sized and positioned at the first computing device and second computing device, respectively. 17. The method of claim 16, further comprising, displaying, in a second user interface at the second computing device, a second list of sharable content; receiving a selection of second content within the second user interface to be shared by the second computing device with the first computing device; broadcasting the content from the second computing device to the first computing device; and presenting a third independent view of the content at the first computing device and a fourth independent view of the content at the second computing device, wherein the first independent view and the third independent view, and the second independent view and the fourth independent view are independently sized and positioned at the first computing device and second computing device, respectively. 18. The method of claim 16, further comprising: capturing a first graphical layer displayed in the first independent view or a second graphical layer displayed in the second independent view using a capture tool provided at the first computing device or the second computing device, respectively; and saving the captured first graphical layer or second graphical layer as an image file on the first computing device or second computing device, respectively. 19. The method of claim 18, further comprising presenting a thumbnail of the captured first graphical layer or the captured second graphical layer in a first gallery displayed by the first computing device or second gallery displayed by the second computing device, respectively. 20. A computer-readable medium having computer-readable instructions stored thereon, the computer-readable instructions when executed by a computing device performing a method of selectively sharing content between a first computing device and a second computing device, comprising: establishing a connection between the first computing device and the second computing device; launching a first browser at the first computing device, the browser including a screen share extension; receiving a selection of the content within the first browser using the screen share extension; broadcasting the content from the first computing device to the second computing device to make the content available within a second browser at the second computing device; and presenting a first independent view of the content at the first computing device, wherein the first independent view within the first browser is independently sized and positioned with respect to a second independent view in the second browser of the content presented at the second computing device.
Real time communication services are used to establish peer-to-peer connection (P2P) between computing devices to selectively share content, such as applications, data, and media. In accordance with the present disclosure, a “Source” and a “Target” are connected in a P2P session or a proxied connection, with each of the Source and Target having a browser that is aware of the other. The Source has a browser extension that allows access to local content, such as, applications, audio and video that are on the Source computing device. To share content, the Source may select a Share button to present a list of local content to share. The Source then makes a selection of the content, which in turn, makes the content available at a browser executing on a computing device(s) of other collaborators in a collaboration session.1. A method of selectively sharing content between a source computing device and a target computing device, comprising: establishing a connection between the source computing device and the target computing device; launching a first browser at the source computing device, the browser including a screen share extension; receiving a selection of the content within the first browser using the screen share extension; broadcasting the content from the source computing device to the target computing device to make the content available within a second browser at the target computing device; and presenting a first independent view of the content at the source computing device and a second independent view of the content at the target computing device, wherein the first independent view and the second independent view are independently sized and positioned within the first browser and the second browser, respectively. 2. The method of claim 1, further comprising providing a share button at the source computing device to present a list of content to share. 3. The method of claim 2, wherein the first independent view and the second independent are adapted to have an independent transparency. 4. The method of claim 1, wherein the source computing device and the target computing device are the same computing device, wherein the first browser and the second browser are the same browser, and wherein the first independent view and the second independent view are presented in the same browser. 5. The method of claim 1, wherein the target computing device additionally operates as a second source computing device and the source computing device additionally operates as a second target computing device, the method further comprising: sharing second content at the second source computing device with the second target computing device; confirming a selection of the second content at the second source computing device; and making the second content available to the second target computing device in a third independent view presented at the first browser at the second target computing device. 6. The method of claim 5, further comprising presenting the second content in a fourth independent view at the second browser at the second source computing device. 7. The method of claim 6, wherein the third independent view and the fourth independent view each have an independent size, position and transparency. 8. The method of claim 1, further comprising: capturing a first graphical layer displayed in the first independent view or a second graphical layer displayed in the second independent view using a capture tool provided at the first browser or the second browser, respectively; and saving the captured first graphical layer or second graphical layer as an image file on the source computing device or target computing device, respectively. 9. The method of claim 8, further comprising presenting a thumbnail of the captured first graphical layer or the captured second graphical layer in a first gallery in the first browser or second gallery in the second browser, respectively. 10. The method of claim 1, further comprising establishing the connection between the source computing device and the target computing device as a peer-to-peer connection. 11. The method of claim 10, further comprising managing resources of the source computing device or the target computing device over the peer-to-peer connection, wherein the resources comprise hardware components of the source computing device or the target computing device. 12. The method of claim 10, wherein the peer-to-peer connection is provided using WebRTC. 13. The method of claim 1, wherein the first independent view and/or the second independent view provide additional functionalities to a collaborative session between the source computing device and the target computing device. 14. The method of claim 13, further comprising capturing an image of the first independent view and/or the second independent to a file. 15. The method of claim 1, further comprising: broadcasting the content from the source computing device to plural target computing devices to make the content available within a respective second browser at each of the plural target computing devices; and presenting a respective second independent view of the content at each of the target computing devices, wherein the first independent view and each of the respective second independent views are independently sized and positioned within the first browser and each of the second browsers, respectively. 16. A method of selectively sharing content between a first computing device and a second computing device, comprising: establishing a peer-to-peer connection between the first computing device and the second computing device; displaying, in a user interface at the first computing device, a list of sharable content; receiving a selection of the content within the user interface to be shared by the first computing device with the second computing device; broadcasting the content from the first computing device to the second computing device; and presenting a first independent view of the content at the first computing device and a second independent view of the content at the second computing device, wherein the first independent view and the second independent view are independently sized and positioned at the first computing device and second computing device, respectively. 17. The method of claim 16, further comprising, displaying, in a second user interface at the second computing device, a second list of sharable content; receiving a selection of second content within the second user interface to be shared by the second computing device with the first computing device; broadcasting the content from the second computing device to the first computing device; and presenting a third independent view of the content at the first computing device and a fourth independent view of the content at the second computing device, wherein the first independent view and the third independent view, and the second independent view and the fourth independent view are independently sized and positioned at the first computing device and second computing device, respectively. 18. The method of claim 16, further comprising: capturing a first graphical layer displayed in the first independent view or a second graphical layer displayed in the second independent view using a capture tool provided at the first computing device or the second computing device, respectively; and saving the captured first graphical layer or second graphical layer as an image file on the first computing device or second computing device, respectively. 19. The method of claim 18, further comprising presenting a thumbnail of the captured first graphical layer or the captured second graphical layer in a first gallery displayed by the first computing device or second gallery displayed by the second computing device, respectively. 20. A computer-readable medium having computer-readable instructions stored thereon, the computer-readable instructions when executed by a computing device performing a method of selectively sharing content between a first computing device and a second computing device, comprising: establishing a connection between the first computing device and the second computing device; launching a first browser at the first computing device, the browser including a screen share extension; receiving a selection of the content within the first browser using the screen share extension; broadcasting the content from the first computing device to the second computing device to make the content available within a second browser at the second computing device; and presenting a first independent view of the content at the first computing device, wherein the first independent view within the first browser is independently sized and positioned with respect to a second independent view in the second browser of the content presented at the second computing device.
2,400
8,773
8,773
15,400,344
2,459
NFC communications from a mobile phone to an information handling system initiates an inventory by a management controller of the information handling system. The inventory is provided to the mobile telephone with a second NFC communication so that an end user can see a visual depiction of the interior of the information handling system before opening the chassis of the system.
1-9. (canceled) 10. A method for inventory of information handling system hardware components, the method comprising: sending a request from a portable information handling system NFC device to a legacy information handling system for a hardware inventory of the legacy information handling system through a first NFC communication; receiving the request at a NFC device of the legacy information handling system; in response to receiving the request, communicating the hardware inventory from the legacy information handling system to the portable information handling system with a second NFC communication. 11. The method of claim 10 wherein the portable information handling system comprises a mobile telephone. 12. The method of claim 10 wherein in response to receiving the request further comprises: in response to receiving the request, initiating queries from a management processor to hardware included in the information handling system at the time of receipt of the request; and sending as the hardware inventory information provided by responses to the management processor queries. 13. The method of claim 12 wherein the hardware inventory includes firmware versions associated with one or more of the hardware. 14. The method of claim 12 wherein the hardware includes at least network communication resources and the hardware inventory includes network addresses of the hardware inventory. 15. The method of claim 12 wherein the hardware includes at least processing components that run a virtualization manager for managing virtual machines running at the information handling system, and the hardware inventory includes settings used by the virtualization manager. 16. The method of claim 10 further comprising: removing the legacy information handling system from a rack supporting operation of the legacy information handling system; installing a replacement information handling system in the rack to replace the legacy information handling system; communicating the hardware inventory from the portable information handling system to the replacement information handling system with a second NFC communication from the NFC device of the portable information handling system to a NFC device of the replacement information handling system; and applying the hardware inventory to configure the replacement information handling system to operate in the rack. 17. A system for inventorying components of an information handling system, the system comprising: a portable information handling system having an inventory tool operable to request an inventory from a legacy information handling system with a first NFC communication to the legacy information handling system; and an inventory module running on a management controller of the legacy information handling system and operable to receive the request from an NFC device of the legacy information handling system, the inventory module initiating queries to the components in response to the request to generate the inventory and sending the inventory to the portable information handling system with a second NFC communication. 18. The system of claim 17 wherein: the inventory module is further operable to report the request to a network administrative tool through a local area network; and the inventory tool is further operable to retrieve configuration information associated with the legacy information handling system through the local area network. 19. The system of claim 17 wherein: the inventory module is further operable to report the request to a network device interfaced with the legacy information handling system; and the network device is further operable to respond to the report with a communication through a local area network to the portable information handling system. 20. The system of claim 17 wherein the inventory tool is further operable to store the inventory and to communicate the inventory to a replacement information handling system of the legacy information handling system.
NFC communications from a mobile phone to an information handling system initiates an inventory by a management controller of the information handling system. The inventory is provided to the mobile telephone with a second NFC communication so that an end user can see a visual depiction of the interior of the information handling system before opening the chassis of the system.1-9. (canceled) 10. A method for inventory of information handling system hardware components, the method comprising: sending a request from a portable information handling system NFC device to a legacy information handling system for a hardware inventory of the legacy information handling system through a first NFC communication; receiving the request at a NFC device of the legacy information handling system; in response to receiving the request, communicating the hardware inventory from the legacy information handling system to the portable information handling system with a second NFC communication. 11. The method of claim 10 wherein the portable information handling system comprises a mobile telephone. 12. The method of claim 10 wherein in response to receiving the request further comprises: in response to receiving the request, initiating queries from a management processor to hardware included in the information handling system at the time of receipt of the request; and sending as the hardware inventory information provided by responses to the management processor queries. 13. The method of claim 12 wherein the hardware inventory includes firmware versions associated with one or more of the hardware. 14. The method of claim 12 wherein the hardware includes at least network communication resources and the hardware inventory includes network addresses of the hardware inventory. 15. The method of claim 12 wherein the hardware includes at least processing components that run a virtualization manager for managing virtual machines running at the information handling system, and the hardware inventory includes settings used by the virtualization manager. 16. The method of claim 10 further comprising: removing the legacy information handling system from a rack supporting operation of the legacy information handling system; installing a replacement information handling system in the rack to replace the legacy information handling system; communicating the hardware inventory from the portable information handling system to the replacement information handling system with a second NFC communication from the NFC device of the portable information handling system to a NFC device of the replacement information handling system; and applying the hardware inventory to configure the replacement information handling system to operate in the rack. 17. A system for inventorying components of an information handling system, the system comprising: a portable information handling system having an inventory tool operable to request an inventory from a legacy information handling system with a first NFC communication to the legacy information handling system; and an inventory module running on a management controller of the legacy information handling system and operable to receive the request from an NFC device of the legacy information handling system, the inventory module initiating queries to the components in response to the request to generate the inventory and sending the inventory to the portable information handling system with a second NFC communication. 18. The system of claim 17 wherein: the inventory module is further operable to report the request to a network administrative tool through a local area network; and the inventory tool is further operable to retrieve configuration information associated with the legacy information handling system through the local area network. 19. The system of claim 17 wherein: the inventory module is further operable to report the request to a network device interfaced with the legacy information handling system; and the network device is further operable to respond to the report with a communication through a local area network to the portable information handling system. 20. The system of claim 17 wherein the inventory tool is further operable to store the inventory and to communicate the inventory to a replacement information handling system of the legacy information handling system.
2,400
8,774
8,774
15,329,307
2,482
An information providing device 1 of a motorcycle includes: an image acquisition section 10 that acquires an image of a road; a lane detection section 12 that detects a lane from the image and detects a radius of curvature of the detected lane and a lateral distance from the host vehicle to the lane; a host vehicle trajectory curvature calculation section 14 that calculates a radius of curvature of a host vehicle trajectory on the basis of the radius of curvature of the lane and the lateral distance; a vehicle speed acquisition section 16 that acquires a vehicle speed of the host vehicle; an inclination angle calculation section 18 that calculates an inclination angle of the host vehicle on the basis of the radius of curvature of the host vehicle trajectory and the vehicle speed.
1. An information providing device for a motorcycle, the information providing device comprising: an image acquisition section that acquires an image of a road on which a host vehicle travels; a lane detection section that detects at least one of a left lane and a right lane from the image of the road acquired by the image acquisition section, and detects: a radius of curvature of the at least one detected lane or a first value related thereto; and a lateral distance from the host vehicle to the at least one lane or a second value related thereto; a host vehicle trajectory curvature calculation section that calculates a radius of curvature of a host vehicle trajectory or a value related thereto on the basis of the first value and the second value of the at least one lane; a vehicle speed acquisition section that acquires a vehicle speed of the host vehicle; a host vehicle physical quantity calculation section that calculates a physical quantity related to a turn of the host vehicle on the basis of either one of the radius of curvature of the host vehicle trajectory and the value related thereto and the vehicle speed; a warning determination section that determines whether a warning should be issued on the basis of the physical quantity that is related to the turn of the host vehicle; and a warning signal generation section that generates a warning signal when the warning determination section determines that the warning should be issued. 2. The information providing device according to claim 1, wherein the host vehicle trajectory curvature calculation section calculates the radius of curvature of the host vehicle trajectory or the value related thereto on the basis of the first value and the second value of each of the left lane and the right lane when both of the left lane and the right lane are detected, and the host vehicle trajectory curvature calculation section calculates the radius of curvature of the host vehicle trajectory or the value related thereto on the basis of the first value and the second value of either one of the lanes when either one of the left lane and the right lane is detected. 3. The information providing device according to claim 1, wherein the physical quantity that is related to the turn is derived from a balancing condition between a centrifugal force and weight of the host vehicle during the turn. 4. The information providing device according to claim 3, wherein the physical quantity that is related to the turn is an inclination angle of the host vehicle, and the warning determination section determines that the warning should be issued when the inclination angle of the host vehicle exceeds a threshold of the inclination angle that is set at every vehicle speed. 5. The information providing device according to claim 3, wherein the physical quantity that is related to the turn is a safe speed that represents a standard with which the host vehicle can travel safely along the host vehicle trajectory with the radius of curvature of the host vehicle trajectory, and the warning determination section determines that the warning should be issued when the vehicle speed of the host vehicle exceeds the safe speed. 6. A non-transitory computer readable medium comprising instructions that when executed by a computer, cause the computer to execute the following: an image acquisition step of acquiring an image of a road on which a host vehicle travels; a lane detection step of detecting at least one of a left lane and a right lane from the image of the road acquired in the image acquisition step and detecting: a radius of curvature of the at least one detected lane or a first value related thereto; and a lateral distance from the host vehicle to the at least one lane or a second value related thereto; a host vehicle trajectory curvature calculation step of calculating a radius of curvature of a host vehicle trajectory or a value related thereto on the basis of the first value and the second value of the at least one lane; a vehicle speed acquisition step of acquiring a vehicle speed of the host vehicle; a host vehicle physical quantity calculation step of calculating a physical quantity that is related to a turn of the host vehicle on the basis of either one of the radius of curvature of the host vehicle trajectory and the value related thereto and the vehicle speed; a warning determination step of determining whether a warning should be issued on the basis of the physical quantity that is related to the turn of the host vehicle; and a warning signal generation step of generating a warning signal when it is determined in the warning determination step that the warning should be issued. 7. The non-transitory computer readable medium according to claim 6, wherein in the host vehicle trajectory curvature calculation step, the radius of curvature of the host vehicle trajectory or the value related thereto is calculated on the basis of the first value and the second value of each of the left lane and the right lane when both of the left lane and the right lane are detected, and in the host vehicle trajectory curvature calculation step, the radius of curvature of the host vehicle trajectory or the value related thereto is calculated on the basis of the first value and the second value of either one of the lanes when either one of the left lane and the right lane is detected. 8. The non-transitory computer readable medium according to claim 6, wherein the physical quantity that is related to the turn is derived from a balancing condition between a centrifugal force and weight of the host vehicle during the turn. 9. The non-transitory computer readable medium according to claim 8, wherein the physical quantity that is related to the turn is an inclination angle of the host vehicle, and the warning determination section determines that the warning should be issued when the inclination angle of the host vehicle exceeds a threshold of the inclination angle that is set at every vehicle speed. 10. The non-transitory computer readable medium according to claim 8, wherein the physical quantity that is related to the turn is a safe speed that represents a standard with which the host vehicle can travel safely along the host vehicle trajectory with the radius of curvature of the host vehicle trajectory, and the warning determination section determines that the warning should be issued when the vehicle speed of the host vehicle exceeds the safe speed.
An information providing device 1 of a motorcycle includes: an image acquisition section 10 that acquires an image of a road; a lane detection section 12 that detects a lane from the image and detects a radius of curvature of the detected lane and a lateral distance from the host vehicle to the lane; a host vehicle trajectory curvature calculation section 14 that calculates a radius of curvature of a host vehicle trajectory on the basis of the radius of curvature of the lane and the lateral distance; a vehicle speed acquisition section 16 that acquires a vehicle speed of the host vehicle; an inclination angle calculation section 18 that calculates an inclination angle of the host vehicle on the basis of the radius of curvature of the host vehicle trajectory and the vehicle speed.1. An information providing device for a motorcycle, the information providing device comprising: an image acquisition section that acquires an image of a road on which a host vehicle travels; a lane detection section that detects at least one of a left lane and a right lane from the image of the road acquired by the image acquisition section, and detects: a radius of curvature of the at least one detected lane or a first value related thereto; and a lateral distance from the host vehicle to the at least one lane or a second value related thereto; a host vehicle trajectory curvature calculation section that calculates a radius of curvature of a host vehicle trajectory or a value related thereto on the basis of the first value and the second value of the at least one lane; a vehicle speed acquisition section that acquires a vehicle speed of the host vehicle; a host vehicle physical quantity calculation section that calculates a physical quantity related to a turn of the host vehicle on the basis of either one of the radius of curvature of the host vehicle trajectory and the value related thereto and the vehicle speed; a warning determination section that determines whether a warning should be issued on the basis of the physical quantity that is related to the turn of the host vehicle; and a warning signal generation section that generates a warning signal when the warning determination section determines that the warning should be issued. 2. The information providing device according to claim 1, wherein the host vehicle trajectory curvature calculation section calculates the radius of curvature of the host vehicle trajectory or the value related thereto on the basis of the first value and the second value of each of the left lane and the right lane when both of the left lane and the right lane are detected, and the host vehicle trajectory curvature calculation section calculates the radius of curvature of the host vehicle trajectory or the value related thereto on the basis of the first value and the second value of either one of the lanes when either one of the left lane and the right lane is detected. 3. The information providing device according to claim 1, wherein the physical quantity that is related to the turn is derived from a balancing condition between a centrifugal force and weight of the host vehicle during the turn. 4. The information providing device according to claim 3, wherein the physical quantity that is related to the turn is an inclination angle of the host vehicle, and the warning determination section determines that the warning should be issued when the inclination angle of the host vehicle exceeds a threshold of the inclination angle that is set at every vehicle speed. 5. The information providing device according to claim 3, wherein the physical quantity that is related to the turn is a safe speed that represents a standard with which the host vehicle can travel safely along the host vehicle trajectory with the radius of curvature of the host vehicle trajectory, and the warning determination section determines that the warning should be issued when the vehicle speed of the host vehicle exceeds the safe speed. 6. A non-transitory computer readable medium comprising instructions that when executed by a computer, cause the computer to execute the following: an image acquisition step of acquiring an image of a road on which a host vehicle travels; a lane detection step of detecting at least one of a left lane and a right lane from the image of the road acquired in the image acquisition step and detecting: a radius of curvature of the at least one detected lane or a first value related thereto; and a lateral distance from the host vehicle to the at least one lane or a second value related thereto; a host vehicle trajectory curvature calculation step of calculating a radius of curvature of a host vehicle trajectory or a value related thereto on the basis of the first value and the second value of the at least one lane; a vehicle speed acquisition step of acquiring a vehicle speed of the host vehicle; a host vehicle physical quantity calculation step of calculating a physical quantity that is related to a turn of the host vehicle on the basis of either one of the radius of curvature of the host vehicle trajectory and the value related thereto and the vehicle speed; a warning determination step of determining whether a warning should be issued on the basis of the physical quantity that is related to the turn of the host vehicle; and a warning signal generation step of generating a warning signal when it is determined in the warning determination step that the warning should be issued. 7. The non-transitory computer readable medium according to claim 6, wherein in the host vehicle trajectory curvature calculation step, the radius of curvature of the host vehicle trajectory or the value related thereto is calculated on the basis of the first value and the second value of each of the left lane and the right lane when both of the left lane and the right lane are detected, and in the host vehicle trajectory curvature calculation step, the radius of curvature of the host vehicle trajectory or the value related thereto is calculated on the basis of the first value and the second value of either one of the lanes when either one of the left lane and the right lane is detected. 8. The non-transitory computer readable medium according to claim 6, wherein the physical quantity that is related to the turn is derived from a balancing condition between a centrifugal force and weight of the host vehicle during the turn. 9. The non-transitory computer readable medium according to claim 8, wherein the physical quantity that is related to the turn is an inclination angle of the host vehicle, and the warning determination section determines that the warning should be issued when the inclination angle of the host vehicle exceeds a threshold of the inclination angle that is set at every vehicle speed. 10. The non-transitory computer readable medium according to claim 8, wherein the physical quantity that is related to the turn is a safe speed that represents a standard with which the host vehicle can travel safely along the host vehicle trajectory with the radius of curvature of the host vehicle trajectory, and the warning determination section determines that the warning should be issued when the vehicle speed of the host vehicle exceeds the safe speed.
2,400
8,775
8,775
14,044,477
2,447
System and method to send security status notifications within a SIP conference. A SIP conference server receives a from a SIP conference client a request for a SIP NOTIFY message, creates a SIP NOTIFY message including information about security status of a conference resource, and sends the SIP NOTIFY message to all SIP conference subscribers. Subscribers parse the NOTIFY message to find and save security status about individual links or the entire conference. The NOTIFY message may be sent in response to a SUBSCRIBE message or other client request. The security status may include a binary indicator and/or a security protocol.
1. A method to send security status notifications of a conference in a session initiation protocol (SIP) framework, comprising the steps of: receiving a request for a SIP NOTIFY message; creating a SIP NOTIFY message comprising information about security status of a conference resource; and sending the SIP NOTIFY message to all conference subscribers. 2. The method of claim 1, wherein the conference resource comprises a link between a conference server and a conference subscriber. 3. The method of claim 1, wherein the conference resource comprises an entire conference resource. 4. The method of claim 1, wherein the request for a SIP NOTIFY message is caused by a change in membership of the conference. 5. The method of claim 1, wherein the request for a SIP NOTIFY message comprises a request from a conference subscriber. 6. The method of claim 1, wherein the step of sending the SIP NOTIFY message comprises the step of sending a second SIP NOTIFY message based on a changed status of access rights for the conference resource, the second SIP NOTIFY message comprising changed access right information for the conference resource. 7. The method of claim 1, wherein the information about security status of a conference resource comprises a binary security indicator. 8. The method of claim 1, wherein the information about security status of a conference resource comprises an indicator of a security protocol used by the conference resource. 9. The method of claim 1, wherein the information about security status of a conference resource comprises information having an attribute-based format. 10. A method to receive security status notifications of a conference in a session initiation protocol (SIP) framework, comprising the steps of: sending a request for a SIP NOTIFY message; and receiving a SIP NOTIFY message comprising information about security status of a conference resource, wherein the SIP NOTIFY message is sent to all conference subscribers. 11. The method of claim 10, wherein the conference resource comprises a link between a conference server and a conference subscriber. 12. The method of claim 10, wherein the conference resource comprises an entire conference resource. 13. The method of claim 10, further comprising the steps of: parsing the SIP NOTIFY message to extract an attribute related to the conference resource and a value of the attribute; and updating in memory a status related to the conference resource based upon the value of the attribute. 14. The method of claim 10, wherein the information about security status of a conference resource comprises a binary security indicator. 15. The method of claim 10, wherein the information about security status of a conference resource comprises an indicator of a security protocol used by the conference resource. 16. A system to send security status notifications of a conference in a session initiation protocol (SIP) framework, comprising: a receiver configured to receive a request for a SIP NOTIFY message; a processor configured to create a SIP NOTIFY message comprising information about security status of a conference resource; and a transmitted configured to send the SIP NOTIFY message to all conference subscribers. 17. The system of claim 16, wherein the conference resource comprises a link between a conference server and a conference subscriber. 18. The system of claim 16, wherein the conference resource comprises an entire conference resource. 19. The system of claim 16, wherein the request for a SIP NOTIFY message is caused by a change in membership of the conference. 20. The system of claim 16, wherein the information about security status of a conference resource comprises an indicator of a security protocol used by the conference resource.
System and method to send security status notifications within a SIP conference. A SIP conference server receives a from a SIP conference client a request for a SIP NOTIFY message, creates a SIP NOTIFY message including information about security status of a conference resource, and sends the SIP NOTIFY message to all SIP conference subscribers. Subscribers parse the NOTIFY message to find and save security status about individual links or the entire conference. The NOTIFY message may be sent in response to a SUBSCRIBE message or other client request. The security status may include a binary indicator and/or a security protocol.1. A method to send security status notifications of a conference in a session initiation protocol (SIP) framework, comprising the steps of: receiving a request for a SIP NOTIFY message; creating a SIP NOTIFY message comprising information about security status of a conference resource; and sending the SIP NOTIFY message to all conference subscribers. 2. The method of claim 1, wherein the conference resource comprises a link between a conference server and a conference subscriber. 3. The method of claim 1, wherein the conference resource comprises an entire conference resource. 4. The method of claim 1, wherein the request for a SIP NOTIFY message is caused by a change in membership of the conference. 5. The method of claim 1, wherein the request for a SIP NOTIFY message comprises a request from a conference subscriber. 6. The method of claim 1, wherein the step of sending the SIP NOTIFY message comprises the step of sending a second SIP NOTIFY message based on a changed status of access rights for the conference resource, the second SIP NOTIFY message comprising changed access right information for the conference resource. 7. The method of claim 1, wherein the information about security status of a conference resource comprises a binary security indicator. 8. The method of claim 1, wherein the information about security status of a conference resource comprises an indicator of a security protocol used by the conference resource. 9. The method of claim 1, wherein the information about security status of a conference resource comprises information having an attribute-based format. 10. A method to receive security status notifications of a conference in a session initiation protocol (SIP) framework, comprising the steps of: sending a request for a SIP NOTIFY message; and receiving a SIP NOTIFY message comprising information about security status of a conference resource, wherein the SIP NOTIFY message is sent to all conference subscribers. 11. The method of claim 10, wherein the conference resource comprises a link between a conference server and a conference subscriber. 12. The method of claim 10, wherein the conference resource comprises an entire conference resource. 13. The method of claim 10, further comprising the steps of: parsing the SIP NOTIFY message to extract an attribute related to the conference resource and a value of the attribute; and updating in memory a status related to the conference resource based upon the value of the attribute. 14. The method of claim 10, wherein the information about security status of a conference resource comprises a binary security indicator. 15. The method of claim 10, wherein the information about security status of a conference resource comprises an indicator of a security protocol used by the conference resource. 16. A system to send security status notifications of a conference in a session initiation protocol (SIP) framework, comprising: a receiver configured to receive a request for a SIP NOTIFY message; a processor configured to create a SIP NOTIFY message comprising information about security status of a conference resource; and a transmitted configured to send the SIP NOTIFY message to all conference subscribers. 17. The system of claim 16, wherein the conference resource comprises a link between a conference server and a conference subscriber. 18. The system of claim 16, wherein the conference resource comprises an entire conference resource. 19. The system of claim 16, wherein the request for a SIP NOTIFY message is caused by a change in membership of the conference. 20. The system of claim 16, wherein the information about security status of a conference resource comprises an indicator of a security protocol used by the conference resource.
2,400
8,776
8,776
15,766,134
2,463
According to certain embodiments, a method by a source network node is provided for providing mobility support for enhanced coverage of wireless devices-in handover to a target network node. The method includes obtaining, from the target network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node. The indication of the at least one resource is transmitted to the wireless device for use in handover from the source network node to the target network node.
1. A method by a source network node for providing mobility support for enhanced coverage of a wireless device in handover to a target network node, the method comprising: obtaining, from the target network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmitting, to the wireless device, the indication of the at least one resource to be used by the wireless device in handover from the source network node to the target network node. 2. The method of claim 1, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used for a transmission of a random access message by the wireless device; and information enabling the wireless device to select a preamble to be used for the transmission of the random access request by the wireless device. 3. The method of claim 1, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 4. The method of claim 1, further comprising receiving, from the wireless device, an indication of a coverage enhancement level associated with the wireless device, and wherein transmitting the at least one resource comprises transmitting resource information for the coverage enhancement level associated with the wireless device. 5. The method of claim 4, wherein transmitting the at least one resource further comprises transmitting resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device. 6. The method of claim 4, wherein obtaining the at least one resource comprises: partitioning a plurality of preambles into a plurality of groups, each of the plurality of groups being associated with a particular one of a plurality of coverage enhancement levels, and selecting, as the at least one resource, a preamble from a particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device, and wherein transmitting the at least one resource comprises transmitting information enabling the wireless device to select a preamble from the particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device. 7. The method of claim 4, comprising: partitioning a plurality of preambles into a plurality of groups, wherein one preamble is associated with each of the plurality of groups, and wherein transmitting the at least one resource comprises transmitting a number of repetitions to be used in transmitting a preamble from a particular group being associated with the coverage enhancement level associated with the wireless device. 8. The method of claim 1, further comprising: determining, based on historical information related to handovers performed from the source network node to the target network node, an estimated coverage enhancement level for the wireless device; and obtaining the at least one resource based on the estimated coverage enhancement level for the wireless device. 9. A source network node for providing mobility support for enhanced coverage of a wireless device in handover to a target network node, the source network node comprising: a memory storing instructions; and a processor operable to execute the instructions to cause the processor to: obtain, from the target network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmit, to the wireless device, the indication of the at least one resource to be used by the wireless device in handover from the source network node to the target network node. 10. The source network node of claim 9, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used for a transmission of a random access message by the wireless device; and information enabling the wireless device to select a preamble to be used for the transmission of the random access request by the wireless device. 11. The source network node of claim 9, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 12. The source network node of claim 9, wherein the processor is further operable to execute the instructions to cause the processor to receive, from the wireless device, an indication of a coverage enhancement level associated with the wireless device, and wherein when transmitting the at least one resource, the processor transmits resource information for the coverage enhancement level associated with the wireless device. 13. The source network node of claim 12, wherein when transmitting the at least one resource, the processor transmits resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device. 14. The source network node of claim 12, wherein: when obtaining the at least one resource, the processor is operable to: partition a plurality of preambles into a plurality of groups, each of the plurality of groups being associated with a particular one of a plurality of coverage enhancement levels, and select, as the at least one resource, a preamble from a particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device, and when transmitting the at least one resource, the processor is operable to transmit information enabling the wireless device to select a preamble from the particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device. 15. The source network node of claim 12, wherein: when obtaining the at least one resource, the processor is operable to partition a plurality of preambles into a plurality of groups, wherein one preamble is associated with each of the plurality of groups, and when transmitting the at least one resource, the processor is operable to transmit a number of repetitions to be used in transmitting a preamble from a particular group being associated with the coverage enhancement level associated with the wireless device. 16. The source network node of claim 9, wherein the processor is further operable to execute the instructions to cause the processor to: determine, based on historical information related to handovers performed from the source network node to the target network node, an estimated coverage enhancement level for the wireless device; and obtain the at least one resource based on the estimated coverage enhancement level for the wireless device. 17. A method by a wireless device receiving mobility support for enhanced coverage during handover from a source network node to a target network node, the method comprising: receiving, from the source network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmitting, to the target network node, a random access message using the at least one resource. 18. The method of claim 17, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used to transmit the random access message by the wireless device; and information enabling the wireless device to select a preamble to be used to transmit the random access message by the wireless device. 19. The method of claim 17, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 20. The method of claim 17, further comprising transmitting, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein receiving the indication of the at least one resource comprises receiving resource information for the coverage enhancement level associated with the wireless device. 21. The method of claim 17, further comprising transmitting, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein receiving the indication of the at least one resource comprises receiving resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device. 22. A wireless device for receiving mobility support for enhanced coverage during handover from a source network node to a target network node, the wireless device comprising: a memory storing instructions; and a processor operable to execute the instructions to cause the processor to: receive, from the source network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmit, to the target network node, a random access message using the at least one resource. 23. The wireless device of claim 22, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used to transmit the random access message by the wireless device; and information enabling the wireless device to select a preamble to be used to transmit the random access message by the wireless device. 24. The wireless device of claim 22, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 25. The wireless device of claim 22, wherein the processor is further operable to execute the instructions to cause the processor to transmit, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein when receiving the indication of the at least one resource, the processor receives resource information for the coverage enhancement level associated with the wireless device. 26. The wireless device 10 of claim 22, wherein the processor is further operable to execute the instructions to cause the processor to transmit, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein when receiving the indication of the at least one resource, the processor receives resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device.
According to certain embodiments, a method by a source network node is provided for providing mobility support for enhanced coverage of wireless devices-in handover to a target network node. The method includes obtaining, from the target network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node. The indication of the at least one resource is transmitted to the wireless device for use in handover from the source network node to the target network node.1. A method by a source network node for providing mobility support for enhanced coverage of a wireless device in handover to a target network node, the method comprising: obtaining, from the target network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmitting, to the wireless device, the indication of the at least one resource to be used by the wireless device in handover from the source network node to the target network node. 2. The method of claim 1, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used for a transmission of a random access message by the wireless device; and information enabling the wireless device to select a preamble to be used for the transmission of the random access request by the wireless device. 3. The method of claim 1, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 4. The method of claim 1, further comprising receiving, from the wireless device, an indication of a coverage enhancement level associated with the wireless device, and wherein transmitting the at least one resource comprises transmitting resource information for the coverage enhancement level associated with the wireless device. 5. The method of claim 4, wherein transmitting the at least one resource further comprises transmitting resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device. 6. The method of claim 4, wherein obtaining the at least one resource comprises: partitioning a plurality of preambles into a plurality of groups, each of the plurality of groups being associated with a particular one of a plurality of coverage enhancement levels, and selecting, as the at least one resource, a preamble from a particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device, and wherein transmitting the at least one resource comprises transmitting information enabling the wireless device to select a preamble from the particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device. 7. The method of claim 4, comprising: partitioning a plurality of preambles into a plurality of groups, wherein one preamble is associated with each of the plurality of groups, and wherein transmitting the at least one resource comprises transmitting a number of repetitions to be used in transmitting a preamble from a particular group being associated with the coverage enhancement level associated with the wireless device. 8. The method of claim 1, further comprising: determining, based on historical information related to handovers performed from the source network node to the target network node, an estimated coverage enhancement level for the wireless device; and obtaining the at least one resource based on the estimated coverage enhancement level for the wireless device. 9. A source network node for providing mobility support for enhanced coverage of a wireless device in handover to a target network node, the source network node comprising: a memory storing instructions; and a processor operable to execute the instructions to cause the processor to: obtain, from the target network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmit, to the wireless device, the indication of the at least one resource to be used by the wireless device in handover from the source network node to the target network node. 10. The source network node of claim 9, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used for a transmission of a random access message by the wireless device; and information enabling the wireless device to select a preamble to be used for the transmission of the random access request by the wireless device. 11. The source network node of claim 9, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 12. The source network node of claim 9, wherein the processor is further operable to execute the instructions to cause the processor to receive, from the wireless device, an indication of a coverage enhancement level associated with the wireless device, and wherein when transmitting the at least one resource, the processor transmits resource information for the coverage enhancement level associated with the wireless device. 13. The source network node of claim 12, wherein when transmitting the at least one resource, the processor transmits resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device. 14. The source network node of claim 12, wherein: when obtaining the at least one resource, the processor is operable to: partition a plurality of preambles into a plurality of groups, each of the plurality of groups being associated with a particular one of a plurality of coverage enhancement levels, and select, as the at least one resource, a preamble from a particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device, and when transmitting the at least one resource, the processor is operable to transmit information enabling the wireless device to select a preamble from the particular one of the plurality of groups being associated with the coverage enhancement level associated with the wireless device. 15. The source network node of claim 12, wherein: when obtaining the at least one resource, the processor is operable to partition a plurality of preambles into a plurality of groups, wherein one preamble is associated with each of the plurality of groups, and when transmitting the at least one resource, the processor is operable to transmit a number of repetitions to be used in transmitting a preamble from a particular group being associated with the coverage enhancement level associated with the wireless device. 16. The source network node of claim 9, wherein the processor is further operable to execute the instructions to cause the processor to: determine, based on historical information related to handovers performed from the source network node to the target network node, an estimated coverage enhancement level for the wireless device; and obtain the at least one resource based on the estimated coverage enhancement level for the wireless device. 17. A method by a wireless device receiving mobility support for enhanced coverage during handover from a source network node to a target network node, the method comprising: receiving, from the source network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmitting, to the target network node, a random access message using the at least one resource. 18. The method of claim 17, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used to transmit the random access message by the wireless device; and information enabling the wireless device to select a preamble to be used to transmit the random access message by the wireless device. 19. The method of claim 17, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 20. The method of claim 17, further comprising transmitting, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein receiving the indication of the at least one resource comprises receiving resource information for the coverage enhancement level associated with the wireless device. 21. The method of claim 17, further comprising transmitting, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein receiving the indication of the at least one resource comprises receiving resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device. 22. A wireless device for receiving mobility support for enhanced coverage during handover from a source network node to a target network node, the wireless device comprising: a memory storing instructions; and a processor operable to execute the instructions to cause the processor to: receive, from the source network node, an indication of at least one resource to be used by the wireless device in handover from the source network node to the target network node; and transmit, to the target network node, a random access message using the at least one resource. 23. The wireless device of claim 22, wherein the at least one resource comprises resource information selected from the group consisting of: a number of repetitions to be used to transmit the random access message by the wireless device; and information enabling the wireless device to select a preamble to be used to transmit the random access message by the wireless device. 24. The wireless device of claim 22, wherein the at least one resource comprises resource information for each of a plurality of coverage enhancement levels. 25. The wireless device of claim 22, wherein the processor is further operable to execute the instructions to cause the processor to transmit, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein when receiving the indication of the at least one resource, the processor receives resource information for the coverage enhancement level associated with the wireless device. 26. The wireless device 10 of claim 22, wherein the processor is further operable to execute the instructions to cause the processor to transmit, to the source network node, an indication of a coverage enhancement level associated with the wireless device, and wherein when receiving the indication of the at least one resource, the processor receives resource information for each of a plurality of coverage enhancement levels that are equal to or worse than the coverage enhancement level associated with the wireless device.
2,400
8,777
8,777
16,322,707
2,416
Disclosed herein is a method, a wireless device and a session management node for IP version selection for a PDU session requested to be established by a WCD, that supports PDU sessions of both IPv4 and IPv6 and that is configured to operatively communicate via a RAN with a SM node in a core network lot, the method being performed by the WCD comprises: sending S110 a first PDU session request message towards the SM node requesting establishment of a first PDU session, which request message comprises IP-version information indicating that the IP version of the to requested first PDU session should be any one of IPv4 or IPv6; and receiving S 130, S 140 , in response to sending the first PDU session request message, a first response message, which first response message comprises WCD information indicating the IP-version (i.e. IPv4 or IPv6) that has been selected for the requested first PDU session.
1-8. (canceled) 9. A method for Internet Protocol (IP) version selection for a Protocol Data Unit (PDU) session requested to be established by a wireless communication device (WCD) that supports PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), and that is configured to operatively communicate via a radio access network (RAN) with a session management (SM) node in a core network, the method being performed by the WCD and comprising: sending a first PDU session request message towards the SM node requesting establishment of a first PDU session, which request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; receiving, in response to sending the first PDU session request message, a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session; and sending a second PDU session request message towards the SM node requesting establishment of a second PDU session, which request message comprises IP version information indicating that the IP version of the requested second PDU session should be any one of IPv4 or IPv6 that was not previously selected. 10. The method of claim 9, wherein the first request message is a PDU session establishment request message. 11. The method of claim 9, wherein the first response message is a NAS message comprising the WCD information. 12. A wireless communication device (WCD) configured to operatively support PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), and to operatively communicate via a radio access network (RAN) with a session management (SM) node in a core network, the WCD comprising: processing circuitry, the processing circuitry being configured to cause the WCD to: send a first PDU session request message towards the SM node requesting establishment of a first PDU session, which request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; receive, in response to sending the first PDU session request message, a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session; and send a second PDU session request message towards the SM node requesting establishment of a second PDU session, which request message comprises IP version information indicating that the IP version of the requested second PDU session should be any one of IPv4 or IPv6 that was not previously selected. 13. A method for Internet Protocol (IP) version selection for a Protocol Data Unit (PDU) session requested to be established by a wireless communication device (WCD) that supports PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), and that is configured to operatively communicate via a radio access network (RAN) with a session management (SM) node in a core network, the method being performed by the SM node and comprising: receiving a SM request message requesting establishment of a first PDU session, which SM request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; selecting, in response to receiving the SM request message, an IP version for the requested first PDU session; and sending a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session, wherein it is further indicated in the WCD information that the other IP type not being selected (IPv4 if IPv6 was selected and IPv6 if IPv4 was selected) is also supported. 14. A session management (SM) node in a core network being configured to operatively select an Internet Protocol (IP) version for a Protocol Data Unit (PDU) session requested to be established by a wireless communication device (WCD) that supports PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the SM node comprising processing circuitry, the processing circuitry being configured to cause the WCD to operatively: receive a SM request message requesting establishment of a first PDU session, which SM request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; select, in response to receiving the SM request message, an IP version for the requested first PDU session; and send a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session, wherein it is further indicated in the WCD information that the other IP type not being selected (IPv4 if IPv6 was selected and IPv6 if IPv4 was selected) is also supported.
Disclosed herein is a method, a wireless device and a session management node for IP version selection for a PDU session requested to be established by a WCD, that supports PDU sessions of both IPv4 and IPv6 and that is configured to operatively communicate via a RAN with a SM node in a core network lot, the method being performed by the WCD comprises: sending S110 a first PDU session request message towards the SM node requesting establishment of a first PDU session, which request message comprises IP-version information indicating that the IP version of the to requested first PDU session should be any one of IPv4 or IPv6; and receiving S 130, S 140 , in response to sending the first PDU session request message, a first response message, which first response message comprises WCD information indicating the IP-version (i.e. IPv4 or IPv6) that has been selected for the requested first PDU session.1-8. (canceled) 9. A method for Internet Protocol (IP) version selection for a Protocol Data Unit (PDU) session requested to be established by a wireless communication device (WCD) that supports PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), and that is configured to operatively communicate via a radio access network (RAN) with a session management (SM) node in a core network, the method being performed by the WCD and comprising: sending a first PDU session request message towards the SM node requesting establishment of a first PDU session, which request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; receiving, in response to sending the first PDU session request message, a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session; and sending a second PDU session request message towards the SM node requesting establishment of a second PDU session, which request message comprises IP version information indicating that the IP version of the requested second PDU session should be any one of IPv4 or IPv6 that was not previously selected. 10. The method of claim 9, wherein the first request message is a PDU session establishment request message. 11. The method of claim 9, wherein the first response message is a NAS message comprising the WCD information. 12. A wireless communication device (WCD) configured to operatively support PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), and to operatively communicate via a radio access network (RAN) with a session management (SM) node in a core network, the WCD comprising: processing circuitry, the processing circuitry being configured to cause the WCD to: send a first PDU session request message towards the SM node requesting establishment of a first PDU session, which request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; receive, in response to sending the first PDU session request message, a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session; and send a second PDU session request message towards the SM node requesting establishment of a second PDU session, which request message comprises IP version information indicating that the IP version of the requested second PDU session should be any one of IPv4 or IPv6 that was not previously selected. 13. A method for Internet Protocol (IP) version selection for a Protocol Data Unit (PDU) session requested to be established by a wireless communication device (WCD) that supports PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), and that is configured to operatively communicate via a radio access network (RAN) with a session management (SM) node in a core network, the method being performed by the SM node and comprising: receiving a SM request message requesting establishment of a first PDU session, which SM request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; selecting, in response to receiving the SM request message, an IP version for the requested first PDU session; and sending a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session, wherein it is further indicated in the WCD information that the other IP type not being selected (IPv4 if IPv6 was selected and IPv6 if IPv4 was selected) is also supported. 14. A session management (SM) node in a core network being configured to operatively select an Internet Protocol (IP) version for a Protocol Data Unit (PDU) session requested to be established by a wireless communication device (WCD) that supports PDU sessions of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the SM node comprising processing circuitry, the processing circuitry being configured to cause the WCD to operatively: receive a SM request message requesting establishment of a first PDU session, which SM request message comprises IP version information indicating that the IP version of the requested first PDU session should be any one of IPv4 or IPv6; select, in response to receiving the SM request message, an IP version for the requested first PDU session; and send a first response message, which first response message comprises WCD information indicating the IP version that has been selected for the requested first PDU session, wherein it is further indicated in the WCD information that the other IP type not being selected (IPv4 if IPv6 was selected and IPv6 if IPv4 was selected) is also supported.
2,400
8,778
8,778
14,590,897
2,483
An apparatus configured to code video information includes a memory and a processor in communication with the memory. The memory is configured to store video information associated with a bitstream. The apparatus further includes a processor in communication with the memory, the processor configured to determine whether a reference layer is included in the bitstream. The processor is further configured to determine an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream and to code the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer.
1. A method of coding video information, the method comprising: determining whether a reference layer is included in a bitstream; determining an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and coding the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 2. The method of claim 1, wherein the reference layer is coded according to a non-HEVC (High Efficiency Video Coding) codec. 3. The method of claim 1, wherein the reference layer is coded according to an Advanced Video Coding (AVC) codec. 4. The method of claim 1, wherein determining whether the reference layer is included in the bitstream comprises determining whether the reference layer is included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 5. The method of claim 1, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer to be decoded. 6. The method of claim 5, wherein determining the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer based upon whether the reference layer is included in the bitstream comprises, if the reference layer is not included in the bitstream, determining the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer to have a value of 0. 7. The method of claim 1, wherein the one or more parameters comprise a parameter which signals a maximum latency. 8. The method of claim 1, wherein the one or more parameters comprise a parameter which signals a maximum reordering of output pictures. 9. The method of claim 1, further comprising generating one or more syntax elements in the bitstream comprising the indication of one or more parameters, wherein coding video information comprises at least one of encoding video information. 10. The method of claim 1, wherein determining the indication of one or more parameters comprises decoding one or more syntax elements from the bitstream and wherein coding video information comprises decoding the video information. 11. An apparatus configured to code video information, the apparatus comprising: a memory configured to store video information associated with a bitstream; a processor in communication with the memory, the processor configured to: determine whether a reference layer is included in the bitstream; determine an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and code the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 12. The apparatus of claim 11, wherein the reference layer is coded according to a non-HEVC (High Efficiency Video Coding) codec. 13. The apparatus of claim 11, wherein the reference layer is coded according to an Advanced Video Coding (AVC) codec. 14. The apparatus of claim 11, wherein the processor is configured to determine whether the reference layer is included in the bitstream via determining whether the reference layer is included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 15. The apparatus of claim 11, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer to be decoded. 16. The apparatus of claim 15, wherein the processor is configured to determine the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer based upon whether the reference layer is included in the bitstream via, if the reference layer is not included in the bitstream, determining the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer to have a value of 0. 17. The apparatus of claim 11, wherein the one or more parameters comprise a parameter which signals a maximum latency. 18. The apparatus of claim 11, wherein the one or more parameters comprise a parameter which signals a maximum reordering of output pictures. 19. The apparatus of claim 11, wherein the processor comprises a video encoder configured to generate one or more syntax elements in the bitstream comprising the indication of one or more parameters, and wherein the processor is configured to encode the video information. 20. The apparatus of claim 11, wherein the processor comprises a video decoder configured to determine the indication of one or more parameters by decoding one or more syntax elements from the bitstream and wherein coding video information comprises decoding the video information, and wherein the processor is configured to decode the video information. 21. A non-transitory computer readable medium comprising code that, when executed, causes an apparatus to perform a process comprising: determining whether a reference layer is included in a bitstream; determining an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and coding the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 22. The non-transitory computer readable medium of claim 21, wherein the reference layer is coded in at least one of a non-HEVC (High Efficiency Video Coding) codec or an Advanced Video Coding (AVC) codec. 23. The non-transitory computer readable medium of claim 21, further comprising code that, when executed, causes the apparatus to determine whether the reference layer is included in the bitstream via determining whether the reference layer is not included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 24. The non-transitory computer readable medium of claim 21, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer to be decoded, a parameter which signals a maximum latency, or a parameter which signals a maximum reordering of output pictures. 25. A video coding device configured to code video information, the video coding device comprising: means for determining whether a reference layer is included in a bitstream; means for determining an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and means for coding the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 26. The video coding device of claim 25, wherein the reference layer is coded in at least one of a non-HEVC (High Efficiency Video Coding) codec and an Advanced Video Coding (AVC) codec. 27. The video coding device of claim 25, wherein means for determining whether the reference layer is included in the bitstream comprises means for determining whether the reference layer is not included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 28. The video coding device of claim 25, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer, a parameter which signals a maximum latency, or a parameter which signals a maximum reordering of output pictures.
An apparatus configured to code video information includes a memory and a processor in communication with the memory. The memory is configured to store video information associated with a bitstream. The apparatus further includes a processor in communication with the memory, the processor configured to determine whether a reference layer is included in the bitstream. The processor is further configured to determine an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream and to code the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer.1. A method of coding video information, the method comprising: determining whether a reference layer is included in a bitstream; determining an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and coding the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 2. The method of claim 1, wherein the reference layer is coded according to a non-HEVC (High Efficiency Video Coding) codec. 3. The method of claim 1, wherein the reference layer is coded according to an Advanced Video Coding (AVC) codec. 4. The method of claim 1, wherein determining whether the reference layer is included in the bitstream comprises determining whether the reference layer is included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 5. The method of claim 1, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer to be decoded. 6. The method of claim 5, wherein determining the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer based upon whether the reference layer is included in the bitstream comprises, if the reference layer is not included in the bitstream, determining the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer to have a value of 0. 7. The method of claim 1, wherein the one or more parameters comprise a parameter which signals a maximum latency. 8. The method of claim 1, wherein the one or more parameters comprise a parameter which signals a maximum reordering of output pictures. 9. The method of claim 1, further comprising generating one or more syntax elements in the bitstream comprising the indication of one or more parameters, wherein coding video information comprises at least one of encoding video information. 10. The method of claim 1, wherein determining the indication of one or more parameters comprises decoding one or more syntax elements from the bitstream and wherein coding video information comprises decoding the video information. 11. An apparatus configured to code video information, the apparatus comprising: a memory configured to store video information associated with a bitstream; a processor in communication with the memory, the processor configured to: determine whether a reference layer is included in the bitstream; determine an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and code the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 12. The apparatus of claim 11, wherein the reference layer is coded according to a non-HEVC (High Efficiency Video Coding) codec. 13. The apparatus of claim 11, wherein the reference layer is coded according to an Advanced Video Coding (AVC) codec. 14. The apparatus of claim 11, wherein the processor is configured to determine whether the reference layer is included in the bitstream via determining whether the reference layer is included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 15. The apparatus of claim 11, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer to be decoded. 16. The apparatus of claim 15, wherein the processor is configured to determine the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer based upon whether the reference layer is included in the bitstream via, if the reference layer is not included in the bitstream, determining the indication of the parameter which signals the maximum size of the decoded picture buffer for the highest temporal sub-layer to have a value of 0. 17. The apparatus of claim 11, wherein the one or more parameters comprise a parameter which signals a maximum latency. 18. The apparatus of claim 11, wherein the one or more parameters comprise a parameter which signals a maximum reordering of output pictures. 19. The apparatus of claim 11, wherein the processor comprises a video encoder configured to generate one or more syntax elements in the bitstream comprising the indication of one or more parameters, and wherein the processor is configured to encode the video information. 20. The apparatus of claim 11, wherein the processor comprises a video decoder configured to determine the indication of one or more parameters by decoding one or more syntax elements from the bitstream and wherein coding video information comprises decoding the video information, and wherein the processor is configured to decode the video information. 21. A non-transitory computer readable medium comprising code that, when executed, causes an apparatus to perform a process comprising: determining whether a reference layer is included in a bitstream; determining an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and coding the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 22. The non-transitory computer readable medium of claim 21, wherein the reference layer is coded in at least one of a non-HEVC (High Efficiency Video Coding) codec or an Advanced Video Coding (AVC) codec. 23. The non-transitory computer readable medium of claim 21, further comprising code that, when executed, causes the apparatus to determine whether the reference layer is included in the bitstream via determining whether the reference layer is not included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 24. The non-transitory computer readable medium of claim 21, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer to be decoded, a parameter which signals a maximum latency, or a parameter which signals a maximum reordering of output pictures. 25. A video coding device configured to code video information, the video coding device comprising: means for determining whether a reference layer is included in a bitstream; means for determining an indication of one or more parameters for a decoded picture buffer based upon whether the reference layer is included in the bitstream; and means for coding the video information based at least in part on the determined indication of the one or more parameters for the decoded picture buffer. 26. The video coding device of claim 25, wherein the reference layer is coded in at least one of a non-HEVC (High Efficiency Video Coding) codec and an Advanced Video Coding (AVC) codec. 27. The video coding device of claim 25, wherein means for determining whether the reference layer is included in the bitstream comprises means for determining whether the reference layer is not included in the bitstream based upon a value included in a one of a video parameter set, a sequence parameter set, a picture parameter set, or an adaptation parameter set. 28. The video coding device of claim 25, wherein the one or more parameters comprise a parameter which signals a maximum size of the decoded picture buffer for a highest temporal sub-layer, a parameter which signals a maximum latency, or a parameter which signals a maximum reordering of output pictures.
2,400
8,779
8,779
15,476,350
2,443
Systems and methods for assessing user activity using dynamic windowed forecasting on historical usage. The system includes a server including an electronic processor. The electronic processor is configured to receive, from a network server hosting at least one application for a plurality of users, a data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique user identifiers and a plurality of timestamps. The electronic processor is configured to group the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of timestamps. The electronic processor is configured to determine a forecasted quantity of users for a forecast time window based on the data points and the plurality of unique user identifiers. The electronic processor is configured to transmit the forecasted quantity of users to a user device.
1. A system comprising: a server communicatively coupled to a database, the server including an electronic processor configured to receive, from a network server hosting at least one application for a plurality of users, a data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique user identifiers and a plurality of timestamps; group the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of timestamps; determine a forecasted quantity of users for a forecast time window based on the plurality of historical windowed data points and the plurality of unique user identifiers; and transmit, to a user device, the forecasted quantity of users. 2. The system of claim 1, wherein the electronic processor is further configured to store the plurality of historical windowed data points to the database; and retrieve, from the database, a subset of the plurality of historical windowed data points, the subset representing at least one time series of the plurality of historical windowed data points corresponding to the forecast time window; wherein the forecasted quantity of users is determined based on the subset of the plurality of historical windowed data points and the plurality of unique user identifiers. 3. The system of claim 2, wherein the electronic processor is further configured to assign a weight to each of the plurality of historical windowed data points to generate a plurality of weighted historical windowed data points and wherein the electronic processor is configured to retrieve the subset of the plurality of historical windowed data points based on the plurality of weighted historical windowed data points. 4. The system of claim 1, wherein the electronic processor is further configured to receive a forecast request including the forecast time window. 5. The system of claim 4, wherein the forecast request further includes an activity; the plurality of historical activity indicators includes a plurality of user activity identifiers; and the electronic processor is configured to determine the forecasted quantity of users for the forecast time window further based on the plurality of user activity identifiers corresponding to the activity. 6. The system of claim 4, wherein the forecast request includes a pivot attribute and wherein the electronic processor is configured to determine the forecasted quantity of users for the forecast time window based on the pivot attribute. 7. The system of claim 6, wherein the pivot attribute is one selected from a group consisting of a region, a client, a protocol, a user type, a customer account, and a logical service infrastructure. 8. The system of claim 1, wherein each of the plurality of user activity identifiers represents one selected from a group consisting of sending an email, reading an email, querying for new emails, deleting an email, accessing a web page, retrieving a document, and creating a calendar invite. 9. The system of claim 1, wherein the electronic processor is further configured to receive, from the network server, a second data stream including a plurality of current activity indicators for a current time window, the plurality of current activity indicators including a plurality of current unique user identifiers, a plurality of current user activity identifiers, and a plurality of current timestamps; group the plurality of current activity indicators into a plurality of current windowed data points based on the plurality of current timestamps; retrieve, from the database, a subset of the plurality of historical windowed data points, the subset representing at least one time series of historical windowed data points corresponding to the current time window; determine a forecasted quantity of users for the current time window based on the subset of the plurality of historical windowed data points and the plurality of unique user identifiers; determine a current quantity users for the current time window based on the plurality of current windowed data points and the plurality of unique user identifiers; generate an alert when the current quantity users differs from the forecasted quantity of users by more than a predetermined threshold; and transmit the alert. 10. A method comprising: receiving, from a network server hosting at least one application for a plurality of users, a first data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique historical user identifiers and a plurality of historical timestamps; grouping the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of historical timestamps; storing to a database the plurality of historical windowed data points; receiving, from the network server, a second data stream including a plurality of current activity indicators for a current time window, the plurality of current activity indicators including a plurality of unique current user identifiers and a plurality of current timestamps; grouping the plurality of current activity indicators into a plurality of current windowed data points based on the plurality of current timestamps; retrieving, from the database, a subset of the plurality of historical windowed data points, the subset representing at least one time series of historical windowed data points corresponding to the current time window; determining a forecasted quantity of users for the current time window based on the subset of the plurality of historical windowed data points and the plurality of unique historical user identifiers; determining a current quantity of users for the current time window based on the plurality of current windowed data points and the plurality of unique current user identifiers; generating an alert when the current quantity of users differs from the quantity of forecast users by more than a predetermined threshold; and transmitting the alert. 11. The method of claim 10, wherein the plurality of historical activity indicators includes a plurality of historical user activity identifiers; the plurality of current activity indicators includes a plurality of current user activity identifiers; determining a forecasted quantity of users for the current time window includes determining the forecasted quantity of users for the current time window based on the plurality of historical user activity identifiers; and determining a current quantity of users for the current time window includes determining the current quantity of users based on the plurality of current user activity identifiers. 12. The method of claim 11, wherein each of the plurality of historical user activity identifiers and each of the plurality of current user activity identifiers represents one selected from a group consisting of sending an email, reading an email, querying for new emails, deleting an email, accessing a web page, retrieving a document, and creating a calendar invite. 13. The method of claim 10, further comprising assigning a weight to each of the plurality of historical windowed data points to generate a plurality of weighted historical windowed data points, wherein retrieving the subset of the plurality of historical windowed data points includes retrieving the subset of the plurality of historical windowed data points based on the plurality of weighted historical windowed data points. 14. The method of claim 10, wherein determining the forecasted quantity of users includes determining the forecasted quantity of users based on a pivot attribute and wherein determining the current quantity of users includes determining the current quantity of users based the pivot attribute. 15. The method of claim 14, wherein determining the current quantity of users based the pivot attribute includes determining the current quantity of users based on one selected from a group consisting of a region, a client, a protocol, a user type, a customer account, and a logical service infrastructure. 16. A non-transitory computer-readable medium including instructions executable by an electronic processor to perform a set of functions, the set of functions comprising: receiving, from a production server hosting at least one application for a plurality of users, a first data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique user identifiers, a plurality of historical user activity identifiers, and a plurality of historical timestamps; grouping the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of historical timestamps; storing to a database the plurality of historical windowed data points; receiving, from the network server, a second data stream including a plurality of current activity indicators for a current time window, the plurality of current activity indicators including a plurality of current unique user identifiers, a plurality of current user activity identifiers, and a plurality of current timestamps; grouping the plurality of current activity indicators into a plurality of current windowed data points based on the plurality of current timestamps; retrieving, from the database, a subset of the plurality of historical windowed data points representing at least one time series of historical windowed data points corresponding to the current time window; determining a forecasted quantity of users for the current time window based on the subset of the plurality of historical windowed data points, the plurality of unique user identifiers, and the plurality of historical user activity identifiers; determining a current quantity of users for the current time window based on the plurality of current windowed data points, the plurality of current unique user identifiers, and the plurality of current user activity identifiers; generating an alert when the current quantity of users differs from the forecasted quantity of users by more than a predetermined threshold; and transmitting the alert. 17. The non-transitory computer-readable medium of claim 16, wherein each of the plurality of historical user activity identifiers and each of the plurality of current user activity identifiers represents one selected from a group consisting of sending an email, reading an email, querying for new emails, deleting an email, accessing a web page, retrieving a document, and creating a calendar invite. 18. The non-transitory computer-readable medium of claim 16, wherein the set of functions further comprises assigning a weight to each of the plurality of historical windowed data points to generate a plurality of weighted historical windowed data points and wherein retrieving the subset of the plurality of historical windowed data points includes retrieving the subset of the plurality of historical windowed data points based on the plurality of weighted historical windowed data points. 19. The non-transitory computer-readable medium of claim 16, wherein determining the forecasted quantity of users includes determining the forecasted quantity of users based on a pivot attribute and wherein determining the current quantity of users includes determining the forecasted quantity of current users based the pivot attribute. 20. The non-transitory computer-readable medium of claim 19, wherein determining the forecasted quantity of users based the pivot attribute includes determining the forecasted quantity of users based on one selected from a group consisting of a region, a client, a protocol, a user type, a customer account, and a logical service infrastructure.
Systems and methods for assessing user activity using dynamic windowed forecasting on historical usage. The system includes a server including an electronic processor. The electronic processor is configured to receive, from a network server hosting at least one application for a plurality of users, a data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique user identifiers and a plurality of timestamps. The electronic processor is configured to group the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of timestamps. The electronic processor is configured to determine a forecasted quantity of users for a forecast time window based on the data points and the plurality of unique user identifiers. The electronic processor is configured to transmit the forecasted quantity of users to a user device.1. A system comprising: a server communicatively coupled to a database, the server including an electronic processor configured to receive, from a network server hosting at least one application for a plurality of users, a data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique user identifiers and a plurality of timestamps; group the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of timestamps; determine a forecasted quantity of users for a forecast time window based on the plurality of historical windowed data points and the plurality of unique user identifiers; and transmit, to a user device, the forecasted quantity of users. 2. The system of claim 1, wherein the electronic processor is further configured to store the plurality of historical windowed data points to the database; and retrieve, from the database, a subset of the plurality of historical windowed data points, the subset representing at least one time series of the plurality of historical windowed data points corresponding to the forecast time window; wherein the forecasted quantity of users is determined based on the subset of the plurality of historical windowed data points and the plurality of unique user identifiers. 3. The system of claim 2, wherein the electronic processor is further configured to assign a weight to each of the plurality of historical windowed data points to generate a plurality of weighted historical windowed data points and wherein the electronic processor is configured to retrieve the subset of the plurality of historical windowed data points based on the plurality of weighted historical windowed data points. 4. The system of claim 1, wherein the electronic processor is further configured to receive a forecast request including the forecast time window. 5. The system of claim 4, wherein the forecast request further includes an activity; the plurality of historical activity indicators includes a plurality of user activity identifiers; and the electronic processor is configured to determine the forecasted quantity of users for the forecast time window further based on the plurality of user activity identifiers corresponding to the activity. 6. The system of claim 4, wherein the forecast request includes a pivot attribute and wherein the electronic processor is configured to determine the forecasted quantity of users for the forecast time window based on the pivot attribute. 7. The system of claim 6, wherein the pivot attribute is one selected from a group consisting of a region, a client, a protocol, a user type, a customer account, and a logical service infrastructure. 8. The system of claim 1, wherein each of the plurality of user activity identifiers represents one selected from a group consisting of sending an email, reading an email, querying for new emails, deleting an email, accessing a web page, retrieving a document, and creating a calendar invite. 9. The system of claim 1, wherein the electronic processor is further configured to receive, from the network server, a second data stream including a plurality of current activity indicators for a current time window, the plurality of current activity indicators including a plurality of current unique user identifiers, a plurality of current user activity identifiers, and a plurality of current timestamps; group the plurality of current activity indicators into a plurality of current windowed data points based on the plurality of current timestamps; retrieve, from the database, a subset of the plurality of historical windowed data points, the subset representing at least one time series of historical windowed data points corresponding to the current time window; determine a forecasted quantity of users for the current time window based on the subset of the plurality of historical windowed data points and the plurality of unique user identifiers; determine a current quantity users for the current time window based on the plurality of current windowed data points and the plurality of unique user identifiers; generate an alert when the current quantity users differs from the forecasted quantity of users by more than a predetermined threshold; and transmit the alert. 10. A method comprising: receiving, from a network server hosting at least one application for a plurality of users, a first data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique historical user identifiers and a plurality of historical timestamps; grouping the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of historical timestamps; storing to a database the plurality of historical windowed data points; receiving, from the network server, a second data stream including a plurality of current activity indicators for a current time window, the plurality of current activity indicators including a plurality of unique current user identifiers and a plurality of current timestamps; grouping the plurality of current activity indicators into a plurality of current windowed data points based on the plurality of current timestamps; retrieving, from the database, a subset of the plurality of historical windowed data points, the subset representing at least one time series of historical windowed data points corresponding to the current time window; determining a forecasted quantity of users for the current time window based on the subset of the plurality of historical windowed data points and the plurality of unique historical user identifiers; determining a current quantity of users for the current time window based on the plurality of current windowed data points and the plurality of unique current user identifiers; generating an alert when the current quantity of users differs from the quantity of forecast users by more than a predetermined threshold; and transmitting the alert. 11. The method of claim 10, wherein the plurality of historical activity indicators includes a plurality of historical user activity identifiers; the plurality of current activity indicators includes a plurality of current user activity identifiers; determining a forecasted quantity of users for the current time window includes determining the forecasted quantity of users for the current time window based on the plurality of historical user activity identifiers; and determining a current quantity of users for the current time window includes determining the current quantity of users based on the plurality of current user activity identifiers. 12. The method of claim 11, wherein each of the plurality of historical user activity identifiers and each of the plurality of current user activity identifiers represents one selected from a group consisting of sending an email, reading an email, querying for new emails, deleting an email, accessing a web page, retrieving a document, and creating a calendar invite. 13. The method of claim 10, further comprising assigning a weight to each of the plurality of historical windowed data points to generate a plurality of weighted historical windowed data points, wherein retrieving the subset of the plurality of historical windowed data points includes retrieving the subset of the plurality of historical windowed data points based on the plurality of weighted historical windowed data points. 14. The method of claim 10, wherein determining the forecasted quantity of users includes determining the forecasted quantity of users based on a pivot attribute and wherein determining the current quantity of users includes determining the current quantity of users based the pivot attribute. 15. The method of claim 14, wherein determining the current quantity of users based the pivot attribute includes determining the current quantity of users based on one selected from a group consisting of a region, a client, a protocol, a user type, a customer account, and a logical service infrastructure. 16. A non-transitory computer-readable medium including instructions executable by an electronic processor to perform a set of functions, the set of functions comprising: receiving, from a production server hosting at least one application for a plurality of users, a first data stream including a plurality of historical activity indicators for the plurality of users, the plurality of historical activity indicators including a plurality of unique user identifiers, a plurality of historical user activity identifiers, and a plurality of historical timestamps; grouping the plurality of historical activity indicators into a plurality of historical windowed data points based on the plurality of historical timestamps; storing to a database the plurality of historical windowed data points; receiving, from the network server, a second data stream including a plurality of current activity indicators for a current time window, the plurality of current activity indicators including a plurality of current unique user identifiers, a plurality of current user activity identifiers, and a plurality of current timestamps; grouping the plurality of current activity indicators into a plurality of current windowed data points based on the plurality of current timestamps; retrieving, from the database, a subset of the plurality of historical windowed data points representing at least one time series of historical windowed data points corresponding to the current time window; determining a forecasted quantity of users for the current time window based on the subset of the plurality of historical windowed data points, the plurality of unique user identifiers, and the plurality of historical user activity identifiers; determining a current quantity of users for the current time window based on the plurality of current windowed data points, the plurality of current unique user identifiers, and the plurality of current user activity identifiers; generating an alert when the current quantity of users differs from the forecasted quantity of users by more than a predetermined threshold; and transmitting the alert. 17. The non-transitory computer-readable medium of claim 16, wherein each of the plurality of historical user activity identifiers and each of the plurality of current user activity identifiers represents one selected from a group consisting of sending an email, reading an email, querying for new emails, deleting an email, accessing a web page, retrieving a document, and creating a calendar invite. 18. The non-transitory computer-readable medium of claim 16, wherein the set of functions further comprises assigning a weight to each of the plurality of historical windowed data points to generate a plurality of weighted historical windowed data points and wherein retrieving the subset of the plurality of historical windowed data points includes retrieving the subset of the plurality of historical windowed data points based on the plurality of weighted historical windowed data points. 19. The non-transitory computer-readable medium of claim 16, wherein determining the forecasted quantity of users includes determining the forecasted quantity of users based on a pivot attribute and wherein determining the current quantity of users includes determining the forecasted quantity of current users based the pivot attribute. 20. The non-transitory computer-readable medium of claim 19, wherein determining the forecasted quantity of users based the pivot attribute includes determining the forecasted quantity of users based on one selected from a group consisting of a region, a client, a protocol, a user type, a customer account, and a logical service infrastructure.
2,400
8,780
8,780
15,513,310
2,413
The present invention provides a method for data transmission in a machine type communication device terminal, comprising steps of: performing the following steps when the terminal receives cell common message: A. receiving first indication information from an EPDCCH on a first resource block, the first indication information indicating a second resource block for transmitting the cell common message; B. receiving the cell common message from a PDSCH on the second resource block; performing the following steps when the terminal receives downlink data: I. receiving second indication information from EPDCCH on a third resource block; IL detecting whether DCI information transmitted to the terminal exists in the second indication information, and if the DCI information transmitted to the terminal exists, II-1. decoding information of a fourth resource block in the DCI information; II-2. receiving the downlink data transmitted from the base station to the terminal from the PDSCH on the fourth resource block.
1. A method for data transmission in a machine type communication device terminal, comprising: performing the following steps-when the terminal receives cell common message: receiving first indication information from an EPDCCH on a first resource block, wherein the first indication information indicates a second resource block for transmitting the cell common message; receiving the cell common message from a PDSCH on the second resource block; performing the following steps-when the terminal receives downlink data: receiving second indication information from EPDCCH on a third resource block; detecting whether DCI information transmitted to the terminal exists in the second indication information, and if the DCI information transmitted to the terminal exists, decoding information of a fourth resource block in the DCI information; receiving the downlink data transmitted from the base station to the terminal from the PDSCH on the fourth resource block. 2. The method according to claim 1, wherein the first resource block, the second resource block, the third resource block, and the fourth resource block are located on different time slots. 3. The method according to claim 2, wherein a location of the first resource block in a frequency band is predetermined, while a location of the third resource block in the frequency band is notified by the base station. 4. The method according to claim 2, wherein the first resource block and the third resource block are located on a same frequency band. 5. The method according to claim 2, wherein the third resource block and the fourth resource block are located on a same frequency band. 6. The method according to claim 1, further comprising detecting the second indication information by the following equation: L  { ( Y p , k + ⌊ m · N ECCE , p , k L · M p ( L ) ⌋ + b )  mod  ⌊ N ECCE , p , k  /  L ⌋ } + i wherein the NECCE denotes a number of the ECCEs in the third resource block. 7. A method for data transmission in a base station, the base station being for transmitting data to a plurality of machine type communication device terminal, comprising: performing the following steps-when the base station transmits cell common message to the plurality of machine type communication device terminals: transmitting first indication information in EPDCCH on a first resource block, the first indication information indicating a second resource block for transmitting the cell common message; transmitting the cell common message in PDSCH on the second resource block; performing the following when the base station transmits the cell common message to the plurality of machine type communication device terminal: assigning a downlink resource block for each machine type communication device terminal that needs to obtain downlink data; transmitting second indication information in the EPDCCH on a third resource block, the second indication information including DCI information transmitted to terminals that need to obtain downlink data, respective DCI information indicating the downlink resource block assigned by the base station; transmitting downlink data to terminals that need to obtain the downlink data in the PDSCH on the downlink resource block, respectively. 8. The method according to claim 7, wherein DCI information of the plurality of terminals is transmitted on the third resource block by frequency-division multiplexing. 9. The method according to claim 7, wherein DCI information of the plurality of terminals is transmitted on the third resource block by time-division multiplexing. 10. The method according to claim 9, wherein DCI information of the plurality of terminals is transmitted for multiple times on the third resource block by time-division multiplexing. 11. The method according to claim 8, wherein the first resource block, the second resource block, the third resource block, and the downlink resource block are located on different time slots. 12. The method according to claim 8, wherein a location of the first resource block in the frequency band in the frequency band is predetermined, and a location of the third resource block in the frequency band is notified by the base station to the plurality of machine type communication device terminals. 13. The method according to claim 11, wherein the first resource block and the third resource block are located on the same frequency band. 14. The method according to claim 7, further comprising: transmitting third indication information in an EPDCCH on the fifth resource block, wherein the third indication information includes a sixth resource block for transmitting the cell common message; wherein the first resource block and the fifth resource block are located on a same frequency band, and the first resource block and the fifth resource block are located on adjacent timeslots; the second resource block and the sixth resource block are located on a same frequency band, and the second resource block and the sixth resource block are located on adjacent time slots. 15. The method according to claim 7, wherein locations of the first resource block and the fifth resource block in the frequency band and time slot are notified by the base station to corresponding machine type communication device terminals, respectively.
The present invention provides a method for data transmission in a machine type communication device terminal, comprising steps of: performing the following steps when the terminal receives cell common message: A. receiving first indication information from an EPDCCH on a first resource block, the first indication information indicating a second resource block for transmitting the cell common message; B. receiving the cell common message from a PDSCH on the second resource block; performing the following steps when the terminal receives downlink data: I. receiving second indication information from EPDCCH on a third resource block; IL detecting whether DCI information transmitted to the terminal exists in the second indication information, and if the DCI information transmitted to the terminal exists, II-1. decoding information of a fourth resource block in the DCI information; II-2. receiving the downlink data transmitted from the base station to the terminal from the PDSCH on the fourth resource block.1. A method for data transmission in a machine type communication device terminal, comprising: performing the following steps-when the terminal receives cell common message: receiving first indication information from an EPDCCH on a first resource block, wherein the first indication information indicates a second resource block for transmitting the cell common message; receiving the cell common message from a PDSCH on the second resource block; performing the following steps-when the terminal receives downlink data: receiving second indication information from EPDCCH on a third resource block; detecting whether DCI information transmitted to the terminal exists in the second indication information, and if the DCI information transmitted to the terminal exists, decoding information of a fourth resource block in the DCI information; receiving the downlink data transmitted from the base station to the terminal from the PDSCH on the fourth resource block. 2. The method according to claim 1, wherein the first resource block, the second resource block, the third resource block, and the fourth resource block are located on different time slots. 3. The method according to claim 2, wherein a location of the first resource block in a frequency band is predetermined, while a location of the third resource block in the frequency band is notified by the base station. 4. The method according to claim 2, wherein the first resource block and the third resource block are located on a same frequency band. 5. The method according to claim 2, wherein the third resource block and the fourth resource block are located on a same frequency band. 6. The method according to claim 1, further comprising detecting the second indication information by the following equation: L  { ( Y p , k + ⌊ m · N ECCE , p , k L · M p ( L ) ⌋ + b )  mod  ⌊ N ECCE , p , k  /  L ⌋ } + i wherein the NECCE denotes a number of the ECCEs in the third resource block. 7. A method for data transmission in a base station, the base station being for transmitting data to a plurality of machine type communication device terminal, comprising: performing the following steps-when the base station transmits cell common message to the plurality of machine type communication device terminals: transmitting first indication information in EPDCCH on a first resource block, the first indication information indicating a second resource block for transmitting the cell common message; transmitting the cell common message in PDSCH on the second resource block; performing the following when the base station transmits the cell common message to the plurality of machine type communication device terminal: assigning a downlink resource block for each machine type communication device terminal that needs to obtain downlink data; transmitting second indication information in the EPDCCH on a third resource block, the second indication information including DCI information transmitted to terminals that need to obtain downlink data, respective DCI information indicating the downlink resource block assigned by the base station; transmitting downlink data to terminals that need to obtain the downlink data in the PDSCH on the downlink resource block, respectively. 8. The method according to claim 7, wherein DCI information of the plurality of terminals is transmitted on the third resource block by frequency-division multiplexing. 9. The method according to claim 7, wherein DCI information of the plurality of terminals is transmitted on the third resource block by time-division multiplexing. 10. The method according to claim 9, wherein DCI information of the plurality of terminals is transmitted for multiple times on the third resource block by time-division multiplexing. 11. The method according to claim 8, wherein the first resource block, the second resource block, the third resource block, and the downlink resource block are located on different time slots. 12. The method according to claim 8, wherein a location of the first resource block in the frequency band in the frequency band is predetermined, and a location of the third resource block in the frequency band is notified by the base station to the plurality of machine type communication device terminals. 13. The method according to claim 11, wherein the first resource block and the third resource block are located on the same frequency band. 14. The method according to claim 7, further comprising: transmitting third indication information in an EPDCCH on the fifth resource block, wherein the third indication information includes a sixth resource block for transmitting the cell common message; wherein the first resource block and the fifth resource block are located on a same frequency band, and the first resource block and the fifth resource block are located on adjacent timeslots; the second resource block and the sixth resource block are located on a same frequency band, and the second resource block and the sixth resource block are located on adjacent time slots. 15. The method according to claim 7, wherein locations of the first resource block and the fifth resource block in the frequency band and time slot are notified by the base station to corresponding machine type communication device terminals, respectively.
2,400
8,781
8,781
15,329,748
2,463
The invention provides a method of and apparatus for controlling a ProSe service in a communication system. An eNB sends a first PLMN identifier, and carrier frequency information of another PLMN to indicate at least one carrier frequency at which a UE of the other PLMN can carry out the ProSe service, to a UE in a shared cell, and if the UE is in an idle state, then the UE reselects a cell or selects a PLMN; or if the UE is in a connected state, then the UE performs a handover procedure. If the handover procedure fails, then the UE releases an RRC connection to enter the idle states, or is DRX-configured and carries out the ProSe service in a DRX sleep time. With the solution of the invention, the UE can reselect or be handed over to the cell to carry out the ProSe service at the carrier frequency indicated by the carrier frequency information to thereby avoid the problem of an overload arising from too many ProSe services being carried out concurrently in the shared cell.
1. A method of controlling a ProSe service in an eNB of a communication system, the method comprising: sending in a shared cell a first PLMN identifier to a UE of the shared cell, wherein the first PLMN identifier indicates that a UE of the first PLMN can carry out the ProSe service in the shared cell controlled by the eNB and shared by the first PLMN and other PLMN. 2. The method according to claim 1, wherein after the sending, the method further comprises: sending information about at least one carrier frequency of the other PLMN to the UE of the shared cell in the shared cell, wherein the information about the at least one carrier frequency indicates the at least one carrier frequency at which a UE of the other PLMN can carry out the ProSe service; and if the UE of the other PLMN intends to carry out the ProSe service in the other PLMN, then determining whether the UE of the other PLMN is in a connected state, and if so, then initiating a handover procedure wherein after the determining, the method further comprises: if the handover procedure fails, sending an RRC connection release instruction to the UE of the other PLMN to instruct the UE of the other PLMN to release an RRC connection with the eNB to enter an idle state; or if the handover procedure fails, receiving a release connection request from the UE of the other PLMN, and sending an RRC connection release instruction to the UE of the other PLMN, in response to the received release connection request, to instruct the UE of the other PLMN to release an RRC connection with the eNB to enter an idle state. 3.-4. (canceled) 5. The method according to claim 2, wherein after the determining, the method further comprises: if the handover procedure fails, sending DRX configuration information to the UE of the other PLMN, wherein the DRX configuration information indicates an sleep time in which the UE of the other PLMN carries out the ProSe service. 6. The method according to claim 1, wherein after the sending, the method further comprises: sending a first period of time in which the ProSe service is carried in the shared cell, corresponding to the first PLMN to the UE; sending the other PLMN identifier, and a second period of time in which the ProSe service is carried in the shared cell, corresponding to the other PLMN identifier to the UE; and receiving information about a radio resource for carrying out the ProSe service in the other PLMN, from the UE of the other PLMN, wherein the information about the radio resource comprises a time window corresponding to the radio resource, and the time window locates in the second period of time. 7. The method according to claim 6, wherein after the receiving, the method further comprises: avoiding the UE of the other PLMN from being scheduled in the shared cell in the time window. 8. (canceled) 9. A method of controlling a ProSe service in a UE of a communication system, the method comprising: receiving a first PLMN identifier from an eNB of a shared cell, wherein the first PLMN identifier indicates that a UE of the first PLMN can carry out the ProSe service in the shared cell controlled by an eNB and shared by the first PLMN and other PLMN. 10. The method according to claim 9, wherein after the receiving, the method further comprises: receiving information about at least one carrier frequency of the other PLMN from the eNB, wherein the information about the at least one carrier frequency indicates the at least one carrier frequency at which a UE of the other PLMN can carry out the ProSe service; and if the UE of the other PLMN intends to carry the ProSe service in the other PLMN, and is in an idle state, reselecting a cell; or if the UE of the other PLMN intends to carry the ProSe service in the other PLMN, and is in a connected state, sending an indicator of the intension to carry out the ProSe service, to the eNB. 11. The method according to claim 10, wherein after the reselecting or sending, the method further comprises: if the handover succeeds, switching the UE of the other PLMN to an appropriate cell for carrying out the ProSe service to carry out the ProSe service. 12. The method according to claim 10, wherein after the reselecting or sending, the method further comprises: if the UE of the other PLMN has not been handed over from the shared cell to another cell in a period of time after sending the indicator of the intension to carry out the ProSe service to the eNB, receiving an RRC connection release instruction from the eNB, and releasing an RRC connection with the eNB and entering the idle state, in response to the RRC connection release instruction; or if the UE of the other PLMN has not been handed over from the shared cell to another cell in a period of time after sending the indicator of the intension to carry out the ProSe service to the eNB, sending a release connection request to the eNB, and releasing an RRC connection with the eNB and entering the idle state, in response to a received RRC connection release instruction from the eNB. 13. (canceled) 14. The method according to claim 10, wherein the method further comprises: if the UE of the other PLMN is in the idle state, then selecting, by the UE of the other PLMN, preferentially a cell at the at least one carrier frequency, and selecting a PLMN and reselecting the appropriate cell for carrying out the ProSe service at the at least one carrier frequency to carry out the ProSe service. 15. The method according to claim 10, wherein after the reselecting or sending, the method further comprises: if the UE of the other PLMN has not been handed over from the shared cell to another cell in a period of time after sending the indicator of the intension to carry out the ProSe service to the eNB, then receiving DRX configuration information from the eNB, wherein the DRX configuration information comprises an sleep time in which the UE of the other PLMN carries out the ProSe service. 16. (canceled) 17. The method according to claim 9, wherein after the receiving, the method further comprises: receiving a first period of time in which the ProSe service is carried out in the shared cell, corresponding to the first PLMN, from the eNB; receiving the other PLMN identifier, and a second period of time in which the ProSe service is carried out in the shared cell, corresponding to the other PLMN identifier, from the eNB; and sending information about a radio resource over which the ProSe service is carried out in the other PLMN, to the eNB, wherein the information about the radio resource comprises a time window corresponding to the radio resource, in the second period of time, and the information about the radio resource is configured to instruct the eNB not to schedule the UE of the other PLMN in the shared cell in the time window. 18.-19. (canceled) 20. A method of controlling a ProSe service in an eNB of a communication system, the method comprising: sending access class barring information for carrying out the ProSe service to a UE authorized to carry out the ProSe service in a first PLMN; receiving a request from the UE for a radio resource for carrying out the ProSe service after establishing an RRC connection with the UE; and sending information about the radio resource for carrying out the ProSe service to the UE in response to the request from the UE for the radio resource for carrying out the ProSe service, wherein the information about the radio resource comprises a time window corresponding to the radio resource. 21. The method according to claim 20, wherein the access class barring information is PLMN specific or applicable to all of PLMNs of the shared cell; wherein the access class barring information comprises ProSe discovery barring information and/or ProSe communication barring information; and PLMN identifier information indicating PLMNs to which the access class barring information is applicable. 22.-23. (canceled) 24. A method for controlling a ProSe service in a UE of a communication system, the method comprising: making an access decision according to access class barring information for carrying the ProSe service in a first PLMN, from an eNB, and if the decision succeed, then sending an RRC connection request to the eNB for setting up an RRC connection with the eNB, wherein the UE is authorized to carry out the ProSe service in the first PLMN; sending a request for a radio resource for carrying out the ProSe service to the eNB; and carrying out the ProSe service in a time window corresponding to the radio resource in information about the radio resource for carrying out the ProSe service, from the eNB. 25.-26 (canceled)
The invention provides a method of and apparatus for controlling a ProSe service in a communication system. An eNB sends a first PLMN identifier, and carrier frequency information of another PLMN to indicate at least one carrier frequency at which a UE of the other PLMN can carry out the ProSe service, to a UE in a shared cell, and if the UE is in an idle state, then the UE reselects a cell or selects a PLMN; or if the UE is in a connected state, then the UE performs a handover procedure. If the handover procedure fails, then the UE releases an RRC connection to enter the idle states, or is DRX-configured and carries out the ProSe service in a DRX sleep time. With the solution of the invention, the UE can reselect or be handed over to the cell to carry out the ProSe service at the carrier frequency indicated by the carrier frequency information to thereby avoid the problem of an overload arising from too many ProSe services being carried out concurrently in the shared cell.1. A method of controlling a ProSe service in an eNB of a communication system, the method comprising: sending in a shared cell a first PLMN identifier to a UE of the shared cell, wherein the first PLMN identifier indicates that a UE of the first PLMN can carry out the ProSe service in the shared cell controlled by the eNB and shared by the first PLMN and other PLMN. 2. The method according to claim 1, wherein after the sending, the method further comprises: sending information about at least one carrier frequency of the other PLMN to the UE of the shared cell in the shared cell, wherein the information about the at least one carrier frequency indicates the at least one carrier frequency at which a UE of the other PLMN can carry out the ProSe service; and if the UE of the other PLMN intends to carry out the ProSe service in the other PLMN, then determining whether the UE of the other PLMN is in a connected state, and if so, then initiating a handover procedure wherein after the determining, the method further comprises: if the handover procedure fails, sending an RRC connection release instruction to the UE of the other PLMN to instruct the UE of the other PLMN to release an RRC connection with the eNB to enter an idle state; or if the handover procedure fails, receiving a release connection request from the UE of the other PLMN, and sending an RRC connection release instruction to the UE of the other PLMN, in response to the received release connection request, to instruct the UE of the other PLMN to release an RRC connection with the eNB to enter an idle state. 3.-4. (canceled) 5. The method according to claim 2, wherein after the determining, the method further comprises: if the handover procedure fails, sending DRX configuration information to the UE of the other PLMN, wherein the DRX configuration information indicates an sleep time in which the UE of the other PLMN carries out the ProSe service. 6. The method according to claim 1, wherein after the sending, the method further comprises: sending a first period of time in which the ProSe service is carried in the shared cell, corresponding to the first PLMN to the UE; sending the other PLMN identifier, and a second period of time in which the ProSe service is carried in the shared cell, corresponding to the other PLMN identifier to the UE; and receiving information about a radio resource for carrying out the ProSe service in the other PLMN, from the UE of the other PLMN, wherein the information about the radio resource comprises a time window corresponding to the radio resource, and the time window locates in the second period of time. 7. The method according to claim 6, wherein after the receiving, the method further comprises: avoiding the UE of the other PLMN from being scheduled in the shared cell in the time window. 8. (canceled) 9. A method of controlling a ProSe service in a UE of a communication system, the method comprising: receiving a first PLMN identifier from an eNB of a shared cell, wherein the first PLMN identifier indicates that a UE of the first PLMN can carry out the ProSe service in the shared cell controlled by an eNB and shared by the first PLMN and other PLMN. 10. The method according to claim 9, wherein after the receiving, the method further comprises: receiving information about at least one carrier frequency of the other PLMN from the eNB, wherein the information about the at least one carrier frequency indicates the at least one carrier frequency at which a UE of the other PLMN can carry out the ProSe service; and if the UE of the other PLMN intends to carry the ProSe service in the other PLMN, and is in an idle state, reselecting a cell; or if the UE of the other PLMN intends to carry the ProSe service in the other PLMN, and is in a connected state, sending an indicator of the intension to carry out the ProSe service, to the eNB. 11. The method according to claim 10, wherein after the reselecting or sending, the method further comprises: if the handover succeeds, switching the UE of the other PLMN to an appropriate cell for carrying out the ProSe service to carry out the ProSe service. 12. The method according to claim 10, wherein after the reselecting or sending, the method further comprises: if the UE of the other PLMN has not been handed over from the shared cell to another cell in a period of time after sending the indicator of the intension to carry out the ProSe service to the eNB, receiving an RRC connection release instruction from the eNB, and releasing an RRC connection with the eNB and entering the idle state, in response to the RRC connection release instruction; or if the UE of the other PLMN has not been handed over from the shared cell to another cell in a period of time after sending the indicator of the intension to carry out the ProSe service to the eNB, sending a release connection request to the eNB, and releasing an RRC connection with the eNB and entering the idle state, in response to a received RRC connection release instruction from the eNB. 13. (canceled) 14. The method according to claim 10, wherein the method further comprises: if the UE of the other PLMN is in the idle state, then selecting, by the UE of the other PLMN, preferentially a cell at the at least one carrier frequency, and selecting a PLMN and reselecting the appropriate cell for carrying out the ProSe service at the at least one carrier frequency to carry out the ProSe service. 15. The method according to claim 10, wherein after the reselecting or sending, the method further comprises: if the UE of the other PLMN has not been handed over from the shared cell to another cell in a period of time after sending the indicator of the intension to carry out the ProSe service to the eNB, then receiving DRX configuration information from the eNB, wherein the DRX configuration information comprises an sleep time in which the UE of the other PLMN carries out the ProSe service. 16. (canceled) 17. The method according to claim 9, wherein after the receiving, the method further comprises: receiving a first period of time in which the ProSe service is carried out in the shared cell, corresponding to the first PLMN, from the eNB; receiving the other PLMN identifier, and a second period of time in which the ProSe service is carried out in the shared cell, corresponding to the other PLMN identifier, from the eNB; and sending information about a radio resource over which the ProSe service is carried out in the other PLMN, to the eNB, wherein the information about the radio resource comprises a time window corresponding to the radio resource, in the second period of time, and the information about the radio resource is configured to instruct the eNB not to schedule the UE of the other PLMN in the shared cell in the time window. 18.-19. (canceled) 20. A method of controlling a ProSe service in an eNB of a communication system, the method comprising: sending access class barring information for carrying out the ProSe service to a UE authorized to carry out the ProSe service in a first PLMN; receiving a request from the UE for a radio resource for carrying out the ProSe service after establishing an RRC connection with the UE; and sending information about the radio resource for carrying out the ProSe service to the UE in response to the request from the UE for the radio resource for carrying out the ProSe service, wherein the information about the radio resource comprises a time window corresponding to the radio resource. 21. The method according to claim 20, wherein the access class barring information is PLMN specific or applicable to all of PLMNs of the shared cell; wherein the access class barring information comprises ProSe discovery barring information and/or ProSe communication barring information; and PLMN identifier information indicating PLMNs to which the access class barring information is applicable. 22.-23. (canceled) 24. A method for controlling a ProSe service in a UE of a communication system, the method comprising: making an access decision according to access class barring information for carrying the ProSe service in a first PLMN, from an eNB, and if the decision succeed, then sending an RRC connection request to the eNB for setting up an RRC connection with the eNB, wherein the UE is authorized to carry out the ProSe service in the first PLMN; sending a request for a radio resource for carrying out the ProSe service to the eNB; and carrying out the ProSe service in a time window corresponding to the radio resource in information about the radio resource for carrying out the ProSe service, from the eNB. 25.-26 (canceled)
2,400
8,782
8,782
15,004,832
2,483
A method, non-transitory computer readable medium and apparatus for calculating a by spot occupancy of a parking lot are disclosed. For example, the method includes receiving an indication of a triggering event, sending a query to receive a first image and a second image in response to the triggering event, receiving the first image and the second image, analyzing the first image and the second image to determine a change in an occupancy status of a parking spot within the parking lot and calculating the by spot occupancy of the parking lot based on the change in the occupancy status of the parking spot.
1. A method for calculating a by spot occupancy of a parking lot, comprising: receiving, by a processor, an indication of a triggering event; sending, by the processor, a query to a video camera to receive a first image and a second image in response to the triggering event; receiving, by a processor, the first image and the second image; analyzing, by the processor, the first image and the second image to determine a change in an occupancy status of a parking spot within the parking lot; and calculating, by the processor, the by spot occupancy of the parking lot based on the change in the occupancy status of the parking spot. 2. The method of claim 1, further comprising: defining, by the processor, a plurality of regions of interest (ROIs) for each image that is captured; and initializing, by the processor, an occupancy table. 3. The method of claim 2, wherein the analyzing is performed on each one of the plurality of ROIs for the each image that is captured. 4. The method of claim 2, further comprising: updating, by the processor, the occupancy table based on the by spot occupancy that is calculated and the change in the occupancy status of the parking spot. 5. The method of claim 1, wherein the triggering event comprises an ingress sensor event. 6. The method of claim 5, wherein the ingress sensor event is detected by at least one of: a laser sensor, an inductive loop sensor, or a video sensor at an entrance of the parking lot. 7. The method of claim 5, wherein the first image is captured before a trigger time plus an ingress sensor fastest travel time and the second image is captured after the trigger time plus an ingress sensor slowest travel time. 8. The method of claim 1, wherein the triggering event comprises an egress sensor event. 9. The method of claim 8, wherein the egress sensor event is detected by at least one of: a laser sensor, an inductive loop sensor, or a video sensor at an entrance of the parking lot. 10. The method of claim 8, wherein the second image is captured at a time the egress sensor event is detected minus an egress sensor fastest travel time and the first image is captured at the time the egress sensor is detected minus an egress sensor slowest travel time. 11. The method of claim 1, wherein the analyzing comprises: performing, by the processor, an image analysis on the first image and the second image; calculating, by the processor, an occupancy status change metric for each region of interest (ROI); and identifying, by the processor, the change in the parking spot associated with an ROI having the highest occupancy status change metric. 12. The method of claim 11, wherein the image analysis is a generation of a difference image performed by calculating a difference between gray levels of each pixel of the first image and the second image. 13. The method of claim 1, wherein the analyzing comprises: calculating, by the processor, a feature vector associated with each region of interest in the first image and the second image. 14. The method of claim 13, wherein the feature vector is a histogram of oriented gradients (HOG). 15. The method of claim 14, wherein the applying the HoG comprises: classifying, by the processor, the HoG features within the each ROI of the first image and the second image as a vehicle or an empty space; and identifying, by the processor, the change in the occupancy status of the parking spot associated with an ROI having a difference between the first image and the second image in HoG features that are classified. 16. A non-transitory computer-readable medium storing a plurality of instructions, which when executed by a processor, cause the processor to perform operations for e calculating a by spot occupancy of a parking lot, the operations comprising: receiving an indication of a triggering event; sending a query to a video camera to receive a first image and a second image in response to the triggering event; receiving the first image and the second image; analyzing the first image and the second image to determine a change in an occupancy status of a parking spot within the parking lot; and calculating the by spot occupancy of the parking lot based on the change in the occupancy status of the parking spot. 17. The non-transitory computer-readable medium of claim 16, further comprising: defining a plurality of regions of interest (ROIs) for each image that is captured; and initializing an occupancy table. 18. The non-transitory computer-readable medium of claim 17, wherein the analyzing is performed on each one of the plurality of ROIs for the each image that is captured. 19. The non-transitory computer-readable medium of claim 16, further comprising: updating the occupancy table based on the by spot occupancy that is calculated and the change in the occupancy status of the parking spot. 20. A method for calculating a by spot occupancy of a parking lot, the method comprising: defining, by a processor, a plurality of regions of interest (ROIs) for each image that is captured; initializing, by the processor, an occupancy table comprising an identification of a plurality of parking spots and an indication of whether each one of the plurality of parking spots is empty or occupied; receiving, by a processor an indication of an ingress sensor event or an egress sensor event; sending, by the processor, a query to a plurality of video cameras to receive a first image and a second image from each one of the plurality of video cameras in response to the triggering event, wherein the query includes a first time associated with when the first image was captured and a second time associated with when the second image was captured; extracting, by the processor, the plurality of ROIs from the first image and the second image from each one of the plurality of video cameras, wherein each one of the plurality of ROIs is associated with a different one of the plurality of parking spots; calculating by the processor, an occupancy status change metric for each one of the plurality of ROIs of the first image and the second image from each one of the plurality of video cameras; calculating, by the processor, the by spot occupancy of the parking lot based on the occupancy status change metric; and updating, by the processor, the occupancy table to indicate a particular parking spot of the plurality of parking spots that changed from empty to occupied for the ingress sensor event or from occupied to empty for the egress sensor event.
A method, non-transitory computer readable medium and apparatus for calculating a by spot occupancy of a parking lot are disclosed. For example, the method includes receiving an indication of a triggering event, sending a query to receive a first image and a second image in response to the triggering event, receiving the first image and the second image, analyzing the first image and the second image to determine a change in an occupancy status of a parking spot within the parking lot and calculating the by spot occupancy of the parking lot based on the change in the occupancy status of the parking spot.1. A method for calculating a by spot occupancy of a parking lot, comprising: receiving, by a processor, an indication of a triggering event; sending, by the processor, a query to a video camera to receive a first image and a second image in response to the triggering event; receiving, by a processor, the first image and the second image; analyzing, by the processor, the first image and the second image to determine a change in an occupancy status of a parking spot within the parking lot; and calculating, by the processor, the by spot occupancy of the parking lot based on the change in the occupancy status of the parking spot. 2. The method of claim 1, further comprising: defining, by the processor, a plurality of regions of interest (ROIs) for each image that is captured; and initializing, by the processor, an occupancy table. 3. The method of claim 2, wherein the analyzing is performed on each one of the plurality of ROIs for the each image that is captured. 4. The method of claim 2, further comprising: updating, by the processor, the occupancy table based on the by spot occupancy that is calculated and the change in the occupancy status of the parking spot. 5. The method of claim 1, wherein the triggering event comprises an ingress sensor event. 6. The method of claim 5, wherein the ingress sensor event is detected by at least one of: a laser sensor, an inductive loop sensor, or a video sensor at an entrance of the parking lot. 7. The method of claim 5, wherein the first image is captured before a trigger time plus an ingress sensor fastest travel time and the second image is captured after the trigger time plus an ingress sensor slowest travel time. 8. The method of claim 1, wherein the triggering event comprises an egress sensor event. 9. The method of claim 8, wherein the egress sensor event is detected by at least one of: a laser sensor, an inductive loop sensor, or a video sensor at an entrance of the parking lot. 10. The method of claim 8, wherein the second image is captured at a time the egress sensor event is detected minus an egress sensor fastest travel time and the first image is captured at the time the egress sensor is detected minus an egress sensor slowest travel time. 11. The method of claim 1, wherein the analyzing comprises: performing, by the processor, an image analysis on the first image and the second image; calculating, by the processor, an occupancy status change metric for each region of interest (ROI); and identifying, by the processor, the change in the parking spot associated with an ROI having the highest occupancy status change metric. 12. The method of claim 11, wherein the image analysis is a generation of a difference image performed by calculating a difference between gray levels of each pixel of the first image and the second image. 13. The method of claim 1, wherein the analyzing comprises: calculating, by the processor, a feature vector associated with each region of interest in the first image and the second image. 14. The method of claim 13, wherein the feature vector is a histogram of oriented gradients (HOG). 15. The method of claim 14, wherein the applying the HoG comprises: classifying, by the processor, the HoG features within the each ROI of the first image and the second image as a vehicle or an empty space; and identifying, by the processor, the change in the occupancy status of the parking spot associated with an ROI having a difference between the first image and the second image in HoG features that are classified. 16. A non-transitory computer-readable medium storing a plurality of instructions, which when executed by a processor, cause the processor to perform operations for e calculating a by spot occupancy of a parking lot, the operations comprising: receiving an indication of a triggering event; sending a query to a video camera to receive a first image and a second image in response to the triggering event; receiving the first image and the second image; analyzing the first image and the second image to determine a change in an occupancy status of a parking spot within the parking lot; and calculating the by spot occupancy of the parking lot based on the change in the occupancy status of the parking spot. 17. The non-transitory computer-readable medium of claim 16, further comprising: defining a plurality of regions of interest (ROIs) for each image that is captured; and initializing an occupancy table. 18. The non-transitory computer-readable medium of claim 17, wherein the analyzing is performed on each one of the plurality of ROIs for the each image that is captured. 19. The non-transitory computer-readable medium of claim 16, further comprising: updating the occupancy table based on the by spot occupancy that is calculated and the change in the occupancy status of the parking spot. 20. A method for calculating a by spot occupancy of a parking lot, the method comprising: defining, by a processor, a plurality of regions of interest (ROIs) for each image that is captured; initializing, by the processor, an occupancy table comprising an identification of a plurality of parking spots and an indication of whether each one of the plurality of parking spots is empty or occupied; receiving, by a processor an indication of an ingress sensor event or an egress sensor event; sending, by the processor, a query to a plurality of video cameras to receive a first image and a second image from each one of the plurality of video cameras in response to the triggering event, wherein the query includes a first time associated with when the first image was captured and a second time associated with when the second image was captured; extracting, by the processor, the plurality of ROIs from the first image and the second image from each one of the plurality of video cameras, wherein each one of the plurality of ROIs is associated with a different one of the plurality of parking spots; calculating by the processor, an occupancy status change metric for each one of the plurality of ROIs of the first image and the second image from each one of the plurality of video cameras; calculating, by the processor, the by spot occupancy of the parking lot based on the occupancy status change metric; and updating, by the processor, the occupancy table to indicate a particular parking spot of the plurality of parking spots that changed from empty to occupied for the ingress sensor event or from occupied to empty for the egress sensor event.
2,400
8,783
8,783
15,857,869
2,424
Methods, systems, and apparatuses are described for performing trick plays of segmented video content are provided. A point at which a trick play begins may be based on a playback time associated with a video segment that includes the video frame currently displayed when a request to start the trick play is received. A point at which to resume playback of the normal rate video content may be similarly based on a trick play playback time associated with a trick play video segment that includes the trick play video frame currently outputted when a request to stop the trick play is received.
1. A method comprising: receiving, by a video playback device and during output of segmented video content, a request to start a trick play; determining, based on a playback time associated with a video frame of the segmented video content that is outputted during receipt of the request to start the trick play, a video segment of segmented trick play video content at which to begin the trick play; obtaining the segmented trick play video content at a rate at which one or more segments of the segmented video content were obtained; and causing playback of the segmented trick play video content beginning with the determined video segment. 2. The method of claim 1, wherein the playback time is a starting playback time of a corresponding video segment, of the segmented video content, comprising the video frame. 3. The method of claim 1, wherein the video segment of the segmented trick play video content at which to begin the trick play is determined by: determining a trick play playback time that corresponds to the playback time; and selecting, based on the trick play playback time, the determined video segment from among a plurality of video segments of the segmented trick play video content. 4. The method of claim 3, wherein the trick play playback time is determined at least by dividing the playback time by a playback rate of the trick play. 5. The method of claim 4, wherein: the trick play is a rewind trick play; video frames of the segmented trick play video content are arranged in reverse order relative to the segmented video content; and the trick play playback time is further determined by subtracting, from an ending playback time of the segmented trick play video content, a result obtained by the dividing. 6. The method of claim 1, wherein: the segmented video content comprises a set of video frames; and the segmented trick play video content comprises a subset of the set of video frames of the segmented video content. 7. The method of claim 1, wherein: the segmented video content comprises first segmented trick play video content associated with a first playback rate; and the segmented trick play video content comprises second segmented trick play video content associated with a second playback rate that is different than the first playback rate. 8. A method comprising: receiving, by a video playback device and during output of segmented trick play video content, a request to stop a trick play; determining, based on a trick play playback time associated with a video frame of the segmented trick play video content that is outputted during receipt of the request to stop the trick play, a video segment of segmented video content at which to resume playback of the segmented video content; obtaining the segmented video content at a rate at which one or more segments of the segmented trick play video content were obtained; and causing playback of the segmented video content beginning with the determined video segment. 9. The method of claim 8, wherein the trick play playback time is a starting playback time of a corresponding video segment, of the segmented trick play video content, comprising the video frame. 10. The method of claim 8, wherein the video segment at which to resume playback of the segmented video content is determined by: determining a playback time that corresponds to the trick play playback time; and selecting, based on the playback time, the determined video segment from among a plurality of video segments of the segmented video content. 11. The method of claim 10, wherein a starting playback time of the determined video segment is greater than or equal to the playback time. 12. The method of claim 10, wherein: the trick play is a fast-forward trick play; and the playback time is determined by multiplying the trick play playback time by a playback rate of the fast-forward trick play. 13. The method of claim 10, wherein: the trick play is a rewind trick play; video frames of the segmented trick play video content are arranged in reverse order relative to the segmented video content; and the playback time is determined by multiplying a playback rate of the rewind trick play with a result obtained by subtracting the trick play playback time from an ending playback time of the segmented trick play video content. 14. The method of claim 8, wherein: the segmented video content comprises first segmented trick play video content associated with a first playback rate; and the segmented trick play video content comprises second segmented trick play video content associated with a second playback rate that is different than the first playback rate. 15. A method comprising: outputting, by a video playback device, first segmented video content; after receiving a request to start a trick play, obtaining a first video segment of second segmented content at a rate at which one or more segments of the first segmented video content were obtained, wherein the first video segment is determined based on a first playback time associated with a first video frame of the first segmented video content that is outputted during receipt of the request to start the trick play; initiating playback of the first video segment of second segmented video content; and after receiving a request to stop the trick play, initiating playback of a second video segment of the first segmented video content, wherein the second video segment is determined based on a second playback time associated with a second video frame of the second segmented video content that is outputted during receipt of the request to stop the trick play. 16. The method of claim 15, wherein: the first segmented video content comprises segmented normal rate video content; and the second segmented video content comprises segmented trick play video content. 17. The method of claim 15, wherein: the first segmented video content comprises first segmented trick play video content associated with a first playback rate; and the second segmented video content comprises second segmented trick play video content associated with a second playback rate that is different than the first playback rate. 18. The method of claim 15, wherein: the trick play is a rewind trick play; and video frames of the second segmented video content are arranged in reverse order relative to the first segmented video content. 19. The method of claim 15, further comprising: after receiving the request to start the trick play, requesting the first video segment from a video content provider; and after receiving the request to stop the trick play, requesting the second video segment from the video content provider. 20. The method of claim 15, further comprising: receiving, by the video playback device and from a content provider, the first segmented video content simultaneously with the second segmented video content.
Methods, systems, and apparatuses are described for performing trick plays of segmented video content are provided. A point at which a trick play begins may be based on a playback time associated with a video segment that includes the video frame currently displayed when a request to start the trick play is received. A point at which to resume playback of the normal rate video content may be similarly based on a trick play playback time associated with a trick play video segment that includes the trick play video frame currently outputted when a request to stop the trick play is received.1. A method comprising: receiving, by a video playback device and during output of segmented video content, a request to start a trick play; determining, based on a playback time associated with a video frame of the segmented video content that is outputted during receipt of the request to start the trick play, a video segment of segmented trick play video content at which to begin the trick play; obtaining the segmented trick play video content at a rate at which one or more segments of the segmented video content were obtained; and causing playback of the segmented trick play video content beginning with the determined video segment. 2. The method of claim 1, wherein the playback time is a starting playback time of a corresponding video segment, of the segmented video content, comprising the video frame. 3. The method of claim 1, wherein the video segment of the segmented trick play video content at which to begin the trick play is determined by: determining a trick play playback time that corresponds to the playback time; and selecting, based on the trick play playback time, the determined video segment from among a plurality of video segments of the segmented trick play video content. 4. The method of claim 3, wherein the trick play playback time is determined at least by dividing the playback time by a playback rate of the trick play. 5. The method of claim 4, wherein: the trick play is a rewind trick play; video frames of the segmented trick play video content are arranged in reverse order relative to the segmented video content; and the trick play playback time is further determined by subtracting, from an ending playback time of the segmented trick play video content, a result obtained by the dividing. 6. The method of claim 1, wherein: the segmented video content comprises a set of video frames; and the segmented trick play video content comprises a subset of the set of video frames of the segmented video content. 7. The method of claim 1, wherein: the segmented video content comprises first segmented trick play video content associated with a first playback rate; and the segmented trick play video content comprises second segmented trick play video content associated with a second playback rate that is different than the first playback rate. 8. A method comprising: receiving, by a video playback device and during output of segmented trick play video content, a request to stop a trick play; determining, based on a trick play playback time associated with a video frame of the segmented trick play video content that is outputted during receipt of the request to stop the trick play, a video segment of segmented video content at which to resume playback of the segmented video content; obtaining the segmented video content at a rate at which one or more segments of the segmented trick play video content were obtained; and causing playback of the segmented video content beginning with the determined video segment. 9. The method of claim 8, wherein the trick play playback time is a starting playback time of a corresponding video segment, of the segmented trick play video content, comprising the video frame. 10. The method of claim 8, wherein the video segment at which to resume playback of the segmented video content is determined by: determining a playback time that corresponds to the trick play playback time; and selecting, based on the playback time, the determined video segment from among a plurality of video segments of the segmented video content. 11. The method of claim 10, wherein a starting playback time of the determined video segment is greater than or equal to the playback time. 12. The method of claim 10, wherein: the trick play is a fast-forward trick play; and the playback time is determined by multiplying the trick play playback time by a playback rate of the fast-forward trick play. 13. The method of claim 10, wherein: the trick play is a rewind trick play; video frames of the segmented trick play video content are arranged in reverse order relative to the segmented video content; and the playback time is determined by multiplying a playback rate of the rewind trick play with a result obtained by subtracting the trick play playback time from an ending playback time of the segmented trick play video content. 14. The method of claim 8, wherein: the segmented video content comprises first segmented trick play video content associated with a first playback rate; and the segmented trick play video content comprises second segmented trick play video content associated with a second playback rate that is different than the first playback rate. 15. A method comprising: outputting, by a video playback device, first segmented video content; after receiving a request to start a trick play, obtaining a first video segment of second segmented content at a rate at which one or more segments of the first segmented video content were obtained, wherein the first video segment is determined based on a first playback time associated with a first video frame of the first segmented video content that is outputted during receipt of the request to start the trick play; initiating playback of the first video segment of second segmented video content; and after receiving a request to stop the trick play, initiating playback of a second video segment of the first segmented video content, wherein the second video segment is determined based on a second playback time associated with a second video frame of the second segmented video content that is outputted during receipt of the request to stop the trick play. 16. The method of claim 15, wherein: the first segmented video content comprises segmented normal rate video content; and the second segmented video content comprises segmented trick play video content. 17. The method of claim 15, wherein: the first segmented video content comprises first segmented trick play video content associated with a first playback rate; and the second segmented video content comprises second segmented trick play video content associated with a second playback rate that is different than the first playback rate. 18. The method of claim 15, wherein: the trick play is a rewind trick play; and video frames of the second segmented video content are arranged in reverse order relative to the first segmented video content. 19. The method of claim 15, further comprising: after receiving the request to start the trick play, requesting the first video segment from a video content provider; and after receiving the request to stop the trick play, requesting the second video segment from the video content provider. 20. The method of claim 15, further comprising: receiving, by the video playback device and from a content provider, the first segmented video content simultaneously with the second segmented video content.
2,400
8,784
8,784
15,161,696
2,481
Apparatus and associated methods relate to aligning a taxi-assist camera such that each image frame of real-time video that the camera generates has a standard presentation format. The taxi-assist camera is configured to be mounted on an aircraft and oriented such that each image frame includes both a specific feature of the aircraft and of nearby objects external to the aircraft. The specific feature of the aircraft is detected and a location within the image frame of the specific feature is determined. The determined location within the image frame is compared with a reference location. A transformation operator is generated to transform the image frame such that the specific feature of the aircraft will be located within the image at a location corresponding to the reference location. The transformation operator is then applied to each of the image frames of the real-time video that the camera generates.
1. An alignment system comprising: a taxi-assist camera configured to be mounted to an aircraft and oriented to provide real-time video during taxi operations of both a specific feature(s) of the aircraft and of nearby objects external to the aircraft, the real-time video comprising a time sequence of image frames, each image frame including a two-dimensional array of pixel data; a feature detector configured to detect the specific feature(s) of the aircraft within at least one of the image frames; a feature comparator configured to compare the detected specific feature(s) within the at least one of the image frames with a reference feature within a reference image; and an image transformation operator configured to transform each of the image frames of the real-time video into a transformed image frame such that the detected specific feature(s) is located at a two-dimensional location within each of the transformed image frames, the two-dimensional location within each of the transformed image frames corresponding to a two-dimensional reference location corresponding to the reference feature within the reference image. 2. The alignment system of claim 1, wherein the feature detector comprises: an edge detector configured to generate at least one edge image corresponding to the at least one of the image frames, the edge image comprising a two-dimensional array of pixel data, each of the pixel data being a function of a difference between pixels located within a distance of threshold of one another. 3. The alignment system of claim 2, wherein the edge detector comprises: a Sobel filter to measure a two-dimensional spatial gradient of the at least one image frame. 4. The alignment system of claim 1, wherein the feature detector comprises: a noise reducer configured to zero the pixel data of the at least one edge image for pixels that have an amplitude that is less than a threshold. 5. The alignment system of claim 4, wherein the noise reducer is further configured to adaptively set the threshold so that fewer than a predetermined number of pixels have amplitudes that are not less than the threshold, and thereby are not zeroed. 6. The alignment system of claim 1, wherein the feature detector is further configured to detect a first feature having a first orientation within the two-dimensional array of pixel data, and a second feature having a second orientation not parallel to the first orientation within the two-dimensional array of pixel data. 7. The alignment system of claim 6, wherein the feature comparator is further configured to compare the first feature within the at least one of the image frames with a first reference feature within the reference image, and to compare the second feature within the at least one of the image frames with a second reference feature within the reference image. 8. The alignment system of claim 7, wherein the image transformation operator is an image translation operator, the image translation operator configured to translate each of the image frames of the real-time video both horizontally and vertically so as to translate both the first and second image features to locations within the image frames corresponding to the first and second reference features, respectively. 9. The alignment system of claim 7, wherein the image transformation operator is an image translation and rotation operator, the image translation and rotation operator configured to translate both horizontally and vertically and rotate each of the image frames of the real-time video so as to transform both the first and second image features to locations within the image frames corresponding to the first and second reference features, respectively. 10. The alignment system of claim 7, wherein the image transformation operator is an image translation, rotation, and shear operator, the image translation, rotation and shear operator configured to translate both horizontally and vertically, rotate and shear each of the image frames of the real-time video so as to transform both the first and second image features to locations within the image frames corresponding to the first and second reference features, respectively. 11. The alignment system of claim 1, wherein the feature detector is configured to only detect features located within a two-dimensional subarray of pixel data. 12. The alignment system of claim 1, wherein the feature(s) comprise the landing gear of the aircraft. 13. The alignment system of claim 1, wherein the feature(s) comprise the wing of the aircraft. 14. The alignment system of claim 11, further comprising an image cropper configured to crop the transformed image frames of the real-time video so as make a standard presentation of the image frames, the standard presentation having the feature(s) located in a standard location with respect to edges of the image frames. 15. The alignment system of claim 2, wherein the edge detector is further configured to reduce a thickness of edge image features to less than a predetermined thickness. 16. A method for aligning a taxi-assist camera of an aircraft to a standard view, the method comprising the steps of: obtaining a first image from a camera mounted on an aircraft, the first image comprising a two-dimensional array of pixel intensity data; calculating edge intensity data using the obtained first image, wherein the calculating uses a function of differences between pixel intensity data of pixels within a local vicinity; creating a second image comprising a two-dimensional array of the calculated edge intensity data; thresholding the second image to zero the magnitude of edge intensity data that are below a predetermined threshold, while edges intensity data that are above the predetermined threshold survive; selecting, from the surviving edges, a first target edge oriented in a first orientation and a second target edge oriented in a second orientation, the first and second orientations providing a basis that spans the two-dimensional array of edge intensity data; calculating a first offset between the selected first edge and a first reference location and a second offset between the selected second edge and a second reference location; generating a transformation operator that transforms the second image such that the selected first edge is located at the first reference location and the selected second edge is located at the second reference location; and applying the generated transformation operator in real-time to imagery obtained by the camera mounted on the aircraft. 17. The method of claim 15, wherein generating a transformation operator comprises: calculating a translation operation. 18. The method of claim 15, wherein generating a transformation operator comprises: calculating a rotation operation. 19. The method of claim 15, wherein generating a transformation operator comprises: calculating a shear operation. 20. The method of claim 15, further comprising: thinning the calculated edges that have a thickness greater than a threshold number of pixel widths.
Apparatus and associated methods relate to aligning a taxi-assist camera such that each image frame of real-time video that the camera generates has a standard presentation format. The taxi-assist camera is configured to be mounted on an aircraft and oriented such that each image frame includes both a specific feature of the aircraft and of nearby objects external to the aircraft. The specific feature of the aircraft is detected and a location within the image frame of the specific feature is determined. The determined location within the image frame is compared with a reference location. A transformation operator is generated to transform the image frame such that the specific feature of the aircraft will be located within the image at a location corresponding to the reference location. The transformation operator is then applied to each of the image frames of the real-time video that the camera generates.1. An alignment system comprising: a taxi-assist camera configured to be mounted to an aircraft and oriented to provide real-time video during taxi operations of both a specific feature(s) of the aircraft and of nearby objects external to the aircraft, the real-time video comprising a time sequence of image frames, each image frame including a two-dimensional array of pixel data; a feature detector configured to detect the specific feature(s) of the aircraft within at least one of the image frames; a feature comparator configured to compare the detected specific feature(s) within the at least one of the image frames with a reference feature within a reference image; and an image transformation operator configured to transform each of the image frames of the real-time video into a transformed image frame such that the detected specific feature(s) is located at a two-dimensional location within each of the transformed image frames, the two-dimensional location within each of the transformed image frames corresponding to a two-dimensional reference location corresponding to the reference feature within the reference image. 2. The alignment system of claim 1, wherein the feature detector comprises: an edge detector configured to generate at least one edge image corresponding to the at least one of the image frames, the edge image comprising a two-dimensional array of pixel data, each of the pixel data being a function of a difference between pixels located within a distance of threshold of one another. 3. The alignment system of claim 2, wherein the edge detector comprises: a Sobel filter to measure a two-dimensional spatial gradient of the at least one image frame. 4. The alignment system of claim 1, wherein the feature detector comprises: a noise reducer configured to zero the pixel data of the at least one edge image for pixels that have an amplitude that is less than a threshold. 5. The alignment system of claim 4, wherein the noise reducer is further configured to adaptively set the threshold so that fewer than a predetermined number of pixels have amplitudes that are not less than the threshold, and thereby are not zeroed. 6. The alignment system of claim 1, wherein the feature detector is further configured to detect a first feature having a first orientation within the two-dimensional array of pixel data, and a second feature having a second orientation not parallel to the first orientation within the two-dimensional array of pixel data. 7. The alignment system of claim 6, wherein the feature comparator is further configured to compare the first feature within the at least one of the image frames with a first reference feature within the reference image, and to compare the second feature within the at least one of the image frames with a second reference feature within the reference image. 8. The alignment system of claim 7, wherein the image transformation operator is an image translation operator, the image translation operator configured to translate each of the image frames of the real-time video both horizontally and vertically so as to translate both the first and second image features to locations within the image frames corresponding to the first and second reference features, respectively. 9. The alignment system of claim 7, wherein the image transformation operator is an image translation and rotation operator, the image translation and rotation operator configured to translate both horizontally and vertically and rotate each of the image frames of the real-time video so as to transform both the first and second image features to locations within the image frames corresponding to the first and second reference features, respectively. 10. The alignment system of claim 7, wherein the image transformation operator is an image translation, rotation, and shear operator, the image translation, rotation and shear operator configured to translate both horizontally and vertically, rotate and shear each of the image frames of the real-time video so as to transform both the first and second image features to locations within the image frames corresponding to the first and second reference features, respectively. 11. The alignment system of claim 1, wherein the feature detector is configured to only detect features located within a two-dimensional subarray of pixel data. 12. The alignment system of claim 1, wherein the feature(s) comprise the landing gear of the aircraft. 13. The alignment system of claim 1, wherein the feature(s) comprise the wing of the aircraft. 14. The alignment system of claim 11, further comprising an image cropper configured to crop the transformed image frames of the real-time video so as make a standard presentation of the image frames, the standard presentation having the feature(s) located in a standard location with respect to edges of the image frames. 15. The alignment system of claim 2, wherein the edge detector is further configured to reduce a thickness of edge image features to less than a predetermined thickness. 16. A method for aligning a taxi-assist camera of an aircraft to a standard view, the method comprising the steps of: obtaining a first image from a camera mounted on an aircraft, the first image comprising a two-dimensional array of pixel intensity data; calculating edge intensity data using the obtained first image, wherein the calculating uses a function of differences between pixel intensity data of pixels within a local vicinity; creating a second image comprising a two-dimensional array of the calculated edge intensity data; thresholding the second image to zero the magnitude of edge intensity data that are below a predetermined threshold, while edges intensity data that are above the predetermined threshold survive; selecting, from the surviving edges, a first target edge oriented in a first orientation and a second target edge oriented in a second orientation, the first and second orientations providing a basis that spans the two-dimensional array of edge intensity data; calculating a first offset between the selected first edge and a first reference location and a second offset between the selected second edge and a second reference location; generating a transformation operator that transforms the second image such that the selected first edge is located at the first reference location and the selected second edge is located at the second reference location; and applying the generated transformation operator in real-time to imagery obtained by the camera mounted on the aircraft. 17. The method of claim 15, wherein generating a transformation operator comprises: calculating a translation operation. 18. The method of claim 15, wherein generating a transformation operator comprises: calculating a rotation operation. 19. The method of claim 15, wherein generating a transformation operator comprises: calculating a shear operation. 20. The method of claim 15, further comprising: thinning the calculated edges that have a thickness greater than a threshold number of pixel widths.
2,400
8,785
8,785
14,271,643
2,483
An image measuring apparatus includes an image capturer capturing an image of a measured object and outputting image data; a memory storing a plurality of first measurement data including the image data; a transmitter transmitting the first measurement data stored in the memory; a controller controlling the image capturer, the memory, and the transmitter; and a position control system controlling a position of the image capturer and outputting second measurement data including focus position data of the image capturer. During position control, the controller capturers an image at a predetermined interval and stores in the memory the first measurement data and the second measurement data so as to be associated with each other. The transmitter transmits the first measurement data stored in the memory depending on a communication status.
1. An image measuring apparatus comprising: an image capturer configured to capture an image of a measured object and outputting image data; a memory configured to store a plurality of first measurement data including the image data; a transmitter configured to transmit the first measurement data stored in the memory; a controller configured to control the image capturer, the memory, and the transmitter; and a position controller configured to control a position of the image capturer and output second measurement data including focus position data of the image capturer, wherein: when the position controller controls the position of the image capturer, the controller allows the image capturer to capture an image at a predetermined interval and stores in the memory the first measurement data and the second measurement data so as to be associated with each other, and the transmitter transmits the first measurement data stored in the memory depending on a communication status. 2. The image measuring apparatus according to claim 1, further comprising: a calculator configured to calculate a focus position of the image capturer from the first measurement data and the second measurement data input from the transmitter through a universal bus, wherein: the first measurement data include the image data and a first timestamp, the second measurement data include the focus position data and a second timestamp, and the calculator is configured to compare the first timestamp with the second timestamp to associate the image data with the focus position data, and is further configured to calculate the focus position of the image capturer based on the associated image data and focus position data. 3. The image measuring apparatus according to claim 1, further comprising: a calculator configured to calculate a focus position of the image capturer from the first measurement data and the second measurement data input from the transmitter through a universal bus, wherein: the memory is further configured to store the second measurement data together with the first measurement data, the transmitter is configured to transmit the first measurement data and the second measurement data associated with each other, and the calculator is configured to calculate the focus position of the image capturer based on the associated image data and focus position data. 4. A non-transitory computer-readable medium for an image measuring apparatus, the image measuring apparatus having an image capturer capturing an image of a measured object and outputting image data, a memory storing a plurality of first measurement data including the image data, a transmitter transmitting the first measurement data stored in the memory, and a position controller controlling a position of the image capturer and outputting second measurement data including focus position data of the image capturer, the computer readable medium instructing the position controller to control the position of the image capturer, the computer-readable medium including an executable set of instructions which, when executed by a processor, causes the processor to execute operations comprising: instructing the image capturer to capture an image at a predetermined interval and storing in the memory the first measurement data and the second measurement data so as to be associated with each other; and instructing a calculator to calculate a focus position of the image capturer from the first measurement data and the second measurement data input from the transmitter through a universal bus, the calculator connected to the image measuring apparatus which transmits the first measurement data stored in the memory depending on a communication status of the transmitter.
An image measuring apparatus includes an image capturer capturing an image of a measured object and outputting image data; a memory storing a plurality of first measurement data including the image data; a transmitter transmitting the first measurement data stored in the memory; a controller controlling the image capturer, the memory, and the transmitter; and a position control system controlling a position of the image capturer and outputting second measurement data including focus position data of the image capturer. During position control, the controller capturers an image at a predetermined interval and stores in the memory the first measurement data and the second measurement data so as to be associated with each other. The transmitter transmits the first measurement data stored in the memory depending on a communication status.1. An image measuring apparatus comprising: an image capturer configured to capture an image of a measured object and outputting image data; a memory configured to store a plurality of first measurement data including the image data; a transmitter configured to transmit the first measurement data stored in the memory; a controller configured to control the image capturer, the memory, and the transmitter; and a position controller configured to control a position of the image capturer and output second measurement data including focus position data of the image capturer, wherein: when the position controller controls the position of the image capturer, the controller allows the image capturer to capture an image at a predetermined interval and stores in the memory the first measurement data and the second measurement data so as to be associated with each other, and the transmitter transmits the first measurement data stored in the memory depending on a communication status. 2. The image measuring apparatus according to claim 1, further comprising: a calculator configured to calculate a focus position of the image capturer from the first measurement data and the second measurement data input from the transmitter through a universal bus, wherein: the first measurement data include the image data and a first timestamp, the second measurement data include the focus position data and a second timestamp, and the calculator is configured to compare the first timestamp with the second timestamp to associate the image data with the focus position data, and is further configured to calculate the focus position of the image capturer based on the associated image data and focus position data. 3. The image measuring apparatus according to claim 1, further comprising: a calculator configured to calculate a focus position of the image capturer from the first measurement data and the second measurement data input from the transmitter through a universal bus, wherein: the memory is further configured to store the second measurement data together with the first measurement data, the transmitter is configured to transmit the first measurement data and the second measurement data associated with each other, and the calculator is configured to calculate the focus position of the image capturer based on the associated image data and focus position data. 4. A non-transitory computer-readable medium for an image measuring apparatus, the image measuring apparatus having an image capturer capturing an image of a measured object and outputting image data, a memory storing a plurality of first measurement data including the image data, a transmitter transmitting the first measurement data stored in the memory, and a position controller controlling a position of the image capturer and outputting second measurement data including focus position data of the image capturer, the computer readable medium instructing the position controller to control the position of the image capturer, the computer-readable medium including an executable set of instructions which, when executed by a processor, causes the processor to execute operations comprising: instructing the image capturer to capture an image at a predetermined interval and storing in the memory the first measurement data and the second measurement data so as to be associated with each other; and instructing a calculator to calculate a focus position of the image capturer from the first measurement data and the second measurement data input from the transmitter through a universal bus, the calculator connected to the image measuring apparatus which transmits the first measurement data stored in the memory depending on a communication status of the transmitter.
2,400
8,786
8,786
15,303,852
2,436
First transistor logic is arranged by a first logic provider in circuit form and provides a minimum of functionality of the semiconductor device employed to bring up the semiconductor device, wherein the minimum of functionality is encrypted using a first encryption key. Second transistor logic is arranged by a second logic provider, different than the first logic provider, in circuit form to include security keys capable to perform cryptographic capabilities using a second encryption key. The second transistor logic further includes functionality that completes the semiconductor device as a chip device and is ready to process secure communication signals.
1. A semiconductor device that processes communication signals, comprising: first transistor logic arranged by a first logic provider in circuit form that provides a minimum of functionality of the semiconductor device employed to bring up the semiconductor device, wherein the minimum of functionality is encrypted using a first encryption key, second transistor logic arranged by a second logic provider, different than the first logic provider, in circuit form to include security keys capable to perform cryptographic capabilities using a second encryption key (302 a), wherein the second transistor logic further includes functionality that completes the semiconductor device as a chip device and is ready to process secure communication signals. 2. (canceled) 3. (canceled) 4. The semiconductor device of claim 1, wherein the minimum of functionality is that transistor logic needed only to start the device in a low level operating mode and enable a routine that starts basic functions of the device. 5. The semiconductor device of claim 4, wherein the basic function is selected to enable the operator to install his or her cryptographic keys (381) and/or digital rights management DRM credentials (302 a). 6. A chipset, comprising: a memory, an interface, a media gateway configured to provide media functionality, a processor configured to retrieve, from the memory, first boot instructions encrypted by a cryptographic key (380), wherein the processor is configured to decrypt the first boot instructions and to execute the first boot instructions to operate in an enabling mode (1), wherein the processor, when operating in the enabling mode (1), is configured to receive configuration data and to write at least parts of the configuration data comprising second boot instructions to the memory. 7. The chipset of claim 6, wherein the second boot instructions enable the processor to control the media gateway to provide the media functionality. 8. The chipset of claim 6, wherein the second boot instructions are encrypted by a further cryptographic key (381). 9. The chipset of claim 6, wherein the configuration data comprises a media authentication credential (302 a) which selectively grant access to the media functionality. 10. The chipset of claim 6, wherein the second boot instructions enable the processor to receive media authentication credential (302 a) which selectively grant access to the media functionality. 11. The chipset of claim 6, wherein the processor, when operating in the enabling mode (1), is configured to disable any further functionality beyond said receiving of the configuration data and said writing of the at least parts of configuration data to the memory. 12. The chipset of claim 6, wherein the chipset is configured to disable execution of the first boot instructions in response to writing the at least parts of the configuration data to the memory. 13. The chipset claim 6, wherein said disabling of the execution of the first boot instructions is hardware-programmed. 14. (canceled) 15. (canceled) 16. (canceled) 17. (canceled) 18. (canceled) 19. A method comprising: writing, to a memory, first boot instructions encrypted by a cryptographic key, wherein execution of the first boot instructions selectively enables to receive configuration data and to write at least parts of the configuration data comprising second boot instructions to the memory. 20. A method, comprising: retrieving, from a memory, first boot instructions encrypted by a cryptographic key, decrypting the first boot instructions, executing the first boot instructions to operate in an enabling mode, in the enabling mode: receiving configuration data, in the enabling mode: writing at least parts of the configuration data to the memory, the at least parts of the configuration data comprising second boot instructions. 21. The method of claim 20, wherein the second boot instructions are encrypted by a further cryptographic key. 22. (canceled) 23. (canceled) 24. The method of claim 20, further comprising: in the enabling mode: disabling any further functionality beyond said receiving of the configuration data and said writing of the at least parts of the configuration data to the memory. 25. The method of claim 20, further comprising: in the enabling mode: disabling execution of the first boot instructions in response to said writing of the at least parts of the configuration data to the memory. 26. (canceled) 27. The method of claim 20, further comprising: receiving a multimedia track via a media gateway, decoding the multimedia track employing a media authentication credential. 28. The method of claim 20, further comprising: retrieving the second boot instructions from the memory, executing the second boot instructions. 29. The method of claim 28, further comprising: in response to executing the second boot instructions: installing drivers of chipset components. 30. The method of claim 13, wherein the method is executed by the chipset of claim 4.
First transistor logic is arranged by a first logic provider in circuit form and provides a minimum of functionality of the semiconductor device employed to bring up the semiconductor device, wherein the minimum of functionality is encrypted using a first encryption key. Second transistor logic is arranged by a second logic provider, different than the first logic provider, in circuit form to include security keys capable to perform cryptographic capabilities using a second encryption key. The second transistor logic further includes functionality that completes the semiconductor device as a chip device and is ready to process secure communication signals.1. A semiconductor device that processes communication signals, comprising: first transistor logic arranged by a first logic provider in circuit form that provides a minimum of functionality of the semiconductor device employed to bring up the semiconductor device, wherein the minimum of functionality is encrypted using a first encryption key, second transistor logic arranged by a second logic provider, different than the first logic provider, in circuit form to include security keys capable to perform cryptographic capabilities using a second encryption key (302 a), wherein the second transistor logic further includes functionality that completes the semiconductor device as a chip device and is ready to process secure communication signals. 2. (canceled) 3. (canceled) 4. The semiconductor device of claim 1, wherein the minimum of functionality is that transistor logic needed only to start the device in a low level operating mode and enable a routine that starts basic functions of the device. 5. The semiconductor device of claim 4, wherein the basic function is selected to enable the operator to install his or her cryptographic keys (381) and/or digital rights management DRM credentials (302 a). 6. A chipset, comprising: a memory, an interface, a media gateway configured to provide media functionality, a processor configured to retrieve, from the memory, first boot instructions encrypted by a cryptographic key (380), wherein the processor is configured to decrypt the first boot instructions and to execute the first boot instructions to operate in an enabling mode (1), wherein the processor, when operating in the enabling mode (1), is configured to receive configuration data and to write at least parts of the configuration data comprising second boot instructions to the memory. 7. The chipset of claim 6, wherein the second boot instructions enable the processor to control the media gateway to provide the media functionality. 8. The chipset of claim 6, wherein the second boot instructions are encrypted by a further cryptographic key (381). 9. The chipset of claim 6, wherein the configuration data comprises a media authentication credential (302 a) which selectively grant access to the media functionality. 10. The chipset of claim 6, wherein the second boot instructions enable the processor to receive media authentication credential (302 a) which selectively grant access to the media functionality. 11. The chipset of claim 6, wherein the processor, when operating in the enabling mode (1), is configured to disable any further functionality beyond said receiving of the configuration data and said writing of the at least parts of configuration data to the memory. 12. The chipset of claim 6, wherein the chipset is configured to disable execution of the first boot instructions in response to writing the at least parts of the configuration data to the memory. 13. The chipset claim 6, wherein said disabling of the execution of the first boot instructions is hardware-programmed. 14. (canceled) 15. (canceled) 16. (canceled) 17. (canceled) 18. (canceled) 19. A method comprising: writing, to a memory, first boot instructions encrypted by a cryptographic key, wherein execution of the first boot instructions selectively enables to receive configuration data and to write at least parts of the configuration data comprising second boot instructions to the memory. 20. A method, comprising: retrieving, from a memory, first boot instructions encrypted by a cryptographic key, decrypting the first boot instructions, executing the first boot instructions to operate in an enabling mode, in the enabling mode: receiving configuration data, in the enabling mode: writing at least parts of the configuration data to the memory, the at least parts of the configuration data comprising second boot instructions. 21. The method of claim 20, wherein the second boot instructions are encrypted by a further cryptographic key. 22. (canceled) 23. (canceled) 24. The method of claim 20, further comprising: in the enabling mode: disabling any further functionality beyond said receiving of the configuration data and said writing of the at least parts of the configuration data to the memory. 25. The method of claim 20, further comprising: in the enabling mode: disabling execution of the first boot instructions in response to said writing of the at least parts of the configuration data to the memory. 26. (canceled) 27. The method of claim 20, further comprising: receiving a multimedia track via a media gateway, decoding the multimedia track employing a media authentication credential. 28. The method of claim 20, further comprising: retrieving the second boot instructions from the memory, executing the second boot instructions. 29. The method of claim 28, further comprising: in response to executing the second boot instructions: installing drivers of chipset components. 30. The method of claim 13, wherein the method is executed by the chipset of claim 4.
2,400
8,787
8,787
14,848,612
2,483
An imaging system may include an image sensor, and a connector that electrically connects the image sensor with electrical cabling. The image sensor may have electrical contacts integrated with an outer surface of an outer package. The connector may include a circuit board having opposing planar surfaces and a plurality of electrical connections that electrically connect the electrical cabling with the electrical contacts. The electrical connections may be bonded to the electrical contacts and disposed on one or both of the opposing planar surfaces. At least one of the opposing planar surfaces may form an angle with the outer surface that is greater than zero degrees and less than 180 degrees.
1. An imaging system comprising: an image sensor comprising: an outer package having an outer surface; and a plurality of electrical contacts integrated with the outer surface; and a circuit board connector comprising: a first planar surface; a second planar surface opposite the first planar surface; and a plurality of electrical connections, wherein each of the plurality of electrical connections comprises a connection portion that is bonded to one of the plurality of electrical contacts; wherein each of the connection portions is disposed on the first planar surface or on the second planar surface, and wherein at least one of the first planar surface or the second planar surface forms an angle with the outer surface of the outer package that is greater than zero degrees and less than 180 degrees. 2. The imaging system of claim 1, wherein the circuit board connector further comprises: a first edge where the first planar surface meets a side surface; and a second edge where the second planar surface meets the side surface, wherein each of the plurality of electrical contacts is adjacent to the first edge or the second edge. 3. The imaging system of claim 2, wherein each of the connection portions of the electrical connections is disposed along the first edge or the second edge and aligned with one of the plurality of electrical contacts. 4. The imaging system of claim 2, wherein a first number of connection portions disposed on the first surface is equal to a first number of the plurality of electrical contacts adjacent to the first edge, and wherein a second number of the connection portions disposed on the second surface is equal to a second number of the plurality of electrical contacts adjacent the second edge. 5. The imaging system of claim 1, wherein the plurality of electrical contacts has a one-dimensional arrangement integrated with the outer surface of the outer package. 6. The imaging system of claim 1, wherein the plurality of electrical contacts has a two-dimensional arrangement integrated with the outer surface of the outer package, and wherein the side surface of the circuit board intersects the two-dimensional arrangement. 7. The imaging system of claim 6, wherein the two-dimensional arrangement comprises an M-by-N array, wherein M and N are integers. 8. The imaging system of claim 1, wherein the connection portions comprises first connection portions, and wherein each of the electrical connections further comprises a second connection portion, wherein each of the second connection portions is configured to bonded to one of a plurality of elongate conductive members of electrical cabling. 9. The imaging system of claim 1, wherein at least one of the plurality of electrical connections comprises a conductive via extending from the first planar surface to the second planar surface. 10. The imaging system of claim 1, wherein the outer surface of the outer package comprises a first outer surface, wherein the outer package further comprises at least one second outer surface, and wherein the circuit board connector further comprises at least one wing that engages with the at least one second outer surface. 11. The imaging system of claim 10, wherein each of the at least one second outer surface faces in a direction other than parallel with a direction in which the first outer surface faces. 12. The imaging system of claim 1, wherein the plurality of electrical connections comprises a power connection configured to communicate a power signal to power the image sensor and a ground connection configured to serve as a ground reference for the power signal, and wherein the imaging system further comprises a capacitor having a first end bonded to the power connection and a second end bonded to the ground connection. 13. The imaging system of claim 1, wherein the plurality of electrical contacts comprises at least one of: a power electrical contact configured to communicate a power signal that powers the image sensor; a ground electrical contact configured to communicate a ground reference signal; a data electrical contact configured to communicate a data signal comprising captured image data; or a clock signal electrical contact configured to communicate a clock signal for operation of the image sensor. 14. The imaging system of claim 1, wherein the circuit board connector further comprises a side surface adjacent each of the first planar surface and the second planar surface, and wherein the side surface faces the outer surface of the image sensor. 15. The imaging system of claim 1, wherein the plurality of electrical contacts comprises a plurality of solder balls configured as a ball grid array. 16. The imaging system of claim 1, wherein the angle is substantially ninety degrees. 17. The imaging system of claim 1, wherein the angle comprises a first angle, wherein the first planar surface forms the first angle, and wherein the second planar surface forms a second angle with the outer surface, the second angle being greater than zero degrees and less than 180 degrees. 18. The imaging system of claim 17, wherein a sum of the first angle and the second angle is less than 360 degrees. 19. The imaging system of claim 18, wherein the sum is substantially 180 degrees. 20. The imaging system of claim 1, wherein the imaging sensor is oriented about an axis that extends in a direction in which the outer surface faces, wherein the imaging sensor has a first elliptical axial profile, wherein the imaging sensor and circuit board connector combined have a second elliptical axial profile, and wherein the second elliptical axial profile is not greater than the first elliptical axial profile.
An imaging system may include an image sensor, and a connector that electrically connects the image sensor with electrical cabling. The image sensor may have electrical contacts integrated with an outer surface of an outer package. The connector may include a circuit board having opposing planar surfaces and a plurality of electrical connections that electrically connect the electrical cabling with the electrical contacts. The electrical connections may be bonded to the electrical contacts and disposed on one or both of the opposing planar surfaces. At least one of the opposing planar surfaces may form an angle with the outer surface that is greater than zero degrees and less than 180 degrees.1. An imaging system comprising: an image sensor comprising: an outer package having an outer surface; and a plurality of electrical contacts integrated with the outer surface; and a circuit board connector comprising: a first planar surface; a second planar surface opposite the first planar surface; and a plurality of electrical connections, wherein each of the plurality of electrical connections comprises a connection portion that is bonded to one of the plurality of electrical contacts; wherein each of the connection portions is disposed on the first planar surface or on the second planar surface, and wherein at least one of the first planar surface or the second planar surface forms an angle with the outer surface of the outer package that is greater than zero degrees and less than 180 degrees. 2. The imaging system of claim 1, wherein the circuit board connector further comprises: a first edge where the first planar surface meets a side surface; and a second edge where the second planar surface meets the side surface, wherein each of the plurality of electrical contacts is adjacent to the first edge or the second edge. 3. The imaging system of claim 2, wherein each of the connection portions of the electrical connections is disposed along the first edge or the second edge and aligned with one of the plurality of electrical contacts. 4. The imaging system of claim 2, wherein a first number of connection portions disposed on the first surface is equal to a first number of the plurality of electrical contacts adjacent to the first edge, and wherein a second number of the connection portions disposed on the second surface is equal to a second number of the plurality of electrical contacts adjacent the second edge. 5. The imaging system of claim 1, wherein the plurality of electrical contacts has a one-dimensional arrangement integrated with the outer surface of the outer package. 6. The imaging system of claim 1, wherein the plurality of electrical contacts has a two-dimensional arrangement integrated with the outer surface of the outer package, and wherein the side surface of the circuit board intersects the two-dimensional arrangement. 7. The imaging system of claim 6, wherein the two-dimensional arrangement comprises an M-by-N array, wherein M and N are integers. 8. The imaging system of claim 1, wherein the connection portions comprises first connection portions, and wherein each of the electrical connections further comprises a second connection portion, wherein each of the second connection portions is configured to bonded to one of a plurality of elongate conductive members of electrical cabling. 9. The imaging system of claim 1, wherein at least one of the plurality of electrical connections comprises a conductive via extending from the first planar surface to the second planar surface. 10. The imaging system of claim 1, wherein the outer surface of the outer package comprises a first outer surface, wherein the outer package further comprises at least one second outer surface, and wherein the circuit board connector further comprises at least one wing that engages with the at least one second outer surface. 11. The imaging system of claim 10, wherein each of the at least one second outer surface faces in a direction other than parallel with a direction in which the first outer surface faces. 12. The imaging system of claim 1, wherein the plurality of electrical connections comprises a power connection configured to communicate a power signal to power the image sensor and a ground connection configured to serve as a ground reference for the power signal, and wherein the imaging system further comprises a capacitor having a first end bonded to the power connection and a second end bonded to the ground connection. 13. The imaging system of claim 1, wherein the plurality of electrical contacts comprises at least one of: a power electrical contact configured to communicate a power signal that powers the image sensor; a ground electrical contact configured to communicate a ground reference signal; a data electrical contact configured to communicate a data signal comprising captured image data; or a clock signal electrical contact configured to communicate a clock signal for operation of the image sensor. 14. The imaging system of claim 1, wherein the circuit board connector further comprises a side surface adjacent each of the first planar surface and the second planar surface, and wherein the side surface faces the outer surface of the image sensor. 15. The imaging system of claim 1, wherein the plurality of electrical contacts comprises a plurality of solder balls configured as a ball grid array. 16. The imaging system of claim 1, wherein the angle is substantially ninety degrees. 17. The imaging system of claim 1, wherein the angle comprises a first angle, wherein the first planar surface forms the first angle, and wherein the second planar surface forms a second angle with the outer surface, the second angle being greater than zero degrees and less than 180 degrees. 18. The imaging system of claim 17, wherein a sum of the first angle and the second angle is less than 360 degrees. 19. The imaging system of claim 18, wherein the sum is substantially 180 degrees. 20. The imaging system of claim 1, wherein the imaging sensor is oriented about an axis that extends in a direction in which the outer surface faces, wherein the imaging sensor has a first elliptical axial profile, wherein the imaging sensor and circuit board connector combined have a second elliptical axial profile, and wherein the second elliptical axial profile is not greater than the first elliptical axial profile.
2,400
8,788
8,788
16,442,089
2,419
Methods, systems, and computer programs for improving compressed image chroma information. In one aspect of the invention, a resolution for a red color component of a color video image is used that is higher than the resolution for a blue color component of the color video image. Another aspect includes utilizing a lower or higher value of a quantization parameter (QP) for one or more chroma channels as compared to the luminance channel. Another aspect is use of a logarithmic representation of a video image to benefit image coding. Another aspect uses more than two chroma channels to represent a video image.
1. (canceled) 2. A method comprising: receiving a compressed video image comprising a luminance channel (Y), a first chroma channel (V) and a second chroma channel (U); accessing, at the decoder, at least a luminance quantization parameter value; characterized by receiving a first image-region-dependent chroma quantization parameter bias value; utilizing, with the decoder, the luminance quantization parameter value and the first image-region-dependent chroma quantization parameter bias value to determine a first chroma quantization parameter value by adding the first image-region-dependent chroma quantization parameter bias value to the luminance quantization parameter value; and decompressing an image region of the video image using the luminance quantization parameter value and the first chroma quantization parameter value, wherein the first chroma quantization parameter value is less than or equal to a predetermined maximum value, wherein the first chroma quantization parameter value is no less than one, and wherein the first chroma quantization parameter value is determined for the first chroma channel (V). 3. The method of claim 2, further comprising: receiving, at the decoder, a second image-region-dependent chroma quantization parameter bias value; utilizing, with the decoder, the luminance quantization parameter value and the second image-region-dependent chroma quantization parameter bias value to determine a second chroma quantization parameter value by adding the second image-region-dependent chroma quantization parameter bias value to the luminance quantization parameter value; and decompressing the image region of the video image using at least the second chroma quantization parameter value, wherein the second chroma quantization parameter value is determined for the second chroma channel (U), and wherein the first image-region-dependent chroma quantization parameter bias value used to determine the first chroma quantization parameter value for the first chroma channel differs from the second image-region-dependent chroma quantization parameter bias value used to determine the second chroma quantization parameter value for the second chroma channel (U). 4. The method of claim 3, further comprising setting the first chroma quantization parameter value to one if adding the first image-region-dependent chroma quantization parameter bias value to the luminance quantization parameter value is lower than one. 5. A method comprising: receiving, at the decoder, at least a luminance QP (quantization parameter) value and a first image-region-dependent chroma QP bias value, the first image-region-dependent chroma QP bias value was determined at an encoder and signaled from the encoder to the decoder, wherein the decoder comprises a luminance channel, a first chroma channel and a second chroma channel; utilizing, with the decoder, the luminance QP value and the first image-region-dependent chroma QP bias value to determine the first chroma QP value by adding the first image-region-dependent chroma QP bias value to the luminance QP value; decompressing an image region of a video image using the luminance QP value and the first chroma QP value, wherein the first chroma QP value is less than a predetermined maximum value and greater than a predetermined minimum value, and wherein the first chroma QP value is determined for the first chroma channel. 6. The method of claim 5, further comprising: receiving, at the decoder, at least a second image-region-dependent chroma QP bias value, the second image-region-dependent chroma QP bias value was determined at the encoder and signaled from the encoder to the decoder; utilizing, with the decoder, the luminance QP value and the second image-region-dependent chroma QP bias value to determine the second chroma QP value by adding the second image-region-dependent chroma QP bias value to the luminance QP value; and decompressing the image region of the video image using at least the second chroma QP value, wherein the second chroma QP value is determined for the second chroma channel, and wherein the first image-region-dependent chroma QP bias value used to determine the first chroma QP value for the first chroma channel differs from the second image-region-dependent chroma QP bias value used to determine the second chroma QP value for the second chroma channel. 7. The method of claim 5, further comprising: configuring the first image-region-dependent chroma QP bias value to be greater than zero or less than zero. 8. The method of claim 6, further comprising: configuring the second image-region-dependent chroma QP bias value to be greater than zero or less than zero.
Methods, systems, and computer programs for improving compressed image chroma information. In one aspect of the invention, a resolution for a red color component of a color video image is used that is higher than the resolution for a blue color component of the color video image. Another aspect includes utilizing a lower or higher value of a quantization parameter (QP) for one or more chroma channels as compared to the luminance channel. Another aspect is use of a logarithmic representation of a video image to benefit image coding. Another aspect uses more than two chroma channels to represent a video image.1. (canceled) 2. A method comprising: receiving a compressed video image comprising a luminance channel (Y), a first chroma channel (V) and a second chroma channel (U); accessing, at the decoder, at least a luminance quantization parameter value; characterized by receiving a first image-region-dependent chroma quantization parameter bias value; utilizing, with the decoder, the luminance quantization parameter value and the first image-region-dependent chroma quantization parameter bias value to determine a first chroma quantization parameter value by adding the first image-region-dependent chroma quantization parameter bias value to the luminance quantization parameter value; and decompressing an image region of the video image using the luminance quantization parameter value and the first chroma quantization parameter value, wherein the first chroma quantization parameter value is less than or equal to a predetermined maximum value, wherein the first chroma quantization parameter value is no less than one, and wherein the first chroma quantization parameter value is determined for the first chroma channel (V). 3. The method of claim 2, further comprising: receiving, at the decoder, a second image-region-dependent chroma quantization parameter bias value; utilizing, with the decoder, the luminance quantization parameter value and the second image-region-dependent chroma quantization parameter bias value to determine a second chroma quantization parameter value by adding the second image-region-dependent chroma quantization parameter bias value to the luminance quantization parameter value; and decompressing the image region of the video image using at least the second chroma quantization parameter value, wherein the second chroma quantization parameter value is determined for the second chroma channel (U), and wherein the first image-region-dependent chroma quantization parameter bias value used to determine the first chroma quantization parameter value for the first chroma channel differs from the second image-region-dependent chroma quantization parameter bias value used to determine the second chroma quantization parameter value for the second chroma channel (U). 4. The method of claim 3, further comprising setting the first chroma quantization parameter value to one if adding the first image-region-dependent chroma quantization parameter bias value to the luminance quantization parameter value is lower than one. 5. A method comprising: receiving, at the decoder, at least a luminance QP (quantization parameter) value and a first image-region-dependent chroma QP bias value, the first image-region-dependent chroma QP bias value was determined at an encoder and signaled from the encoder to the decoder, wherein the decoder comprises a luminance channel, a first chroma channel and a second chroma channel; utilizing, with the decoder, the luminance QP value and the first image-region-dependent chroma QP bias value to determine the first chroma QP value by adding the first image-region-dependent chroma QP bias value to the luminance QP value; decompressing an image region of a video image using the luminance QP value and the first chroma QP value, wherein the first chroma QP value is less than a predetermined maximum value and greater than a predetermined minimum value, and wherein the first chroma QP value is determined for the first chroma channel. 6. The method of claim 5, further comprising: receiving, at the decoder, at least a second image-region-dependent chroma QP bias value, the second image-region-dependent chroma QP bias value was determined at the encoder and signaled from the encoder to the decoder; utilizing, with the decoder, the luminance QP value and the second image-region-dependent chroma QP bias value to determine the second chroma QP value by adding the second image-region-dependent chroma QP bias value to the luminance QP value; and decompressing the image region of the video image using at least the second chroma QP value, wherein the second chroma QP value is determined for the second chroma channel, and wherein the first image-region-dependent chroma QP bias value used to determine the first chroma QP value for the first chroma channel differs from the second image-region-dependent chroma QP bias value used to determine the second chroma QP value for the second chroma channel. 7. The method of claim 5, further comprising: configuring the first image-region-dependent chroma QP bias value to be greater than zero or less than zero. 8. The method of claim 6, further comprising: configuring the second image-region-dependent chroma QP bias value to be greater than zero or less than zero.
2,400
8,789
8,789
12,051,787
2,415
Various example embodiments are disclosed relating to transmission adaptation in a wireless network. According to another example embodiment, an apparatus may include a processor. The processor may be configured to measure a channel quality for a plurality of wireless resources (e.g., physical resource blocks), determine one or more proposed resources based on the measured channel quality for the wireless resources, determine at least one proposed transmission parameter based on a number of the proposed wireless resources and the channel quality of the proposed wireless resources, and send a report to an infrastructure node, the report including the at least one proposed transmission parameter and identifying the proposed wireless resources.
1. A method comprising: measuring a channel quality for a plurality of wireless resources; determining one or more proposed resources based on the measured channel quality for each of the wireless resources; determining at least one proposed transmission parameter based on a number of the proposed wireless resources and the channel quality of the proposed wireless resources; sending a report to an infrastructure node, the report including the at least one proposed transmission parameter and identifying the proposed wireless resources. 2. The method of claim 1 wherein each wireless resource comprises one or more channels. 3. The method of claim 1 wherein each wireless resources comprises one or more OFDM (orthogonal frequency division multiplexing) subcarriers. 4. The method of claim 1 wherein the measuring a channel quality comprises measuring a signal to interference and noise ratio (SINR) for each wireless resource. 5. The method of claim 1 wherein each wireless resource comprises a physical resource block including a plurality of subcarriers across a time slot, wherein the measuring a channel quality comprises determining an average SINR across the plurality of subcarriers of the PRB. 6. The method of claim 1 wherein each wireless resource comprises a physical resource block (PRB) including a plurality of subcarriers across one or more time slots, wherein the measuring a channel quality comprises determining an average channel quality of at least a subset of the plurality of subcarriers of the PRB. 7. The method of claim 1 wherein the determining one or more proposed wireless resources comprises using a best-M technique. 8. The method of claim 1 wherein the determining one or more proposed wireless resources comprises determining the M resources having the highest channel quality. 9. The method of claim 1 wherein the determining one or more proposed wireless resources comprises using a threshold CQI (channel quality indication) technique. 10. The method of claim 1 wherein the determining comprises determining a wireless resource having a highest channel quality and any other of the wireless resources within a threshold or distance of the highest channel quality resource. 11. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining at least one of a modulation scheme, coding rate, transport block size and/or weightings or other parameters relating to MIMO (multiple-input, multiple-output) systems, based at least on a number of the proposed wireless resources and a channel quality or channel qualities of the proposed wireless resources. 12. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining a modulation scheme and coding rate based on a number of the proposed wireless resources and a substantially average of the channel qualities of the proposed wireless resources. 13. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining a modulation scheme and coding rate based on a number of the proposed wireless resources and a geometric average of SINRs of the proposed wireless resources. 14. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining one or more maximum transmission parameter that may be supported based on the proposed wireless resources and the channel quality of the proposed wireless resources to achieve a specific performance target. 15. The method of claim 1 wherein the sending comprises sending a report to an infrastructure node, the report include the at least one proposed transmission parameter including a proposed modulation scheme and modulation rate and a map identifying the proposed wireless resources. 16. A method comprising: determining, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determining, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; determining, based on a number of the PRBs in the proposed set of PRBs, a proposed set of transmission parameters that includes at least one parameter; and sending a report to an infrastructure node, the report identifying the proposed set of PRBs and the proposed set of transmission parameters. 17. The method of claim 16 wherein the determining the proposed set of transmission parameters substantially corresponds to determining a set of transmission parameters that will provide or achieve a target error rate or performance target based on the transmission of data to the wireless node using the proposed set of transmission parameters and using the proposed set of PRBs based on the channel quality(ies) of the proposed set of PRBs. 18. The method of claim 16 wherein each of the PRBs includes a plurality of subcarriers, and wherein the determining a channel quality associated with each PRB comprises determining an SINR for one or more of the subcarriers of a PRB, and calculating an average SINR for the plurality (or one or more subcarriers of the plurality) of subcarriers of the PRB. 19. The method of claim 16 wherein each of the PRBs includes a plurality of channels, and wherein the determining a channel quality associated with each PRB comprises determining an average of the channel qualities across at least a subset of the plurality of channels for each PRB. 20. The method of claim 16 wherein the determining a proposed set of PRBs comprises determining a set of M PRBs having substantially the highest channel quality of the plurality of PRBs, or determining a PRB having a highest channel quality and one or more other PRBs having a channel quality within a threshold or distance of the highest channel quality PRB. 21. The method of claim 16 wherein the determining the proposed set of transmission parameters includes determining a modulation scheme and either a coding rate or transport block size. 22. The method of claim 16 and further comprising receiving from an infrastructure node, an indication of one or more of the proposed set of PRBs that will be used by the infrastructure node to transmit to the wireless node. 23. The method of claim 16 and further comprising receiving data transmitted from an infrastructure node via one or more of the PRBs of the proposed set of PRBs and using the proposed set of transmission parameters. 24. A method comprising: determining, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determining, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; sending a CQI report to an infrastructure node, the CQI report including a parameter ID that identifies a modulation scheme and a coding rate that may be used for transmission to the wireless node via the proposed set of PRBs to provide or achieve a specific block error probability (BLEP). 25. The method of claim 24 wherein the sending comprises sending a CQI report to an infrastructure node, the CQI report identifying the proposed set of PRBs, the CQI report also including a parameter ID that identifies a modulation scheme and a coding rate that may be used for transmission to the wireless node via the proposed set of PRBs to provide or achieve a specific block error probability (BLEP) of approximately 10%. 26. The method of claim 24 wherein the determining, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node comprises determining, based on the PRB channel qualities a best M PRBs. 27. An apparatus for use in wireless communications, the apparatus comprising: a wireless transceiver; and a processor, the processor configured to: measure a channel quality for a plurality of wireless resources; determine one or more proposed wireless resources based on the measured channel quality for each of the wireless resources; determine at least one proposed transmission parameter based on a number of the proposed wireless resources and the channel quality of the proposed wireless resources; and send a report to an infrastructure node, the report including the at least one proposed transmission parameter and identifying the proposed wireless resources. 28. An apparatus for use in wireless communications, the apparatus comprising: a wireless transceiver; and a processor, the processor configured to: determine, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determine, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; determine, based on a number of PRBs in the proposed set of PRBs, a proposed set of transmission parameters that includes at least one parameter; and send a report to an infrastructure node, the report identifying the proposed set of PRBs and the proposed set of transmission parameters. 29. An apparatus for use in wireless communications, the apparatus comprising: a wireless transceiver; and a processor, the processor configured to: determine, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determine, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; determine, based on a reference number of PRBs and the channel qualities of the proposed set of PRBs, a proposed set of transmission parameters that includes at least one parameter, the reference number of PRBs being equal to the number of PRBs in the proposed set of PRBs; and send a report to an infrastructure node, the report identifying the proposed set of PRBs and the proposed set of transmission parameters.
Various example embodiments are disclosed relating to transmission adaptation in a wireless network. According to another example embodiment, an apparatus may include a processor. The processor may be configured to measure a channel quality for a plurality of wireless resources (e.g., physical resource blocks), determine one or more proposed resources based on the measured channel quality for the wireless resources, determine at least one proposed transmission parameter based on a number of the proposed wireless resources and the channel quality of the proposed wireless resources, and send a report to an infrastructure node, the report including the at least one proposed transmission parameter and identifying the proposed wireless resources.1. A method comprising: measuring a channel quality for a plurality of wireless resources; determining one or more proposed resources based on the measured channel quality for each of the wireless resources; determining at least one proposed transmission parameter based on a number of the proposed wireless resources and the channel quality of the proposed wireless resources; sending a report to an infrastructure node, the report including the at least one proposed transmission parameter and identifying the proposed wireless resources. 2. The method of claim 1 wherein each wireless resource comprises one or more channels. 3. The method of claim 1 wherein each wireless resources comprises one or more OFDM (orthogonal frequency division multiplexing) subcarriers. 4. The method of claim 1 wherein the measuring a channel quality comprises measuring a signal to interference and noise ratio (SINR) for each wireless resource. 5. The method of claim 1 wherein each wireless resource comprises a physical resource block including a plurality of subcarriers across a time slot, wherein the measuring a channel quality comprises determining an average SINR across the plurality of subcarriers of the PRB. 6. The method of claim 1 wherein each wireless resource comprises a physical resource block (PRB) including a plurality of subcarriers across one or more time slots, wherein the measuring a channel quality comprises determining an average channel quality of at least a subset of the plurality of subcarriers of the PRB. 7. The method of claim 1 wherein the determining one or more proposed wireless resources comprises using a best-M technique. 8. The method of claim 1 wherein the determining one or more proposed wireless resources comprises determining the M resources having the highest channel quality. 9. The method of claim 1 wherein the determining one or more proposed wireless resources comprises using a threshold CQI (channel quality indication) technique. 10. The method of claim 1 wherein the determining comprises determining a wireless resource having a highest channel quality and any other of the wireless resources within a threshold or distance of the highest channel quality resource. 11. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining at least one of a modulation scheme, coding rate, transport block size and/or weightings or other parameters relating to MIMO (multiple-input, multiple-output) systems, based at least on a number of the proposed wireless resources and a channel quality or channel qualities of the proposed wireless resources. 12. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining a modulation scheme and coding rate based on a number of the proposed wireless resources and a substantially average of the channel qualities of the proposed wireless resources. 13. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining a modulation scheme and coding rate based on a number of the proposed wireless resources and a geometric average of SINRs of the proposed wireless resources. 14. The method of claim 1 wherein the determining at least one proposed transmission parameter comprises determining one or more maximum transmission parameter that may be supported based on the proposed wireless resources and the channel quality of the proposed wireless resources to achieve a specific performance target. 15. The method of claim 1 wherein the sending comprises sending a report to an infrastructure node, the report include the at least one proposed transmission parameter including a proposed modulation scheme and modulation rate and a map identifying the proposed wireless resources. 16. A method comprising: determining, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determining, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; determining, based on a number of the PRBs in the proposed set of PRBs, a proposed set of transmission parameters that includes at least one parameter; and sending a report to an infrastructure node, the report identifying the proposed set of PRBs and the proposed set of transmission parameters. 17. The method of claim 16 wherein the determining the proposed set of transmission parameters substantially corresponds to determining a set of transmission parameters that will provide or achieve a target error rate or performance target based on the transmission of data to the wireless node using the proposed set of transmission parameters and using the proposed set of PRBs based on the channel quality(ies) of the proposed set of PRBs. 18. The method of claim 16 wherein each of the PRBs includes a plurality of subcarriers, and wherein the determining a channel quality associated with each PRB comprises determining an SINR for one or more of the subcarriers of a PRB, and calculating an average SINR for the plurality (or one or more subcarriers of the plurality) of subcarriers of the PRB. 19. The method of claim 16 wherein each of the PRBs includes a plurality of channels, and wherein the determining a channel quality associated with each PRB comprises determining an average of the channel qualities across at least a subset of the plurality of channels for each PRB. 20. The method of claim 16 wherein the determining a proposed set of PRBs comprises determining a set of M PRBs having substantially the highest channel quality of the plurality of PRBs, or determining a PRB having a highest channel quality and one or more other PRBs having a channel quality within a threshold or distance of the highest channel quality PRB. 21. The method of claim 16 wherein the determining the proposed set of transmission parameters includes determining a modulation scheme and either a coding rate or transport block size. 22. The method of claim 16 and further comprising receiving from an infrastructure node, an indication of one or more of the proposed set of PRBs that will be used by the infrastructure node to transmit to the wireless node. 23. The method of claim 16 and further comprising receiving data transmitted from an infrastructure node via one or more of the PRBs of the proposed set of PRBs and using the proposed set of transmission parameters. 24. A method comprising: determining, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determining, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; sending a CQI report to an infrastructure node, the CQI report including a parameter ID that identifies a modulation scheme and a coding rate that may be used for transmission to the wireless node via the proposed set of PRBs to provide or achieve a specific block error probability (BLEP). 25. The method of claim 24 wherein the sending comprises sending a CQI report to an infrastructure node, the CQI report identifying the proposed set of PRBs, the CQI report also including a parameter ID that identifies a modulation scheme and a coding rate that may be used for transmission to the wireless node via the proposed set of PRBs to provide or achieve a specific block error probability (BLEP) of approximately 10%. 26. The method of claim 24 wherein the determining, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node comprises determining, based on the PRB channel qualities a best M PRBs. 27. An apparatus for use in wireless communications, the apparatus comprising: a wireless transceiver; and a processor, the processor configured to: measure a channel quality for a plurality of wireless resources; determine one or more proposed wireless resources based on the measured channel quality for each of the wireless resources; determine at least one proposed transmission parameter based on a number of the proposed wireless resources and the channel quality of the proposed wireless resources; and send a report to an infrastructure node, the report including the at least one proposed transmission parameter and identifying the proposed wireless resources. 28. An apparatus for use in wireless communications, the apparatus comprising: a wireless transceiver; and a processor, the processor configured to: determine, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determine, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; determine, based on a number of PRBs in the proposed set of PRBs, a proposed set of transmission parameters that includes at least one parameter; and send a report to an infrastructure node, the report identifying the proposed set of PRBs and the proposed set of transmission parameters. 29. An apparatus for use in wireless communications, the apparatus comprising: a wireless transceiver; and a processor, the processor configured to: determine, at a wireless node, a channel quality associated with each of a plurality of physical resource blocks (PRBs); determine, based on the PRB channel qualities, a proposed set of PRBs for use in transmitting to the wireless node; determine, based on a reference number of PRBs and the channel qualities of the proposed set of PRBs, a proposed set of transmission parameters that includes at least one parameter, the reference number of PRBs being equal to the number of PRBs in the proposed set of PRBs; and send a report to an infrastructure node, the report identifying the proposed set of PRBs and the proposed set of transmission parameters.
2,400
8,790
8,790
14,899,208
2,485
A secure imaging system for drug preparations on a predetermined site comprises a dynamic graphic interface including at least one processing camera having a focal distance adjusted for the detection of objects and connected to a digital unit for managing video signals from the processing camera. The unit has means for establishing a comparison between the stored data of the in-method preparation using first images corresponding to the video signals and steps for preparing stored prescriptions and means for selecting a prescription in accordance with said comparison. Warning means are activated in the event that at least one step of the indexed preparation does not comply with the corresponding step of the selected prescription.
1-33. (canceled) 34. A method for the secure production of drug preparations in compliance with a prescription on a predetermined site comprising: monitoring the preparation at least in real time using a dynamic graphic interface using at least a so-called processing video stream making it possible to view the products on the preparation site with a display of information relating to the prescription once detected by a digital processing for identifying the components of the preparation and by comparing data of the steps of the preparation and stored data of the steps of the prescription, in triggering a warning in case of a detected non-compliance between the data of the steps of the preparation and the prescription, and in validating the preparation in case of compliance between the steps data. 35. The method for a secure production according to claim 34, wherein said information relating to the prescription is preferably selected from a list of available vials according to the prescription and a list of vials used with the evolution of the volume of component taken from each of these, with a display of the evolution of the volume injected into a delivery packaging and/or the missing volume, and a warning display being also provided. 36. The method for a secure production according to claim 34, wherein one of the so-called processing video streams is focused on object analysis data for a validation of steps, specifically of key steps of the preparation, and a so-called scene second video stream is focused on an overall view of the actions executed and the location of the objects on the site. 37. The method for a secure production according claim 34, wherein the detection extends to an automatic identification of the syringes by processing the first video streams using shape and character recognition. 38. The method for a secure production according to claim 34, wherein the processing stream consists of a double parallel stream, with each stream being adjusted for detecting objects in substantially different size ranges. 39. A device for filming a plurality of objects such as a vial and a syringe, for a secure production of drug preparations, comprising: at least a pair of filming devices positioned opposite one another, a reflective element for each one of the filming devices, with the two reflective elements of the same pair of devices being positioned between said devices along the axis defined by the two devices and each one being oriented so as to reflect images of a drug preparation production area towards the matching device. 40. The device according to claim 39, wherein the two areas covered by the two devices of the same pair of devices are identical, and in that the devices have different zoom lens making it possible to focus on objects with different sizes which are present in the drug preparation production area. 41. The device according to claim 39, characterized in that the two reflective elements consist of flat surfaces associated together by a common edge. 42. The device according to claim 41, wherein the two flat surfaces are formed by two adjacent faces of a prism with a triangular cross-section. 43. The device according to claim 39, comprising means for attaching to a mounting for positioning the objects involved in the production of a drug preparation. 44. A secure imaging system for drug preparations on a predetermined site adapted to implement the method according to claim 34, comprising: a dynamic graphic interface comprising at least one viewing and recording so-called processing camera having a focal length adjusted for the detection of objects liable to contain components and connected to a digital unit managing the video signals from the processing camera, in that said unit has means for establishing a comparison between stored data of the preparation in progress using the first images corresponding to the video signals and steps of the preparation of the prescriptions stored in a prescription memory and means for selecting a prescription according to such comparison, in that information on the selected prescription is displayed with the images transmitted by the digital management unit on display means, and in that warning means are able to be activated in the event that at least one step of the indexed preparation does not comply with the corresponding step of the selected prescription. 45. The secure imaging system according to claim 44, wherein the indexing means is adapted to index special steps specific to each prescription, key steps, using a particular indexing and the warning means is triggered in the event of a non-compliance with at least one step of the preparation, especially a critical step. 46. The secure imaging system according to claim 44, wherein the dynamic graphic interface comprises at least another recording and viewing so-called scene camera having a focal length adjusted for the global detection of the site, with the processing camera and the scene camera having synchronized streams. 47. The secure imaging system according to claim 44, comprising a filming device, a mounting for positioning objects, and a drug preparations production chamber, with the mounting for positioning objects being positioned inside the chamber, and the filming device outside thereof against a transparent window of the chamber, and in such a position that images of the mounting for positioning objects, reach the filming devices of the system. 48. The system according to claim 47, wherein the mounting for positioning objects comprises at least one syringe and one vial of a fluid to be taken with the syringe, comprising a flat base for supporting the objects, a screen standing at the back of the base and a syringe holder mounted to translate with respect to the base between a disengaged position independent of the base and an engaged position in the base.
A secure imaging system for drug preparations on a predetermined site comprises a dynamic graphic interface including at least one processing camera having a focal distance adjusted for the detection of objects and connected to a digital unit for managing video signals from the processing camera. The unit has means for establishing a comparison between the stored data of the in-method preparation using first images corresponding to the video signals and steps for preparing stored prescriptions and means for selecting a prescription in accordance with said comparison. Warning means are activated in the event that at least one step of the indexed preparation does not comply with the corresponding step of the selected prescription.1-33. (canceled) 34. A method for the secure production of drug preparations in compliance with a prescription on a predetermined site comprising: monitoring the preparation at least in real time using a dynamic graphic interface using at least a so-called processing video stream making it possible to view the products on the preparation site with a display of information relating to the prescription once detected by a digital processing for identifying the components of the preparation and by comparing data of the steps of the preparation and stored data of the steps of the prescription, in triggering a warning in case of a detected non-compliance between the data of the steps of the preparation and the prescription, and in validating the preparation in case of compliance between the steps data. 35. The method for a secure production according to claim 34, wherein said information relating to the prescription is preferably selected from a list of available vials according to the prescription and a list of vials used with the evolution of the volume of component taken from each of these, with a display of the evolution of the volume injected into a delivery packaging and/or the missing volume, and a warning display being also provided. 36. The method for a secure production according to claim 34, wherein one of the so-called processing video streams is focused on object analysis data for a validation of steps, specifically of key steps of the preparation, and a so-called scene second video stream is focused on an overall view of the actions executed and the location of the objects on the site. 37. The method for a secure production according claim 34, wherein the detection extends to an automatic identification of the syringes by processing the first video streams using shape and character recognition. 38. The method for a secure production according to claim 34, wherein the processing stream consists of a double parallel stream, with each stream being adjusted for detecting objects in substantially different size ranges. 39. A device for filming a plurality of objects such as a vial and a syringe, for a secure production of drug preparations, comprising: at least a pair of filming devices positioned opposite one another, a reflective element for each one of the filming devices, with the two reflective elements of the same pair of devices being positioned between said devices along the axis defined by the two devices and each one being oriented so as to reflect images of a drug preparation production area towards the matching device. 40. The device according to claim 39, wherein the two areas covered by the two devices of the same pair of devices are identical, and in that the devices have different zoom lens making it possible to focus on objects with different sizes which are present in the drug preparation production area. 41. The device according to claim 39, characterized in that the two reflective elements consist of flat surfaces associated together by a common edge. 42. The device according to claim 41, wherein the two flat surfaces are formed by two adjacent faces of a prism with a triangular cross-section. 43. The device according to claim 39, comprising means for attaching to a mounting for positioning the objects involved in the production of a drug preparation. 44. A secure imaging system for drug preparations on a predetermined site adapted to implement the method according to claim 34, comprising: a dynamic graphic interface comprising at least one viewing and recording so-called processing camera having a focal length adjusted for the detection of objects liable to contain components and connected to a digital unit managing the video signals from the processing camera, in that said unit has means for establishing a comparison between stored data of the preparation in progress using the first images corresponding to the video signals and steps of the preparation of the prescriptions stored in a prescription memory and means for selecting a prescription according to such comparison, in that information on the selected prescription is displayed with the images transmitted by the digital management unit on display means, and in that warning means are able to be activated in the event that at least one step of the indexed preparation does not comply with the corresponding step of the selected prescription. 45. The secure imaging system according to claim 44, wherein the indexing means is adapted to index special steps specific to each prescription, key steps, using a particular indexing and the warning means is triggered in the event of a non-compliance with at least one step of the preparation, especially a critical step. 46. The secure imaging system according to claim 44, wherein the dynamic graphic interface comprises at least another recording and viewing so-called scene camera having a focal length adjusted for the global detection of the site, with the processing camera and the scene camera having synchronized streams. 47. The secure imaging system according to claim 44, comprising a filming device, a mounting for positioning objects, and a drug preparations production chamber, with the mounting for positioning objects being positioned inside the chamber, and the filming device outside thereof against a transparent window of the chamber, and in such a position that images of the mounting for positioning objects, reach the filming devices of the system. 48. The system according to claim 47, wherein the mounting for positioning objects comprises at least one syringe and one vial of a fluid to be taken with the syringe, comprising a flat base for supporting the objects, a screen standing at the back of the base and a syringe holder mounted to translate with respect to the base between a disengaged position independent of the base and an engaged position in the base.
2,400
8,791
8,791
15,153,347
2,426
There is provided a system including a display, a wireless communication element, a non-transitory memory storing an executable code, and a hardware processor executing the executable code to receive an input signal including a media content and a data content associated with the media content, extract the data content from the input signal, display the media content on the display, and transmit the data content of the input signal to a user device using the wireless communication element.
1. A system comprising: a display; a wireless communication element; a non-transitory memory storing an executable code; and a hardware processor executing the executable code to: receive an input signal including a media content and a data content associated with the media content: extract the data content from the input signal; display the media content on the display; and transmit, in response to an unplanned trigger event in the media content, using the wireless communication element, the data content of the input signal to a user device to execute an action: wherein displaying the media content on the display comprises playing the media content including an audio, and wherein the data content comprises instructions to cause the user device to take the action in response to detecting a keyword in the audio. 2. The system of claim 1, wherein the data content of the input signal is synchronized with the media content of the input signal. 3. The system of claim 2, wherein the user device includes at least one of a toy, a mobile device, and a light system. 4. The system of claim 3, wherein the user device executes an action based on the data content extracted from the input signal. 5. The system of claim 4, wherein the user device executing the action augments the media content. 6. (canceled) 7. The system of claim 1, wherein the trigger event is one of a breaking news event, a user alert event, and a programmed event. 8-10. (canceled) 11. A method for use with a system including a display, a wireless communication element, a non-transitory memory, and a hardware processor, the method comprising: receiving an input signal including a media content and a data content associated with the media content; extracting the data content from the input signal; displaying the media content on the display; and transmitting, in response to an unplanned trigger event in the media content, using the wireless communication element, the data content of the input signal to a user device to execute an action; wherein displaying the media content on the display comprises playing the media content including an audio, and wherein the data content comprises instructions to cause the user device to take the action in response to detecting a keyword in the audio. 12. The method of claim 11, wherein the data content of the input signal is synchronized with the media content of the input signal. 13. The method of claim 11, wherein the user device includes at least one of a toy, a mobile device, and a light system. 14. The method of claim 13, wherein the user device executes an action based on the data content extracted from the input signal. 15. The method of claim 14, wherein the user device executing the action augments the media content. 16. (canceled) 17. The method of claim 11, wherein the trigger event is one of a breaking news event, a user alert event, and a programmed event. 18-20. (canceled)
There is provided a system including a display, a wireless communication element, a non-transitory memory storing an executable code, and a hardware processor executing the executable code to receive an input signal including a media content and a data content associated with the media content, extract the data content from the input signal, display the media content on the display, and transmit the data content of the input signal to a user device using the wireless communication element.1. A system comprising: a display; a wireless communication element; a non-transitory memory storing an executable code; and a hardware processor executing the executable code to: receive an input signal including a media content and a data content associated with the media content: extract the data content from the input signal; display the media content on the display; and transmit, in response to an unplanned trigger event in the media content, using the wireless communication element, the data content of the input signal to a user device to execute an action: wherein displaying the media content on the display comprises playing the media content including an audio, and wherein the data content comprises instructions to cause the user device to take the action in response to detecting a keyword in the audio. 2. The system of claim 1, wherein the data content of the input signal is synchronized with the media content of the input signal. 3. The system of claim 2, wherein the user device includes at least one of a toy, a mobile device, and a light system. 4. The system of claim 3, wherein the user device executes an action based on the data content extracted from the input signal. 5. The system of claim 4, wherein the user device executing the action augments the media content. 6. (canceled) 7. The system of claim 1, wherein the trigger event is one of a breaking news event, a user alert event, and a programmed event. 8-10. (canceled) 11. A method for use with a system including a display, a wireless communication element, a non-transitory memory, and a hardware processor, the method comprising: receiving an input signal including a media content and a data content associated with the media content; extracting the data content from the input signal; displaying the media content on the display; and transmitting, in response to an unplanned trigger event in the media content, using the wireless communication element, the data content of the input signal to a user device to execute an action; wherein displaying the media content on the display comprises playing the media content including an audio, and wherein the data content comprises instructions to cause the user device to take the action in response to detecting a keyword in the audio. 12. The method of claim 11, wherein the data content of the input signal is synchronized with the media content of the input signal. 13. The method of claim 11, wherein the user device includes at least one of a toy, a mobile device, and a light system. 14. The method of claim 13, wherein the user device executes an action based on the data content extracted from the input signal. 15. The method of claim 14, wherein the user device executing the action augments the media content. 16. (canceled) 17. The method of claim 11, wherein the trigger event is one of a breaking news event, a user alert event, and a programmed event. 18-20. (canceled)
2,400
8,792
8,792
15,790,314
2,419
The application relates to a method for reducing visual artefacts in a frame of a digital video signal, which is coded by blocks and then decoded. A block type is defined according to the coding method for a block selected according to a predetermined set of coding types. In the method filtering is performed to reduce visual artefacts due to a block boundary. The filtering performed depends on block types of the frame in the environment of the block boundary.
1. A method for reducing visual artefacts in a frame of a digital video signal, which is coded by blocks and then decoded, a block type being defined according to the coding method for a block selected from a predetermined set of coding types, in which filtering is performed to reduce visual artefacts due to a block boundary, wherein the filtering performed on the block boundary depends on block types of the frame in the environment of the block boundary. 2. A method according to claim 1, wherein the frame comprises at least one region of blocks, each block within said region having a region type, and that the filtering performed on the block boundary depends on a region type of the blocks in the environment of the block boundary. 3. A method according to claim 1 wherein the filtering performed on the block boundary depends on a block type of a block on a first side of the block boundary and on a block type of a block on a second side of the block boundary. 4. A method according to claim 1, wherein at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary on at least one side of the block boundary is modified according to the block type of at least one block in the environment of the block boundary. 5. A method according to claim 4, wherein at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary is modified according to the block type of a first block and a second block, the first and second blocks being located on opposite sides of the block boundary. 6. A method according to claim 4, wherein said at least one parameter is selected from a group comprising: a number of pixels to be examined, a number of pixels to be filtered, an activity measure providing an indication of the difference between pixel values on one side of the block boundary, and a filtering window. 7. A method according to claim 1, in which a number of pixels is selected for examination from at least one side of the block boundary, wherein the number of pixels selected for examination depends on the image content of the frame in the environment of the block boundary, and that the number of pixels selected for examination further depends on the block type of a block in the environment of the block boundary. 8. A method according to claim 7, wherein the number of pixels selected for examination depends on the difference in pixel value between pixels across the block boundary. 9. A method according to claim 7, wherein the number of pixels selected for examination depends on the size of the quantization step of the coefficients used in the coding of the blocks. 10. A method according to claim 8, wherein the number of pixels is first defined according to the image content of the frame in the environment of the block boundary, and the number of pixels is further truncated according to the block type of a block in the environment of the block boundary to give a truncated number of pixels for examination. 11. A method according to claim 1, wherein certain pixels to be filtered are selected, and a new value is determined for each pixel to be filtered on the basis of pixels that appear in a filtering window set around the pixel. 12. A method according to claim 1, wherein pixels to be filtered are selected from the pixels selected for examination. 13. A method according to claim 11, wherein the new value of the pixel to be filtered is the mean value of the pixels that appear in the filtering window. 14. A device for reducing visual artefacts in a frame of a digital video signal, which is coded by blocks and then decoded, a block type being defined according to the coding method for a block selected according to a predetermined set of coding types, the device comprising a filter for reducing visual artefacts due to a block boundary, wherein the filter is arranged to operate adaptively according to the block types of the frame in the environment of the block boundary. 15. A device according to claim 14, wherein the filter is arranged such that the frame comprises at least one region of blocks, each block within said region having a region type, and that the filtering performed on the block boundary depends on a region type of the blocks in the environment of the block boundary. 16. A device according to claim 14, wherein the filter is arranged such that the filtering performed on the block boundary depends on a block type of a block on a first side of the block boundary and on a block type of a block on a second side of the block boundary. 17. A device according to claim 14, wherein the filter is arranged such that at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary on at least one side of the block boundary is modified according to the block type of at least one block in the environment of the block boundary. 18. A device according to claim 17, wherein the filter is arranged such that at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary is modified according to the block type of a first block and a second block, the first and second blocks being located on opposite sides of the block boundary. 19. A device according to claim 17, wherein said at least one parameter is selected from a group comprising: a number of pixels to be examined, a number of pixels to be filtered, an activity measure providing an indication of the difference between pixel values on one side of the block boundary, and a filtering window. 20. A non-transitory storage medium for storing a software program comprising machine executable operations for coding and decoding a digital video signal by blocks, a block type being defined according to the coding method for a block selected according to a predetermined set of coding types, for reducing visual artefacts due to a block boundary by filtering, wherein the software program further comprises machine executable operations for filtering adaptively according to the block types of the frame in the environment of the block boundary.
The application relates to a method for reducing visual artefacts in a frame of a digital video signal, which is coded by blocks and then decoded. A block type is defined according to the coding method for a block selected according to a predetermined set of coding types. In the method filtering is performed to reduce visual artefacts due to a block boundary. The filtering performed depends on block types of the frame in the environment of the block boundary.1. A method for reducing visual artefacts in a frame of a digital video signal, which is coded by blocks and then decoded, a block type being defined according to the coding method for a block selected from a predetermined set of coding types, in which filtering is performed to reduce visual artefacts due to a block boundary, wherein the filtering performed on the block boundary depends on block types of the frame in the environment of the block boundary. 2. A method according to claim 1, wherein the frame comprises at least one region of blocks, each block within said region having a region type, and that the filtering performed on the block boundary depends on a region type of the blocks in the environment of the block boundary. 3. A method according to claim 1 wherein the filtering performed on the block boundary depends on a block type of a block on a first side of the block boundary and on a block type of a block on a second side of the block boundary. 4. A method according to claim 1, wherein at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary on at least one side of the block boundary is modified according to the block type of at least one block in the environment of the block boundary. 5. A method according to claim 4, wherein at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary is modified according to the block type of a first block and a second block, the first and second blocks being located on opposite sides of the block boundary. 6. A method according to claim 4, wherein said at least one parameter is selected from a group comprising: a number of pixels to be examined, a number of pixels to be filtered, an activity measure providing an indication of the difference between pixel values on one side of the block boundary, and a filtering window. 7. A method according to claim 1, in which a number of pixels is selected for examination from at least one side of the block boundary, wherein the number of pixels selected for examination depends on the image content of the frame in the environment of the block boundary, and that the number of pixels selected for examination further depends on the block type of a block in the environment of the block boundary. 8. A method according to claim 7, wherein the number of pixels selected for examination depends on the difference in pixel value between pixels across the block boundary. 9. A method according to claim 7, wherein the number of pixels selected for examination depends on the size of the quantization step of the coefficients used in the coding of the blocks. 10. A method according to claim 8, wherein the number of pixels is first defined according to the image content of the frame in the environment of the block boundary, and the number of pixels is further truncated according to the block type of a block in the environment of the block boundary to give a truncated number of pixels for examination. 11. A method according to claim 1, wherein certain pixels to be filtered are selected, and a new value is determined for each pixel to be filtered on the basis of pixels that appear in a filtering window set around the pixel. 12. A method according to claim 1, wherein pixels to be filtered are selected from the pixels selected for examination. 13. A method according to claim 11, wherein the new value of the pixel to be filtered is the mean value of the pixels that appear in the filtering window. 14. A device for reducing visual artefacts in a frame of a digital video signal, which is coded by blocks and then decoded, a block type being defined according to the coding method for a block selected according to a predetermined set of coding types, the device comprising a filter for reducing visual artefacts due to a block boundary, wherein the filter is arranged to operate adaptively according to the block types of the frame in the environment of the block boundary. 15. A device according to claim 14, wherein the filter is arranged such that the frame comprises at least one region of blocks, each block within said region having a region type, and that the filtering performed on the block boundary depends on a region type of the blocks in the environment of the block boundary. 16. A device according to claim 14, wherein the filter is arranged such that the filtering performed on the block boundary depends on a block type of a block on a first side of the block boundary and on a block type of a block on a second side of the block boundary. 17. A device according to claim 14, wherein the filter is arranged such that at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary on at least one side of the block boundary is modified according to the block type of at least one block in the environment of the block boundary. 18. A device according to claim 17, wherein the filter is arranged such that at least one parameter of the filtering performed to reduce visual artefacts due to a block boundary is modified according to the block type of a first block and a second block, the first and second blocks being located on opposite sides of the block boundary. 19. A device according to claim 17, wherein said at least one parameter is selected from a group comprising: a number of pixels to be examined, a number of pixels to be filtered, an activity measure providing an indication of the difference between pixel values on one side of the block boundary, and a filtering window. 20. A non-transitory storage medium for storing a software program comprising machine executable operations for coding and decoding a digital video signal by blocks, a block type being defined according to the coding method for a block selected according to a predetermined set of coding types, for reducing visual artefacts due to a block boundary by filtering, wherein the software program further comprises machine executable operations for filtering adaptively according to the block types of the frame in the environment of the block boundary.
2,400
8,793
8,793
15,398,449
2,451
Work-load management in a client-server infrastructure includes setting request information in accordance with request semantics corresponding to a type of request from a client. The request semantics include different request-types provided with different priorities during processing. Within a server, requests with high priority are included in a standard request processing queue. Further, requests with low priority are excluded from the standard request processing queue when server workload of the server exceeds a predetermined first threshold value.
1-20. (canceled) 21. A computer-implemented method, comprising: receiving, from a client and by a server, a first request and accompanying request information identifying the first request as a first type of request; including, based upon the first type of request indicating a higher priority, the first request in a standard request processing queue; receiving, by the server, a second request and accompanying request information identifying the second request as a second type of request; determining that a server workload of the server exceeds a predetermined first threshold value; and excluding, based upon the second type of request indicating a lower priority and only upon the determining, the second request from the standard request processing queue. 22. The method of claim 21, wherein the first type of request represents a synchronous request, and the second type of request represents an asynchronous request. 23. The method of claim 21, wherein the second request is reprioritized to the higher priority based upon receipt of a third request and accompanying request information indicating the second request and identifying the third request as a third type of request. 24. The method of claim 21, wherein the first request is reprioritized to the lower priority based upon receipt of a fourth request and accompanying request information indicating the first request and identifying the fourth request as a fourth type of request. 25. The method of claim 24, wherein the server responds to the fourth request with a no content response signaling reprioritization of the first request. 26. The method of claim 21, wherein the second request is included within the standard request processing queue based upon the server workload falling below the first threshold. 27. The method of claim 21, wherein the second request is included within the standard request processing queue based upon a wait time of the second request exceeding a predetermined second threshold value. 28. The method of claim 21, wherein the request information is included within headers of the requests. 29. A server system, comprising: at least one hardware processor configured to initiate the following operations: receiving, from a client and by the server, a first request and accompanying request information identifying the first request as a first type of request; including, based upon the first type of request indicating a higher priority, the first request in a standard request processing queue; receiving, by the server, a second request and accompanying request information identifying the second request as a second type of request; determining that a server workload of the server exceeds a predetermined first threshold value; and excluding, based upon the second type of request indicating a lower priority and only upon the determining, the second request from the standard request processing queue. 30. The server system of claim 29, wherein the first type of request represents a synchronous request, and the second type of request represents an asynchronous request. 31. The server system of claim 29, wherein the second request is reprioritized to the higher priority based upon receipt of a third request and accompanying request information indicating the second request and identifying the third request as a third type of request. 32. The server system of claim 29, wherein the first request is reprioritized to the lower priority based upon receipt of a fourth request and accompanying request information indicating the first request and identifying the fourth request as a fourth type of request. 33. The server system of claim 32, wherein the server responds to the fourth request with a no content response signaling reprioritization of the first request. 34. The server system of claim 29, wherein the second request is included within the standard request processing queue based upon the server workload falling below the first threshold. 35. The server system of claim 29, wherein the second request is included within the standard request processing queue based upon a wait time of the second request exceeding a predetermined second threshold value. 36. A computer program product, comprising: a computer hardware storage device having stored therein program code, the program code, which when executed by a computer hardware system, causes the computer hardware system to perform: receiving, from a client and by a server, a first request and accompanying request information identifying the first request as a first type of request; including, based upon the first type of request indicating a higher priority, the first request in a standard request processing queue; receiving, by the server, a second request and accompanying request information identifying the second request as a second type of request; determining that a server workload of the server exceeds a predetermined first threshold value; and excluding, based upon the second type of request indicating a lower priority and only upon the determining, the second request from the standard request processing queue. 37. The computer program product of claim 36, wherein the first type of request represents a synchronous request, and the second type of request represents an asynchronous request. 38. The computer program product of claim 36, wherein the second request is reprioritized to the higher priority based upon receipt of a third request and accompanying request information indicating the second request and identifying the third request as a third type of request. 39. The computer program product of claim 36, wherein the first request is reprioritized to the lower priority based upon receipt of a fourth request and accompanying request information indicating the first request and identifying the fourth request as a fourth type of request. 40. The computer program product of claim 36, wherein the second request is included within the standard request processing queue based upon a wait time of the second request exceeding a predetermined second threshold value.
Work-load management in a client-server infrastructure includes setting request information in accordance with request semantics corresponding to a type of request from a client. The request semantics include different request-types provided with different priorities during processing. Within a server, requests with high priority are included in a standard request processing queue. Further, requests with low priority are excluded from the standard request processing queue when server workload of the server exceeds a predetermined first threshold value.1-20. (canceled) 21. A computer-implemented method, comprising: receiving, from a client and by a server, a first request and accompanying request information identifying the first request as a first type of request; including, based upon the first type of request indicating a higher priority, the first request in a standard request processing queue; receiving, by the server, a second request and accompanying request information identifying the second request as a second type of request; determining that a server workload of the server exceeds a predetermined first threshold value; and excluding, based upon the second type of request indicating a lower priority and only upon the determining, the second request from the standard request processing queue. 22. The method of claim 21, wherein the first type of request represents a synchronous request, and the second type of request represents an asynchronous request. 23. The method of claim 21, wherein the second request is reprioritized to the higher priority based upon receipt of a third request and accompanying request information indicating the second request and identifying the third request as a third type of request. 24. The method of claim 21, wherein the first request is reprioritized to the lower priority based upon receipt of a fourth request and accompanying request information indicating the first request and identifying the fourth request as a fourth type of request. 25. The method of claim 24, wherein the server responds to the fourth request with a no content response signaling reprioritization of the first request. 26. The method of claim 21, wherein the second request is included within the standard request processing queue based upon the server workload falling below the first threshold. 27. The method of claim 21, wherein the second request is included within the standard request processing queue based upon a wait time of the second request exceeding a predetermined second threshold value. 28. The method of claim 21, wherein the request information is included within headers of the requests. 29. A server system, comprising: at least one hardware processor configured to initiate the following operations: receiving, from a client and by the server, a first request and accompanying request information identifying the first request as a first type of request; including, based upon the first type of request indicating a higher priority, the first request in a standard request processing queue; receiving, by the server, a second request and accompanying request information identifying the second request as a second type of request; determining that a server workload of the server exceeds a predetermined first threshold value; and excluding, based upon the second type of request indicating a lower priority and only upon the determining, the second request from the standard request processing queue. 30. The server system of claim 29, wherein the first type of request represents a synchronous request, and the second type of request represents an asynchronous request. 31. The server system of claim 29, wherein the second request is reprioritized to the higher priority based upon receipt of a third request and accompanying request information indicating the second request and identifying the third request as a third type of request. 32. The server system of claim 29, wherein the first request is reprioritized to the lower priority based upon receipt of a fourth request and accompanying request information indicating the first request and identifying the fourth request as a fourth type of request. 33. The server system of claim 32, wherein the server responds to the fourth request with a no content response signaling reprioritization of the first request. 34. The server system of claim 29, wherein the second request is included within the standard request processing queue based upon the server workload falling below the first threshold. 35. The server system of claim 29, wherein the second request is included within the standard request processing queue based upon a wait time of the second request exceeding a predetermined second threshold value. 36. A computer program product, comprising: a computer hardware storage device having stored therein program code, the program code, which when executed by a computer hardware system, causes the computer hardware system to perform: receiving, from a client and by a server, a first request and accompanying request information identifying the first request as a first type of request; including, based upon the first type of request indicating a higher priority, the first request in a standard request processing queue; receiving, by the server, a second request and accompanying request information identifying the second request as a second type of request; determining that a server workload of the server exceeds a predetermined first threshold value; and excluding, based upon the second type of request indicating a lower priority and only upon the determining, the second request from the standard request processing queue. 37. The computer program product of claim 36, wherein the first type of request represents a synchronous request, and the second type of request represents an asynchronous request. 38. The computer program product of claim 36, wherein the second request is reprioritized to the higher priority based upon receipt of a third request and accompanying request information indicating the second request and identifying the third request as a third type of request. 39. The computer program product of claim 36, wherein the first request is reprioritized to the lower priority based upon receipt of a fourth request and accompanying request information indicating the first request and identifying the fourth request as a fourth type of request. 40. The computer program product of claim 36, wherein the second request is included within the standard request processing queue based upon a wait time of the second request exceeding a predetermined second threshold value.
2,400
8,794
8,794
15,659,403
2,433
Disclosed is a method and system for static behavior-predictive malware detection. The method and system uses a transfer learning model from behavior prediction to malware detection based on static features. In accordance with an embodiment of the invention, machine learning is used to capture the relations between static features, behavior features, and other context information. For example, the machine learning may be implemented with a deep learning network model with multiple embedded layers is pre-trained with metadata gathered from various resources, including sandbox logs, simulator logs and context information. Synthesized behavior-related static features are generated by projecting the original static features to the behavior features. A final static model may then be trained using the combination of the original static features and the synthesized features as the training data. The detection stage may be performed in real time with static analysis because only static features are needed. Other embodiments and features are also disclosed.
1. A computer-implemented method comprising: receiving a sample of code data; extracting static features from the sample; inputting the static features a first network trained by machine learning to obtain predicted-behavior features; inputting the static features and the predicted-behavior features to a second network trained by machine learning to obtain a malicious score; and using the malicious score to determine whether to label the sample as malicious. 2. The computer-implemented method of claim 1, wherein the sample comprises an unknown sample. 3. The computer-implemented method of claim 1, wherein the static features are features regarding content of the sample. 4. The computer-implemented method of claim 1, wherein the predicted-behavior features are actions performed by the sample when the sample is executed. 5. The computer-implemented method of claim 1, wherein the first network is an artificial neural network. 6. The computer-implemented method of claim 5, wherein the first network is trained during a pre-training stage. 7. The computer-implemented method of claim 6, wherein the pre-training stage uses static features extracted from known samples as input data and behavior features, which are obtained by executing instruction code of the known sample in a protected environment, as output data. 8. The computer-implemented method of claim 1, wherein the second network is an artificial neural network. 9. The computer-implemented method of claim 8, wherein the second network is trained during a training stage that is after the pre-training stage. 10. The computer-implemented method of claim 9, wherein the training stage uses the static features and the predicted-behavior features of known samples as input data and malicious labels of the known samples as output data. 11. A non-transitory computer-readable storage medium comprising instructions stored thereon, that when executed by a processor, perform the steps of: receiving a sample of code data; extracting static features from the sample; inputting the static features a first network trained by machine learning to obtain predicted-behavior features; inputting the static features and the predicted-behavior features to a second network trained by machine learning to obtain a malicious score; and using the malicious score to determine whether to label the sample as malicious. 12. A system comprising: at least one computer that includes at least one processor which executes program instructions and memory which stores and provides access to data; and a malware detection module in memory, the malware detection module including program code configured to: receive a sample of code data; extract static features from the sample; input the static features a first network trained by machine learning to obtain predicted-behavior features; input the static features and the predicted-behavior features to a second network trained by machine learning to obtain a malicious score; and use the malicious score to determine whether to label the sample as malicious. 13. A computer-implemented method comprising: receiving a plurality of known samples of code data; extracting static features from each of the plurality of known samples; executing instruction code of each of the plurality of known samples in a protected environment to obtain behavior features for each of the plurality of known samples; and training a first network using the static and behavior features of each of the plurality of known samples as input and output data, respectively. 14. The computer-implemented method of claim 13, further comprising: providing the static features of each of the plurality of known samples as input data to the first learning network; obtaining predicted-behavior features of each of the plurality of known samples as output data from the first learning network; training a second network using the static and predicted-behavior features of each of the plurality of known samples as input data and a malicious label of each of the plurality of known samples as output data. 15. The computer-implemented method of claim 14, further comprising: receiving an unknown sample of code data; extracting static features from the unknown sample; inputting the static features from the unknown sample to the first network; inputting the static features and the predicted-behavior features from the unknown sample to the second network; using the malicious score to determine whether to label the unknown sample as malicious.
Disclosed is a method and system for static behavior-predictive malware detection. The method and system uses a transfer learning model from behavior prediction to malware detection based on static features. In accordance with an embodiment of the invention, machine learning is used to capture the relations between static features, behavior features, and other context information. For example, the machine learning may be implemented with a deep learning network model with multiple embedded layers is pre-trained with metadata gathered from various resources, including sandbox logs, simulator logs and context information. Synthesized behavior-related static features are generated by projecting the original static features to the behavior features. A final static model may then be trained using the combination of the original static features and the synthesized features as the training data. The detection stage may be performed in real time with static analysis because only static features are needed. Other embodiments and features are also disclosed.1. A computer-implemented method comprising: receiving a sample of code data; extracting static features from the sample; inputting the static features a first network trained by machine learning to obtain predicted-behavior features; inputting the static features and the predicted-behavior features to a second network trained by machine learning to obtain a malicious score; and using the malicious score to determine whether to label the sample as malicious. 2. The computer-implemented method of claim 1, wherein the sample comprises an unknown sample. 3. The computer-implemented method of claim 1, wherein the static features are features regarding content of the sample. 4. The computer-implemented method of claim 1, wherein the predicted-behavior features are actions performed by the sample when the sample is executed. 5. The computer-implemented method of claim 1, wherein the first network is an artificial neural network. 6. The computer-implemented method of claim 5, wherein the first network is trained during a pre-training stage. 7. The computer-implemented method of claim 6, wherein the pre-training stage uses static features extracted from known samples as input data and behavior features, which are obtained by executing instruction code of the known sample in a protected environment, as output data. 8. The computer-implemented method of claim 1, wherein the second network is an artificial neural network. 9. The computer-implemented method of claim 8, wherein the second network is trained during a training stage that is after the pre-training stage. 10. The computer-implemented method of claim 9, wherein the training stage uses the static features and the predicted-behavior features of known samples as input data and malicious labels of the known samples as output data. 11. A non-transitory computer-readable storage medium comprising instructions stored thereon, that when executed by a processor, perform the steps of: receiving a sample of code data; extracting static features from the sample; inputting the static features a first network trained by machine learning to obtain predicted-behavior features; inputting the static features and the predicted-behavior features to a second network trained by machine learning to obtain a malicious score; and using the malicious score to determine whether to label the sample as malicious. 12. A system comprising: at least one computer that includes at least one processor which executes program instructions and memory which stores and provides access to data; and a malware detection module in memory, the malware detection module including program code configured to: receive a sample of code data; extract static features from the sample; input the static features a first network trained by machine learning to obtain predicted-behavior features; input the static features and the predicted-behavior features to a second network trained by machine learning to obtain a malicious score; and use the malicious score to determine whether to label the sample as malicious. 13. A computer-implemented method comprising: receiving a plurality of known samples of code data; extracting static features from each of the plurality of known samples; executing instruction code of each of the plurality of known samples in a protected environment to obtain behavior features for each of the plurality of known samples; and training a first network using the static and behavior features of each of the plurality of known samples as input and output data, respectively. 14. The computer-implemented method of claim 13, further comprising: providing the static features of each of the plurality of known samples as input data to the first learning network; obtaining predicted-behavior features of each of the plurality of known samples as output data from the first learning network; training a second network using the static and predicted-behavior features of each of the plurality of known samples as input data and a malicious label of each of the plurality of known samples as output data. 15. The computer-implemented method of claim 14, further comprising: receiving an unknown sample of code data; extracting static features from the unknown sample; inputting the static features from the unknown sample to the first network; inputting the static features and the predicted-behavior features from the unknown sample to the second network; using the malicious score to determine whether to label the unknown sample as malicious.
2,400
8,795
8,795
15,300,133
2,498
There is described a method of protecting an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables. The method comprises: (i) modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and (ii) inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables. New variables may be defined as part of this method. There are also described associated apparatuses, computer programs and the like.
1. A method, implemented by one or more processors, of protecting an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables, the method comprising: modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables. 2. The method of claim 1 further comprising defining a plurality of new variables. 3. The method of claim 2 wherein a value assigned to at least one of the new variables is not based, directly or indirectly, on any of the one or more condition variables. 4. The method of claim 2 wherein a value assigned to at least one of the new variables is a constant value. 5. The method of claim 2 wherein a value assigned to at least one of the new variables is based on a program variable of the item of software, said program variable being different than the one or more condition variables. 6. The method of claim 2 wherein a value assigned to at least one of the new variables is based, directly or indirectly, on at least one of the one or more condition variables. 7. The method of claim 6 wherein each of the one or more condition variables is used, directly or indirectly, to assign a value to at least one of the new variables. 8. The method of claim 7 wherein at least one identity transformation is dependent on at least one of the new variables. 9. The method of claim 7 further comprising: reformulating the condition to produce a new condition, the new condition being based on at least one of the new variables, wherein the new condition is satisfied if the condition is satisfied, and wherein the new condition is not satisfied if the condition is not satisfied; and modifying the item of software such that at least part of the control flow is dependent on whether the new condition is satisfied. 10. The method of claim 6 further comprising modifying said portion of the item of software such that at least one instance of at least one of the one or more condition variables is replaced by an equivalent expression based on at least one of the new variables. 11. The method of claim 2 further comprising: identifying a code block in the item of software where at least one of the one or more condition variables is assigned a value that is subsequently used to test whether the condition is satisfied; and assigning values to at least some of the new variables in said code block. 12. The method of claim 1 wherein the item of software comprises an IF-THEN statement including an IF section of code comprising the condition and a THEN section of code arranged to be executed in response to the condition being satisfied, and wherein modifying the item of software comprises removing the IF-THEN statement such that the modified item of software always executes the THEN section of code regardless of whether the condition is satisfied. 13. The method of claim 1 wherein the item of software comprises an IF-THEN-ELSE statement including an IF section of code comprising the condition, a THEN section of code arranged to be executed in response to the condition being satisfied and an ELSE section of code arranged to be executed in response to the condition not being satisfied, and wherein modifying the item of software comprises removing the IF-THEN-ELSE statement such that the modified item of software always executes the THEN section of code regardless of whether the condition is satisfied. 14. The method of claim 1 wherein the item of software comprises an IF-THEN-ELSE statement including an IF section of code comprising the logical complement of the condition, a THEN section of code arranged to be executed in response to the condition not being satisfied and an ELSE section of code arranged to be executed in response to the condition being satisfied, and wherein modifying the item of software comprises removing the IF-THEN-ELSE statement such that the modified item of software always executes the ELSE section of code regardless of whether the condition is satisfied. 15. The method of claim 1 wherein at least one of the identity transformations is a multiplication identity transformation which, in the absence of tampering, evaluates to 1 if the condition is satisfied and does not evaluate to 1 if the condition is not satisfied, wherein said multiplication identity transformation may be inserted into an expression by multiplying a variable in the expression by the multiplication identity transformation. 16. The method of claim 1 wherein at least one of the identity transformations is an addition identity transformation which, in the absence of tampering, evaluates to 0 if the condition is satisfied and does not evaluate to 0 if the condition is not satisfied, wherein said addition identity transformation may be inserted into an expression by adding the addition identity transformation to a variable in the expression. 17. The method of claim 1 further comprising: identifying all control flow paths through said portion of the modified item of software; and for each identified control flow path, taking into account values of variables along that control flow path so as to identify respective identity transformations for insertion into expressions in that control flow path. 18. The method of claim 1 further comprising identifying a condition in the item of software to be obfuscated. 19. The method of claim 1 further comprising inserting a branch point in the control flow in said portion of the modified item of software, the control flow path taken from said branch point being independent of whether the condition is satisfied. 20. The method of claim 1 wherein, subsequent to said portion of the modified item of software, the control flow through the modified item of software may vary dependent on whether the condition is satisfied. 21. A method, implemented by one or more processors, of protecting an item of software, the method comprising the steps of: (a) using the method of claim 1 to protect the item of software so as to obfuscate a first condition which causes a variation in control flow through a first portion of the item of software dependent on whether the first condition is satisfied; and (b) using the method of claim 1 to protect the item of software so as to obfuscate a second condition which causes a variation in control flow through a second portion of the item of software dependent on whether the second condition is satisfied. 22. The method of claim 21 wherein there is at least a partial overlap between said first and second portions of the item of software. 23. The method of claim 21 wherein the second condition is the logical complement of the first condition. 24. (canceled) 25. (canceled) 26. One or more tangible computer readable media comprising computer program code which, when executed by a processor, causes the processor protect an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables, by: modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables. 27. (canceled) 28. An apparatus for protecting an item of software comprising: an input for receiving an item of software to be protected, the item of software comprising a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables; an output for outputting a protected item of software; and processing means for producing the protected item of software from the item of software to be protected by: modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables.
There is described a method of protecting an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables. The method comprises: (i) modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and (ii) inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables. New variables may be defined as part of this method. There are also described associated apparatuses, computer programs and the like.1. A method, implemented by one or more processors, of protecting an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables, the method comprising: modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables. 2. The method of claim 1 further comprising defining a plurality of new variables. 3. The method of claim 2 wherein a value assigned to at least one of the new variables is not based, directly or indirectly, on any of the one or more condition variables. 4. The method of claim 2 wherein a value assigned to at least one of the new variables is a constant value. 5. The method of claim 2 wherein a value assigned to at least one of the new variables is based on a program variable of the item of software, said program variable being different than the one or more condition variables. 6. The method of claim 2 wherein a value assigned to at least one of the new variables is based, directly or indirectly, on at least one of the one or more condition variables. 7. The method of claim 6 wherein each of the one or more condition variables is used, directly or indirectly, to assign a value to at least one of the new variables. 8. The method of claim 7 wherein at least one identity transformation is dependent on at least one of the new variables. 9. The method of claim 7 further comprising: reformulating the condition to produce a new condition, the new condition being based on at least one of the new variables, wherein the new condition is satisfied if the condition is satisfied, and wherein the new condition is not satisfied if the condition is not satisfied; and modifying the item of software such that at least part of the control flow is dependent on whether the new condition is satisfied. 10. The method of claim 6 further comprising modifying said portion of the item of software such that at least one instance of at least one of the one or more condition variables is replaced by an equivalent expression based on at least one of the new variables. 11. The method of claim 2 further comprising: identifying a code block in the item of software where at least one of the one or more condition variables is assigned a value that is subsequently used to test whether the condition is satisfied; and assigning values to at least some of the new variables in said code block. 12. The method of claim 1 wherein the item of software comprises an IF-THEN statement including an IF section of code comprising the condition and a THEN section of code arranged to be executed in response to the condition being satisfied, and wherein modifying the item of software comprises removing the IF-THEN statement such that the modified item of software always executes the THEN section of code regardless of whether the condition is satisfied. 13. The method of claim 1 wherein the item of software comprises an IF-THEN-ELSE statement including an IF section of code comprising the condition, a THEN section of code arranged to be executed in response to the condition being satisfied and an ELSE section of code arranged to be executed in response to the condition not being satisfied, and wherein modifying the item of software comprises removing the IF-THEN-ELSE statement such that the modified item of software always executes the THEN section of code regardless of whether the condition is satisfied. 14. The method of claim 1 wherein the item of software comprises an IF-THEN-ELSE statement including an IF section of code comprising the logical complement of the condition, a THEN section of code arranged to be executed in response to the condition not being satisfied and an ELSE section of code arranged to be executed in response to the condition being satisfied, and wherein modifying the item of software comprises removing the IF-THEN-ELSE statement such that the modified item of software always executes the ELSE section of code regardless of whether the condition is satisfied. 15. The method of claim 1 wherein at least one of the identity transformations is a multiplication identity transformation which, in the absence of tampering, evaluates to 1 if the condition is satisfied and does not evaluate to 1 if the condition is not satisfied, wherein said multiplication identity transformation may be inserted into an expression by multiplying a variable in the expression by the multiplication identity transformation. 16. The method of claim 1 wherein at least one of the identity transformations is an addition identity transformation which, in the absence of tampering, evaluates to 0 if the condition is satisfied and does not evaluate to 0 if the condition is not satisfied, wherein said addition identity transformation may be inserted into an expression by adding the addition identity transformation to a variable in the expression. 17. The method of claim 1 further comprising: identifying all control flow paths through said portion of the modified item of software; and for each identified control flow path, taking into account values of variables along that control flow path so as to identify respective identity transformations for insertion into expressions in that control flow path. 18. The method of claim 1 further comprising identifying a condition in the item of software to be obfuscated. 19. The method of claim 1 further comprising inserting a branch point in the control flow in said portion of the modified item of software, the control flow path taken from said branch point being independent of whether the condition is satisfied. 20. The method of claim 1 wherein, subsequent to said portion of the modified item of software, the control flow through the modified item of software may vary dependent on whether the condition is satisfied. 21. A method, implemented by one or more processors, of protecting an item of software, the method comprising the steps of: (a) using the method of claim 1 to protect the item of software so as to obfuscate a first condition which causes a variation in control flow through a first portion of the item of software dependent on whether the first condition is satisfied; and (b) using the method of claim 1 to protect the item of software so as to obfuscate a second condition which causes a variation in control flow through a second portion of the item of software dependent on whether the second condition is satisfied. 22. The method of claim 21 wherein there is at least a partial overlap between said first and second portions of the item of software. 23. The method of claim 21 wherein the second condition is the logical complement of the first condition. 24. (canceled) 25. (canceled) 26. One or more tangible computer readable media comprising computer program code which, when executed by a processor, causes the processor protect an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables, by: modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables. 27. (canceled) 28. An apparatus for protecting an item of software comprising: an input for receiving an item of software to be protected, the item of software comprising a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one or more condition variables; an output for outputting a protected item of software; and processing means for producing the protected item of software from the item of software to be protected by: modifying the item of software such that the control flow through said portion is not dependent on whether the condition is satisfied; and inserting a plurality of identity transformations into expressions in said portion of the modified item of software, wherein the identity transformations are defined and inserted such that, in the absence of tampering, they maintain the results of the expressions if the condition is satisfied and such that they alter the results of the expressions if the condition is not satisfied, wherein each identity transformation is directly or indirectly dependent on at least one of the one or more condition variables.
2,400
8,796
8,796
15,335,735
2,447
Embodiments provide systems and methods for exchanging media through an edge server between different communication networks. More specifically, embodiments of the present disclosure provide systems and methods for establishing and conducting voice and/or video communications between one or more parties on a private network, such as within an enterprise, and one or more parties on a different network such as another private network or an open network such as the Internet using an edge server of the enterprise network. This edge server, also referred to herein as a Session Border Controller (SBC), can be adapted to allow media packets to traverse through a port typically kept open by enterprise firewalls and used for other data exchanges such as HyperText Transfer Protocol (HTTP) data traffic. The SBC can also provide multiplexing and demultiplexing of media streams through the same port and address to traverse firewalls between the different communication networks.
1. A system comprising: a first communication network; a second communication network; and a session border controller coupled with the first communication network and the second communication network, the session border controller comprising a processor and a memory, the memory comprising a set of instruction stored therein which, when executed by the processor, causes the processor to: receive, from a calling endpoint on the first communication network during initiation of a call session between the calling endpoint and a remote endpoint on the second communication network using a signaling channel, a message to the remote endpoint to check media connectivity in the call session, determine, based on the message from the calling endpoint, whether media connectivity is available between the calling endpoint and the remote endpoint, in response to determining media connectivity is available between the calling endpoint and the remote endpoint, conduct the call session between the calling endpoint and the remote endpoint using the signaling channel without media tunneling, and in response to determining media connectivity is not available between the calling endpoint and the remote endpoint, conduct the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling. 2. The system of claim 1, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling comprises: receiving a media tunneling offer from the calling endpoint, the media tunneling offer including representation of a certificate for the calling endpoint; generating a media tunneling answer in response to the media tunneling offer from the calling endpoint, the media tunneling answer comprising a representation of a certificate for the session border controller and an indication of a port of the session border controller; and sending the media tunneling answer to the calling endpoint. 3. The system of claim 2, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling further comprises: receiving, at the port of the session border controller indicated by the media tunneling answer, a media tunneling setup message including a representation of a certificate; determining whether the representation of the certificate from the media tunneling setup message and the representation of the certificate in the media tunneling offer match; in response to determining the representation of the certificate from the media tunneling setup message matches the representation of the certificate in the media tunneling offer, associating one or more media channels of the port of the session border controller indicated by the media tunneling answer with the call session; and exchanging media of the call session using the one or more media channels of the session border associated with the call session and signaling of the call session using the signaling channel. 4. The system of claim 3, wherein conducting the call further comprises converting media exchanged between the calling endpoint and the remote endpoint over the one or more media channels from a protocol of the first communication network to a protocol of the second communication network and from the protocol of the second communication network to the protocol of the first communication network. 5. The system of claim 4, wherein the one or more media channels comprise an audio channel and a video channel separate from the audio channel. 6. The system of claim 5, wherein signaling for the audio channel and the video channel is multiplexed and exchanged via the signaling channel. 7. The system of claim 1, wherein initiation of the call session further comprises: receiving, from the calling endpoint, a message requesting initiation of a call between the calling endpoint and the remote endpoint; determining whether the call has been accepted by the remote endpoint; and in response to determining the call has been accepted by the remote endpoint, sending a response to the calling endpoint indicating acceptance of the call. 8. A system comprising: 9. a first communication network; and 10. an endpoint coupled with the first communication network, the endpoint comprising a processor and a memory, the memory comprising a set of instruction stored therein which, when executed by the processor, causes the processor to: send, during initiation of a call session with a remote endpoint on a second communication network using a signaling channel, a message to the remote endpoint to check media connectivity in the call session, in response to media connectivity being available with the remote endpoint, conduct the call session with the remote endpoint using the signaling channel without media tunneling, and in response to determining media connectivity is not with the remote endpoint, conduct the call session with the remote endpoint using the signaling channel and media tunneling. 11. The system of claim 8, wherein conducting the call session with the remote endpoint using the signaling channel and media tunneling comprises: generating a media tunneling offer, the media tunneling offer comprising a representation of a certificate for the endpoint; and sending the media tunneling offer to the remote endpoint. 12. The system of claim 9, wherein conducting the call session with the remote endpoint using the signaling channel and media tunneling further comprises: receiving, in response to the media tunneling offer, a media tunneling answer, the media tunneling answer comprising a representation of a certificate for a session border controller coupled with the first communication network and the second communication network and an indication of a port of the session border controller; determining, based on the media tunneling answer, whether media tunneling is available; and in response to determining media tunneling is available, generating a media tunneling setup message including the representation of the certificate for the endpoint and sending the media tunneling setup message to the port of the session border controller indicated by the media tunneling answer. 13. The system of claim 10, wherein the one or more media channels comprise an audio channel and a video channel separate from the audio channel. 14. The system of claim 11, wherein signaling for the audio channel and the video channel is multiplexed and exchanged via the signaling channel. 15. The system of claim 8, wherein initiation of the call session further comprises sending, to the remote endpoint, a signaling message requesting call session initiation. 16. A method comprising: receiving, at a session border controller from a calling endpoint on a first communication network during initiation of a call session between the calling endpoint and a remote endpoint on a second communication network using a signaling channel, a message to the remote endpoint to check media connectivity in the call session; determining, by the session border controller based on the message from the calling endpoint, whether media connectivity is available between the calling endpoint and the session border controller; in response to determining media connectivity is available between the calling endpoint and the session border controller, conducting, by the session border controller, the call session between the calling endpoint and the remote endpoint using the signaling channel without media tunneling; and in response to determining media connectivity is not available between the calling endpoint and the session border controller, conducting, by the session border controller, the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling or initiating a call between the calling endpoint and the remote endpoint using an alternate number. 15. The method of claim 14, wherein initiating the call between the calling endpoint and the remote endpoint using the alternate number comprises receiving, by the session border controller from the calling endpoint the alternate number for the call and initiating, by the session border controller, the call between the calling endpoint and the remote endpoint using the alternate number. 16. The method of claim 14, wherein initiating the call between the calling endpoint and the remote endpoint using the alternate number comprises receiving, by an enterprise communication server from the calling endpoint the alternate number for the call and initiating, by the enterprise communication server, the call between the calling endpoint and the remote endpoint using the alternate number. 17. The method of claim 14, wherein initiating the call between the calling endpoint and the remote endpoint using the alternate number comprises initiating the call from the calling endpoint to the remote endpoint using the alternate number. 18. The method of claim 14, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling comprises: receiving a media tunneling offer from the calling endpoint, the media tunneling offer including a representation of a certificate for the calling endpoint; generating a media tunneling answer in response to the media tunneling offer from the calling endpoint, the media tunneling answer comprising a representation of a certificate for the session border controller and an indication of a port of the session border controller; and sending the media tunneling answer to the calling endpoint. 19. The method of claim 18, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling further comprises: receiving, at the port of the session border controller indicated by the media tunneling answer, a media tunneling setup message including a representation of a certificate; determining whether the representation of the certificate from the media tunneling setup message and the representation of the certificate in the media tunneling offer match; in response to determining the representation of the certificate from the media tunneling setup message matches the representation of the certificate in the media tunneling offer, associating one or more media channels of the port of the session border controller indicated by the media tunneling answer with the call session; and exchanging media of the call session using the one or more media channels of the session border associated with the call session and signaling of the call session using the signaling channel. 20. The method of claim 19, wherein conducting the call further comprises converting media exchanged between the calling endpoint and the remote endpoint over the one or more media channels from a protocol of the first communication network to a protocol of the second communication network and from the protocol of the second communication network to the protocol of the first communication network.
Embodiments provide systems and methods for exchanging media through an edge server between different communication networks. More specifically, embodiments of the present disclosure provide systems and methods for establishing and conducting voice and/or video communications between one or more parties on a private network, such as within an enterprise, and one or more parties on a different network such as another private network or an open network such as the Internet using an edge server of the enterprise network. This edge server, also referred to herein as a Session Border Controller (SBC), can be adapted to allow media packets to traverse through a port typically kept open by enterprise firewalls and used for other data exchanges such as HyperText Transfer Protocol (HTTP) data traffic. The SBC can also provide multiplexing and demultiplexing of media streams through the same port and address to traverse firewalls between the different communication networks.1. A system comprising: a first communication network; a second communication network; and a session border controller coupled with the first communication network and the second communication network, the session border controller comprising a processor and a memory, the memory comprising a set of instruction stored therein which, when executed by the processor, causes the processor to: receive, from a calling endpoint on the first communication network during initiation of a call session between the calling endpoint and a remote endpoint on the second communication network using a signaling channel, a message to the remote endpoint to check media connectivity in the call session, determine, based on the message from the calling endpoint, whether media connectivity is available between the calling endpoint and the remote endpoint, in response to determining media connectivity is available between the calling endpoint and the remote endpoint, conduct the call session between the calling endpoint and the remote endpoint using the signaling channel without media tunneling, and in response to determining media connectivity is not available between the calling endpoint and the remote endpoint, conduct the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling. 2. The system of claim 1, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling comprises: receiving a media tunneling offer from the calling endpoint, the media tunneling offer including representation of a certificate for the calling endpoint; generating a media tunneling answer in response to the media tunneling offer from the calling endpoint, the media tunneling answer comprising a representation of a certificate for the session border controller and an indication of a port of the session border controller; and sending the media tunneling answer to the calling endpoint. 3. The system of claim 2, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling further comprises: receiving, at the port of the session border controller indicated by the media tunneling answer, a media tunneling setup message including a representation of a certificate; determining whether the representation of the certificate from the media tunneling setup message and the representation of the certificate in the media tunneling offer match; in response to determining the representation of the certificate from the media tunneling setup message matches the representation of the certificate in the media tunneling offer, associating one or more media channels of the port of the session border controller indicated by the media tunneling answer with the call session; and exchanging media of the call session using the one or more media channels of the session border associated with the call session and signaling of the call session using the signaling channel. 4. The system of claim 3, wherein conducting the call further comprises converting media exchanged between the calling endpoint and the remote endpoint over the one or more media channels from a protocol of the first communication network to a protocol of the second communication network and from the protocol of the second communication network to the protocol of the first communication network. 5. The system of claim 4, wherein the one or more media channels comprise an audio channel and a video channel separate from the audio channel. 6. The system of claim 5, wherein signaling for the audio channel and the video channel is multiplexed and exchanged via the signaling channel. 7. The system of claim 1, wherein initiation of the call session further comprises: receiving, from the calling endpoint, a message requesting initiation of a call between the calling endpoint and the remote endpoint; determining whether the call has been accepted by the remote endpoint; and in response to determining the call has been accepted by the remote endpoint, sending a response to the calling endpoint indicating acceptance of the call. 8. A system comprising: 9. a first communication network; and 10. an endpoint coupled with the first communication network, the endpoint comprising a processor and a memory, the memory comprising a set of instruction stored therein which, when executed by the processor, causes the processor to: send, during initiation of a call session with a remote endpoint on a second communication network using a signaling channel, a message to the remote endpoint to check media connectivity in the call session, in response to media connectivity being available with the remote endpoint, conduct the call session with the remote endpoint using the signaling channel without media tunneling, and in response to determining media connectivity is not with the remote endpoint, conduct the call session with the remote endpoint using the signaling channel and media tunneling. 11. The system of claim 8, wherein conducting the call session with the remote endpoint using the signaling channel and media tunneling comprises: generating a media tunneling offer, the media tunneling offer comprising a representation of a certificate for the endpoint; and sending the media tunneling offer to the remote endpoint. 12. The system of claim 9, wherein conducting the call session with the remote endpoint using the signaling channel and media tunneling further comprises: receiving, in response to the media tunneling offer, a media tunneling answer, the media tunneling answer comprising a representation of a certificate for a session border controller coupled with the first communication network and the second communication network and an indication of a port of the session border controller; determining, based on the media tunneling answer, whether media tunneling is available; and in response to determining media tunneling is available, generating a media tunneling setup message including the representation of the certificate for the endpoint and sending the media tunneling setup message to the port of the session border controller indicated by the media tunneling answer. 13. The system of claim 10, wherein the one or more media channels comprise an audio channel and a video channel separate from the audio channel. 14. The system of claim 11, wherein signaling for the audio channel and the video channel is multiplexed and exchanged via the signaling channel. 15. The system of claim 8, wherein initiation of the call session further comprises sending, to the remote endpoint, a signaling message requesting call session initiation. 16. A method comprising: receiving, at a session border controller from a calling endpoint on a first communication network during initiation of a call session between the calling endpoint and a remote endpoint on a second communication network using a signaling channel, a message to the remote endpoint to check media connectivity in the call session; determining, by the session border controller based on the message from the calling endpoint, whether media connectivity is available between the calling endpoint and the session border controller; in response to determining media connectivity is available between the calling endpoint and the session border controller, conducting, by the session border controller, the call session between the calling endpoint and the remote endpoint using the signaling channel without media tunneling; and in response to determining media connectivity is not available between the calling endpoint and the session border controller, conducting, by the session border controller, the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling or initiating a call between the calling endpoint and the remote endpoint using an alternate number. 15. The method of claim 14, wherein initiating the call between the calling endpoint and the remote endpoint using the alternate number comprises receiving, by the session border controller from the calling endpoint the alternate number for the call and initiating, by the session border controller, the call between the calling endpoint and the remote endpoint using the alternate number. 16. The method of claim 14, wherein initiating the call between the calling endpoint and the remote endpoint using the alternate number comprises receiving, by an enterprise communication server from the calling endpoint the alternate number for the call and initiating, by the enterprise communication server, the call between the calling endpoint and the remote endpoint using the alternate number. 17. The method of claim 14, wherein initiating the call between the calling endpoint and the remote endpoint using the alternate number comprises initiating the call from the calling endpoint to the remote endpoint using the alternate number. 18. The method of claim 14, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling comprises: receiving a media tunneling offer from the calling endpoint, the media tunneling offer including a representation of a certificate for the calling endpoint; generating a media tunneling answer in response to the media tunneling offer from the calling endpoint, the media tunneling answer comprising a representation of a certificate for the session border controller and an indication of a port of the session border controller; and sending the media tunneling answer to the calling endpoint. 19. The method of claim 18, wherein conducting the call session between the calling endpoint and the remote endpoint using the signaling channel and media tunneling further comprises: receiving, at the port of the session border controller indicated by the media tunneling answer, a media tunneling setup message including a representation of a certificate; determining whether the representation of the certificate from the media tunneling setup message and the representation of the certificate in the media tunneling offer match; in response to determining the representation of the certificate from the media tunneling setup message matches the representation of the certificate in the media tunneling offer, associating one or more media channels of the port of the session border controller indicated by the media tunneling answer with the call session; and exchanging media of the call session using the one or more media channels of the session border associated with the call session and signaling of the call session using the signaling channel. 20. The method of claim 19, wherein conducting the call further comprises converting media exchanged between the calling endpoint and the remote endpoint over the one or more media channels from a protocol of the first communication network to a protocol of the second communication network and from the protocol of the second communication network to the protocol of the first communication network.
2,400
8,797
8,797
15,368,809
2,462
A device comprising: a transceiver operable in a first or second mode and configured to receive packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit, wherein: in the first mode the transceiver: (i) sends a polling message in response to receiving the indication of a further packet for transmission; and (ii) listens for that further packet; and in the second mode the transceiver: (i) does not send a polling message in response to receiving the indication of a further packet for transmission; and (ii) listens for packets regardless of whether a received packet indicates that there is a further packet to transmit or not; and a controller configured to monitor an activity level for the transceiver and cause the transceiver to operate in the first or second mode in dependence on the activity level.
1. A device capable of communicating according to a wireless communications protocol, the device comprising: a transceiver configured to receive packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit, the transceiver being operable in a first mode or a second mode, wherein: in the first mode the transceiver is configured to: (i) send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listen for that further packet; and in the second mode the transceiver is configured to: (i) not send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listen for packets regardless of whether a received packet indicates that the remote device has a further packet to transmit or not; and a controller configured to monitor an activity level for the transceiver and cause the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level. 2. The device according to claim 1, wherein the controller is configured to monitor the activity level by measuring a rate of number of packets received over time. 3. The device according to claim 1, wherein the controller is configured to monitor the activity level by measuring a rate of amount of data received over time. 4. The device according to claim 1, wherein the controller is configured to monitor the activity level by determining a priority level for data received. 5. The device according to claim 4, wherein the controller is configured to cause the transceiver to operate in the second mode if the priority level is associated with video and/or voice data. 6. The device according to claim 1, wherein the transceiver is configured to listen for packets for a greater amount of time in the second mode than in the first mode. 7. The device according to claim 1, wherein the transceiver is configured to intermittently listen for packets in the first mode and continually listen for packets in the second mode. 8. The device according to claim 1, wherein the wireless communications protocol is a Wi-Fi protocol. 9. The device according to claim 8, wherein the first mode is a power save (PS) mode and the second mode is an active mode according to the Wi-Fi protocol. 10. The device according to claim 8, wherein the indication of whether or not the remote device has a further packet to transmit is dependent on a more data field of a Wi-Fi packet and wherein the polling message is a PS-Poll. 11. The device according to claim 10, wherein the controller is configured to monitor the activity level by measuring a rate of receiving packets having the more data field set to indicate that the remove device has a further packet to transmit. 12. The device according to claim 1, wherein the monitoring of the activity level comprises measuring the number of packets received over a period of time indicating that the remote device has further packets to transmit, and wherein the controller is further configured to compare the activity level with a threshold, the transceiver being caused to operate in the first mode or the second mode in dependence on said comparison. 13. The device according to claim 1, wherein the monitoring of the activity level comprises monitoring for a change in an identifier received from one or more remote devices. 14. The device according to claim 1, wherein the transceiver is caused to operate in the first mode or the second mode further in dependence on the power level of a battery that powers the transceiver. 15. The device according to claim 1, wherein the controller is configured to cause the transceiver to operate in the second mode in response to the monitored activity level being greater than a first threshold, and cause the transceiver to operate in the first mode in response to the monitored activity level being less than a second threshold; and, wherein the second threshold is different to the first threshold. 16. A method of communicating according to a wireless communications protocol, the method comprising: receiving packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit; operating a transceiver in a first mode or a second mode, wherein: in the first mode the transceiver: (i) sends a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for that further packet; and in the second mode the transceiver: (i) does not send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for packets regardless of whether a received packet indicates that the remote device has a further packet to transmit or not; and monitoring an activity level for the transceiver and causing the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level. 17. The method according to claim 16, wherein: the monitoring of the activity level comprises measuring the number of packets received over a period of time indicating that the remote device has further packets to transmit; and the causing of the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level further comprises comparing the activity level with a threshold, the transceiver being caused to operate in the first mode or the second mode in dependence on said comparison. 18. The method according to claim 16, wherein monitoring the activity level further comprises monitoring for a change in an identifier of one or more remote devices. 19. The method according to claim 16, further comprising causing the transceiver to operate in the second mode in response to the monitored activity level being greater than a first threshold, and causing the transceiver to operate in the first mode in response to the monitored activity level being less than a second threshold; and, wherein the second threshold is different to the first threshold. 20. A non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system, cause the computer system to perform a method of communicating according to a wireless communications protocol, the method comprising: receiving packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit; operating a transceiver in a first mode or a second mode, wherein: in the first mode the transceiver: (i) sends a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for that further packet; and in the second mode the transceiver: (i) does not send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for packets regardless of whether a received packet indicates that the remote device has a further packet to transmit or not; and monitoring an activity level for the transceiver and causing the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level.
A device comprising: a transceiver operable in a first or second mode and configured to receive packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit, wherein: in the first mode the transceiver: (i) sends a polling message in response to receiving the indication of a further packet for transmission; and (ii) listens for that further packet; and in the second mode the transceiver: (i) does not send a polling message in response to receiving the indication of a further packet for transmission; and (ii) listens for packets regardless of whether a received packet indicates that there is a further packet to transmit or not; and a controller configured to monitor an activity level for the transceiver and cause the transceiver to operate in the first or second mode in dependence on the activity level.1. A device capable of communicating according to a wireless communications protocol, the device comprising: a transceiver configured to receive packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit, the transceiver being operable in a first mode or a second mode, wherein: in the first mode the transceiver is configured to: (i) send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listen for that further packet; and in the second mode the transceiver is configured to: (i) not send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listen for packets regardless of whether a received packet indicates that the remote device has a further packet to transmit or not; and a controller configured to monitor an activity level for the transceiver and cause the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level. 2. The device according to claim 1, wherein the controller is configured to monitor the activity level by measuring a rate of number of packets received over time. 3. The device according to claim 1, wherein the controller is configured to monitor the activity level by measuring a rate of amount of data received over time. 4. The device according to claim 1, wherein the controller is configured to monitor the activity level by determining a priority level for data received. 5. The device according to claim 4, wherein the controller is configured to cause the transceiver to operate in the second mode if the priority level is associated with video and/or voice data. 6. The device according to claim 1, wherein the transceiver is configured to listen for packets for a greater amount of time in the second mode than in the first mode. 7. The device according to claim 1, wherein the transceiver is configured to intermittently listen for packets in the first mode and continually listen for packets in the second mode. 8. The device according to claim 1, wherein the wireless communications protocol is a Wi-Fi protocol. 9. The device according to claim 8, wherein the first mode is a power save (PS) mode and the second mode is an active mode according to the Wi-Fi protocol. 10. The device according to claim 8, wherein the indication of whether or not the remote device has a further packet to transmit is dependent on a more data field of a Wi-Fi packet and wherein the polling message is a PS-Poll. 11. The device according to claim 10, wherein the controller is configured to monitor the activity level by measuring a rate of receiving packets having the more data field set to indicate that the remove device has a further packet to transmit. 12. The device according to claim 1, wherein the monitoring of the activity level comprises measuring the number of packets received over a period of time indicating that the remote device has further packets to transmit, and wherein the controller is further configured to compare the activity level with a threshold, the transceiver being caused to operate in the first mode or the second mode in dependence on said comparison. 13. The device according to claim 1, wherein the monitoring of the activity level comprises monitoring for a change in an identifier received from one or more remote devices. 14. The device according to claim 1, wherein the transceiver is caused to operate in the first mode or the second mode further in dependence on the power level of a battery that powers the transceiver. 15. The device according to claim 1, wherein the controller is configured to cause the transceiver to operate in the second mode in response to the monitored activity level being greater than a first threshold, and cause the transceiver to operate in the first mode in response to the monitored activity level being less than a second threshold; and, wherein the second threshold is different to the first threshold. 16. A method of communicating according to a wireless communications protocol, the method comprising: receiving packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit; operating a transceiver in a first mode or a second mode, wherein: in the first mode the transceiver: (i) sends a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for that further packet; and in the second mode the transceiver: (i) does not send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for packets regardless of whether a received packet indicates that the remote device has a further packet to transmit or not; and monitoring an activity level for the transceiver and causing the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level. 17. The method according to claim 16, wherein: the monitoring of the activity level comprises measuring the number of packets received over a period of time indicating that the remote device has further packets to transmit; and the causing of the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level further comprises comparing the activity level with a threshold, the transceiver being caused to operate in the first mode or the second mode in dependence on said comparison. 18. The method according to claim 16, wherein monitoring the activity level further comprises monitoring for a change in an identifier of one or more remote devices. 19. The method according to claim 16, further comprising causing the transceiver to operate in the second mode in response to the monitored activity level being greater than a first threshold, and causing the transceiver to operate in the first mode in response to the monitored activity level being less than a second threshold; and, wherein the second threshold is different to the first threshold. 20. A non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system, cause the computer system to perform a method of communicating according to a wireless communications protocol, the method comprising: receiving packets from a remote device, each packet comprising an indication of whether or not the remote device has a further packet to transmit; operating a transceiver in a first mode or a second mode, wherein: in the first mode the transceiver: (i) sends a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for that further packet; and in the second mode the transceiver: (i) does not send a polling message to the remote device in response to receiving the indication of the remote device having a further packet to transmit; and (ii) listens for packets regardless of whether a received packet indicates that the remote device has a further packet to transmit or not; and monitoring an activity level for the transceiver and causing the transceiver to operate in the first mode or the second mode in dependence on the monitored activity level.
2,400
8,798
8,798
15,005,564
2,419
In one example, a device for coding video data includes a memory configured to store video data and a video coder configured to form, for a current block of the video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate, code an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list, and code the current block of video data using motion information of the identified merge candidate.
1. A method of coding video data, the method comprising: forming, for a current block of video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; coding an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and coding the current block of video data using motion information of the identified merge candidate. 2. The method of claim 1, wherein forming the merge candidate list comprises: determining, for the current block, a corresponding block in a reference picture; determining whether motion information is available for the corresponding block; and forming the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 3. The method of claim 2, wherein determining whether motion information is available for the corresponding block comprises determining whether a portion of the corresponding block is intra-predicted. 4. The method of claim 1, wherein forming the merge candidate list comprises forming the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 5. The method of claim 4, wherein forming the ATMVP candidate from the representative set of motion information comprises forming the ATMVP candidate from motion information for a predetermined position of the corresponding block. 6. The method of claim 4, wherein forming the ATMVP candidate from the representative set of motion information comprises forming the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 7. The method of claim 1, wherein forming the merge candidate list comprises: using a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; when the first ATMVP candidate is available, adding the first ATMVP candidate to the merge candidate list as the ATMPV candidate; when the first ATMVP candidate is not available: using a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture; and adding the second ATMVP candidate to the merge candidate list as the ATMVP candidate. 8. The method of claim 7, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 9. The method of claim 7, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 10. The method of claim 7, further comprising selecting the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 11. The method of claim 1, wherein forming the merge candidate list comprises: determining whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and adding the ATMVP candidate to the candidate list after determining that the motion vector is available. 12. The method of claim 11, wherein when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X, setting the motion vector to be available for reference picture list X and scaling the motion vector to a reference picture in reference picture list X. 13. The method of claim 1, wherein coding the index comprises decoding the index, and wherein coding the current block comprises: predicting the current block using the motion information of the identified merge candidate to form a predicted block; decoding residual information for the current block; and decoding the current block using the decoded residual information and the predicted block. 14. The method of claim 1, wherein coding the index comprises encoding the index, and wherein coding the current block comprises: predicting the current block using the motion information of the identified merge candidate to form a predicted block; forming a residual block representing differences between the current block and the predicted block; and encoding the residual information. 15. A device for coding video data, the device comprising: a memory configured to store video data; and a video coder configured to: form, for a current block of the video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; code an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and code the current block of video data using motion information of the identified merge candidate. 16. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to: determine, for the current block, a corresponding block in a reference picture; determine whether motion information is available for the corresponding block; and form the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 17. The device of claim 16, wherein to determine whether motion information is available for the corresponding block, the video coder is configured to determine whether a portion of the corresponding block is intra-predicted. 18. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to form the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 19. The device of claim 18, wherein to form the ATMVP candidate from the representative set of motion information, the video coder is configured to form the ATMVP candidate from motion information for a predetermined position of the corresponding block. 20. The device of claim 18, wherein to form the ATMVP candidate from the representative set of motion information, the video coder is configured to form the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 21. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to: use a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; when the first ATMVP candidate is available, add the first ATMVP candidate to the merge candidate list as the ATMPV candidate; when the first ATMVP candidate is not available: use a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture; and adde the second ATMVP candidate to the merge candidate list as the ATMVP candidate. 22. The device of claim 21, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 23. The device of claim 21, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 24. The device of claim 21, wherein the video coder is further configured to select the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 25. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to: determine whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and add the ATMVP candidate to the candidate list after determining that the motion vector is available. 26. The device of claim 25, wherein when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X, the video coder is configured to set the motion vector to be available for reference picture list X and scale the motion vector to a reference picture in reference picture list X. 27. The device of claim 15, wherein the video coder comprises a video decoder configured to decode the index, and to code the current block, the video decoder is configured to: predict the current block using the motion information of the identified merge candidate to form a predicted block; decode residual information for the current block; and decode the current block using the decoded residual information and the predicted block. 28. The device of claim 15, wherein the video coder comprises a video encoder configured to encode the index, and wherein to code the current block, the video encoder is configured to: predict the current block using the motion information of the identified merge candidate to form a predicted block; form a residual block representing differences between the current block and the predicted block; and encode the residual information. 29. The device of claim 15, wherein the device comprises at least one of: an integrated circuit; a microprocessor; or a wireless communication device. 30. A device for coding video data, the device comprising: means for forming, for a current block of video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; means for coding an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and means for coding the current block of video data using motion information of the identified merge candidate. 31. The device of claim 30, wherein forming the merge candidate list comprises: means for determining, for the current block, a corresponding block in a reference picture; means for determining whether motion information is available for the corresponding block; and means for forming the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 32. The device of claim 31, wherein the means for determining whether motion information is available for the corresponding block comprises means for determining whether a portion of the corresponding block is intra-predicted. 33. The device of claim 30, wherein the means for forming the merge candidate list comprises means for forming the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 34. The device of claim 33, wherein the means for forming the ATMVP candidate from the representative set of motion information comprises means for forming the ATMVP candidate from motion information for a predetermined position of the corresponding block. 35. The device of claim 33, wherein the means for forming the ATMVP candidate from the representative set of motion information comprises means for forming the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 36. The device of claim 30, wherein the means for forming the merge candidate list comprises: means for using a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; means for adding, when the first ATMVP candidate is available, the first ATMVP candidate to the merge candidate list as the ATMPV candidate; means for using a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture when the first ATMVP candidate is not available; and means for adding the second ATMVP candidate to the merge candidate list as the ATMVP candidate when the first ATMVP candidate is not available. 37. The device of claim 36, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 38. The device of claim 36, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 39. The device of claim 36, further comprising means for selecting the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 40. The device of claim 30, wherein the means for forming the merge candidate list comprises: means for determining whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and means for adding the ATMVP candidate to the candidate list after determining that the motion vector is available. 41. The device of claim 40, further comprising means for setting the motion vector to be available for reference picture list X and for scaling the motion vector to a reference picture in reference picture list X when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X. 42. The device of claim 30, wherein the means for coding the index comprises means for decoding the index, and wherein the means for coding the current block comprises: means for predicting the current block using the motion information of the identified merge candidate to form a predicted block; means for decoding residual information for the current block; and means for decoding the current block using the decoded residual information and the predicted block. 43. The device of claim 30, wherein the means for coding the index comprises encoding the index, and wherein the means for coding the current block comprises: means for predicting the current block using the motion information of the identified merge candidate to form a predicted block; means for forming a residual block representing differences between the current block and the predicted block; and means for encoding the residual information. 44. A computer-readable storage medium having stored thereon instructions that, when executed, cause a processor to: form, for a current block of video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; code an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and code the current block of video data using motion information of the identified merge candidate. 45. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to: determine, for the current block, a corresponding block in a reference picture; determine whether motion information is available for the corresponding block; and form the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 46. The computer-readable storage medium of claim 45, wherein the instructions that cause the processor to determine whether motion information is available for the corresponding block comprise instructions that cause the processor to determining whether a portion of the corresponding block is intra-predicted. 47. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to form the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 48. The computer-readable storage medium of claim 47, wherein the instructions that cause the processor to form the ATMVP candidate from the representative set of motion information comprise instructions that cause the processor to form the ATMVP candidate from motion information for a predetermined position of the corresponding block. 49. The computer-readable storage medium of claim 47, wherein the instructions that cause the processor to form the ATMVP candidate from the representative set of motion information comprise instructions that cause the processor to form the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 50. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to: use a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; when the first ATMVP candidate is available, add the first ATMVP candidate to the merge candidate list as the ATMPV candidate; when the first ATMVP candidate is not available: use a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture; and add the second ATMVP candidate to the merge candidate list as the ATMVP candidate. 51. The computer-readable storage medium of claim 50, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 52. The computer-readable storage medium of claim 50, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 53. The computer-readable storage medium of claim 50, further comprising instructions that cause the processor to select the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 54. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to: determine whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and add the ATMVP candidate to the candidate list after determining that the motion vector is available. 55. The computer-readable storage medium of claim 54, wherein when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X, the instructions cause the processor to set the motion vector to be available for reference picture list X and scale the motion vector to a reference picture in reference picture list X. 56. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to code the index comprise instructions that cause the processor to decode the index, and wherein the instructions that cause the processor to code the current block comprise instructions that cause the processor to: predict the current block using the motion information of the identified merge candidate to form a predicted block; decode residual information for the current block; and decode the current block using the decoded residual information and the predicted block. 57. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to code the index comprises encoding the index, and wherein the instructions that cause the processor to code the current block comprise instructions that cause the processor to: predict the current block using the motion information of the identified merge candidate to form a predicted block; form a residual block representing differences between the current block and the predicted block; and encode the residual information.
In one example, a device for coding video data includes a memory configured to store video data and a video coder configured to form, for a current block of the video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate, code an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list, and code the current block of video data using motion information of the identified merge candidate.1. A method of coding video data, the method comprising: forming, for a current block of video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; coding an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and coding the current block of video data using motion information of the identified merge candidate. 2. The method of claim 1, wherein forming the merge candidate list comprises: determining, for the current block, a corresponding block in a reference picture; determining whether motion information is available for the corresponding block; and forming the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 3. The method of claim 2, wherein determining whether motion information is available for the corresponding block comprises determining whether a portion of the corresponding block is intra-predicted. 4. The method of claim 1, wherein forming the merge candidate list comprises forming the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 5. The method of claim 4, wherein forming the ATMVP candidate from the representative set of motion information comprises forming the ATMVP candidate from motion information for a predetermined position of the corresponding block. 6. The method of claim 4, wherein forming the ATMVP candidate from the representative set of motion information comprises forming the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 7. The method of claim 1, wherein forming the merge candidate list comprises: using a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; when the first ATMVP candidate is available, adding the first ATMVP candidate to the merge candidate list as the ATMPV candidate; when the first ATMVP candidate is not available: using a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture; and adding the second ATMVP candidate to the merge candidate list as the ATMVP candidate. 8. The method of claim 7, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 9. The method of claim 7, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 10. The method of claim 7, further comprising selecting the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 11. The method of claim 1, wherein forming the merge candidate list comprises: determining whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and adding the ATMVP candidate to the candidate list after determining that the motion vector is available. 12. The method of claim 11, wherein when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X, setting the motion vector to be available for reference picture list X and scaling the motion vector to a reference picture in reference picture list X. 13. The method of claim 1, wherein coding the index comprises decoding the index, and wherein coding the current block comprises: predicting the current block using the motion information of the identified merge candidate to form a predicted block; decoding residual information for the current block; and decoding the current block using the decoded residual information and the predicted block. 14. The method of claim 1, wherein coding the index comprises encoding the index, and wherein coding the current block comprises: predicting the current block using the motion information of the identified merge candidate to form a predicted block; forming a residual block representing differences between the current block and the predicted block; and encoding the residual information. 15. A device for coding video data, the device comprising: a memory configured to store video data; and a video coder configured to: form, for a current block of the video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; code an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and code the current block of video data using motion information of the identified merge candidate. 16. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to: determine, for the current block, a corresponding block in a reference picture; determine whether motion information is available for the corresponding block; and form the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 17. The device of claim 16, wherein to determine whether motion information is available for the corresponding block, the video coder is configured to determine whether a portion of the corresponding block is intra-predicted. 18. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to form the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 19. The device of claim 18, wherein to form the ATMVP candidate from the representative set of motion information, the video coder is configured to form the ATMVP candidate from motion information for a predetermined position of the corresponding block. 20. The device of claim 18, wherein to form the ATMVP candidate from the representative set of motion information, the video coder is configured to form the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 21. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to: use a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; when the first ATMVP candidate is available, add the first ATMVP candidate to the merge candidate list as the ATMPV candidate; when the first ATMVP candidate is not available: use a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture; and adde the second ATMVP candidate to the merge candidate list as the ATMVP candidate. 22. The device of claim 21, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 23. The device of claim 21, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 24. The device of claim 21, wherein the video coder is further configured to select the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 25. The device of claim 15, wherein to form the merge candidate list, the video coder is configured to: determine whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and add the ATMVP candidate to the candidate list after determining that the motion vector is available. 26. The device of claim 25, wherein when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X, the video coder is configured to set the motion vector to be available for reference picture list X and scale the motion vector to a reference picture in reference picture list X. 27. The device of claim 15, wherein the video coder comprises a video decoder configured to decode the index, and to code the current block, the video decoder is configured to: predict the current block using the motion information of the identified merge candidate to form a predicted block; decode residual information for the current block; and decode the current block using the decoded residual information and the predicted block. 28. The device of claim 15, wherein the video coder comprises a video encoder configured to encode the index, and wherein to code the current block, the video encoder is configured to: predict the current block using the motion information of the identified merge candidate to form a predicted block; form a residual block representing differences between the current block and the predicted block; and encode the residual information. 29. The device of claim 15, wherein the device comprises at least one of: an integrated circuit; a microprocessor; or a wireless communication device. 30. A device for coding video data, the device comprising: means for forming, for a current block of video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; means for coding an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and means for coding the current block of video data using motion information of the identified merge candidate. 31. The device of claim 30, wherein forming the merge candidate list comprises: means for determining, for the current block, a corresponding block in a reference picture; means for determining whether motion information is available for the corresponding block; and means for forming the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 32. The device of claim 31, wherein the means for determining whether motion information is available for the corresponding block comprises means for determining whether a portion of the corresponding block is intra-predicted. 33. The device of claim 30, wherein the means for forming the merge candidate list comprises means for forming the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 34. The device of claim 33, wherein the means for forming the ATMVP candidate from the representative set of motion information comprises means for forming the ATMVP candidate from motion information for a predetermined position of the corresponding block. 35. The device of claim 33, wherein the means for forming the ATMVP candidate from the representative set of motion information comprises means for forming the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 36. The device of claim 30, wherein the means for forming the merge candidate list comprises: means for using a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; means for adding, when the first ATMVP candidate is available, the first ATMVP candidate to the merge candidate list as the ATMPV candidate; means for using a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture when the first ATMVP candidate is not available; and means for adding the second ATMVP candidate to the merge candidate list as the ATMVP candidate when the first ATMVP candidate is not available. 37. The device of claim 36, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 38. The device of claim 36, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 39. The device of claim 36, further comprising means for selecting the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 40. The device of claim 30, wherein the means for forming the merge candidate list comprises: means for determining whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and means for adding the ATMVP candidate to the candidate list after determining that the motion vector is available. 41. The device of claim 40, further comprising means for setting the motion vector to be available for reference picture list X and for scaling the motion vector to a reference picture in reference picture list X when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X. 42. The device of claim 30, wherein the means for coding the index comprises means for decoding the index, and wherein the means for coding the current block comprises: means for predicting the current block using the motion information of the identified merge candidate to form a predicted block; means for decoding residual information for the current block; and means for decoding the current block using the decoded residual information and the predicted block. 43. The device of claim 30, wherein the means for coding the index comprises encoding the index, and wherein the means for coding the current block comprises: means for predicting the current block using the motion information of the identified merge candidate to form a predicted block; means for forming a residual block representing differences between the current block and the predicted block; and means for encoding the residual information. 44. A computer-readable storage medium having stored thereon instructions that, when executed, cause a processor to: form, for a current block of video data, a merge candidate list including a plurality of merge candidates, the plurality of merge candidates including four spatial neighboring candidates from four neighboring blocks to the current block and, immediately following the four spatial neighboring candidates, an advanced temporal motion vector prediction (ATMVP) candidate; code an index into the merge candidate list that identifies a merge candidate of the plurality of merge candidates in the merge candidate list; and code the current block of video data using motion information of the identified merge candidate. 45. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to: determine, for the current block, a corresponding block in a reference picture; determine whether motion information is available for the corresponding block; and form the merge candidate list to include the ATMVP candidate after determining that motion information is available for the corresponding block. 46. The computer-readable storage medium of claim 45, wherein the instructions that cause the processor to determine whether motion information is available for the corresponding block comprise instructions that cause the processor to determining whether a portion of the corresponding block is intra-predicted. 47. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to form the ATMVP candidate from a representative set of motion information for a corresponding block to the current block in a reference picture. 48. The computer-readable storage medium of claim 47, wherein the instructions that cause the processor to form the ATMVP candidate from the representative set of motion information comprise instructions that cause the processor to form the ATMVP candidate from motion information for a predetermined position of the corresponding block. 49. The computer-readable storage medium of claim 47, wherein the instructions that cause the processor to form the ATMVP candidate from the representative set of motion information comprise instructions that cause the processor to form the ATMVP candidate from motion information for a predetermined sub-prediction unit (sub-PU) of the corresponding block. 50. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to: use a first temporal motion vector, relative to the current block, to identify a first advanced temporal motion vector prediction (ATMVP) candidate in a first motion source picture; when the first ATMVP candidate is available, add the first ATMVP candidate to the merge candidate list as the ATMPV candidate; when the first ATMVP candidate is not available: use a second temporal motion vector, relative to the current block, to identify a second ATMVP candidate in a second motion source picture; and add the second ATMVP candidate to the merge candidate list as the ATMVP candidate. 51. The computer-readable storage medium of claim 50, wherein the first temporal motion vector and the second temporal motion vector comprise the same temporal motion vector, and wherein the first motion source picture and the second motion source picture comprise different motion source pictures. 52. The computer-readable storage medium of claim 50, wherein the first temporal motion vector and the second temporal motion vector comprise different temporal motion vectors. 53. The computer-readable storage medium of claim 50, further comprising instructions that cause the processor to select the first temporal motion vector and the second temporal motion vector according to a predetermined order from temporal vectors of the neighboring blocks. 54. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to form the merge candidate list comprise instructions that cause the processor to: determine whether a motion vector is available for a sub-block of the ATMVP candidate for a reference picture list X; and add the ATMVP candidate to the candidate list after determining that the motion vector is available. 55. The computer-readable storage medium of claim 54, wherein when the motion vector is not available for reference picture list X but is available for reference picture list Y, wherein Y comprises a reference picture list other than reference picture list X, the instructions cause the processor to set the motion vector to be available for reference picture list X and scale the motion vector to a reference picture in reference picture list X. 56. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to code the index comprise instructions that cause the processor to decode the index, and wherein the instructions that cause the processor to code the current block comprise instructions that cause the processor to: predict the current block using the motion information of the identified merge candidate to form a predicted block; decode residual information for the current block; and decode the current block using the decoded residual information and the predicted block. 57. The computer-readable storage medium of claim 44, wherein the instructions that cause the processor to code the index comprises encoding the index, and wherein the instructions that cause the processor to code the current block comprise instructions that cause the processor to: predict the current block using the motion information of the identified merge candidate to form a predicted block; form a residual block representing differences between the current block and the predicted block; and encode the residual information.
2,400
8,799
8,799
15,446,246
2,441
Described herein are enhancements for operating cache nodes in a content delivery network to synchronize edge dictionary configurations. In at least one implementation, a cache node of a content delivery network receives a content request from an end user device. In response to the request, the cache node identifies a modification to a key-value pair of an edge dictionary, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service. The method further provides generating a modified version of the edge dictionary based on the modification, and transferring a notification of the modification to at least one other cache node in the content delivery network.
1. A method of operating a content delivery network with a plurality of cache nodes that cache content for end user devices, the method comprising: in a first cache node, receiving a content request from an end user device; in the first cache node, identifying a modification to at least one key-value pair in an edge dictionary based on the content request, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service and a plurality of key-value pairs; in the first cache node, generating a modified version of the edge dictionary based on the modification to the at least one key-value pair; in the first cache node, transferring a notification to at least one other cache node in the content delivery network, wherein the notification indicates the modification to the at least one key-value pair; and in the at least one other cache node, implementing the modification in at least one edge dictionary corresponding to the modification. 2. The method of claim 1 wherein the edge dictionary comprises a blacklist reference function or a user authentication reference function. 3. The method of claim 1 wherein the HTTP accelerator service comprises a varnish configuration language (VCL) service. 4. The method of claim 1 wherein identifying the modification to the at least one key-value pair in the edge dictionary comprises: transferring a request to an origin server to determine permissions for the end user device; and receiving permission information for the end user device from the origin server. 5. The method of claim 1 wherein identifying the modification to the at least one key-value pair in the edge dictionary comprises: determining a quantity of requests from the end user device over a period of time; determining that the quantity of requests meets quantity criteria; generating a blacklist key-value pair based on an identifier for the end user device. 6. The method of claim 5 wherein the blacklist key-value pair comprises an internet protocol (IP) address for the end user device. 7. The method of claim 1 further comprising: in the first cache node, receiving, from a second cache node, a second notification, wherein the second notification indicates a second modification to the edge dictionary; and in the first cache node and in response to the second notification, implementing the second modification in the modified version of the edge dictionary. 8. A content delivery network that caches content for end user devices, the content delivery network comprising: a first cache node configured to: receive a content request from an end user device; identify a modification to at least one key-value pair in an edge dictionary based on the content request, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service and a plurality of key-value pairs; generate a modified version of the edge dictionary based on the modification to the at least one key-value pair; and transfer a notification to at least one other cache node in the content delivery network, wherein the notification indicates the modification to the at least one key-value pair; and the at least one other cache node configured to: implement the modification in at least one edge dictionary corresponding to the modification. 9. The content delivery network of claim 8 wherein the edge dictionary comprises a blacklist reference function or a user authentication reference function. 10. The content delivery network of claim 8 wherein the HTTP accelerator service comprises a varnish configuration language (VCL) service. 11. The content delivery network of claim 8 wherein the first cache node configured to identify the modification to the at least one key-value pair in the edge dictionary is configured to: transfer a request to an origin server to determine permissions for the end user device; and receive permission information for the end user device from the origin server. 12. The content delivery network of claim 8 wherein first cache node configured to identify the modification to the at least one key-value pair in the edge dictionary is configured to: determine a quantity of requests from the end user device over a period of time; determine that the quantity of requests meets quantity criteria; generate a blacklist key-value pair based on an identifier for the end user device. 13. The content delivery network of claim 12 wherein the backlist key-value pair comprises an internet protocol (IP) address for the end user device. 14. The content delivery network of claim 8 wherein the first first cache node is further configured to: receive, from a second cache node, a second notification, wherein the second notification indicates a second modification to the edge dictionary; in response to the second notification, implement the second modification in the modified version of the edge dictionary. 15. A computer apparatus to manage edge dictionaries in a content delivery node of a content delivery network, the computer apparatus comprising: at least one non-transitory computer readable media; and processing instructions stored on the at least one non-transitory computer readable media that, when executed by a processing system, direct the processing system to: receive a content request from an end user device; identify a modification to at least one key-value pair in an edge dictionary based on the content request, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service and a plurality of key-value pairs; generate a modified version of the edge dictionary based on the modification to the at least one key-value pair; and transfer a notification to at least one other cache node in the content delivery network, wherein the notification indicates the modification to the at least one key-value pair. 16. The apparatus of claim 15 wherein the edge dictionary comprises a blacklist reference function or a user authentication reference function. 17. The apparatus of claim 15 wherein the HTTP accelerator service comprises a varnish configuration language (VCL) service. 18. The apparatus of claim 15 wherein the processing instructions to identify the modification to the at least one key-value pair in the edge dictionary direct the processing system to: transfer a request to an origin server to determine permissions for the end user device; and receive permission information for the end user device from the origin server. 19. The apparatus of claim 15 wherein the processing instructions further direct the processing system to, in response to the content request, determine whether a key-value pair in the plurality of key-value pairs is available to satisfy the content request, and wherein the processing instructions to identify the modification to the at least one key-value pair in the edge dictionary based on the content request direct the processing system to, if a key-value pair in the plurality of key-value pairs is not available to satisfy the content request, identify the modification to the at least one key value pair in the edge dictionary based on the content request. 20. The apparatus of claim 15 wherein the modification to the at least one key-value pair comprises one of an add action to add a new key-value pair, a delete action to remove an existing key-value pair, or a change action to change an existing key-value pair.
Described herein are enhancements for operating cache nodes in a content delivery network to synchronize edge dictionary configurations. In at least one implementation, a cache node of a content delivery network receives a content request from an end user device. In response to the request, the cache node identifies a modification to a key-value pair of an edge dictionary, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service. The method further provides generating a modified version of the edge dictionary based on the modification, and transferring a notification of the modification to at least one other cache node in the content delivery network.1. A method of operating a content delivery network with a plurality of cache nodes that cache content for end user devices, the method comprising: in a first cache node, receiving a content request from an end user device; in the first cache node, identifying a modification to at least one key-value pair in an edge dictionary based on the content request, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service and a plurality of key-value pairs; in the first cache node, generating a modified version of the edge dictionary based on the modification to the at least one key-value pair; in the first cache node, transferring a notification to at least one other cache node in the content delivery network, wherein the notification indicates the modification to the at least one key-value pair; and in the at least one other cache node, implementing the modification in at least one edge dictionary corresponding to the modification. 2. The method of claim 1 wherein the edge dictionary comprises a blacklist reference function or a user authentication reference function. 3. The method of claim 1 wherein the HTTP accelerator service comprises a varnish configuration language (VCL) service. 4. The method of claim 1 wherein identifying the modification to the at least one key-value pair in the edge dictionary comprises: transferring a request to an origin server to determine permissions for the end user device; and receiving permission information for the end user device from the origin server. 5. The method of claim 1 wherein identifying the modification to the at least one key-value pair in the edge dictionary comprises: determining a quantity of requests from the end user device over a period of time; determining that the quantity of requests meets quantity criteria; generating a blacklist key-value pair based on an identifier for the end user device. 6. The method of claim 5 wherein the blacklist key-value pair comprises an internet protocol (IP) address for the end user device. 7. The method of claim 1 further comprising: in the first cache node, receiving, from a second cache node, a second notification, wherein the second notification indicates a second modification to the edge dictionary; and in the first cache node and in response to the second notification, implementing the second modification in the modified version of the edge dictionary. 8. A content delivery network that caches content for end user devices, the content delivery network comprising: a first cache node configured to: receive a content request from an end user device; identify a modification to at least one key-value pair in an edge dictionary based on the content request, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service and a plurality of key-value pairs; generate a modified version of the edge dictionary based on the modification to the at least one key-value pair; and transfer a notification to at least one other cache node in the content delivery network, wherein the notification indicates the modification to the at least one key-value pair; and the at least one other cache node configured to: implement the modification in at least one edge dictionary corresponding to the modification. 9. The content delivery network of claim 8 wherein the edge dictionary comprises a blacklist reference function or a user authentication reference function. 10. The content delivery network of claim 8 wherein the HTTP accelerator service comprises a varnish configuration language (VCL) service. 11. The content delivery network of claim 8 wherein the first cache node configured to identify the modification to the at least one key-value pair in the edge dictionary is configured to: transfer a request to an origin server to determine permissions for the end user device; and receive permission information for the end user device from the origin server. 12. The content delivery network of claim 8 wherein first cache node configured to identify the modification to the at least one key-value pair in the edge dictionary is configured to: determine a quantity of requests from the end user device over a period of time; determine that the quantity of requests meets quantity criteria; generate a blacklist key-value pair based on an identifier for the end user device. 13. The content delivery network of claim 12 wherein the backlist key-value pair comprises an internet protocol (IP) address for the end user device. 14. The content delivery network of claim 8 wherein the first first cache node is further configured to: receive, from a second cache node, a second notification, wherein the second notification indicates a second modification to the edge dictionary; in response to the second notification, implement the second modification in the modified version of the edge dictionary. 15. A computer apparatus to manage edge dictionaries in a content delivery node of a content delivery network, the computer apparatus comprising: at least one non-transitory computer readable media; and processing instructions stored on the at least one non-transitory computer readable media that, when executed by a processing system, direct the processing system to: receive a content request from an end user device; identify a modification to at least one key-value pair in an edge dictionary based on the content request, wherein the edge dictionary comprises a reference key-value function for a Hypertext Transfer Protocol (HTTP) accelerator service and a plurality of key-value pairs; generate a modified version of the edge dictionary based on the modification to the at least one key-value pair; and transfer a notification to at least one other cache node in the content delivery network, wherein the notification indicates the modification to the at least one key-value pair. 16. The apparatus of claim 15 wherein the edge dictionary comprises a blacklist reference function or a user authentication reference function. 17. The apparatus of claim 15 wherein the HTTP accelerator service comprises a varnish configuration language (VCL) service. 18. The apparatus of claim 15 wherein the processing instructions to identify the modification to the at least one key-value pair in the edge dictionary direct the processing system to: transfer a request to an origin server to determine permissions for the end user device; and receive permission information for the end user device from the origin server. 19. The apparatus of claim 15 wherein the processing instructions further direct the processing system to, in response to the content request, determine whether a key-value pair in the plurality of key-value pairs is available to satisfy the content request, and wherein the processing instructions to identify the modification to the at least one key-value pair in the edge dictionary based on the content request direct the processing system to, if a key-value pair in the plurality of key-value pairs is not available to satisfy the content request, identify the modification to the at least one key value pair in the edge dictionary based on the content request. 20. The apparatus of claim 15 wherein the modification to the at least one key-value pair comprises one of an add action to add a new key-value pair, a delete action to remove an existing key-value pair, or a change action to change an existing key-value pair.
2,400