Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
8,800 | 8,800 | 15,840,813 | 2,426 | Various arrangements for initiating and conducting asymmetrical video communication are presented. A streaming video and audio device may detect an acceleration of the streaming video and audio device over a predefined acceleration threshold. In response, the streaming video and audio device may transmit an acceleration-triggered asymmetrical video communication request to a cloud-based communication server system. The cloud-based communication server system may determine a user account that is linked with the video and audio capture device from which the acceleration-triggered asymmetrical video communication request was received. In response, an acceleration-triggered asymmetrical video communication link may be established between the video and audio capture device and an application executed by a mobile device. | 1. An asymmetrical video communication system, comprising:
an application executed using one or more processors of a mobile device, wherein the mobile device comprises a mobile device display; a mobile device microphone; and a mobile device speaker; and a video and audio capture device, comprising: a housing; one or more processors housed by the housing; a video camera housed by the housing; a microphone housed by the housing; a speaker housed by the housing; and an accelerometer housed by the housing, wherein:
the video and audio capture device does not have an electronic display;
in response to detecting an acceleration of the housing over a predefined acceleration threshold, an acceleration-triggered asymmetrical video communication request is caused to be transmitted to a cloud-based communication server system; and
the cloud-based communication server system is configured to:
receive, from a device, a request to log into a user account of a plurality of user accounts, wherein the user account is linked with the video and audio capture device;
receive, from the device while logged into the user account, an indication of a default contact and a secondary contact, wherein:
the secondary contact is linked to an acceleration pattern; and
the default contact is linked to other instances of acceleration over the predefined acceleration threshold;
receive the acceleration-triggered asymmetrical video communication request from the video and audio capture device;
determine the user account from the plurality of user accounts that is linked with the video and audio capture device from which the acceleration-triggered asymmetrical video communication request was received;
select a contact from the default contact and the secondary contact with which to establish an acceleration-triggered asymmetrical video communication link based on detecting the acceleration of the housing over the predefined acceleration threshold and comparing to the acceleration pattern;
establish the acceleration-triggered asymmetrical video communication link between the application executed by the mobile device of the contact and the video and audio capture device based on the acceleration pattern, wherein:
video and audio captured using the video and audio capture device are streamed via the cloud-based communication server system to the application and audio captured by the mobile device is streamed via the cloud-based communication server system to the video and audio capture device; and
video is not streamed from the mobile device to the cloud-based communication server system or to the video and audio capture device. 2. The asymmetrical video communication system of claim 1, wherein the cloud-based communication server system is further configured to: transmit a request to the application executed by the mobile device based on the application being linked with the user account in response to receiving the acceleration-triggered asymmetrical video communication request. 3. The asymmetrical video communication system of claim 2, wherein the mobile device is configured to:
present a notification indicative of the request in response to receiving the request for the acceleration-triggered asymmetrical video communication link; and in response to user input provided in response to the presented notification, the application executed by the mobile device is configured to cause an activation request to be transmitted to the cloud-based communication server system. 4. The asymmetrical video communication system of claim 3, wherein the cloud-based communication server system is configured to establish the acceleration-triggered asymmetrical video communication link between the application executed by the mobile device and the video and audio capture device based on receipt of the activation request. 5. The asymmetrical video communication system of claim 3, wherein the cloud-based communication server system is further configured to transmit a picture captured by the video and audio capture device as part of the notification, wherein the picture was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold. 6. The asymmetrical video communication system of claim 3, wherein the cloud-based communication server system is further configured to transmit a video clip captured by the video and audio capture device as part of the notification, wherein:
the video clip was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold; and the video clip temporally spans from before the video and audio capture device detected the acceleration over the predefined acceleration threshold until after the video and audio capture device detected the acceleration over the predefined acceleration threshold. 7. The asymmetrical video communication system of claim 1, wherein the acceleration pattern over the predefined acceleration threshold is indicative of a user performing a sequence of taps interspersed with at least one pause on the housing of the video and audio capture device. 8. The asymmetrical video communication system of claim 1, wherein the acceleration-triggered asymmetrical video communication request to be transmitted to the cloud-based communication server system is transmitted by the video and audio capture device in response to detecting multiple distinct instances of acceleration greater than the predefined acceleration threshold within a predefined period of time. 9. The asymmetrical video communication system of claim 8, wherein the video and audio capture device is further configured to:
transmit a pattern indication to the cloud-based communication server system, wherein the pattern indication indicates a number of distinct instances of acceleration greater than the predefined acceleration threshold within the predefined period of time. 10. The asymmetrical video communication system of claim 9, wherein the cloud-based communication server system is further configured to determine the user account from the plurality of user accounts at least partially based on the pattern indication. 11. The asymmetrical video communication system of claim 1, wherein the video and audio capture device further comprises a light and the video and audio capture device is further configured to change an illumination state of the light in response to the acceleration-triggered asymmetrical video communication request being transmitted. 12. A method for initiating and conducting asymmetrical video communication, the method comprising:
receiving, by a cloud-based communication server system, a request to log into a user account that is linked with a video and audio capture device; receiving an indication of a default contact and a secondary contact, wherein:
the secondary contact is linked to an acceleration pattern; and
the default contact is linked to other instances of acceleration over the predefined acceleration threshold;
detecting, by the video and audio capture device, an acceleration of a housing of the streaming video and audio device over a predefined acceleration threshold; transmitting, by the video and audio capture device, an acceleration-triggered asymmetrical video communication request to the cloud-based communication server system in response to detecting the acceleration of the video and audio capture device over the predefined acceleration threshold, wherein the video and audio capture device does not have an electronic display; receiving, by the cloud-based communication server system, the acceleration-triggered asymmetrical video communication request from the video and audio capture device; determining, by the cloud-based communication server system, the user account that is linked with the video and audio capture device from which the acceleration-triggered asymmetrical video communication request was received; selecting, by the cloud-based communication server system, a contact from the default contact and the secondary contact with which to establish an acceleration-triggered asymmetrical video communication link based on detecting the acceleration of the housing over the predefined acceleration threshold and comparing to the acceleration pattern; establishing, by the cloud-based communication server system, the acceleration-triggered asymmetrical video communication link between the video and audio capture device and an application executed by a mobile device linked within the contact, wherein the mobile device comprises a display, microphone, and speaker; and streaming video and audio captured using the video and audio capture device via the cloud-based communication server system to the application and audio captured by the mobile device is streamed via the cloud-based communication server system to the video and audio capture device. 13. The method for initiating and conducting asymmetrical video communication of claim 12, further comprising:
transmitting, by the cloud-based communication server system, a request to the application executed by the mobile device based on the application being linked with the user account in response to receiving the acceleration-triggered asymmetrical video communication request. 14. The method for initiating and conducting asymmetrical video communication of claim 13, further comprising:
presenting, by the application of the mobile device, a notification indicative of the request in response to receiving the request for the acceleration-triggered asymmetrical video communication link; and causing, by the application an activation request to be transmitted to the cloud-based communication server system in response to user input provided in response to the presented notification. 15. The method for initiating and conducting asymmetrical video communication of claim 14, further comprising: establishing, by the cloud-based communication server system, the acceleration-triggered asymmetrical video communication link between the application executed by the mobile device and the video and audio capture device based on receipt of the activation request. 16. The method for initiating and conducting asymmetrical video communication of claim 14, further comprising: transmitting, by the cloud-based communication server system, a picture captured by the video and audio capture device as part of the notification, wherein the picture was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold. 17. The method for initiating and conducting asymmetrical video communication of claim 14, further comprising:
transmitting, by the cloud-based communication server system, as part of the notification, a video clip captured by the video and audio capture device, wherein:
the video clip was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold; and
the video clip temporally spans from before the video and audio capture device detected the acceleration over the predefined acceleration threshold until after the video and audio capture device detected the acceleration over the predefined acceleration threshold. 18. The method for initiating and conducting asymmetrical video communication of claim 12, wherein the acceleration-triggered asymmetrical video communication request is transmitted to the cloud-based communication server system by the video and audio capture device in response to detecting multiple distinct instances of acceleration greater than the predefined acceleration threshold within a predefined period of time. 19. The method for initiating and conducting asymmetrical video communication of claim 18, further comprising:
transmitting, by the video and audio capture device, a pattern indication to the cloud-based communication server system, wherein the pattern indication indicates a number of distinct instances of acceleration greater than the predefined acceleration threshold within the predefined period of time; and selecting, by the cloud-based communication server system, the user account from a plurality of user accounts at least partially based on the pattern indication. 20. The method for initiating and conducting asymmetrical video communication of claim 12, further comprising:
altering, by the video and audio device, an illumination state of a light in response to the acceleration-triggered asymmetrical video communication request being transmitted. | Various arrangements for initiating and conducting asymmetrical video communication are presented. A streaming video and audio device may detect an acceleration of the streaming video and audio device over a predefined acceleration threshold. In response, the streaming video and audio device may transmit an acceleration-triggered asymmetrical video communication request to a cloud-based communication server system. The cloud-based communication server system may determine a user account that is linked with the video and audio capture device from which the acceleration-triggered asymmetrical video communication request was received. In response, an acceleration-triggered asymmetrical video communication link may be established between the video and audio capture device and an application executed by a mobile device.1. An asymmetrical video communication system, comprising:
an application executed using one or more processors of a mobile device, wherein the mobile device comprises a mobile device display; a mobile device microphone; and a mobile device speaker; and a video and audio capture device, comprising: a housing; one or more processors housed by the housing; a video camera housed by the housing; a microphone housed by the housing; a speaker housed by the housing; and an accelerometer housed by the housing, wherein:
the video and audio capture device does not have an electronic display;
in response to detecting an acceleration of the housing over a predefined acceleration threshold, an acceleration-triggered asymmetrical video communication request is caused to be transmitted to a cloud-based communication server system; and
the cloud-based communication server system is configured to:
receive, from a device, a request to log into a user account of a plurality of user accounts, wherein the user account is linked with the video and audio capture device;
receive, from the device while logged into the user account, an indication of a default contact and a secondary contact, wherein:
the secondary contact is linked to an acceleration pattern; and
the default contact is linked to other instances of acceleration over the predefined acceleration threshold;
receive the acceleration-triggered asymmetrical video communication request from the video and audio capture device;
determine the user account from the plurality of user accounts that is linked with the video and audio capture device from which the acceleration-triggered asymmetrical video communication request was received;
select a contact from the default contact and the secondary contact with which to establish an acceleration-triggered asymmetrical video communication link based on detecting the acceleration of the housing over the predefined acceleration threshold and comparing to the acceleration pattern;
establish the acceleration-triggered asymmetrical video communication link between the application executed by the mobile device of the contact and the video and audio capture device based on the acceleration pattern, wherein:
video and audio captured using the video and audio capture device are streamed via the cloud-based communication server system to the application and audio captured by the mobile device is streamed via the cloud-based communication server system to the video and audio capture device; and
video is not streamed from the mobile device to the cloud-based communication server system or to the video and audio capture device. 2. The asymmetrical video communication system of claim 1, wherein the cloud-based communication server system is further configured to: transmit a request to the application executed by the mobile device based on the application being linked with the user account in response to receiving the acceleration-triggered asymmetrical video communication request. 3. The asymmetrical video communication system of claim 2, wherein the mobile device is configured to:
present a notification indicative of the request in response to receiving the request for the acceleration-triggered asymmetrical video communication link; and in response to user input provided in response to the presented notification, the application executed by the mobile device is configured to cause an activation request to be transmitted to the cloud-based communication server system. 4. The asymmetrical video communication system of claim 3, wherein the cloud-based communication server system is configured to establish the acceleration-triggered asymmetrical video communication link between the application executed by the mobile device and the video and audio capture device based on receipt of the activation request. 5. The asymmetrical video communication system of claim 3, wherein the cloud-based communication server system is further configured to transmit a picture captured by the video and audio capture device as part of the notification, wherein the picture was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold. 6. The asymmetrical video communication system of claim 3, wherein the cloud-based communication server system is further configured to transmit a video clip captured by the video and audio capture device as part of the notification, wherein:
the video clip was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold; and the video clip temporally spans from before the video and audio capture device detected the acceleration over the predefined acceleration threshold until after the video and audio capture device detected the acceleration over the predefined acceleration threshold. 7. The asymmetrical video communication system of claim 1, wherein the acceleration pattern over the predefined acceleration threshold is indicative of a user performing a sequence of taps interspersed with at least one pause on the housing of the video and audio capture device. 8. The asymmetrical video communication system of claim 1, wherein the acceleration-triggered asymmetrical video communication request to be transmitted to the cloud-based communication server system is transmitted by the video and audio capture device in response to detecting multiple distinct instances of acceleration greater than the predefined acceleration threshold within a predefined period of time. 9. The asymmetrical video communication system of claim 8, wherein the video and audio capture device is further configured to:
transmit a pattern indication to the cloud-based communication server system, wherein the pattern indication indicates a number of distinct instances of acceleration greater than the predefined acceleration threshold within the predefined period of time. 10. The asymmetrical video communication system of claim 9, wherein the cloud-based communication server system is further configured to determine the user account from the plurality of user accounts at least partially based on the pattern indication. 11. The asymmetrical video communication system of claim 1, wherein the video and audio capture device further comprises a light and the video and audio capture device is further configured to change an illumination state of the light in response to the acceleration-triggered asymmetrical video communication request being transmitted. 12. A method for initiating and conducting asymmetrical video communication, the method comprising:
receiving, by a cloud-based communication server system, a request to log into a user account that is linked with a video and audio capture device; receiving an indication of a default contact and a secondary contact, wherein:
the secondary contact is linked to an acceleration pattern; and
the default contact is linked to other instances of acceleration over the predefined acceleration threshold;
detecting, by the video and audio capture device, an acceleration of a housing of the streaming video and audio device over a predefined acceleration threshold; transmitting, by the video and audio capture device, an acceleration-triggered asymmetrical video communication request to the cloud-based communication server system in response to detecting the acceleration of the video and audio capture device over the predefined acceleration threshold, wherein the video and audio capture device does not have an electronic display; receiving, by the cloud-based communication server system, the acceleration-triggered asymmetrical video communication request from the video and audio capture device; determining, by the cloud-based communication server system, the user account that is linked with the video and audio capture device from which the acceleration-triggered asymmetrical video communication request was received; selecting, by the cloud-based communication server system, a contact from the default contact and the secondary contact with which to establish an acceleration-triggered asymmetrical video communication link based on detecting the acceleration of the housing over the predefined acceleration threshold and comparing to the acceleration pattern; establishing, by the cloud-based communication server system, the acceleration-triggered asymmetrical video communication link between the video and audio capture device and an application executed by a mobile device linked within the contact, wherein the mobile device comprises a display, microphone, and speaker; and streaming video and audio captured using the video and audio capture device via the cloud-based communication server system to the application and audio captured by the mobile device is streamed via the cloud-based communication server system to the video and audio capture device. 13. The method for initiating and conducting asymmetrical video communication of claim 12, further comprising:
transmitting, by the cloud-based communication server system, a request to the application executed by the mobile device based on the application being linked with the user account in response to receiving the acceleration-triggered asymmetrical video communication request. 14. The method for initiating and conducting asymmetrical video communication of claim 13, further comprising:
presenting, by the application of the mobile device, a notification indicative of the request in response to receiving the request for the acceleration-triggered asymmetrical video communication link; and causing, by the application an activation request to be transmitted to the cloud-based communication server system in response to user input provided in response to the presented notification. 15. The method for initiating and conducting asymmetrical video communication of claim 14, further comprising: establishing, by the cloud-based communication server system, the acceleration-triggered asymmetrical video communication link between the application executed by the mobile device and the video and audio capture device based on receipt of the activation request. 16. The method for initiating and conducting asymmetrical video communication of claim 14, further comprising: transmitting, by the cloud-based communication server system, a picture captured by the video and audio capture device as part of the notification, wherein the picture was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold. 17. The method for initiating and conducting asymmetrical video communication of claim 14, further comprising:
transmitting, by the cloud-based communication server system, as part of the notification, a video clip captured by the video and audio capture device, wherein:
the video clip was captured based on the video and audio capture device detecting the acceleration over the predefined acceleration threshold; and
the video clip temporally spans from before the video and audio capture device detected the acceleration over the predefined acceleration threshold until after the video and audio capture device detected the acceleration over the predefined acceleration threshold. 18. The method for initiating and conducting asymmetrical video communication of claim 12, wherein the acceleration-triggered asymmetrical video communication request is transmitted to the cloud-based communication server system by the video and audio capture device in response to detecting multiple distinct instances of acceleration greater than the predefined acceleration threshold within a predefined period of time. 19. The method for initiating and conducting asymmetrical video communication of claim 18, further comprising:
transmitting, by the video and audio capture device, a pattern indication to the cloud-based communication server system, wherein the pattern indication indicates a number of distinct instances of acceleration greater than the predefined acceleration threshold within the predefined period of time; and selecting, by the cloud-based communication server system, the user account from a plurality of user accounts at least partially based on the pattern indication. 20. The method for initiating and conducting asymmetrical video communication of claim 12, further comprising:
altering, by the video and audio device, an illumination state of a light in response to the acceleration-triggered asymmetrical video communication request being transmitted. | 2,400 |
8,801 | 8,801 | 15,063,082 | 2,454 | Technologies for providing hints for adjusting digital media properties include a destination computing device wirelessly coupled to multiple source computing devices. The destination computing device is configured to receive digital media streams from each of a multiple number of source computing devices, process each of the received digital media streams, and output one or more of the processed digital media streams based on one or more output settings and/or or more digital media properties of the digital media. The destination computing device is further configured to determine one or more performance metrics based on an analysis of the output digital media streams, determine one or more hints for one or more of the digital media streams based on the analysis, and transmit each of the hints to a corresponding one of the source computing devices. Other embodiments are described and claimed herein. | 1. A destination computing device for providing hints usable to adjust properties of digital media, the destination computing device comprising:
a digital media stream processing module to process a plurality of digital media streams based on a plurality of digital media properties, wherein each of the digital media streams is received from one of a plurality of source computing devices wirelessly coupled to the destination computing device; a digital media output module to output one or more of the processed digital media streams to an output device of the destination computing device based on one or more output settings; a performance metric determination module to (i) analyze the processing and output of the digital media streams and (ii) determine one or more performance metrics based on the analysis, wherein the one or more performance metrics indicate an actual performance level; and a hint determination module to (i) analyze the one or more performance metrics, (ii) determine whether a hint is to be sent to one or more of the plurality of source computing devices based on the analysis of the one or more performance metrics, wherein the hint identifies information usable by a source computing device of the plurality of source computing devices to determine whether to change one or more of the plurality of digital media properties associated with a digital media stream of that source computing device, (iii) generate, in response to a determination that the hint is to be sent, a message that includes the hint, and (iv) transmit the message to a corresponding one or more of the source computing devices. 2. The destination computing device of claim 1, wherein to analyze the one or more performance metrics comprises to compare one or more of the one or more performance metrics against an expected output performance level, wherein the expected output performance level is determinable from at least one of the one or more output settings or the one or more of the plurality of digital media properties. 3. The destination computing device of claim 1, wherein to generate the message that includes the hint comprises to generate the message that includes one of an indication of underperformance associated with the output of the digital media stream of the source computing device, a type of digital media stream of another of the plurality of source computing devices, or a priority level associated with the digital media stream of the source computing device. 4. The destination computing device of claim 1, wherein the one or more performance metrics identify at least one of a present processing condition or present output condition. 5. The destination computing device of claim 1, wherein the one or more performance metrics include at least one of an actual output frame rate, an actual output resolution, a processed bit rate, packet loss information, or decoder queue information. 6. The destination computing device of claim 1, wherein the plurality of digital media properties include at least one of a frame rate, an aspect ratio, a bit rate, a data rate, a sample rate, an encoder type, or a container format type. 7. The destination computing device of claim 1, wherein the one or more output settings include at least one of an audio output setting, a video output display layout/configuration setting, and a video display setting. 8. The destination computing device of claim 1, further comprising a user interface management module to provide an adjustment interface of the destination computing device usable by a user of the destination computing device to make one or more user initiated adjustments to one or more of the one or more output settings presently being used to output each of the digital media streams. 9. The destination computing device of claim 8, wherein the adjustment interface is to provide a visual reference to at least one of the plurality of digital media properties presently being used to process each of the digital media streams, one or more of the one or more output settings presently being used to output each of the digital media streams, or one or more of the one or more performance metrics. 10. The destination computing device of claim 1, wherein to output one or more of the processed digital media streams to the output device of the destination computing device comprises to output each of the processed digital media streams to at least one of a display of the destination computing device or a speaker of the destination computing device. 11. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a destination computing device to:
process a plurality of digital media streams based on a plurality of digital media properties, wherein each of the digital media streams is received from one of a plurality of source computing devices wirelessly coupled to the destination computing device; output one or more of the processed digital media streams to an output device of the destination computing device based on one or more output settings; analyze the processing and output of the digital media streams; determine one or more performance metrics based on the analysis; analyze the one or more performance metrics; determine whether a hint is to be sent to one or more of the plurality of source computing devices based on the analysis of the one or more performance metrics, wherein the hint identifies information usable by a source computing device of the plurality of source computing devices to determine whether to change one or more of the plurality of digital media properties associated with a digital media stream of that source computing device; generate, in response to a determination that the hint is to be sent, a message that includes the hint; and transmit the message to a corresponding one or more of the source computing devices. 12. The one or more computer-readable storage media of claim 11, wherein to analyze the one or more performance metrics comprises to compare one or more of the one or more performance metrics against an expected output performance level, wherein the expected output performance level is determinable from at least one of the one or more output settings or the one or more digital media properties. 13. The one or more computer-readable storage media of claim 11, wherein to generate the message that includes the hint comprises to generate the message that includes one of an indication of underperformance associated with the output of the digital media stream of the source computing device, a type of digital media stream of another of the plurality of source computing devices, or a priority level associated with the digital media stream of the source computing device. 14. The one or more computer-readable storage media of claim 11, wherein the plurality of digital media properties include at least one of a frame rate, an aspect ratio, a bit rate, a data rate, a sample rate, an encoder type, or a container format type. 15. The one or more computer-readable storage media of claim 11, wherein the one or more output settings include at least one of an audio output setting, a video output display layout/configuration setting, and a video display setting. 16. The one or more computer-readable storage media of claim 11, wherein the plurality of instructions further cause the destination computing device to provide an adjustment interface of the destination computing device usable by a user of the destination computing device to make one or more user initiated adjustments to one or more of the one or more output settings presently being used to output each of the digital media streams. 17. The one or more computer-readable storage media of claim 16, wherein the adjustment interface is to provide a visual reference to at least one of the plurality of digital media properties presently being used to process each of the digital media streams, one or more of the one or more output settings presently being used to output each of the digital media streams, or one or more of the one or more performance metrics. 18. The one or more computer-readable storage media of claim 11, wherein to output one or more of the processed digital media streams to the output device of the destination computing device comprises to output each of the processed digital media streams to at least one of a display of the destination computing device or a speaker of the destination computing device. 19. A method for providing hints usable to adjust properties of digital media, the method comprising:
processing, by a destination computing device, a plurality of digital media streams based on a plurality of digital media properties, wherein each of the digital media streams is received from one of a plurality of source computing devices wirelessly coupled to the destination computing device; outputting, by the destination computing device, one or more of the processed digital media streams to an output device of the destination computing device based on one or more output settings; analyzing, by the destination computing device, the processing and output of the digital media streams; determining, by the destination computing device, one or more performance metrics based on the analysis; analyzing, by the destination computing device, the one or more performance metrics determining, by the destination computing device, whether a hint is to be sent to one or more of the plurality of source computing devices based on the analysis of the one or more performance metrics, wherein the hint identifies information usable by a source computing device of the plurality of source computing devices to determine whether to change one or more of the plurality of digital media properties associated with a digital media stream of that source computing device; generating, by the destination computing device and in response to a determination that the hint is to be sent, a message that includes the hint; and transmitting, by the destination computing device, the message to a corresponding one or more of the source computing devices. 20. The method of claim 19, wherein analyzing the one or more performance metrics comprises comparing one or more of the one or more performance metrics against an expected output performance level, wherein the expected output performance level is determinable from at least one of the one or more output settings or the one or more digital media properties. 21. The method of claim 19, wherein generating the message that includes the hint comprises generating the message that includes one of an indication of underperformance associated with the output of the digital media stream of the source computing device, a type of digital media stream of another of the plurality of source computing devices, or a priority level associated with the digital media stream of the source computing device. 22. The method of claim 19, wherein outputting the processed digital media streams to the output device based on the one or more output settings comprises outputting the processed digital media streams to the output device based on at least one of an audio output setting, a video output display layout/configuration setting, or a video display setting. 23. The method of claim 19, further comprising providing, by the destination computing device, an adjustment interface of the destination computing device usable by a user of the destination computing device to make one or more user initiated adjustments to one or more of the one or more output settings presently being used to output each of the digital media streams. 24. The method of claim 23, further comprising providing, by the destination computing device, a visual reference to at least one of the plurality of digital media properties presently being used to process each of the digital media streams, one or more of the one or more output settings presently being used to output each of the digital media streams, or one or more of the one or more performance metrics. 25. The method of claim 19, wherein outputting one or more of the processed digital media streams to the output device of the destination computing device comprises outputting each of the processed digital media streams to at least one of a display of the destination computing device or a speaker of the destination computing device. | Technologies for providing hints for adjusting digital media properties include a destination computing device wirelessly coupled to multiple source computing devices. The destination computing device is configured to receive digital media streams from each of a multiple number of source computing devices, process each of the received digital media streams, and output one or more of the processed digital media streams based on one or more output settings and/or or more digital media properties of the digital media. The destination computing device is further configured to determine one or more performance metrics based on an analysis of the output digital media streams, determine one or more hints for one or more of the digital media streams based on the analysis, and transmit each of the hints to a corresponding one of the source computing devices. Other embodiments are described and claimed herein.1. A destination computing device for providing hints usable to adjust properties of digital media, the destination computing device comprising:
a digital media stream processing module to process a plurality of digital media streams based on a plurality of digital media properties, wherein each of the digital media streams is received from one of a plurality of source computing devices wirelessly coupled to the destination computing device; a digital media output module to output one or more of the processed digital media streams to an output device of the destination computing device based on one or more output settings; a performance metric determination module to (i) analyze the processing and output of the digital media streams and (ii) determine one or more performance metrics based on the analysis, wherein the one or more performance metrics indicate an actual performance level; and a hint determination module to (i) analyze the one or more performance metrics, (ii) determine whether a hint is to be sent to one or more of the plurality of source computing devices based on the analysis of the one or more performance metrics, wherein the hint identifies information usable by a source computing device of the plurality of source computing devices to determine whether to change one or more of the plurality of digital media properties associated with a digital media stream of that source computing device, (iii) generate, in response to a determination that the hint is to be sent, a message that includes the hint, and (iv) transmit the message to a corresponding one or more of the source computing devices. 2. The destination computing device of claim 1, wherein to analyze the one or more performance metrics comprises to compare one or more of the one or more performance metrics against an expected output performance level, wherein the expected output performance level is determinable from at least one of the one or more output settings or the one or more of the plurality of digital media properties. 3. The destination computing device of claim 1, wherein to generate the message that includes the hint comprises to generate the message that includes one of an indication of underperformance associated with the output of the digital media stream of the source computing device, a type of digital media stream of another of the plurality of source computing devices, or a priority level associated with the digital media stream of the source computing device. 4. The destination computing device of claim 1, wherein the one or more performance metrics identify at least one of a present processing condition or present output condition. 5. The destination computing device of claim 1, wherein the one or more performance metrics include at least one of an actual output frame rate, an actual output resolution, a processed bit rate, packet loss information, or decoder queue information. 6. The destination computing device of claim 1, wherein the plurality of digital media properties include at least one of a frame rate, an aspect ratio, a bit rate, a data rate, a sample rate, an encoder type, or a container format type. 7. The destination computing device of claim 1, wherein the one or more output settings include at least one of an audio output setting, a video output display layout/configuration setting, and a video display setting. 8. The destination computing device of claim 1, further comprising a user interface management module to provide an adjustment interface of the destination computing device usable by a user of the destination computing device to make one or more user initiated adjustments to one or more of the one or more output settings presently being used to output each of the digital media streams. 9. The destination computing device of claim 8, wherein the adjustment interface is to provide a visual reference to at least one of the plurality of digital media properties presently being used to process each of the digital media streams, one or more of the one or more output settings presently being used to output each of the digital media streams, or one or more of the one or more performance metrics. 10. The destination computing device of claim 1, wherein to output one or more of the processed digital media streams to the output device of the destination computing device comprises to output each of the processed digital media streams to at least one of a display of the destination computing device or a speaker of the destination computing device. 11. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a destination computing device to:
process a plurality of digital media streams based on a plurality of digital media properties, wherein each of the digital media streams is received from one of a plurality of source computing devices wirelessly coupled to the destination computing device; output one or more of the processed digital media streams to an output device of the destination computing device based on one or more output settings; analyze the processing and output of the digital media streams; determine one or more performance metrics based on the analysis; analyze the one or more performance metrics; determine whether a hint is to be sent to one or more of the plurality of source computing devices based on the analysis of the one or more performance metrics, wherein the hint identifies information usable by a source computing device of the plurality of source computing devices to determine whether to change one or more of the plurality of digital media properties associated with a digital media stream of that source computing device; generate, in response to a determination that the hint is to be sent, a message that includes the hint; and transmit the message to a corresponding one or more of the source computing devices. 12. The one or more computer-readable storage media of claim 11, wherein to analyze the one or more performance metrics comprises to compare one or more of the one or more performance metrics against an expected output performance level, wherein the expected output performance level is determinable from at least one of the one or more output settings or the one or more digital media properties. 13. The one or more computer-readable storage media of claim 11, wherein to generate the message that includes the hint comprises to generate the message that includes one of an indication of underperformance associated with the output of the digital media stream of the source computing device, a type of digital media stream of another of the plurality of source computing devices, or a priority level associated with the digital media stream of the source computing device. 14. The one or more computer-readable storage media of claim 11, wherein the plurality of digital media properties include at least one of a frame rate, an aspect ratio, a bit rate, a data rate, a sample rate, an encoder type, or a container format type. 15. The one or more computer-readable storage media of claim 11, wherein the one or more output settings include at least one of an audio output setting, a video output display layout/configuration setting, and a video display setting. 16. The one or more computer-readable storage media of claim 11, wherein the plurality of instructions further cause the destination computing device to provide an adjustment interface of the destination computing device usable by a user of the destination computing device to make one or more user initiated adjustments to one or more of the one or more output settings presently being used to output each of the digital media streams. 17. The one or more computer-readable storage media of claim 16, wherein the adjustment interface is to provide a visual reference to at least one of the plurality of digital media properties presently being used to process each of the digital media streams, one or more of the one or more output settings presently being used to output each of the digital media streams, or one or more of the one or more performance metrics. 18. The one or more computer-readable storage media of claim 11, wherein to output one or more of the processed digital media streams to the output device of the destination computing device comprises to output each of the processed digital media streams to at least one of a display of the destination computing device or a speaker of the destination computing device. 19. A method for providing hints usable to adjust properties of digital media, the method comprising:
processing, by a destination computing device, a plurality of digital media streams based on a plurality of digital media properties, wherein each of the digital media streams is received from one of a plurality of source computing devices wirelessly coupled to the destination computing device; outputting, by the destination computing device, one or more of the processed digital media streams to an output device of the destination computing device based on one or more output settings; analyzing, by the destination computing device, the processing and output of the digital media streams; determining, by the destination computing device, one or more performance metrics based on the analysis; analyzing, by the destination computing device, the one or more performance metrics determining, by the destination computing device, whether a hint is to be sent to one or more of the plurality of source computing devices based on the analysis of the one or more performance metrics, wherein the hint identifies information usable by a source computing device of the plurality of source computing devices to determine whether to change one or more of the plurality of digital media properties associated with a digital media stream of that source computing device; generating, by the destination computing device and in response to a determination that the hint is to be sent, a message that includes the hint; and transmitting, by the destination computing device, the message to a corresponding one or more of the source computing devices. 20. The method of claim 19, wherein analyzing the one or more performance metrics comprises comparing one or more of the one or more performance metrics against an expected output performance level, wherein the expected output performance level is determinable from at least one of the one or more output settings or the one or more digital media properties. 21. The method of claim 19, wherein generating the message that includes the hint comprises generating the message that includes one of an indication of underperformance associated with the output of the digital media stream of the source computing device, a type of digital media stream of another of the plurality of source computing devices, or a priority level associated with the digital media stream of the source computing device. 22. The method of claim 19, wherein outputting the processed digital media streams to the output device based on the one or more output settings comprises outputting the processed digital media streams to the output device based on at least one of an audio output setting, a video output display layout/configuration setting, or a video display setting. 23. The method of claim 19, further comprising providing, by the destination computing device, an adjustment interface of the destination computing device usable by a user of the destination computing device to make one or more user initiated adjustments to one or more of the one or more output settings presently being used to output each of the digital media streams. 24. The method of claim 23, further comprising providing, by the destination computing device, a visual reference to at least one of the plurality of digital media properties presently being used to process each of the digital media streams, one or more of the one or more output settings presently being used to output each of the digital media streams, or one or more of the one or more performance metrics. 25. The method of claim 19, wherein outputting one or more of the processed digital media streams to the output device of the destination computing device comprises outputting each of the processed digital media streams to at least one of a display of the destination computing device or a speaker of the destination computing device. | 2,400 |
8,802 | 8,802 | 15,123,371 | 2,483 | The invention relates to a camera device ( 10 ), in particular for the rear region of a vehicle, having a drive unit ( 50 ), which is operatively connected via a transmission mechanism to a carriage ( 11 ); the carriage ( 11 ) mechanically holds the camera ( 4 ) and the drive unit ( 50 ) can move the carriage ( 11 ) together with the camera ( 4 ) at least between a standby position ( 1 ) and a recording position ( 2 ) along a movement direction ( 7 ) and the camera ( 4 ) is connected to a camera cable ( 14 ) in order to transmit image data. According to the invention, the camera ( 4 ) has a cable port ( 4.4 ) for the camera cable ( 14 ), which is positioned laterally relative to the movement direction ( 7 ) of the camera ( 4 ). | 1-21. (canceled) 22. A camera device, in particular for the rear region of a vehicle, having a drive unit, which is operatively connected via a transmission mechanism to a carriage;
the carriage mechanically holds a camera and the drive unit can move the carriage together with the camera at least between a standby position and a recording position along a movement direction and the camera is connected to a camera cable in order to transmit image data, characterized in that the camera has a cable port for the camera cable, which is positioned laterally relative to the movement direction of the camera. 23. The camera device according to claim 22, characterized in that the carriage is composed of at least two parts, in particular with a first and second carriage part, and, in particular, the carriage constitutes a casing for the camera, with the casing having at least openings for a lens of the camera and for the camera cable. 24. The camera device according to claim 23, characterized in that the carriage parts are connected to each other with connecting means, especially interlocking connections, and in particular, the connecting means are provided above and below the camera port. 25. The camera device according to claim 24, characterized in that the connected carriage parts form a closed cutting line and in particular, the cutting line extends in the region of the opening for the camera port and in particular, the cutting line is embodied as stepped in order to produce a labyrinth seal. 26. The camera device according to claim 22, characterized in that sealing elements are positioned between the camera and the carriage, thus enclosing the camera in a particularly water-tight fashion. 27. The camera device according to claim 22, characterized in that the camera is mounted to the carriage by means of at least one holding means; preferably at least two holding means are provided, which are in particular positioned at different heights. 28. The camera device according to claim 22, characterized in that the camera cable can be connected to the camera by means of a plug, in particular with interlocking mechanisms. 29. The camera device according to claim 22, characterized in that the camera cable can be routed through a sleeve and through an opening in the carriage to the camera; in particular, the sleeve is embodied as a kink-prevention sleeve, a sealing sleeve, and/or a tension-relief element. 30. The camera device according to claim 22, characterized in that the carriage is arranged in movable fashion in a housing by means of at least one guide, and, in particular, the carriage with the camera has only a linear movement direction. 31. The camera device according to claim 30, characterized in that the carriage is supported in moving fashion on the housing by means of two guides, with the two guides in particular being positioned in a lower region on the carriage, and, in particular, the two guides on the carriage each have strut-shaped guide means that are preferably provided with slide cushions. 32. The camera device according to claim 30, characterized in that the housing is composed of at least two parts, in particular with a front housing part and a rear housing part that comprise the housing, and, in particular, the front housing part is oriented toward the recording position and the rear housing part is oriented toward the standby position. 33. The camera device according to claim 32, characterized in that the housing has an opening through which the camera cable passes and the opening is embodied so that it enables a relative movement of the camera cable inside the opening. 34. The camera device according to claim 33, characterized in that the opening is positioned in the region of a connecting line between the front and rear housing part, and, in particular, the opening can be fully or partially closed by an additional sleeve and the camera cable can be inserted through the additional sleeve into the housing. 35. The camera device according to claim 32, characterized in that the front housing part is provided with an opening for the camera, in particular for the lens, especially in the recording position, and this opening is closed by a movable cover in the standby position of the camera. 36. The camera device according to claim 35, characterized in that the cover is fastened exclusively to the front housing part, in particular, a fixed rotation axle functions as a connecting element, and, in particular, at least one return spring for the cover is provided in order to move the cover from an open position into a closed position. 37. The camera device according to claim 35, characterized in that a sealing element, in particular with an indentation, a notch, and/or a cavity, is provided between the front housing part and the cover in order to permit a simple compression of the sealing element in its position by means of a pressure on the cover resting against it. 38. The camera device according to claim 35, characterized in that a movement of the camera from the standby position toward the auxiliary position can trigger a signal, in particular can trigger a vehicle-specific function, and, in particular, a manual pressure on the cover is required in order to thus move the carriage from the standby position into the auxiliary position. 39. The camera device according to claim 35, characterized in that the cover can only be actuated by the camera and/or the carriage in a change from the standby position into the recording position. 40. The camera device according to claim 30, characterized in that a switch element is positioned on the housing, which protrudes at least part-way into the travel path of the carriage, and the carriage has a triggering element which, when the camera is moved in the direction toward the auxiliary position, trips the switch element. 41. The camera device according to claim 30, characterized in that the drive unit and/or at least one transmission mechanism is/are positioned laterally next to the housing for the carriage, and, in particular, the transmission mechanism is provided between the drive unit and the carriage. 42. The camera device according to claim 22, characterized in that the carriage can be moved into an auxiliary position beyond the standby position, and the auxiliary position can only be reached without the use of the drive unit. | The invention relates to a camera device ( 10 ), in particular for the rear region of a vehicle, having a drive unit ( 50 ), which is operatively connected via a transmission mechanism to a carriage ( 11 ); the carriage ( 11 ) mechanically holds the camera ( 4 ) and the drive unit ( 50 ) can move the carriage ( 11 ) together with the camera ( 4 ) at least between a standby position ( 1 ) and a recording position ( 2 ) along a movement direction ( 7 ) and the camera ( 4 ) is connected to a camera cable ( 14 ) in order to transmit image data. According to the invention, the camera ( 4 ) has a cable port ( 4.4 ) for the camera cable ( 14 ), which is positioned laterally relative to the movement direction ( 7 ) of the camera ( 4 ).1-21. (canceled) 22. A camera device, in particular for the rear region of a vehicle, having a drive unit, which is operatively connected via a transmission mechanism to a carriage;
the carriage mechanically holds a camera and the drive unit can move the carriage together with the camera at least between a standby position and a recording position along a movement direction and the camera is connected to a camera cable in order to transmit image data, characterized in that the camera has a cable port for the camera cable, which is positioned laterally relative to the movement direction of the camera. 23. The camera device according to claim 22, characterized in that the carriage is composed of at least two parts, in particular with a first and second carriage part, and, in particular, the carriage constitutes a casing for the camera, with the casing having at least openings for a lens of the camera and for the camera cable. 24. The camera device according to claim 23, characterized in that the carriage parts are connected to each other with connecting means, especially interlocking connections, and in particular, the connecting means are provided above and below the camera port. 25. The camera device according to claim 24, characterized in that the connected carriage parts form a closed cutting line and in particular, the cutting line extends in the region of the opening for the camera port and in particular, the cutting line is embodied as stepped in order to produce a labyrinth seal. 26. The camera device according to claim 22, characterized in that sealing elements are positioned between the camera and the carriage, thus enclosing the camera in a particularly water-tight fashion. 27. The camera device according to claim 22, characterized in that the camera is mounted to the carriage by means of at least one holding means; preferably at least two holding means are provided, which are in particular positioned at different heights. 28. The camera device according to claim 22, characterized in that the camera cable can be connected to the camera by means of a plug, in particular with interlocking mechanisms. 29. The camera device according to claim 22, characterized in that the camera cable can be routed through a sleeve and through an opening in the carriage to the camera; in particular, the sleeve is embodied as a kink-prevention sleeve, a sealing sleeve, and/or a tension-relief element. 30. The camera device according to claim 22, characterized in that the carriage is arranged in movable fashion in a housing by means of at least one guide, and, in particular, the carriage with the camera has only a linear movement direction. 31. The camera device according to claim 30, characterized in that the carriage is supported in moving fashion on the housing by means of two guides, with the two guides in particular being positioned in a lower region on the carriage, and, in particular, the two guides on the carriage each have strut-shaped guide means that are preferably provided with slide cushions. 32. The camera device according to claim 30, characterized in that the housing is composed of at least two parts, in particular with a front housing part and a rear housing part that comprise the housing, and, in particular, the front housing part is oriented toward the recording position and the rear housing part is oriented toward the standby position. 33. The camera device according to claim 32, characterized in that the housing has an opening through which the camera cable passes and the opening is embodied so that it enables a relative movement of the camera cable inside the opening. 34. The camera device according to claim 33, characterized in that the opening is positioned in the region of a connecting line between the front and rear housing part, and, in particular, the opening can be fully or partially closed by an additional sleeve and the camera cable can be inserted through the additional sleeve into the housing. 35. The camera device according to claim 32, characterized in that the front housing part is provided with an opening for the camera, in particular for the lens, especially in the recording position, and this opening is closed by a movable cover in the standby position of the camera. 36. The camera device according to claim 35, characterized in that the cover is fastened exclusively to the front housing part, in particular, a fixed rotation axle functions as a connecting element, and, in particular, at least one return spring for the cover is provided in order to move the cover from an open position into a closed position. 37. The camera device according to claim 35, characterized in that a sealing element, in particular with an indentation, a notch, and/or a cavity, is provided between the front housing part and the cover in order to permit a simple compression of the sealing element in its position by means of a pressure on the cover resting against it. 38. The camera device according to claim 35, characterized in that a movement of the camera from the standby position toward the auxiliary position can trigger a signal, in particular can trigger a vehicle-specific function, and, in particular, a manual pressure on the cover is required in order to thus move the carriage from the standby position into the auxiliary position. 39. The camera device according to claim 35, characterized in that the cover can only be actuated by the camera and/or the carriage in a change from the standby position into the recording position. 40. The camera device according to claim 30, characterized in that a switch element is positioned on the housing, which protrudes at least part-way into the travel path of the carriage, and the carriage has a triggering element which, when the camera is moved in the direction toward the auxiliary position, trips the switch element. 41. The camera device according to claim 30, characterized in that the drive unit and/or at least one transmission mechanism is/are positioned laterally next to the housing for the carriage, and, in particular, the transmission mechanism is provided between the drive unit and the carriage. 42. The camera device according to claim 22, characterized in that the carriage can be moved into an auxiliary position beyond the standby position, and the auxiliary position can only be reached without the use of the drive unit. | 2,400 |
8,803 | 8,803 | 15,496,531 | 2,466 | The disclosure relates to a method for gain adjustment in mobility measurements of a user equipment (UE). The method includes: selecting a signal stream of a plurality of signal streams received from a plurality of radio cells for mobility measurements; performing a mobility measurement on the selected signal stream based on a given gain; determining a gain update of the selected signal stream based on a received signal strength measurement of the selected signal stream; and if the gain update is outside a predetermined gain range, initiating a recovery of the mobility measurement based on the gain update. | 1. A method for gain adjustment in mobility measurements of a user equipment (UE), the method comprising:
selecting a signal stream of a plurality of signal streams received from a plurality of radio cells for mobility measurements; performing a mobility measurement on the selected signal stream based on a given gain; determining a gain update of the selected signal stream based on a received signal strength measurement of the selected signal stream; and if the gain update is outside a predetermined gain range, initiating a recovery of the mobility measurement based on the gain update. 2. The method of claim 1, comprising:
performing the mobility measurement within one sub-frame of the selected signal stream. 3. The method of claim 1, comprising:
performing the received signal strength measurement based on at least one reference symbol comprised in the selected signal stream. 4. The method of claim 1, comprising:
performing the received signal strength measurement after reception of a third or a half sub-frame of the selected signal stream. 5. The method of claim 1,
wherein initiating the recovery of the mobility measurement comprises discarding a result of the mobility measurement and repeating the mobility measurement. 6. The method of claim 5,
wherein repeating the mobility measurement is performed in one of succeeding paging cycles. 7. The method of claim 1,
wherein initiating the recovery of the mobility measurement comprises extending the mobility measurement. 8. The method of claim 7,
wherein extending the mobility measurement comprises extending the mobility measurement to at least one further sub-frame of a same paging cycle. 9. The method of claim 1,
wherein initiating the recovery of the mobility measurement comprises rescheduling the mobility measurement. 10. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement within a same paging cycle. 11. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement after mobility measurements on all other selected signal streams have been performed. 12. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement within a same paging cycle. 13. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement within one of subsequent paging cycles. 14. The method of claim 1,
wherein performing the mobility measurement comprises at least one of a neighbor cell measurement, a neighbor cell identification and a combined neighbor cell identification and measurement. 15. The method of claim 1,
wherein performing the mobility measurement comprises performing an inter-frequency measurement. 16. The method of claim 1,
wherein determining the gain update of the selected signal stream is performed together with determining a time acquisition of the selected signal stream. 17. The method of claim 1, comprising:
performing the mobility measurement when the UE is in idle mode or in connected mode. 18. A device for gain adjustment in mobility measurements of a user equipment (UE), the device comprising:
a receiving circuit configured to receive a plurality of signal streams from a plurality of radio cells; a selection circuit configured to select a signal stream of the plurality of received signal streams for mobility measurements; a mobility measurement circuit configured to perform a mobility measurement on the selected signal stream based on a given gain; a signal strength measurement circuit configured to perform a received signal strength measurement of the selected signal stream; a gain update circuit configured to determine a gain update of the selected signal stream based on the performed received signal strength measurement of the selected signal stream; and a recovery circuit configured to initiate a recovery of the mobility measurement based on the gain update if the gain update is outside a predetermined gain range. 19. The device of claim 18,
wherein the mobility measurement circuit is configured to perform the mobility measurement within one sub-frame of the selected signal stream. 20. The device of claim 18,
wherein the signal strength measurement circuit is configured to perform the received signal strength measurement based on at least one reference symbol comprised in the selected signal stream. 21. The device of claim 18,
wherein the signal strength measurement circuit is configured to perform the received signal strength measurement after reception of a third or a half sub-frame of the selected signal stream. 22. A user equipment (UE) comprising:
a receiver circuit configured to receive a plurality of signal streams from a plurality of radio cells; and a baseband circuit configured to: select a signal stream of the plurality of received signal streams for mobility measurements; perform a mobility measurement on the selected signal stream based on a given gain; determine a gain update of the selected signal stream based on a received signal strength measurement of the selected signal stream; and initiate a recovery of the mobility measurement based on the gain update if the gain update is outside a predetermined gain range. 23. The user equipment of claim 22,
wherein the baseband circuit is configured to perform the received signal strength measurement based on at least one reference symbol comprised in the selected signal stream. 24. The user equipment of claim 22,
wherein the baseband circuit is configured to perform the received signal strength measurement after reception of a third or a half sub-frame of the selected signal stream. 25. The user equipment of claim 22,
wherein the baseband circuit is configured to initiate the recovery of the mobility measurement based on discarding a result of the mobility measurement and repeating the mobility measurement. | The disclosure relates to a method for gain adjustment in mobility measurements of a user equipment (UE). The method includes: selecting a signal stream of a plurality of signal streams received from a plurality of radio cells for mobility measurements; performing a mobility measurement on the selected signal stream based on a given gain; determining a gain update of the selected signal stream based on a received signal strength measurement of the selected signal stream; and if the gain update is outside a predetermined gain range, initiating a recovery of the mobility measurement based on the gain update.1. A method for gain adjustment in mobility measurements of a user equipment (UE), the method comprising:
selecting a signal stream of a plurality of signal streams received from a plurality of radio cells for mobility measurements; performing a mobility measurement on the selected signal stream based on a given gain; determining a gain update of the selected signal stream based on a received signal strength measurement of the selected signal stream; and if the gain update is outside a predetermined gain range, initiating a recovery of the mobility measurement based on the gain update. 2. The method of claim 1, comprising:
performing the mobility measurement within one sub-frame of the selected signal stream. 3. The method of claim 1, comprising:
performing the received signal strength measurement based on at least one reference symbol comprised in the selected signal stream. 4. The method of claim 1, comprising:
performing the received signal strength measurement after reception of a third or a half sub-frame of the selected signal stream. 5. The method of claim 1,
wherein initiating the recovery of the mobility measurement comprises discarding a result of the mobility measurement and repeating the mobility measurement. 6. The method of claim 5,
wherein repeating the mobility measurement is performed in one of succeeding paging cycles. 7. The method of claim 1,
wherein initiating the recovery of the mobility measurement comprises extending the mobility measurement. 8. The method of claim 7,
wherein extending the mobility measurement comprises extending the mobility measurement to at least one further sub-frame of a same paging cycle. 9. The method of claim 1,
wherein initiating the recovery of the mobility measurement comprises rescheduling the mobility measurement. 10. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement within a same paging cycle. 11. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement after mobility measurements on all other selected signal streams have been performed. 12. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement within a same paging cycle. 13. The method of claim 9,
wherein rescheduling the mobility measurement comprises rescheduling the mobility measurement within one of subsequent paging cycles. 14. The method of claim 1,
wherein performing the mobility measurement comprises at least one of a neighbor cell measurement, a neighbor cell identification and a combined neighbor cell identification and measurement. 15. The method of claim 1,
wherein performing the mobility measurement comprises performing an inter-frequency measurement. 16. The method of claim 1,
wherein determining the gain update of the selected signal stream is performed together with determining a time acquisition of the selected signal stream. 17. The method of claim 1, comprising:
performing the mobility measurement when the UE is in idle mode or in connected mode. 18. A device for gain adjustment in mobility measurements of a user equipment (UE), the device comprising:
a receiving circuit configured to receive a plurality of signal streams from a plurality of radio cells; a selection circuit configured to select a signal stream of the plurality of received signal streams for mobility measurements; a mobility measurement circuit configured to perform a mobility measurement on the selected signal stream based on a given gain; a signal strength measurement circuit configured to perform a received signal strength measurement of the selected signal stream; a gain update circuit configured to determine a gain update of the selected signal stream based on the performed received signal strength measurement of the selected signal stream; and a recovery circuit configured to initiate a recovery of the mobility measurement based on the gain update if the gain update is outside a predetermined gain range. 19. The device of claim 18,
wherein the mobility measurement circuit is configured to perform the mobility measurement within one sub-frame of the selected signal stream. 20. The device of claim 18,
wherein the signal strength measurement circuit is configured to perform the received signal strength measurement based on at least one reference symbol comprised in the selected signal stream. 21. The device of claim 18,
wherein the signal strength measurement circuit is configured to perform the received signal strength measurement after reception of a third or a half sub-frame of the selected signal stream. 22. A user equipment (UE) comprising:
a receiver circuit configured to receive a plurality of signal streams from a plurality of radio cells; and a baseband circuit configured to: select a signal stream of the plurality of received signal streams for mobility measurements; perform a mobility measurement on the selected signal stream based on a given gain; determine a gain update of the selected signal stream based on a received signal strength measurement of the selected signal stream; and initiate a recovery of the mobility measurement based on the gain update if the gain update is outside a predetermined gain range. 23. The user equipment of claim 22,
wherein the baseband circuit is configured to perform the received signal strength measurement based on at least one reference symbol comprised in the selected signal stream. 24. The user equipment of claim 22,
wherein the baseband circuit is configured to perform the received signal strength measurement after reception of a third or a half sub-frame of the selected signal stream. 25. The user equipment of claim 22,
wherein the baseband circuit is configured to initiate the recovery of the mobility measurement based on discarding a result of the mobility measurement and repeating the mobility measurement. | 2,400 |
8,804 | 8,804 | 14,961,701 | 2,457 | A system and method for creating, managing, and using an application in a messaging environment is described. A communication including an application specification comprising zero or more commands is received from a sender and processed. The system and method determine whether the application specification is in a done condition, and iterates until done. A confirming specification, including revisions made while iterating, is also created and returned to the sender and recipients. | 1. A computer-based method comprising:
associating a software service with an email address; receiving a first email message directed to the email address; parsing the first email message to determine an application specification, the application specification identifying an input-data variable and a function; and creating an application product that applies the function to the input-data variable. 2. The method of claim 1, further comprising identifying a sender of the first email message and replying to the sender with a second email message. 3. The method of claim 2, wherein the second email message includes information for accessing the application product. 4. The method of claim 2, wherein the second email message includes the determined application specification. 5. The method of claim 2, wherein the first email message includes a plurality of email addresses other than the email address, and wherein the second email message is addressed to the plurality of email addresses. 6. The method of claim 2, further comprising identifying a missing requirement in the first email message and prompting the sender for the missing requirement in the second email message. 7. The method of claim 6, further comprising:
receiving a third email message including the missing requirement; and updating the application product responsive to the missing requirement. 8. The method of claim 7, wherein updating the application product comprises amending the application specification to include the missing requirement. 9. A computer-implemented method for creating an application product, the method comprising:
receiving a first communication from a first sender, the first communication identifying zero or more recipients; parsing the first communication to determine an application specification; processing the application specification, wherein the processing comprises producing an application product; determining whether the application specification is in a done condition; storing the application product; transmitting information for accessing the application product to the first sender, and to the zero or more recipients; and revising the application specification and transmitting the revised application specification to the sender if the application specification is not in a done condition. 10. The computer-implemented method of claim 9, wherein the receiving the first communication is via e-mail. 11. The computer-implemented method of claim 9, the first communication further comprising one or more address fields, the zero or more recipients identified in the one or more address fields, the one or more address fields corresponding to one or more application access privileges for the zero or more recipients. 12. The computer-implemented method of claim 9, further comprising transmitting to the first sender, information for creating an application product. 13. The computer-implemented method of claim 12, wherein the information for creating an application product includes a template. 14. The computer-implemented method of claim 9, further comprising iterating until the application specification is in a done condition. 15. The computer-implemented method of claim 9, further comprising transmitting the revised application specification to the zero or more recipients. 16. The computer-implemented method of claim 9, wherein revising the application specification further comprises stamping the application specification with a version indicator. 17. The computer-implemented method of claim 9, wherein the application specification includes zero or more erroneous commands, and revising the application specification includes identifying errors corresponding to the zero or more erroneous commands. 18. The computer-implemented method of claim 9, the method further comprising applying one or more access permissions to the application product corresponding to the first sender and the zero or more recipients. 19. The computer-implemented method of claim 18, further comprising receiving a second communication from a second sender, wherein the access permissions prohibit the second sender from modifying the application product, and rejecting the second communication. 20. The computer-implemented method of claim 18, further comprising receiving a second communication from a second sender, the second communication including one or more updates to the application specification, wherein the access permissions permit the second sender to modify the application product, and tracking and associating the one or more updates to the application specification with the second sender. 21. The computer-implemented method of claim 18, further comprising receiving a third communication from the first sender, the third communication including one or more instructions for modifying the access permissions, and in response to the one or more instructions, modifying the access permissions. 22. The computer-implemented method of claim 18, wherein the access permissions prohibit the zero or more recipients from modifying the application product. 23. The computer-implemented method of claim 18, wherein applying one or more access permissions further comprises creating a password. 24. The computer-implemented method of claim 9, wherein the application product is an application. 25. The computer-implemented method of claim 9, wherein the application specification includes zero or more specification elements from the group consisting of input-data variables, functions, directives, parameters, and commands. 26. A system comprising:
one or more computers configured to perform operations including: associating a software service with an email address; receiving an email message directed to the email address; parsing the email message to determine an application specification, the application specification identifying an input-data variable and a function; and creating an application product that applies the function to the input-data variable. 27. A system comprising:
one or more computers configured to perform operations including: receiving a first communication from a first sender, the first communication identifying zero or more recipients; parsing the first communication to determine an application specification; processing the application specification, wherein the processing comprises producing an application product; determining whether the application specification is in a done condition; storing the application product; transmitting information for accessing the application product to the first sender, and to the zero or more recipients; and revising the application specification and transmitting the revised application specification to the sender if the application specification is not in a done condition. | A system and method for creating, managing, and using an application in a messaging environment is described. A communication including an application specification comprising zero or more commands is received from a sender and processed. The system and method determine whether the application specification is in a done condition, and iterates until done. A confirming specification, including revisions made while iterating, is also created and returned to the sender and recipients.1. A computer-based method comprising:
associating a software service with an email address; receiving a first email message directed to the email address; parsing the first email message to determine an application specification, the application specification identifying an input-data variable and a function; and creating an application product that applies the function to the input-data variable. 2. The method of claim 1, further comprising identifying a sender of the first email message and replying to the sender with a second email message. 3. The method of claim 2, wherein the second email message includes information for accessing the application product. 4. The method of claim 2, wherein the second email message includes the determined application specification. 5. The method of claim 2, wherein the first email message includes a plurality of email addresses other than the email address, and wherein the second email message is addressed to the plurality of email addresses. 6. The method of claim 2, further comprising identifying a missing requirement in the first email message and prompting the sender for the missing requirement in the second email message. 7. The method of claim 6, further comprising:
receiving a third email message including the missing requirement; and updating the application product responsive to the missing requirement. 8. The method of claim 7, wherein updating the application product comprises amending the application specification to include the missing requirement. 9. A computer-implemented method for creating an application product, the method comprising:
receiving a first communication from a first sender, the first communication identifying zero or more recipients; parsing the first communication to determine an application specification; processing the application specification, wherein the processing comprises producing an application product; determining whether the application specification is in a done condition; storing the application product; transmitting information for accessing the application product to the first sender, and to the zero or more recipients; and revising the application specification and transmitting the revised application specification to the sender if the application specification is not in a done condition. 10. The computer-implemented method of claim 9, wherein the receiving the first communication is via e-mail. 11. The computer-implemented method of claim 9, the first communication further comprising one or more address fields, the zero or more recipients identified in the one or more address fields, the one or more address fields corresponding to one or more application access privileges for the zero or more recipients. 12. The computer-implemented method of claim 9, further comprising transmitting to the first sender, information for creating an application product. 13. The computer-implemented method of claim 12, wherein the information for creating an application product includes a template. 14. The computer-implemented method of claim 9, further comprising iterating until the application specification is in a done condition. 15. The computer-implemented method of claim 9, further comprising transmitting the revised application specification to the zero or more recipients. 16. The computer-implemented method of claim 9, wherein revising the application specification further comprises stamping the application specification with a version indicator. 17. The computer-implemented method of claim 9, wherein the application specification includes zero or more erroneous commands, and revising the application specification includes identifying errors corresponding to the zero or more erroneous commands. 18. The computer-implemented method of claim 9, the method further comprising applying one or more access permissions to the application product corresponding to the first sender and the zero or more recipients. 19. The computer-implemented method of claim 18, further comprising receiving a second communication from a second sender, wherein the access permissions prohibit the second sender from modifying the application product, and rejecting the second communication. 20. The computer-implemented method of claim 18, further comprising receiving a second communication from a second sender, the second communication including one or more updates to the application specification, wherein the access permissions permit the second sender to modify the application product, and tracking and associating the one or more updates to the application specification with the second sender. 21. The computer-implemented method of claim 18, further comprising receiving a third communication from the first sender, the third communication including one or more instructions for modifying the access permissions, and in response to the one or more instructions, modifying the access permissions. 22. The computer-implemented method of claim 18, wherein the access permissions prohibit the zero or more recipients from modifying the application product. 23. The computer-implemented method of claim 18, wherein applying one or more access permissions further comprises creating a password. 24. The computer-implemented method of claim 9, wherein the application product is an application. 25. The computer-implemented method of claim 9, wherein the application specification includes zero or more specification elements from the group consisting of input-data variables, functions, directives, parameters, and commands. 26. A system comprising:
one or more computers configured to perform operations including: associating a software service with an email address; receiving an email message directed to the email address; parsing the email message to determine an application specification, the application specification identifying an input-data variable and a function; and creating an application product that applies the function to the input-data variable. 27. A system comprising:
one or more computers configured to perform operations including: receiving a first communication from a first sender, the first communication identifying zero or more recipients; parsing the first communication to determine an application specification; processing the application specification, wherein the processing comprises producing an application product; determining whether the application specification is in a done condition; storing the application product; transmitting information for accessing the application product to the first sender, and to the zero or more recipients; and revising the application specification and transmitting the revised application specification to the sender if the application specification is not in a done condition. | 2,400 |
8,805 | 8,805 | 13,443,123 | 2,477 | Systems and methods for designing, using, and/or implementing beacon-enabled communications for variable payload transfers are described. In various embodiments, these systems and methods may be applicable to power line communications (PLC). For example, a method may include implementing a superframe having a plurality of beacon slots, a plurality of intermediate slots following the beacon slots, and a poll-based Contention Free Period (CFP) slot following the intermediate slots. Each of the beacon slots and each of the intermediate slots may correspond to a respective one of a plurality of frequency subbands, and the poll-based CFP slot may correspond to a combination of the plurality of frequency subbands. The method may also include receiving a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot, and then transmitting a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. | 1. A method comprising:
performing, by a communication device,
implementing a superframe structure having a plurality of beacon slots, a plurality of intermediate slots following the plurality of beacon slots, and a poll-based Contention Free Period (CFP) slot following the plurality of intermediate slots, each of the plurality of beacon slots and each of the plurality of intermediate slots corresponding to a respective one of a plurality of frequency subbands, and the poll-based CFP slot corresponding to a combination of the plurality of frequency subbands;
receiving a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot; and
in response to the poll request, transmitting a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. 2. The method of claim 1, further comprising:
performing, by the communication device,
in response to transmitting the data packet, receiving an acknowledgement message over the first of the plurality of frequency subbands. 3. The method of claim 1, further comprising:
performing, by the communication device,
adding an indication to the data packet of one or more outstanding data packets; and
transmitting the one or more outstanding data packets over the second of the plurality of frequency subbands following the data packet during the poll-based CFP slot. 4. The method of claim 3, wherein transmitting the one or more outstanding data packets includes transmitting the one or more outstanding data packets without exceeding a maximum number of packets transmittable in response to the poll request. 5. The method of claim 3, wherein transmitting the one or more outstanding data packets includes transmitting the one or more outstanding data packets without exceeding a maximum transmission duration. 6. The method of claim 1, further comprising:
performing, by the communication device,
detecting at least one beacon during one of the plurality of beacon slots, the detected beacon having been transmitted over a respective frequency subband;
creating a downlink subband report based, at least in part, upon the detected beacon;
transmitting the downlink subband report over each of the plurality of frequency subbands during respective intermediate slots; and
receiving a subband allocation message, the subband allocation message identifying the first of the plurality of frequency subbands as suitable for subsequent downlink communications and identifying the second of the plurality of frequency subbands as suitable for subsequent uplink communications. 7. The method of claim 1, wherein the intermediate slots are Contention Access Period (CAP) slots during which one or more other communications devices are allowed to compete with the communication device for access to a communication medium. 8. The method of claim 7, further comprising:
performing, by the communication device,
receiving data over the first of the plurality of frequency subbands during a first CAP slot corresponding to the first frequency subband; and
transmitting an acknowledgement message over the second of the plurality of frequency subbands during the first CAP slot. 9. The method of claim 7, further comprising:
performing, by the communication device,
transmitting data over the second of the plurality of frequency subbands during a second CAP slot corresponding to the second frequency subband; and
receiving an acknowledgement message over the first of the plurality of frequency subbands during the second CAP slot. 10. The method of claim 1, wherein the intermediate slots are Discovery Phase (DP) slots during which the communication device abstains from transmitting data packets, the presence or absence of DP slots indicated in one or more beacons received over one or more of the plurality of beacon slots. 11. The method of claim 10, wherein the presence or absence of DP slots implements access control to limit a number of communication devices capable of joining a network. 12. A PLC device, comprising:
a processor; and a memory coupled to the processor, the memory configured to store program instructions executable by the processor to cause the PLC device to:
implement a superframe structure having a plurality of beacon slots, a plurality of Contention Access Period (CAP) slots following the plurality of beacon slots, and a poll-based Contention Free Period (CFP) slot following the plurality of CAP slots, each of the plurality of beacon slots and each of the plurality of CAP slots corresponding to a respective one of a plurality of frequency subbands, and the poll-based CFP slot corresponding to a combination of the plurality of frequency subbands;
transmit a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot; and
in response to the poll request, receive a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. 13. The PLC device of claim 12, wherein the processor includes a digital signal processor (DSP), an application specific integrated circuit (ASIC), a system-on-chip (SoC) circuit, a field-programmable gate array (FPGA), a microprocessor, or a microcontroller. 14. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
in response to having received the data packet, transmit an acknowledgement message over the first of the plurality of frequency subbands during the poll-based CFP slot. 15. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
transmit a plurality of beacons, each of the plurality of beacons transmitted over a corresponding one of the plurality of beacon slots; receive a downlink subband report during at least one of the plurality of CAP slots; and transmit a subband allocation message over the first of the plurality of frequency subbands during at least one of: one of the plurality of CAP slots or the poll-based CFP slot, the subband allocation message identifying the first of the plurality of frequency subbands as suitable for subsequent downlink communications and identifying the second of the plurality of frequency subbands as suitable for subsequent uplink communications. 16. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
transmit data over the first of the plurality of frequency subbands during a first CAP slot corresponding to the first frequency subband; and receive an acknowledgement message over the second of the plurality of frequency subbands during the first CAP slot. 17. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
receive data over the second of the plurality of frequency subbands during a second CAP slot corresponding to the second frequency subband; and transmit an acknowledgement message over the first of the plurality of frequency subbands during the second CAP slot. 18. The PLC device of claim 12, wherein PLC device is a PLC data concentrator or router. 19. A non-transitory electronic storage medium having program instructions stored thereon that, upon execution by a processor within a power line communication (PLC) data concentrator, cause the PLC data concentrator to:
implement a first superframe structure having a plurality of beacon slots, a plurality of Discovery Phase (DP) slots following the plurality of beacon slots, and a poll-based Contention Free Period (CFP) slot following the plurality of DP slots, each of the plurality of beacon slots and each of the plurality of DP slots corresponding to a respective one of a plurality of frequency subbands, and the poll-based CFP slot corresponding to a combination of the plurality of frequency subbands; transmit a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot; and in response to the poll request, receive a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. 20. The electronic storage medium of claim 19, wherein the program instructions, upon execution by the processor, further cause the PLC data concentrator to:
implement a second superframe structure having the plurality of beacon slots and the poll-based CFP following the plurality of beacon slots, the second superframe structure excluding the plurality of DP slots; and perform one of: (a) in response to one or more PLC devices being allowed to join the PLC data concentrator, follow the first superframe structure; or (b) in response to one or more PLC devices not being allowed to join the PLC data concentrator, follow the second superframe structure. | Systems and methods for designing, using, and/or implementing beacon-enabled communications for variable payload transfers are described. In various embodiments, these systems and methods may be applicable to power line communications (PLC). For example, a method may include implementing a superframe having a plurality of beacon slots, a plurality of intermediate slots following the beacon slots, and a poll-based Contention Free Period (CFP) slot following the intermediate slots. Each of the beacon slots and each of the intermediate slots may correspond to a respective one of a plurality of frequency subbands, and the poll-based CFP slot may correspond to a combination of the plurality of frequency subbands. The method may also include receiving a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot, and then transmitting a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot.1. A method comprising:
performing, by a communication device,
implementing a superframe structure having a plurality of beacon slots, a plurality of intermediate slots following the plurality of beacon slots, and a poll-based Contention Free Period (CFP) slot following the plurality of intermediate slots, each of the plurality of beacon slots and each of the plurality of intermediate slots corresponding to a respective one of a plurality of frequency subbands, and the poll-based CFP slot corresponding to a combination of the plurality of frequency subbands;
receiving a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot; and
in response to the poll request, transmitting a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. 2. The method of claim 1, further comprising:
performing, by the communication device,
in response to transmitting the data packet, receiving an acknowledgement message over the first of the plurality of frequency subbands. 3. The method of claim 1, further comprising:
performing, by the communication device,
adding an indication to the data packet of one or more outstanding data packets; and
transmitting the one or more outstanding data packets over the second of the plurality of frequency subbands following the data packet during the poll-based CFP slot. 4. The method of claim 3, wherein transmitting the one or more outstanding data packets includes transmitting the one or more outstanding data packets without exceeding a maximum number of packets transmittable in response to the poll request. 5. The method of claim 3, wherein transmitting the one or more outstanding data packets includes transmitting the one or more outstanding data packets without exceeding a maximum transmission duration. 6. The method of claim 1, further comprising:
performing, by the communication device,
detecting at least one beacon during one of the plurality of beacon slots, the detected beacon having been transmitted over a respective frequency subband;
creating a downlink subband report based, at least in part, upon the detected beacon;
transmitting the downlink subband report over each of the plurality of frequency subbands during respective intermediate slots; and
receiving a subband allocation message, the subband allocation message identifying the first of the plurality of frequency subbands as suitable for subsequent downlink communications and identifying the second of the plurality of frequency subbands as suitable for subsequent uplink communications. 7. The method of claim 1, wherein the intermediate slots are Contention Access Period (CAP) slots during which one or more other communications devices are allowed to compete with the communication device for access to a communication medium. 8. The method of claim 7, further comprising:
performing, by the communication device,
receiving data over the first of the plurality of frequency subbands during a first CAP slot corresponding to the first frequency subband; and
transmitting an acknowledgement message over the second of the plurality of frequency subbands during the first CAP slot. 9. The method of claim 7, further comprising:
performing, by the communication device,
transmitting data over the second of the plurality of frequency subbands during a second CAP slot corresponding to the second frequency subband; and
receiving an acknowledgement message over the first of the plurality of frequency subbands during the second CAP slot. 10. The method of claim 1, wherein the intermediate slots are Discovery Phase (DP) slots during which the communication device abstains from transmitting data packets, the presence or absence of DP slots indicated in one or more beacons received over one or more of the plurality of beacon slots. 11. The method of claim 10, wherein the presence or absence of DP slots implements access control to limit a number of communication devices capable of joining a network. 12. A PLC device, comprising:
a processor; and a memory coupled to the processor, the memory configured to store program instructions executable by the processor to cause the PLC device to:
implement a superframe structure having a plurality of beacon slots, a plurality of Contention Access Period (CAP) slots following the plurality of beacon slots, and a poll-based Contention Free Period (CFP) slot following the plurality of CAP slots, each of the plurality of beacon slots and each of the plurality of CAP slots corresponding to a respective one of a plurality of frequency subbands, and the poll-based CFP slot corresponding to a combination of the plurality of frequency subbands;
transmit a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot; and
in response to the poll request, receive a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. 13. The PLC device of claim 12, wherein the processor includes a digital signal processor (DSP), an application specific integrated circuit (ASIC), a system-on-chip (SoC) circuit, a field-programmable gate array (FPGA), a microprocessor, or a microcontroller. 14. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
in response to having received the data packet, transmit an acknowledgement message over the first of the plurality of frequency subbands during the poll-based CFP slot. 15. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
transmit a plurality of beacons, each of the plurality of beacons transmitted over a corresponding one of the plurality of beacon slots; receive a downlink subband report during at least one of the plurality of CAP slots; and transmit a subband allocation message over the first of the plurality of frequency subbands during at least one of: one of the plurality of CAP slots or the poll-based CFP slot, the subband allocation message identifying the first of the plurality of frequency subbands as suitable for subsequent downlink communications and identifying the second of the plurality of frequency subbands as suitable for subsequent uplink communications. 16. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
transmit data over the first of the plurality of frequency subbands during a first CAP slot corresponding to the first frequency subband; and receive an acknowledgement message over the second of the plurality of frequency subbands during the first CAP slot. 17. The PLC device of claim 12, wherein the program instructions are executable by the processor to further cause the PLC device to:
receive data over the second of the plurality of frequency subbands during a second CAP slot corresponding to the second frequency subband; and transmit an acknowledgement message over the first of the plurality of frequency subbands during the second CAP slot. 18. The PLC device of claim 12, wherein PLC device is a PLC data concentrator or router. 19. A non-transitory electronic storage medium having program instructions stored thereon that, upon execution by a processor within a power line communication (PLC) data concentrator, cause the PLC data concentrator to:
implement a first superframe structure having a plurality of beacon slots, a plurality of Discovery Phase (DP) slots following the plurality of beacon slots, and a poll-based Contention Free Period (CFP) slot following the plurality of DP slots, each of the plurality of beacon slots and each of the plurality of DP slots corresponding to a respective one of a plurality of frequency subbands, and the poll-based CFP slot corresponding to a combination of the plurality of frequency subbands; transmit a poll request over a first of the plurality of frequency subbands during the poll-based CFP slot; and in response to the poll request, receive a data packet over a second of the plurality of frequency subbands during the poll-based CFP slot. 20. The electronic storage medium of claim 19, wherein the program instructions, upon execution by the processor, further cause the PLC data concentrator to:
implement a second superframe structure having the plurality of beacon slots and the poll-based CFP following the plurality of beacon slots, the second superframe structure excluding the plurality of DP slots; and perform one of: (a) in response to one or more PLC devices being allowed to join the PLC data concentrator, follow the first superframe structure; or (b) in response to one or more PLC devices not being allowed to join the PLC data concentrator, follow the second superframe structure. | 2,400 |
8,806 | 8,806 | 15,239,935 | 2,456 | A method of dynamically maintaining conference attributes during a conference includes conducting the conference according to a first set of conference attributes based on a first set of member terminals currently members of the conference and detecting during the conference that conference membership changes from the first set of member terminals to a second set of member terminals participating in the conference. Thus, a second set of conference attributes can be determined based on the second set of member terminals so that the conference can be dynamically changed so as to be conducted according to the second set of conference attributes rather than the first set of conference attributes. | 1. A method of dynamically maintaining conference attributes during a conference, comprising:
conducting, by a computer of a contact center, the conference according to a first set of conference attributes based on a first set of member terminals currently members of the conference; detecting during the conference, by the computer of the contact center, that conference membership changes from the first set of member terminals to a second set of member terminals participating in the conference; determining, by the computer of the contact center, a second set of conference attributes based on the second set of member terminals; and conducting, by the computer of the contact center, the conference according to the second set of conference attributes rather than the first set of conference attributes. 2. The method of claim 1, wherein the conference is initially established between the first set of member terminals. 3. The method of claim 1, wherein detecting the change in conference membership comprises detecting a joining member terminal that joins the conference. 4. The method of claim 1, wherein detecting the change in conference membership comprises detecting a leaving member terminal, from among the first set of member terminals, that leaves the conference. 5. The method of claim 1, comprising:
determining, by the computer of the contact center, respective capabilities of each of the first set of member terminals, wherein the first set of conference attributes is based on the respective capabilities. 6. The method of claim 1, comprising:
determining, by the computer of the contact center, respective capabilities of each of the second set of member terminals, wherein the second set of conference attributes is based on the respective capabilities. 7. The method of claim 5, comprising:
retrieving, by the computer of the contact center, the respective capabilities from a context store of the contact center. 8. The method of claim 1, comprising:
determining, by the computer of the contact center, a respective identification of each of the first set of member terminals. 9. The method of claim 1, comprising:
determining, by the computer of the contact center, a respective identification of each of the second set of member terminals. 10. The method of claim 1, comprising:
determining, by the computer of the contact center, a respective identification of a respective user associated with each of the first set of member terminals. 11. A system for dynamically maintaining conference attributes during a conference, comprising:
a memory device storing executable instructions; and a processor in communication with the memory device, wherein the processor, when executing the executable instructions:
conducts the conference according to a first set of conference attributes based on a first set of member terminals currently members of the conference;
detects during the conference that conference membership changes from the first set of member terminals to a second set of member terminals participating in the conference;
determines a second set of conference attributes based on the second set of member terminals; and
conducts the conference according to the second set of conference attributes rather than the first set of conference attributes. 12. The system of claim 11, wherein the conference is initially established between the first set of member terminals. 13. The system of claim 11, wherein detecting the change in conference membership comprises detecting a joining member terminal that joins the conference. 14. The system of claim 11, wherein detecting the change in conference membership comprises detecting a leaving member terminal, from among the first set of member terminals, that leaves the conference. 15. The system of claim 11, wherein the processor, when executing the executable instructions determines respective capabilities of each of the first set of member terminals, wherein the first set of conference attributes is based on the respective capabilities. 16. The system of claim 11, wherein the processor, when executing the executable instructions determines respective capabilities of each of the second set of member terminals, wherein the second set of conference attributes is based on the respective capabilities. 17. The system of claim 15, wherein the processor, when executing the executable instructions retrieves the respective capabilities from a context store of the contact center. 18. The system of claim 11, wherein the processor, when executing the executable instructions determines a respective identification of each of the first set of member terminals. 19. The system of claim 11, wherein the processor, when executing the executable instructions determines a respective identification of each of the second set of member terminals. 20. The system of claim 11, wherein the processor, when executing the executable instructions determines a respective identification of a respective user associated with each of the first set of member terminals. | A method of dynamically maintaining conference attributes during a conference includes conducting the conference according to a first set of conference attributes based on a first set of member terminals currently members of the conference and detecting during the conference that conference membership changes from the first set of member terminals to a second set of member terminals participating in the conference. Thus, a second set of conference attributes can be determined based on the second set of member terminals so that the conference can be dynamically changed so as to be conducted according to the second set of conference attributes rather than the first set of conference attributes.1. A method of dynamically maintaining conference attributes during a conference, comprising:
conducting, by a computer of a contact center, the conference according to a first set of conference attributes based on a first set of member terminals currently members of the conference; detecting during the conference, by the computer of the contact center, that conference membership changes from the first set of member terminals to a second set of member terminals participating in the conference; determining, by the computer of the contact center, a second set of conference attributes based on the second set of member terminals; and conducting, by the computer of the contact center, the conference according to the second set of conference attributes rather than the first set of conference attributes. 2. The method of claim 1, wherein the conference is initially established between the first set of member terminals. 3. The method of claim 1, wherein detecting the change in conference membership comprises detecting a joining member terminal that joins the conference. 4. The method of claim 1, wherein detecting the change in conference membership comprises detecting a leaving member terminal, from among the first set of member terminals, that leaves the conference. 5. The method of claim 1, comprising:
determining, by the computer of the contact center, respective capabilities of each of the first set of member terminals, wherein the first set of conference attributes is based on the respective capabilities. 6. The method of claim 1, comprising:
determining, by the computer of the contact center, respective capabilities of each of the second set of member terminals, wherein the second set of conference attributes is based on the respective capabilities. 7. The method of claim 5, comprising:
retrieving, by the computer of the contact center, the respective capabilities from a context store of the contact center. 8. The method of claim 1, comprising:
determining, by the computer of the contact center, a respective identification of each of the first set of member terminals. 9. The method of claim 1, comprising:
determining, by the computer of the contact center, a respective identification of each of the second set of member terminals. 10. The method of claim 1, comprising:
determining, by the computer of the contact center, a respective identification of a respective user associated with each of the first set of member terminals. 11. A system for dynamically maintaining conference attributes during a conference, comprising:
a memory device storing executable instructions; and a processor in communication with the memory device, wherein the processor, when executing the executable instructions:
conducts the conference according to a first set of conference attributes based on a first set of member terminals currently members of the conference;
detects during the conference that conference membership changes from the first set of member terminals to a second set of member terminals participating in the conference;
determines a second set of conference attributes based on the second set of member terminals; and
conducts the conference according to the second set of conference attributes rather than the first set of conference attributes. 12. The system of claim 11, wherein the conference is initially established between the first set of member terminals. 13. The system of claim 11, wherein detecting the change in conference membership comprises detecting a joining member terminal that joins the conference. 14. The system of claim 11, wherein detecting the change in conference membership comprises detecting a leaving member terminal, from among the first set of member terminals, that leaves the conference. 15. The system of claim 11, wherein the processor, when executing the executable instructions determines respective capabilities of each of the first set of member terminals, wherein the first set of conference attributes is based on the respective capabilities. 16. The system of claim 11, wherein the processor, when executing the executable instructions determines respective capabilities of each of the second set of member terminals, wherein the second set of conference attributes is based on the respective capabilities. 17. The system of claim 15, wherein the processor, when executing the executable instructions retrieves the respective capabilities from a context store of the contact center. 18. The system of claim 11, wherein the processor, when executing the executable instructions determines a respective identification of each of the first set of member terminals. 19. The system of claim 11, wherein the processor, when executing the executable instructions determines a respective identification of each of the second set of member terminals. 20. The system of claim 11, wherein the processor, when executing the executable instructions determines a respective identification of a respective user associated with each of the first set of member terminals. | 2,400 |
8,807 | 8,807 | 15,691,785 | 2,446 | A system for analyzing data received from at least one mobile electronic device comprises a mobile electronic device and a server. The mobile electronic device includes a sensor configured to collect video, audio and/or imagery data, and the mobile electronic device is configured to initiate collection of data based on a command from a user of the mobile electronic device. The server includes a receiver configured to receive the video, audio and/or imagery data collected by the sensor of the mobile electronic device and a processing system. The processing system of the server includes a processor and is configured to, when a condition is met in accordance with a rule established on the server, issue a command to turn on the sensor of the mobile electronic device and enable the mobile electronic device to transmit the video, audio and/or imagery data collected by the sensor to the server, without any input by the user of the mobile electronic device. In addition, the video, audio and/or imagery data are collected by the sensor at a location of the mobile electronic device. | 1. (canceled) 2. A system for analyzing data received from at least one mobile electronic device, the system comprising:
a mobile electronic device including a sensor configured to collect video, audio and/or imagery data, the mobile electronic device being configured to initiate collection of data based on a command from a user of the mobile electronic device; and a server including:
a processing system including a processor, the processing system being configured to, when a condition is met in accordance with a rule established on the server, issue a command to turn on the sensor of the mobile electronic device and enable the mobile electronic device to transmit the video, audio and/or imagery data collected by the sensor to the server, without any input by the user of the mobile electronic device, the video, audio and/or imagery data being collected by the sensor at a location of the mobile electronic device; and
a receiver configured to receive the video, audio and/or imagery data collected by the sensor of the mobile electronic device. 3. The system according to claim 2, wherein the mobile electronic device is a smartphone or a tablet. 4. The system according to claim 2, wherein the sensor is a video camera or a microphone. 5. The system according to claim 2, wherein the condition is that the mobile electronic device is moved within a specific distance of the location. 6. The system according to claim 5, wherein the location is determined based on data received by the server from another electronic device. 7. The system according to claim 2, wherein the mobile electronic device is further configured to display an image that does not indicate data collection or transmission when the mobile electronic device transmits the video, audio and/or imagery data collected by the sensor to the server, without any input by the user of the mobile electronic device, so that the data collection and transmission are done surreptitiously and a person is prevented from noticing the data collection or transmission. 8. The system according to claim 7, wherein the image is an image of a game or other application. 9. The system according to claim 2, wherein the mobile electronic device is configured to send its collected data to the server for follow-on analysis and distribution, by issuing a command. 10. The system according to claim 2, wherein the server further includes a transmitter configured to transmit the data received from the mobile electronic device to another electronic device. 11. The system according to claim 2, wherein the processing system is further configured to analyze the data received from the mobile electronic device to generate warning information. 12. The system according to claim 11, wherein the server further includes a transmitter configured to transmit the generated warning information to the mobile electronic device and/or another electronic device. 13. A server for analyzing data received from at least one mobile electronic device, the server comprising:
a processing system including a processor, the processing system being configured to, when a condition is met in accordance with a rule established on the server, issue a command to turn on a sensor of a mobile electronic device and enable the mobile electronic device to transmit video, audio and/or imagery data collected by the sensor to the server without any input by the user of the mobile electronic device, the video, audio and/or imagery data being collected by the sensor at a location of the mobile electronic device; and a receiver configured to receive the video, audio and/or imagery data collected by the sensor of the mobile electronic device. 14. A non-transitory computer-readable storage medium, having computer-executable instructions embodied thereon, wherein when executed by one or more processors of a server, the computer-executable instructions cause the one or more processors to:
determine whether a condition of a rule stored on the server is met; in response to the determination that the condition is met, issue a command to a mobile electronic device to turn on a sensor of the mobile electronic device and enable the mobile electronic device to collect video, audio and/or imagery data by the sensor and transmit the collected video, audio and/or imagery data to the server, without any input by a user of the mobile device, the video, audio and/or imagery data being collected by the sensor at a location of the mobile electronic device; and receive the video, audio and/or imagery data transmitted from the mobile electronic device. 15. The non-transitory computer-readable storage medium according to claim 14, wherein the computer-executable instructions further cause the one or more processors to analyze the data collected by the sensor of the mobile electronic device to generate warning information. 16. The non-transitory computer-readable storage medium according to claim 15, wherein the computer-executable instructions further cause the one or more processors to transmit the warning information to the mobile electronic device and/or another electronic device. 17. The non-transitory computer-readable storage medium according to claim 14, wherein the computer-executable instructions further cause the one or more processors to transmit the data collected by the sensor of the mobile electronic device to another electronic device. 18. The non-transitory computer-readable storage medium according to claim 14, wherein the sensor is a video camera or a microphone. 19. The non-transitory computer-readable storage medium according to claim 14, wherein the computer-executable instructions further cause the one or more processors to enable the mobile electronic device to display an image that does not indicate data collection or transmission when the mobile electronic device transmits the collected video, audio and/or imagery data to the server, without any input by the user of the mobile electronic device, so that the data collection and transmission are done surreptitiously and a person is prevented from noticing the data collection or transmission. 20. A method for collecting and analyzing data from at least one mobile electronic device, comprising:
determining whether a condition is met in accordance with a rule; in response to the determination that the condition is met, issuing a command to the at least one mobile device to turn on a sensor of the at least one mobile electronic device and enable the at least one mobile electronic device to collect video, audio and/or imagery data by the sensor and transmit the collected video, audio and/or imagery data, without any input by a user of the at least one mobile electronic device, the video, audio and/or imagery data being collected by the sensor at a location of the at least one mobile electronic device; and receiving the video, audio and/or imagery data transmitted from the at least one mobile electronic device. 21. The method according to claim 20, further comprising:
transmitting the data received from the at least one mobile electronic device to another electronic device. | A system for analyzing data received from at least one mobile electronic device comprises a mobile electronic device and a server. The mobile electronic device includes a sensor configured to collect video, audio and/or imagery data, and the mobile electronic device is configured to initiate collection of data based on a command from a user of the mobile electronic device. The server includes a receiver configured to receive the video, audio and/or imagery data collected by the sensor of the mobile electronic device and a processing system. The processing system of the server includes a processor and is configured to, when a condition is met in accordance with a rule established on the server, issue a command to turn on the sensor of the mobile electronic device and enable the mobile electronic device to transmit the video, audio and/or imagery data collected by the sensor to the server, without any input by the user of the mobile electronic device. In addition, the video, audio and/or imagery data are collected by the sensor at a location of the mobile electronic device.1. (canceled) 2. A system for analyzing data received from at least one mobile electronic device, the system comprising:
a mobile electronic device including a sensor configured to collect video, audio and/or imagery data, the mobile electronic device being configured to initiate collection of data based on a command from a user of the mobile electronic device; and a server including:
a processing system including a processor, the processing system being configured to, when a condition is met in accordance with a rule established on the server, issue a command to turn on the sensor of the mobile electronic device and enable the mobile electronic device to transmit the video, audio and/or imagery data collected by the sensor to the server, without any input by the user of the mobile electronic device, the video, audio and/or imagery data being collected by the sensor at a location of the mobile electronic device; and
a receiver configured to receive the video, audio and/or imagery data collected by the sensor of the mobile electronic device. 3. The system according to claim 2, wherein the mobile electronic device is a smartphone or a tablet. 4. The system according to claim 2, wherein the sensor is a video camera or a microphone. 5. The system according to claim 2, wherein the condition is that the mobile electronic device is moved within a specific distance of the location. 6. The system according to claim 5, wherein the location is determined based on data received by the server from another electronic device. 7. The system according to claim 2, wherein the mobile electronic device is further configured to display an image that does not indicate data collection or transmission when the mobile electronic device transmits the video, audio and/or imagery data collected by the sensor to the server, without any input by the user of the mobile electronic device, so that the data collection and transmission are done surreptitiously and a person is prevented from noticing the data collection or transmission. 8. The system according to claim 7, wherein the image is an image of a game or other application. 9. The system according to claim 2, wherein the mobile electronic device is configured to send its collected data to the server for follow-on analysis and distribution, by issuing a command. 10. The system according to claim 2, wherein the server further includes a transmitter configured to transmit the data received from the mobile electronic device to another electronic device. 11. The system according to claim 2, wherein the processing system is further configured to analyze the data received from the mobile electronic device to generate warning information. 12. The system according to claim 11, wherein the server further includes a transmitter configured to transmit the generated warning information to the mobile electronic device and/or another electronic device. 13. A server for analyzing data received from at least one mobile electronic device, the server comprising:
a processing system including a processor, the processing system being configured to, when a condition is met in accordance with a rule established on the server, issue a command to turn on a sensor of a mobile electronic device and enable the mobile electronic device to transmit video, audio and/or imagery data collected by the sensor to the server without any input by the user of the mobile electronic device, the video, audio and/or imagery data being collected by the sensor at a location of the mobile electronic device; and a receiver configured to receive the video, audio and/or imagery data collected by the sensor of the mobile electronic device. 14. A non-transitory computer-readable storage medium, having computer-executable instructions embodied thereon, wherein when executed by one or more processors of a server, the computer-executable instructions cause the one or more processors to:
determine whether a condition of a rule stored on the server is met; in response to the determination that the condition is met, issue a command to a mobile electronic device to turn on a sensor of the mobile electronic device and enable the mobile electronic device to collect video, audio and/or imagery data by the sensor and transmit the collected video, audio and/or imagery data to the server, without any input by a user of the mobile device, the video, audio and/or imagery data being collected by the sensor at a location of the mobile electronic device; and receive the video, audio and/or imagery data transmitted from the mobile electronic device. 15. The non-transitory computer-readable storage medium according to claim 14, wherein the computer-executable instructions further cause the one or more processors to analyze the data collected by the sensor of the mobile electronic device to generate warning information. 16. The non-transitory computer-readable storage medium according to claim 15, wherein the computer-executable instructions further cause the one or more processors to transmit the warning information to the mobile electronic device and/or another electronic device. 17. The non-transitory computer-readable storage medium according to claim 14, wherein the computer-executable instructions further cause the one or more processors to transmit the data collected by the sensor of the mobile electronic device to another electronic device. 18. The non-transitory computer-readable storage medium according to claim 14, wherein the sensor is a video camera or a microphone. 19. The non-transitory computer-readable storage medium according to claim 14, wherein the computer-executable instructions further cause the one or more processors to enable the mobile electronic device to display an image that does not indicate data collection or transmission when the mobile electronic device transmits the collected video, audio and/or imagery data to the server, without any input by the user of the mobile electronic device, so that the data collection and transmission are done surreptitiously and a person is prevented from noticing the data collection or transmission. 20. A method for collecting and analyzing data from at least one mobile electronic device, comprising:
determining whether a condition is met in accordance with a rule; in response to the determination that the condition is met, issuing a command to the at least one mobile device to turn on a sensor of the at least one mobile electronic device and enable the at least one mobile electronic device to collect video, audio and/or imagery data by the sensor and transmit the collected video, audio and/or imagery data, without any input by a user of the at least one mobile electronic device, the video, audio and/or imagery data being collected by the sensor at a location of the at least one mobile electronic device; and receiving the video, audio and/or imagery data transmitted from the at least one mobile electronic device. 21. The method according to claim 20, further comprising:
transmitting the data received from the at least one mobile electronic device to another electronic device. | 2,400 |
8,808 | 8,808 | 15,257,935 | 2,494 | According to an aspect of some embodiments of the present invention there is provided a computer-implemented method for detection of malicious code within runtime generated code executing within a computer, comprising executing on a processor of the computer the acts of: receiving an indication of at least one of the creation and the execution of runtime generated code in a memory of a computer; identifying a match between signature data associated with the runtime generated code and a template signature of a plurality of templates representing authorized source creation modules that created the runtime generated code, the templates stored in a repository on a storage device; and triggering a security process to handle malicious code in the runtime generated code when no match is found. | 1. A computer-implemented method for detection of malicious code within runtime generated code executing within a computer, comprising executing on a processor of the computer the acts of:
receiving an indication of at least one of the creation and the execution of runtime generated code in a memory of a computer; identifying a match between signature data associated with the runtime generated code and a template signature of a plurality of templates representing authorized source creation modules that created the runtime generated code, the templates stored in a repository on a storage device; and triggering a security process to handle malicious code in the runtime generated code when no match is found. 2. The method of claim 1, wherein the template signature represents an authorized just in time (JIT) compiler. 3. The method of claim 2, wherein identifying the match between the signature data and the template signature comprises at least one of:
identifying an association between a first executable module called by the runtime generated code to invoke an operating system function, and the template representing the authorized JIT compiler, and identifying an association between a second executable module creating the runtime generated code and the template representing the authorized JIT compiler. 4. The method of claim 2, wherein the signature data comprises a predefined size of an area in the memory storing the runtime generated code. 5. The method of claim 2, wherein the signature data comprises a designation of a memory region storing the runtime generated code as read-only or no-access. 6. The method of claim 2, wherein the signature data comprises at least one code pattern. 7. The method of claim 6, wherein the at least one code pattern includes at least one member selected from the group consisting of: at least one predefined prolog at a start region of at least one function of the runtime generated code, at least one epilogue, and at least one magic operand value. 8. The method of claim 2, wherein the signature data comprises predefined control structures related to the JIT compiler at least one of at a start region and an end region of the runtime generated code. 9. The method of claim 8, wherein the predefined control structures include at least one of: a linked list at each of a plurality of different memory regions each storing a portion of the runtime generated code, and fields defining size and address of the respective memory region located after the respective linked list. 10. The method of claim 9, wherein the linked list is verified by traversing pointers of each memory region, and the fields are verified by correlating the values of the fields with operating system values. 11. The method of claim 2, wherein the signature data comprises an application associated with the runtime generated code to which the authorized JIT compiler is restricted. 12. The method of claim 1, wherein the template signature represents an authorized hook engine. 13. The method of claim 12, wherein the signature data includes identification that the runtime generated code is created by a hook engine, the identifying performed by at least one of:
emulating preexisting code at the prolog of a hooked module to reach outside code residing outside of the hooked module; and analyzing a stack trace related to the outside code to identify the runtime generated code by locating the position of the runtime generated code as appearing in the stack trace before the authorized hook engine executable that installed the hook. 14. The method of claim 12, wherein the signature data includes at least one member selected from the group consisting of: a predefined size of the memory area where the runtime generated code resides, at least one code pattern, predefined control structures at least at one of at a start portion and an end portion of the runtime generated code memory region, and an opcode signature calculated from assembly obtained by applying a disassemble program to the runtime generated code excluding mutable parameters. 15. The method of claim 14, wherein the at least one code pattern includes at least one member selected from the group consisting of: at least one predefined prolog at a start region of at least one function of the runtime generated code, at least one epilogue, and at least one magic operand value. 16. The method of claim 1, wherein the template signature represents an authorized executable compressor. 17. The method of claim 16, wherein the signature data includes at least one member selected from the group consisting of: size of a memory allocation according to a format of the decompressed executable file, a cryptographic hash function calculated over immutable portions of the executable file structure and code, and permissions on memory pages where the decompressed executable file resides. 18. The method of claim 17, further comprising verifying that contents of the memory at the base of the memory allocation is according to the format of the decompressed executable file by parsing contents of the memory allocation according to the format of the decompressed executable file, and checking that field values are logical and conform to the format. 19. A system for detection of runtime generated code containing malicious code, comprising:
a memory for storing code; a storage device for storing a repository of templates representing authorized; source creation modules that create runtime generated code; a program store storing code; and a processor coupled to the memory, the storage device, and the program store for implementing the stored code, the stored code comprising: stored code to receive an indication of at least one of the creation and the execution of runtime generated code in the memory, identify a match between signature data associated with the runtime generated code and a template signature of the repository; and trigger a security process to handle malicious code in the runtime generated code when no match is found. 20. A computer program product comprising a non-transitory computer readable storage medium storing program code thereon for implementation by a processor of a system for detection of runtime generated code containing malicious code, the program code comprising:
instructions to receive an indication of at least one of the creation and the execution of runtime generated code in a memory of a computer; instructions to identify a match between signature data associated with the runtime generated code and a template signature of a set of templates representing authorized source creation modules that create runtime generated code; and instructions to trigger a security process to handle malicious code in the runtime generated code when no match is found. | According to an aspect of some embodiments of the present invention there is provided a computer-implemented method for detection of malicious code within runtime generated code executing within a computer, comprising executing on a processor of the computer the acts of: receiving an indication of at least one of the creation and the execution of runtime generated code in a memory of a computer; identifying a match between signature data associated with the runtime generated code and a template signature of a plurality of templates representing authorized source creation modules that created the runtime generated code, the templates stored in a repository on a storage device; and triggering a security process to handle malicious code in the runtime generated code when no match is found.1. A computer-implemented method for detection of malicious code within runtime generated code executing within a computer, comprising executing on a processor of the computer the acts of:
receiving an indication of at least one of the creation and the execution of runtime generated code in a memory of a computer; identifying a match between signature data associated with the runtime generated code and a template signature of a plurality of templates representing authorized source creation modules that created the runtime generated code, the templates stored in a repository on a storage device; and triggering a security process to handle malicious code in the runtime generated code when no match is found. 2. The method of claim 1, wherein the template signature represents an authorized just in time (JIT) compiler. 3. The method of claim 2, wherein identifying the match between the signature data and the template signature comprises at least one of:
identifying an association between a first executable module called by the runtime generated code to invoke an operating system function, and the template representing the authorized JIT compiler, and identifying an association between a second executable module creating the runtime generated code and the template representing the authorized JIT compiler. 4. The method of claim 2, wherein the signature data comprises a predefined size of an area in the memory storing the runtime generated code. 5. The method of claim 2, wherein the signature data comprises a designation of a memory region storing the runtime generated code as read-only or no-access. 6. The method of claim 2, wherein the signature data comprises at least one code pattern. 7. The method of claim 6, wherein the at least one code pattern includes at least one member selected from the group consisting of: at least one predefined prolog at a start region of at least one function of the runtime generated code, at least one epilogue, and at least one magic operand value. 8. The method of claim 2, wherein the signature data comprises predefined control structures related to the JIT compiler at least one of at a start region and an end region of the runtime generated code. 9. The method of claim 8, wherein the predefined control structures include at least one of: a linked list at each of a plurality of different memory regions each storing a portion of the runtime generated code, and fields defining size and address of the respective memory region located after the respective linked list. 10. The method of claim 9, wherein the linked list is verified by traversing pointers of each memory region, and the fields are verified by correlating the values of the fields with operating system values. 11. The method of claim 2, wherein the signature data comprises an application associated with the runtime generated code to which the authorized JIT compiler is restricted. 12. The method of claim 1, wherein the template signature represents an authorized hook engine. 13. The method of claim 12, wherein the signature data includes identification that the runtime generated code is created by a hook engine, the identifying performed by at least one of:
emulating preexisting code at the prolog of a hooked module to reach outside code residing outside of the hooked module; and analyzing a stack trace related to the outside code to identify the runtime generated code by locating the position of the runtime generated code as appearing in the stack trace before the authorized hook engine executable that installed the hook. 14. The method of claim 12, wherein the signature data includes at least one member selected from the group consisting of: a predefined size of the memory area where the runtime generated code resides, at least one code pattern, predefined control structures at least at one of at a start portion and an end portion of the runtime generated code memory region, and an opcode signature calculated from assembly obtained by applying a disassemble program to the runtime generated code excluding mutable parameters. 15. The method of claim 14, wherein the at least one code pattern includes at least one member selected from the group consisting of: at least one predefined prolog at a start region of at least one function of the runtime generated code, at least one epilogue, and at least one magic operand value. 16. The method of claim 1, wherein the template signature represents an authorized executable compressor. 17. The method of claim 16, wherein the signature data includes at least one member selected from the group consisting of: size of a memory allocation according to a format of the decompressed executable file, a cryptographic hash function calculated over immutable portions of the executable file structure and code, and permissions on memory pages where the decompressed executable file resides. 18. The method of claim 17, further comprising verifying that contents of the memory at the base of the memory allocation is according to the format of the decompressed executable file by parsing contents of the memory allocation according to the format of the decompressed executable file, and checking that field values are logical and conform to the format. 19. A system for detection of runtime generated code containing malicious code, comprising:
a memory for storing code; a storage device for storing a repository of templates representing authorized; source creation modules that create runtime generated code; a program store storing code; and a processor coupled to the memory, the storage device, and the program store for implementing the stored code, the stored code comprising: stored code to receive an indication of at least one of the creation and the execution of runtime generated code in the memory, identify a match between signature data associated with the runtime generated code and a template signature of the repository; and trigger a security process to handle malicious code in the runtime generated code when no match is found. 20. A computer program product comprising a non-transitory computer readable storage medium storing program code thereon for implementation by a processor of a system for detection of runtime generated code containing malicious code, the program code comprising:
instructions to receive an indication of at least one of the creation and the execution of runtime generated code in a memory of a computer; instructions to identify a match between signature data associated with the runtime generated code and a template signature of a set of templates representing authorized source creation modules that create runtime generated code; and instructions to trigger a security process to handle malicious code in the runtime generated code when no match is found. | 2,400 |
8,809 | 8,809 | 15,188,766 | 2,482 | An example method of decoding video data includes obtaining, from a coded video bitstream and for a current block of the video data, an indication of an intra-prediction mode that identifies an initial predictive block; filtering, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines and unfiltered values of samples in the current line to generate filtered values for samples for the current line; and reconstructing, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block. | 1. A method of decoding video data, the method comprising:
obtaining, from a coded video bitstream and for a current block of the video data, an indication of an intra-prediction mode that identifies an initial predictive block; filtering, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and reconstructing, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block. 2. The method of claim 1, wherein each line of the plurality of lines comprises a same quantity of non-border samples, and wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each non-border sample of a respective line to generate filtered non-border samples for the respective line. 3. The method of claim 1, wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each sample of a respective line to generate filtered samples for the respective line. 4. The method of claim 1, wherein the filtering of the samples of the current line is further based on unfiltered samples in a following line of the plurality of lines of the initial predictive block. 5. The method of claim 1, wherein the filtering of the samples of the current line is further based on unfiltered samples in a plurality of preceding lines of the plurality of lines of the initial predictive block that includes the preceding line. 6. The method of claim 1, wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 7. The method of claim 1, wherein the current block of the video data is M by N samples, and wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 8. A method of encoding video data, the method comprising:
selecting, for a current block of the video data, an initial predictive block; filtering, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and encoding, in a coded video bitstream, an indication of an intra-prediction mode that identifies the initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the initial predictive block and the values of samples of the current block. 9. The method of claim 8, wherein each line of the plurality of lines comprises a same quantity of non-border samples, and wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each non-border sample of a respective line to generate filtered non-border samples for the respective line. 10. The method of claim 8, wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each sample of a respective line to generate filtered samples for the respective line. 11. The method of claim 8, wherein the filtering of the samples of the current line is further based on unfiltered samples in a following line of the plurality of lines of the initial predictive block. 12. The method of claim 8, wherein the filtering of the samples of the current line is further based on unfiltered samples in a plurality of preceding lines of the plurality of lines of the initial predictive block that includes the preceding line. 13. The method of claim 8, wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 14. The method of claim 8, wherein the current block of the video data is M by N samples, and wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 15. A device for encoding or decoding video data, the device comprising:
a memory configured to store a portion of the video data; and one or more processors configured to:
identify, for a current block of the video data, an initial predictive block;
filter, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and
reconstruct, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block. 16. The device of claim 15, wherein each line of the plurality of lines comprises a same quantity of non-border samples, and wherein, to filter samples in each respective line of the plurality of lines, the one or more processors are configured to:
filter, in parallel, each non-border sample of a respective line to generate filtered non-border samples for the respective line. 17. The device of claim 15, wherein, to filter samples in each respective line of the plurality of lines, the one or more processors are configured to:
filter, in parallel, each sample of a respective line to generate filtered samples for the respective line. 18. The device of claim 15, wherein the one or more processors are further configured to filter the samples of the current line based on unfiltered samples in a following line of the plurality of lines of the initial predictive block. 19. The device of claim 15, wherein the one or more processors are further configured to filter the samples of the current line based on unfiltered samples in a plurality of preceding lines of the plurality of lines of the initial predictive block that includes the preceding line. 20. The device of claim 15, wherein the one or more processors are configured to filter the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 21. The device of claim 15, wherein the current block of the video data is M by N samples, and wherein the one or more processors are configured to filter the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 22. The device of claim 15, wherein the one or more processors are further configured to:
obtain, from a coded video bitstream and for the current block of the video data, an indication of an intra-prediction mode that identifies the initial predictive block; and obtain, from the coded video bitstream, the residual data for the current block. 23. The device of claim 15, wherein the one or more processors are further configured to:
encode, in a coded video bitstream and for the current block of the video data, an indication of an intra-prediction mode that identifies the initial predictive block; and encode, in the coded video bitstream, the residual data for the current block. 24. The device of claim 15, further comprising a display configured to display the reconstructed block. 25. The device of claim 15, further comprising a camera configured to capture the video data. 26. The device of claim 15, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; or a wireless communication device. 27. A non-transitory computer-readable storage medium storing instructions that, when executed, cause one or more processors of a video encoding or decoding device to:
identify, for a current block of the video data, an initial predictive block; filter, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and reconstruct, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block. | An example method of decoding video data includes obtaining, from a coded video bitstream and for a current block of the video data, an indication of an intra-prediction mode that identifies an initial predictive block; filtering, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines and unfiltered values of samples in the current line to generate filtered values for samples for the current line; and reconstructing, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block.1. A method of decoding video data, the method comprising:
obtaining, from a coded video bitstream and for a current block of the video data, an indication of an intra-prediction mode that identifies an initial predictive block; filtering, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and reconstructing, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block. 2. The method of claim 1, wherein each line of the plurality of lines comprises a same quantity of non-border samples, and wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each non-border sample of a respective line to generate filtered non-border samples for the respective line. 3. The method of claim 1, wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each sample of a respective line to generate filtered samples for the respective line. 4. The method of claim 1, wherein the filtering of the samples of the current line is further based on unfiltered samples in a following line of the plurality of lines of the initial predictive block. 5. The method of claim 1, wherein the filtering of the samples of the current line is further based on unfiltered samples in a plurality of preceding lines of the plurality of lines of the initial predictive block that includes the preceding line. 6. The method of claim 1, wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 7. The method of claim 1, wherein the current block of the video data is M by N samples, and wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 8. A method of encoding video data, the method comprising:
selecting, for a current block of the video data, an initial predictive block; filtering, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and encoding, in a coded video bitstream, an indication of an intra-prediction mode that identifies the initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the initial predictive block and the values of samples of the current block. 9. The method of claim 8, wherein each line of the plurality of lines comprises a same quantity of non-border samples, and wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each non-border sample of a respective line to generate filtered non-border samples for the respective line. 10. The method of claim 8, wherein filtering samples in each respective line of the plurality of lines comprises:
filtering, in parallel, each sample of a respective line to generate filtered samples for the respective line. 11. The method of claim 8, wherein the filtering of the samples of the current line is further based on unfiltered samples in a following line of the plurality of lines of the initial predictive block. 12. The method of claim 8, wherein the filtering of the samples of the current line is further based on unfiltered samples in a plurality of preceding lines of the plurality of lines of the initial predictive block that includes the preceding line. 13. The method of claim 8, wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 14. The method of claim 8, wherein the current block of the video data is M by N samples, and wherein filtering the samples in the current line comprises filtering the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 15. A device for encoding or decoding video data, the device comprising:
a memory configured to store a portion of the video data; and one or more processors configured to:
identify, for a current block of the video data, an initial predictive block;
filter, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and
reconstruct, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block. 16. The device of claim 15, wherein each line of the plurality of lines comprises a same quantity of non-border samples, and wherein, to filter samples in each respective line of the plurality of lines, the one or more processors are configured to:
filter, in parallel, each non-border sample of a respective line to generate filtered non-border samples for the respective line. 17. The device of claim 15, wherein, to filter samples in each respective line of the plurality of lines, the one or more processors are configured to:
filter, in parallel, each sample of a respective line to generate filtered samples for the respective line. 18. The device of claim 15, wherein the one or more processors are further configured to filter the samples of the current line based on unfiltered samples in a following line of the plurality of lines of the initial predictive block. 19. The device of claim 15, wherein the one or more processors are further configured to filter the samples of the current line based on unfiltered samples in a plurality of preceding lines of the plurality of lines of the initial predictive block that includes the preceding line. 20. The device of claim 15, wherein the one or more processors are configured to filter the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
i
+
k
,
j
+
l
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 21. The device of claim 15, wherein the current block of the video data is M by N samples, and wherein the one or more processors are configured to filter the samples in the current line in accordance with the following equation where the plurality of lines comprises the plurality of rows:
q
[
i
,
j
]
=
∑
l
=
-
R
0
R
1
∑
k
=
1
R
2
a
·
q
[
i
-
k
,
j
+
l
]
+
∑
l
=
-
S
0
S
1
∑
k
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
or the following equation where the plurality of lines comprises the plurality of columns:
q
[
i
,
j
]
=
∑
k
=
-
R
0
R
1
∑
l
=
1
R
2
a
·
q
[
i
+
k
,
j
-
l
]
+
∑
k
=
-
S
0
S
1
∑
l
=
0
S
2
b
·
p
[
min
(
i
+
k
,
M
-
1
)
,
min
(
j
+
l
,
N
-
1
)
]
where q[i,j] represents the filtered sample at position [i,j]; p[i,j] represents the unfiltered sample at position [i,j]; a and b are filter parameters; R0, R1, and R2 define which filtered samples are used to generate the filtered sample at position [i,j]; and S0, S1, and S2 define which unfiltered samples are used to generate the filtered sample at position [i,j]. 22. The device of claim 15, wherein the one or more processors are further configured to:
obtain, from a coded video bitstream and for the current block of the video data, an indication of an intra-prediction mode that identifies the initial predictive block; and obtain, from the coded video bitstream, the residual data for the current block. 23. The device of claim 15, wherein the one or more processors are further configured to:
encode, in a coded video bitstream and for the current block of the video data, an indication of an intra-prediction mode that identifies the initial predictive block; and encode, in the coded video bitstream, the residual data for the current block. 24. The device of claim 15, further comprising a display configured to display the reconstructed block. 25. The device of claim 15, further comprising a camera configured to capture the video data. 26. The device of claim 15, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; or a wireless communication device. 27. A non-transitory computer-readable storage medium storing instructions that, when executed, cause one or more processors of a video encoding or decoding device to:
identify, for a current block of the video data, an initial predictive block; filter, in parallel, samples in a current line of a plurality of lines of the initial predictive block based on filtered values of samples in a preceding line of the plurality of lines of the initial predictive block and unfiltered values of samples in the current line to generate filtered values for samples for the current line of the initial predictive block, wherein the plurality of lines comprises either a plurality of rows or a plurality of columns of the video data; and reconstruct, using intra prediction, values of samples of the current block based on the filtered values of the samples of the current initial predictive block and residual data for the current block that represents a difference between the filtered values of the samples of the current initial predictive block and the values of samples of the current block. | 2,400 |
8,810 | 8,810 | 14,610,534 | 2,435 | Methods and systems are described whereby a server can forward a request from a device behind a NAT router to a system to determine if the request is suspicious. A server can receive a message via a network device, such as a NAT router, disposed at a location. The message can originate from one of a plurality of computings device located downstream of the network device. The server can determine that the message originated from a compromised device and transmit a signal to facilitate execution of a first process on the computing devices located downstream from the compromised device, wherein, upon execution, the first process is configured to compare information located in a local storage of the computing device with a predetermined list of domains. | 1. A method comprising:
receiving a message via a network device disposed at a location, wherein the message originated from a first computing device located downstream of the network device; determining that the message originated from a compromised device; and transmitting a signal to facilitate execution of a first process on the first computing device, wherein, upon execution, the first process is configured to compare information located in a local storage of the first computing device with a predetermined list of domains. 2. The method of claim 1, wherein transmitting the signal to facilitate execution of the first process comprises one or more of calling a user, causing a physical message to be sent to a user, causing a second computing device to communicate with a third computing device, causing a browser to be directed to an address comprising a message, using a network enabled application, causing a message to be displayed in a browser, sending a user an Short Message Service (SMS) message, sending a user a fax, and sending a user an electronic mail (e-mail) message. 3. The method of claim 1, wherein the network device is a network address translation router. 4. The method of claim 1, wherein the first process is configured to detect that the first computing device is compromised based on a match between the information located in the local storage and an item in the predetermined list of domains, and wherein the first process takes action in response to said detection that the first computing device is compromised. 5. The method of claim 4, wherein the action taken comprises requesting computer-executable code for performing a second process. 6. The method of claim 1, wherein the message is an e-mail message. 7. The method of claim 1, wherein determining that the message originated from the compromised device is based at least on recognizing a pattern. 8. The method of claim 7, wherein the pattern comprises accessing an electronic file plurality of times during a threshold window of time. 9. The method of claim 3, wherein transmitting the signal to facilitate execution of the first process on the first computing device comprises transmitting a first response signal to the network address translation router, wherein the first response signal causes the network address translation router to transmit a subsequent response signal to the first computing device. 10. A method comprising:
receiving a message indicating that one or more of a plurality of devices is compromised; and transmitting a signal to facilitate execution of a first process on the one or more of the plurality of devices, wherein, upon execution on the one or more of the plurality of devices, the first process is configured to compare information located in a local storage of the one or more of the plurality of devices with a predetermined list of domains. 11. The method of claim 10, wherein the first process is configured to initiate action upon determining that the one or more of the plurality of devices is compromised. 12. The method of claim 11, wherein the action initiated is configured to request computer-executable code for performing a second process. 13. The method of claim 10, wherein transmitting the signal to facilitate execution of the first process on the one or more of the plurality of devices comprises transmitting a signal to facilitate execution of the first process on all of the plurality of devices. 14. A method comprising:
receiving a notification that a computing device on a shared cork has been compromised; requesting computer-executable code for performing a first process; and receiving computer-executable code for performing the first process,wherein, upon execution, the first process is configured to compare information located in a local storage with a predetermined list of domains. 15. The method of claim 14, wherein the first process is configured to detect an issue if the information in the local storage matches an item in the predetermined list of domains. 16. The method of claim 15, wherein the first process is configured to initiate action in response to the first process detecting an issue. 17. The method of claim 16, wherein the initiated action is configured to request computer-executable code for performing a second process. 18. The method of claim 14, wherein the notification that the computing device on the shared network has been compromised is based on an e-mail message created by the computing device. 19. The method of claim 14, wherein receiving the notification that the computing device on the shared network has been compromised is based at least on recognizing a pattern. 20. The method of claim 19, wherein the pattern comprises accessing an electronic file a plurality of times during a threshold window of time. | Methods and systems are described whereby a server can forward a request from a device behind a NAT router to a system to determine if the request is suspicious. A server can receive a message via a network device, such as a NAT router, disposed at a location. The message can originate from one of a plurality of computings device located downstream of the network device. The server can determine that the message originated from a compromised device and transmit a signal to facilitate execution of a first process on the computing devices located downstream from the compromised device, wherein, upon execution, the first process is configured to compare information located in a local storage of the computing device with a predetermined list of domains.1. A method comprising:
receiving a message via a network device disposed at a location, wherein the message originated from a first computing device located downstream of the network device; determining that the message originated from a compromised device; and transmitting a signal to facilitate execution of a first process on the first computing device, wherein, upon execution, the first process is configured to compare information located in a local storage of the first computing device with a predetermined list of domains. 2. The method of claim 1, wherein transmitting the signal to facilitate execution of the first process comprises one or more of calling a user, causing a physical message to be sent to a user, causing a second computing device to communicate with a third computing device, causing a browser to be directed to an address comprising a message, using a network enabled application, causing a message to be displayed in a browser, sending a user an Short Message Service (SMS) message, sending a user a fax, and sending a user an electronic mail (e-mail) message. 3. The method of claim 1, wherein the network device is a network address translation router. 4. The method of claim 1, wherein the first process is configured to detect that the first computing device is compromised based on a match between the information located in the local storage and an item in the predetermined list of domains, and wherein the first process takes action in response to said detection that the first computing device is compromised. 5. The method of claim 4, wherein the action taken comprises requesting computer-executable code for performing a second process. 6. The method of claim 1, wherein the message is an e-mail message. 7. The method of claim 1, wherein determining that the message originated from the compromised device is based at least on recognizing a pattern. 8. The method of claim 7, wherein the pattern comprises accessing an electronic file plurality of times during a threshold window of time. 9. The method of claim 3, wherein transmitting the signal to facilitate execution of the first process on the first computing device comprises transmitting a first response signal to the network address translation router, wherein the first response signal causes the network address translation router to transmit a subsequent response signal to the first computing device. 10. A method comprising:
receiving a message indicating that one or more of a plurality of devices is compromised; and transmitting a signal to facilitate execution of a first process on the one or more of the plurality of devices, wherein, upon execution on the one or more of the plurality of devices, the first process is configured to compare information located in a local storage of the one or more of the plurality of devices with a predetermined list of domains. 11. The method of claim 10, wherein the first process is configured to initiate action upon determining that the one or more of the plurality of devices is compromised. 12. The method of claim 11, wherein the action initiated is configured to request computer-executable code for performing a second process. 13. The method of claim 10, wherein transmitting the signal to facilitate execution of the first process on the one or more of the plurality of devices comprises transmitting a signal to facilitate execution of the first process on all of the plurality of devices. 14. A method comprising:
receiving a notification that a computing device on a shared cork has been compromised; requesting computer-executable code for performing a first process; and receiving computer-executable code for performing the first process,wherein, upon execution, the first process is configured to compare information located in a local storage with a predetermined list of domains. 15. The method of claim 14, wherein the first process is configured to detect an issue if the information in the local storage matches an item in the predetermined list of domains. 16. The method of claim 15, wherein the first process is configured to initiate action in response to the first process detecting an issue. 17. The method of claim 16, wherein the initiated action is configured to request computer-executable code for performing a second process. 18. The method of claim 14, wherein the notification that the computing device on the shared network has been compromised is based on an e-mail message created by the computing device. 19. The method of claim 14, wherein receiving the notification that the computing device on the shared network has been compromised is based at least on recognizing a pattern. 20. The method of claim 19, wherein the pattern comprises accessing an electronic file a plurality of times during a threshold window of time. | 2,400 |
8,811 | 8,811 | 15,354,028 | 2,459 | The user-data field specified in the MPEG and AVC transport stream standard is used to embed HTML-5 and/or Javascript for rendering a variety of content including subtitles, 2D, and 3D graphics, and interactive content including advertisements, shopping, and games. Also, high quality vector graphics can be rendered on the screen that scale to any resolution. Finally, the content can allow for user input and response, and can be applied for interactive content, entertainment, and games. | 1. A device comprising:
at least one computer medium that is not a transitory signal and that comprises instructions executable by at least one processor to: enter into a format_identifier field of a user-data element a 32-bit descriptor indicating that the user-data element contains information pertaining hypertext markup language 5 (HTML5) and/or Javascript content; embed into the user-data element the information pertaining to the HTML5 and/or Javascript content; and associate the user-data element with a Moving Picture Expert Group (MPEG) and/or Advanced Video Coding (AVC) transport stream (TS). 2. The device of claim 1, wherein the format_identifier is obtained from a Registration Authority. 3. The device of claim 1, wherein the information pertaining to the HTML5 and/or Javascript content includes a network link to the HTML5 and/or Javascript content. 4. The device of claim 1, wherein the information pertaining to the HTML5 and/or Javascript content includes the HTML5 and/or Javascript content. 5. The device of claim 1, wherein the HTML5 and/or Javascript content includes subtitles. 6. The device of claim 1, wherein the HTML5 and/or Javascript content includes graphics. 7. The device of claim 1, wherein the HTML5 and/or Javascript content includes interactive content. 8. The device of claim 1, wherein the HTML5 and/or Javascript content includes at least one advertisement. 9. The device of claim 1, wherein the HTML5 and/or Javascript content includes at least one computer game. 10. The device of claim 1, wherein the HTML5 and/or Javascript content includes an electronic program guide (EPG). 11. The device of claim 1, wherein the instructions are executable to transmit the TS. 12. The device of claim 1, comprising the at least one processor. 13. An assembly comprising:
at least one processor; at least one display configured to be controlled by the processor; and at least one computer storage accessible to the processor and including instructions executable by the processor to: receive a Moving Picture Expert Group (MPEG) and/or Advanced Video Coding (AVC) transport stream; access a descriptor in a format_identifier field of a user-data element in the TS, the descriptor indicating that the user-data element contains information related to hypertext markup language 5 (HTML5) and/or Javascript content; and render, on the display, the content using the information. 14. The assembly of claim 13, wherein the information pertaining to the HTML5 and/or Javascript content includes a network link to the HTML5 and/or Javascript content. 15. The assembly of claim 13, wherein the information pertaining to the HTML5 and/or Javascript content includes the HTML5 and/or Javascript content. 16. A method comprising:
entering into a format_identifier field of a user-data element a descriptor indicating that the user-data element contains information pertaining hypertext markup language 5 (HTML5) and/or Javascript content; embedding into the user-data element the information pertaining to the HTML5 and/or Javascript content; and associating the user-data element with a Moving Picture Expert Group (MPEG) and/or Advanced Video Coding (AVC) transport stream (TS). 17. The method of claim 16, wherein the information pertaining to the HTML5 and/or Javascript content includes a network link to the HTML5 and/or Javascript content. 18. The method of claim 16, wherein the information pertaining to the HTML5 and/or Javascript content includes the HTML5 and/or Javascript content. 19. The method of claim 16, comprising transmitting the TS. | The user-data field specified in the MPEG and AVC transport stream standard is used to embed HTML-5 and/or Javascript for rendering a variety of content including subtitles, 2D, and 3D graphics, and interactive content including advertisements, shopping, and games. Also, high quality vector graphics can be rendered on the screen that scale to any resolution. Finally, the content can allow for user input and response, and can be applied for interactive content, entertainment, and games.1. A device comprising:
at least one computer medium that is not a transitory signal and that comprises instructions executable by at least one processor to: enter into a format_identifier field of a user-data element a 32-bit descriptor indicating that the user-data element contains information pertaining hypertext markup language 5 (HTML5) and/or Javascript content; embed into the user-data element the information pertaining to the HTML5 and/or Javascript content; and associate the user-data element with a Moving Picture Expert Group (MPEG) and/or Advanced Video Coding (AVC) transport stream (TS). 2. The device of claim 1, wherein the format_identifier is obtained from a Registration Authority. 3. The device of claim 1, wherein the information pertaining to the HTML5 and/or Javascript content includes a network link to the HTML5 and/or Javascript content. 4. The device of claim 1, wherein the information pertaining to the HTML5 and/or Javascript content includes the HTML5 and/or Javascript content. 5. The device of claim 1, wherein the HTML5 and/or Javascript content includes subtitles. 6. The device of claim 1, wherein the HTML5 and/or Javascript content includes graphics. 7. The device of claim 1, wherein the HTML5 and/or Javascript content includes interactive content. 8. The device of claim 1, wherein the HTML5 and/or Javascript content includes at least one advertisement. 9. The device of claim 1, wherein the HTML5 and/or Javascript content includes at least one computer game. 10. The device of claim 1, wherein the HTML5 and/or Javascript content includes an electronic program guide (EPG). 11. The device of claim 1, wherein the instructions are executable to transmit the TS. 12. The device of claim 1, comprising the at least one processor. 13. An assembly comprising:
at least one processor; at least one display configured to be controlled by the processor; and at least one computer storage accessible to the processor and including instructions executable by the processor to: receive a Moving Picture Expert Group (MPEG) and/or Advanced Video Coding (AVC) transport stream; access a descriptor in a format_identifier field of a user-data element in the TS, the descriptor indicating that the user-data element contains information related to hypertext markup language 5 (HTML5) and/or Javascript content; and render, on the display, the content using the information. 14. The assembly of claim 13, wherein the information pertaining to the HTML5 and/or Javascript content includes a network link to the HTML5 and/or Javascript content. 15. The assembly of claim 13, wherein the information pertaining to the HTML5 and/or Javascript content includes the HTML5 and/or Javascript content. 16. A method comprising:
entering into a format_identifier field of a user-data element a descriptor indicating that the user-data element contains information pertaining hypertext markup language 5 (HTML5) and/or Javascript content; embedding into the user-data element the information pertaining to the HTML5 and/or Javascript content; and associating the user-data element with a Moving Picture Expert Group (MPEG) and/or Advanced Video Coding (AVC) transport stream (TS). 17. The method of claim 16, wherein the information pertaining to the HTML5 and/or Javascript content includes a network link to the HTML5 and/or Javascript content. 18. The method of claim 16, wherein the information pertaining to the HTML5 and/or Javascript content includes the HTML5 and/or Javascript content. 19. The method of claim 16, comprising transmitting the TS. | 2,400 |
8,812 | 8,812 | 14,161,523 | 2,483 | Methods, systems and Devices for operating a surveillance system are described herein. One method includes determining a plurality of parameters of a video camera installed at a particular location in a facility based on a projection of an image captured by the video camera onto a virtual image captured by a virtual video camera placed at a virtual location in a building information model of the facility corresponding to the particular location, determining a two-dimensional geometry of the facility based on the building information model, wherein the geometry includes a plurality of spaces, determining a coverage of the video camera based on a portion of the plurality of parameters and the geometry, determining which spaces of the plurality of spaces are included in the coverage, and associating each space included in the coverage with a respective portion of the image. | 1. A method for operating a surveillance system, comprising:
determining a plurality of parameters of a video camera installed at a particular location in a facility based on a projection of an image captured by the video camera onto a virtual image captured by a virtual video camera placed at a virtual location in a building information model of the facility corresponding to the particular location; determining a two-dimensional geometry of the facility based on the building information model, wherein the geometry includes a plurality of spaces; determining a coverage of the video camera based on a portion of the plurality of parameters and the geometry; determining which spaces of the plurality of spaces are included in the coverage; and associating each space included in the coverage with a respective portion of the image. 2. The method of claim 1, wherein the particular location includes a geographic position identified by geographic coordinates. 3. The method of claim 1, wherein the method includes determining the virtual location to place the virtual video camera based on installation information associated with the video camera. 4. The method of claim 1, wherein the plurality of camera parameters include a position of the video camera, a resolution of the video camera, a pan setting of the video camera, a tilt setting of the video camera, a focal length of the video camera, an aspect ratio of the video camera, and a width of the image. 5. The method of claim 1, wherein determining the coverage of the video camera includes a Boolean operation between a potential area of coverage of the video camera and a frustum of the video camera. 6. The method of claim 1, wherein associating each space included in the coverage with a respective portion of the image includes projecting a respective polygon associated with each space included in the coverage into a coordinate system of the image. 7. The method of claim 6, wherein the method includes projecting the respective polygon associated with each space included in the coverage into the coordinate system of the image using a transform matrix. 8. The method of claim 1, wherein the method includes determining a particular space in which a person is located based on relationship information associating the image with each space included in the coverage. 9. A system, comprising:
a computing device; and a plurality of video cameras, each installed at a respective location in a facility and configured to capture a respective video image of a respective portion of the facility;
wherein the computing device is configured to:
receive the video images;
determine a respective number of spaces of the facility included in each of the received video images based on information relating each of the video images with a building information model of the facility; and
determine a particular space of the facility in which a person is present based on a location of the person in at least one of the received video images 10. The system of claim 9, wherein the computing device is configured to:
determine a space connected to the particular space; and determine at least one of the plurality of video cameras covering the space connected to the particular space. 11. The system of claim 9, wherein the computing device is configured to:
determine a plurality of spaces connected to the particular space; determine at least one of the plurality of video cameras covering each of the plurality of spaces connected to the particular space; and provide a respective video image captured by the at least one of the plurality of video cameras to a user. 12. The system of claim 9, wherein the computing device is configured to provide a notification responsive to a determination that the particular space of the facility in which the person is present is a restricted location. 13. The system of claim 9, wherein the computing device is configured to determine another space of the facility toward which the person is moving. 14. The system of claim 13, wherein the computing device is configured to provide a video image associated with at least one of the plurality of video cameras covering the other space of the facility towards which the person is moving. 15. The system of claim 13, wherein the computing device is configured to lock a door associated with the other space of the facility towards which the person is moving. 16. The system of claim 9, wherein the computing device is configured to manipulate an orientation of each of the plurality of video cameras. 17. A non-transitory computer-readable medium having instructions stored thereon executable by a processor to:
receive a video image captured by a video camera installed at a particular location in a facility; place a virtual video camera in a building information model of the facility at a virtual location associated with the particular location; determine a virtual video image based on the placement of the virtual video camera; project the video image onto the virtual video image; allow a user to align the projected video image with the virtual video image; determine a plurality of parameters of the video camera based on the aligned projected video image and virtual video image; determine a two-dimensional geometry of the facility based on the building information model, wherein the geometry includes a plurality of spaces; determine a coverage of the video camera based on a portion of the plurality of parameters and the geometry; determine a subset of the plurality of spaces included in the coverage; and associate each space of the subset with a respective portion of the video image. 18. The computer-readable medium of claim 17, wherein the instructions are executable by the processor to display the projected video image as partially transparent. 19. The computer-readable medium of claim 17, wherein the instructions are executable by the processor to:
provide a plurality of widgets associated with the projected video image; and allow the user to align the projected video image with the virtual video image using the plurality of widgets. 20. The computer readable medium of claim 17, wherein the instructions are executable by the processor to provide a notification responsive to a correct alignment of the projected video image with the virtual video image. | Methods, systems and Devices for operating a surveillance system are described herein. One method includes determining a plurality of parameters of a video camera installed at a particular location in a facility based on a projection of an image captured by the video camera onto a virtual image captured by a virtual video camera placed at a virtual location in a building information model of the facility corresponding to the particular location, determining a two-dimensional geometry of the facility based on the building information model, wherein the geometry includes a plurality of spaces, determining a coverage of the video camera based on a portion of the plurality of parameters and the geometry, determining which spaces of the plurality of spaces are included in the coverage, and associating each space included in the coverage with a respective portion of the image.1. A method for operating a surveillance system, comprising:
determining a plurality of parameters of a video camera installed at a particular location in a facility based on a projection of an image captured by the video camera onto a virtual image captured by a virtual video camera placed at a virtual location in a building information model of the facility corresponding to the particular location; determining a two-dimensional geometry of the facility based on the building information model, wherein the geometry includes a plurality of spaces; determining a coverage of the video camera based on a portion of the plurality of parameters and the geometry; determining which spaces of the plurality of spaces are included in the coverage; and associating each space included in the coverage with a respective portion of the image. 2. The method of claim 1, wherein the particular location includes a geographic position identified by geographic coordinates. 3. The method of claim 1, wherein the method includes determining the virtual location to place the virtual video camera based on installation information associated with the video camera. 4. The method of claim 1, wherein the plurality of camera parameters include a position of the video camera, a resolution of the video camera, a pan setting of the video camera, a tilt setting of the video camera, a focal length of the video camera, an aspect ratio of the video camera, and a width of the image. 5. The method of claim 1, wherein determining the coverage of the video camera includes a Boolean operation between a potential area of coverage of the video camera and a frustum of the video camera. 6. The method of claim 1, wherein associating each space included in the coverage with a respective portion of the image includes projecting a respective polygon associated with each space included in the coverage into a coordinate system of the image. 7. The method of claim 6, wherein the method includes projecting the respective polygon associated with each space included in the coverage into the coordinate system of the image using a transform matrix. 8. The method of claim 1, wherein the method includes determining a particular space in which a person is located based on relationship information associating the image with each space included in the coverage. 9. A system, comprising:
a computing device; and a plurality of video cameras, each installed at a respective location in a facility and configured to capture a respective video image of a respective portion of the facility;
wherein the computing device is configured to:
receive the video images;
determine a respective number of spaces of the facility included in each of the received video images based on information relating each of the video images with a building information model of the facility; and
determine a particular space of the facility in which a person is present based on a location of the person in at least one of the received video images 10. The system of claim 9, wherein the computing device is configured to:
determine a space connected to the particular space; and determine at least one of the plurality of video cameras covering the space connected to the particular space. 11. The system of claim 9, wherein the computing device is configured to:
determine a plurality of spaces connected to the particular space; determine at least one of the plurality of video cameras covering each of the plurality of spaces connected to the particular space; and provide a respective video image captured by the at least one of the plurality of video cameras to a user. 12. The system of claim 9, wherein the computing device is configured to provide a notification responsive to a determination that the particular space of the facility in which the person is present is a restricted location. 13. The system of claim 9, wherein the computing device is configured to determine another space of the facility toward which the person is moving. 14. The system of claim 13, wherein the computing device is configured to provide a video image associated with at least one of the plurality of video cameras covering the other space of the facility towards which the person is moving. 15. The system of claim 13, wherein the computing device is configured to lock a door associated with the other space of the facility towards which the person is moving. 16. The system of claim 9, wherein the computing device is configured to manipulate an orientation of each of the plurality of video cameras. 17. A non-transitory computer-readable medium having instructions stored thereon executable by a processor to:
receive a video image captured by a video camera installed at a particular location in a facility; place a virtual video camera in a building information model of the facility at a virtual location associated with the particular location; determine a virtual video image based on the placement of the virtual video camera; project the video image onto the virtual video image; allow a user to align the projected video image with the virtual video image; determine a plurality of parameters of the video camera based on the aligned projected video image and virtual video image; determine a two-dimensional geometry of the facility based on the building information model, wherein the geometry includes a plurality of spaces; determine a coverage of the video camera based on a portion of the plurality of parameters and the geometry; determine a subset of the plurality of spaces included in the coverage; and associate each space of the subset with a respective portion of the video image. 18. The computer-readable medium of claim 17, wherein the instructions are executable by the processor to display the projected video image as partially transparent. 19. The computer-readable medium of claim 17, wherein the instructions are executable by the processor to:
provide a plurality of widgets associated with the projected video image; and allow the user to align the projected video image with the virtual video image using the plurality of widgets. 20. The computer readable medium of claim 17, wherein the instructions are executable by the processor to provide a notification responsive to a correct alignment of the projected video image with the virtual video image. | 2,400 |
8,813 | 8,813 | 14,689,527 | 2,419 | A camera assembly includes a housing. A camera is mounted to the housing. A cover is disposed over the camera. The cover has a variable opacity. When the camera is being used, such as for authentication, the cover is substantially transparent. When the camera is not being used, the cover is substantially opaque, to reassure the user's sense of privacy. | 1. A camera assembly comprising:
a housing; a camera mounted to the housing; and a cover disposed over the camera, the cover having a variable opacity. 2. The camera assembly of claim 1 wherein the cover has a first mode in which the cover is substantially transparent and a second mode in which the cover is substantially opaque. 3. The camera assembly of claim 1 wherein the camera is part of an authentication system installed in a vehicle. 4. The camera assembly of claim 1 further including at least one position sensor within the housing. 5. The camera assembly of claim 4 wherein the at least one position sensor includes a gps receiver. 6. The camera assembly of claim 4 further including a processor within the housing, the processor receiving position information from the at least one position sensor and digital image information from the camera. 7. The camera assembly of claim 6 wherein the processor is programmed to provide navigation instructions based upon the position information. 8. The camera system of claim 1 wherein the cover is electrochromatic. 9. An authentication system comprising:
a housing installed in a vehicle; at least one position sensor; a camera mounted to the housing; a variable opacity cover mounted over the camera; and a processor within the housing, the processor receiving position information from the at least one position sensor, the processor receiving the image from the camera, the processor programmed to authenticate operation of the vehicle based upon the image of the occupant, the processor controlling the opacity of the cover. 9. The authentication system of claim 8 wherein the at least one position sensor includes a gps receiver. 10. The authentication system of claim 9 wherein the processor is programmed to provide navigation instructions based upon the position information. 11. A method for taking an image in a vehicle including the steps of:
a) presenting an object to a camera in a housing in a vehicle while the camera is in a first position relative to the housing; b) causing the camera to take an image of the object; and c) after said steps a) and b), increasing an opacity of a cover disposed in front of the camera. 12. The method of claim 11 wherein step c) includes the step of increasing the opacity to substantially opaque. | A camera assembly includes a housing. A camera is mounted to the housing. A cover is disposed over the camera. The cover has a variable opacity. When the camera is being used, such as for authentication, the cover is substantially transparent. When the camera is not being used, the cover is substantially opaque, to reassure the user's sense of privacy.1. A camera assembly comprising:
a housing; a camera mounted to the housing; and a cover disposed over the camera, the cover having a variable opacity. 2. The camera assembly of claim 1 wherein the cover has a first mode in which the cover is substantially transparent and a second mode in which the cover is substantially opaque. 3. The camera assembly of claim 1 wherein the camera is part of an authentication system installed in a vehicle. 4. The camera assembly of claim 1 further including at least one position sensor within the housing. 5. The camera assembly of claim 4 wherein the at least one position sensor includes a gps receiver. 6. The camera assembly of claim 4 further including a processor within the housing, the processor receiving position information from the at least one position sensor and digital image information from the camera. 7. The camera assembly of claim 6 wherein the processor is programmed to provide navigation instructions based upon the position information. 8. The camera system of claim 1 wherein the cover is electrochromatic. 9. An authentication system comprising:
a housing installed in a vehicle; at least one position sensor; a camera mounted to the housing; a variable opacity cover mounted over the camera; and a processor within the housing, the processor receiving position information from the at least one position sensor, the processor receiving the image from the camera, the processor programmed to authenticate operation of the vehicle based upon the image of the occupant, the processor controlling the opacity of the cover. 9. The authentication system of claim 8 wherein the at least one position sensor includes a gps receiver. 10. The authentication system of claim 9 wherein the processor is programmed to provide navigation instructions based upon the position information. 11. A method for taking an image in a vehicle including the steps of:
a) presenting an object to a camera in a housing in a vehicle while the camera is in a first position relative to the housing; b) causing the camera to take an image of the object; and c) after said steps a) and b), increasing an opacity of a cover disposed in front of the camera. 12. The method of claim 11 wherein step c) includes the step of increasing the opacity to substantially opaque. | 2,400 |
8,814 | 8,814 | 16,053,409 | 2,437 | Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for reducing latency in network communications and data presentation. In one aspect, a user session is initiated in which data related to an account is presented to the user. A user group to which the given user has been assigned is identified. A first dataset related to the account is selected based on the user group. A second dataset related to the account is selected based on types of data previously requested by various other users in the user group. A user interface for the account is updated to present at least a portion of the first dataset. Latency in updating the user interface is reduced when presenting additional portions of the first dataset or the second dataset by providing, to the client device, the second dataset prior to receiving a request for the second dataset. | 1. A method performed by data processing apparatus, the method comprising:
generating, by the data processing apparatus and for presentation on a client device, a visualization of an initial dashboard user interface that includes multiple different display cards that provide different reports for a given online account, wherein the multiple different display cards present different types of data in a same user interface; selecting, by the data processing apparatus, a set of data for a different display card that is not included in the initial dashboard user interface; and reducing latency for presenting an updated dashboard user interface at the client device during a same user session in which the initial dashboard user interface is displayed at the client device by pre-caching, at the client device, the set of data for the different display card that is not included in the initial dashboard, wherein the pre-caching is performed prior to a request from the client device to present the different display card and while the initial dashboard user interface is displayed at the client device during the user session; detecting a trigger to update the pre-cached set of data for the different display card; determining, in response to detecting the trigger, whether to update the pre-cached set of data for the different display card, including:
updating the pre-cached set of data for the different display card when an analysis indicates that the pre-cached set of data should be updated; and
waiting for another trigger before updating the pre-cached set of data for the different display card when the analysis indicates that the pre-cached set of data should not be updated. 2. The method of claim 1, wherein the trigger to update the pre-cached set of data for the different display card is based on an amount of time that has elapsed since data was transmitted to the client device for storage in a cache of the client device that is at least a threshold amount of time. 3. The method of claim 1, wherein the trigger to update the pre-cached set of data for the different display card is based on a value of the data stored in a cache on the client device that is a different value than a current value of the data. 4. The method of claim 3, wherein the trigger to update the pre-cached set of data for the different display card is based on a threshold number of data items of the pre-cached set of data that have changed from a previous update to the pre-cached set of data in the cache. 5. The method of claim 1, wherein determining, whether to update the pre-cached set of data for the different display card is based on i) a type of data stored in a cache on the client device, ii) an amount of data stored in the cache on the client device, or iii) a combination thereof. 6. The method of claim 1, wherein updating the pre-cached set of data for the different display card includes replacing previously cached data with updated data. 7. The method of claim 1, further comprising:
after pre-caching the set of data for the different display card, receiving the request to present the different display card from the client device; and generating, by the data processing apparatus, a visualization of the updated dashboard user interface that includes the different display card that was not included in the initial dashboard user interface and that was pre-cached at the client device prior to the request by the given user to present the different display card. 8. A system, comprising:
a first front-end server, including one or more processors, that generates, for presentation on a client device, a visualization of an initial dashboard user interface that includes multiple different display cards that provide different reports for a given online account, wherein the multiple different display cards present different types of data in a same user interface; and a second front-end server, including one or more processors, that selects a set of data for a different display card that is not included in the initial dashboard user interface, reduces latency for presenting an updated dashboard user interface at the client device during a same user session in which the initial dashboard user interface is displayed at the client device by pre-caching, at the client device, the set of data for the different display card that is not included in the initial dashboard, wherein the pre-caching is performed prior to a request from the client device to present the different display card and while the initial dashboard user interface is displayed at the client device during the user session, and detects a trigger to update the pre-cached set of data for the different display card, determines, in response to detecting the trigger, whether to update the pre-cached set of data for the different display card, including:
updating the pre-cached set of data for the different display card when an analysis indicates that the pre-cached set of data should be updated; and
waiting for another trigger before updating the pre-cached set of data for the different display card when the analysis indicates that the pre-cached set of data should not be updated. 9. The system of claim 8, wherein the trigger to update the pre-cached set of data for the different display card is based on an amount of time that has elapsed since data was transmitted to the client device for storage in a cache of the client device that is at least a threshold amount of time. 10. The system of claim 8, wherein the trigger to update the pre-cached set of data for the different display card is based on a value of the data stored in a cache on the client device that is a different value than a current value of the data. 11. The system of claim 10, wherein the trigger to update the pre-cached set of data for the different display card is based on a threshold number of data items of the pre-cached set of data that have changed from a previous update to the pre-cached set of data in the cache. 12. The system of claim 8, wherein determining, whether to update the pre-cached set of data for the different display card is based on i) a type of data stored in a cache on the client device, ii) an amount of data stored in the cache on the client device, or iii) a combination thereof. 13. The system of claim 8, wherein updating the pre-cached set of data for the different display card includes replacing previously cached data with updated data. 14. The system of claim 8, further comprising:
after pre-caching the set of data for the different display card, receiving the request to present the different display card from the client device; and generating, by the data processing apparatus, a visualization of the updated dashboard user interface that includes the different display card that was not included in the initial dashboard user interface and that was pre-cached at the client device prior to the request by the given user to present the different display card. 15. A non-transitory computer storage medium encoded with a computer program, the program comprising instructions that when executed by one or more data processing apparatus cause the data processing apparatus to perform operations comprising:
generating, by the data processing apparatus and for presentation on a client device, a visualization of an initial dashboard user interface that includes multiple different display cards that provide different reports for a given online account, wherein the multiple different display cards present different types of data in a same user interface; selecting, by the data processing apparatus, a set of data for a different display card that is not included in the initial dashboard user interface; and reducing latency for presenting an updated dashboard user interface at the client device during a same user session in which the initial dashboard user interface is displayed at the client device by pre-caching, at the client device, the set of data for the different display card that is not included in the initial dashboard, wherein the pre-caching is performed prior to a request from the client device to present the different display card and while the initial dashboard user interface is displayed at the client device during the user session; detecting a trigger to update the pre-cached set of data for the different display card; determining, in response to detecting the trigger, whether to update the pre-cached set of data for the different display card, including:
updating the pre-cached set of data for the different display card when an analysis indicates that the pre-cached set of data should be updated; and
waiting for another trigger before updating the pre-cached set of data for the different display card when the analysis indicates that the pre-cached set of data should not be updated. 16. The storage medium of claim 15, wherein the trigger to update the pre-cached set of data for the different display card is based on an amount of time that has elapsed since data was transmitted to the client device for storage in a cache of the client device that is at least a threshold amount of time. 17. The storage medium of claim 15, wherein the trigger to update the pre-cached set of data for the different display card is based on a value of the data stored in a cache on the client device that is a different value than a current value of the data. 18. The storage medium of claim 17, wherein the trigger to update the pre-cached set of data for the different display card is based on a threshold number of data items of the pre-cached set of data that have changed from a previous update to the pre-cached set of data in the cache. 19. The storage medium of claim 15, wherein determining, whether to update the pre-cached set of data for the different display card is based on i) a type of data stored in a cache on the client device, ii) an amount of data stored in the cache on the client device, or iii) a combination thereof. 20. The system of claim 15, further comprising:
after pre-caching the set of data for the different display card, receiving the request to present the different display card from the client device; and generating, by the data processing apparatus, a visualization of the updated dashboard user interface that includes the different display card that was not included in the initial dashboard user interface and that was pre-cached at the client device prior to the request by the given user to present the different display card. | Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for reducing latency in network communications and data presentation. In one aspect, a user session is initiated in which data related to an account is presented to the user. A user group to which the given user has been assigned is identified. A first dataset related to the account is selected based on the user group. A second dataset related to the account is selected based on types of data previously requested by various other users in the user group. A user interface for the account is updated to present at least a portion of the first dataset. Latency in updating the user interface is reduced when presenting additional portions of the first dataset or the second dataset by providing, to the client device, the second dataset prior to receiving a request for the second dataset.1. A method performed by data processing apparatus, the method comprising:
generating, by the data processing apparatus and for presentation on a client device, a visualization of an initial dashboard user interface that includes multiple different display cards that provide different reports for a given online account, wherein the multiple different display cards present different types of data in a same user interface; selecting, by the data processing apparatus, a set of data for a different display card that is not included in the initial dashboard user interface; and reducing latency for presenting an updated dashboard user interface at the client device during a same user session in which the initial dashboard user interface is displayed at the client device by pre-caching, at the client device, the set of data for the different display card that is not included in the initial dashboard, wherein the pre-caching is performed prior to a request from the client device to present the different display card and while the initial dashboard user interface is displayed at the client device during the user session; detecting a trigger to update the pre-cached set of data for the different display card; determining, in response to detecting the trigger, whether to update the pre-cached set of data for the different display card, including:
updating the pre-cached set of data for the different display card when an analysis indicates that the pre-cached set of data should be updated; and
waiting for another trigger before updating the pre-cached set of data for the different display card when the analysis indicates that the pre-cached set of data should not be updated. 2. The method of claim 1, wherein the trigger to update the pre-cached set of data for the different display card is based on an amount of time that has elapsed since data was transmitted to the client device for storage in a cache of the client device that is at least a threshold amount of time. 3. The method of claim 1, wherein the trigger to update the pre-cached set of data for the different display card is based on a value of the data stored in a cache on the client device that is a different value than a current value of the data. 4. The method of claim 3, wherein the trigger to update the pre-cached set of data for the different display card is based on a threshold number of data items of the pre-cached set of data that have changed from a previous update to the pre-cached set of data in the cache. 5. The method of claim 1, wherein determining, whether to update the pre-cached set of data for the different display card is based on i) a type of data stored in a cache on the client device, ii) an amount of data stored in the cache on the client device, or iii) a combination thereof. 6. The method of claim 1, wherein updating the pre-cached set of data for the different display card includes replacing previously cached data with updated data. 7. The method of claim 1, further comprising:
after pre-caching the set of data for the different display card, receiving the request to present the different display card from the client device; and generating, by the data processing apparatus, a visualization of the updated dashboard user interface that includes the different display card that was not included in the initial dashboard user interface and that was pre-cached at the client device prior to the request by the given user to present the different display card. 8. A system, comprising:
a first front-end server, including one or more processors, that generates, for presentation on a client device, a visualization of an initial dashboard user interface that includes multiple different display cards that provide different reports for a given online account, wherein the multiple different display cards present different types of data in a same user interface; and a second front-end server, including one or more processors, that selects a set of data for a different display card that is not included in the initial dashboard user interface, reduces latency for presenting an updated dashboard user interface at the client device during a same user session in which the initial dashboard user interface is displayed at the client device by pre-caching, at the client device, the set of data for the different display card that is not included in the initial dashboard, wherein the pre-caching is performed prior to a request from the client device to present the different display card and while the initial dashboard user interface is displayed at the client device during the user session, and detects a trigger to update the pre-cached set of data for the different display card, determines, in response to detecting the trigger, whether to update the pre-cached set of data for the different display card, including:
updating the pre-cached set of data for the different display card when an analysis indicates that the pre-cached set of data should be updated; and
waiting for another trigger before updating the pre-cached set of data for the different display card when the analysis indicates that the pre-cached set of data should not be updated. 9. The system of claim 8, wherein the trigger to update the pre-cached set of data for the different display card is based on an amount of time that has elapsed since data was transmitted to the client device for storage in a cache of the client device that is at least a threshold amount of time. 10. The system of claim 8, wherein the trigger to update the pre-cached set of data for the different display card is based on a value of the data stored in a cache on the client device that is a different value than a current value of the data. 11. The system of claim 10, wherein the trigger to update the pre-cached set of data for the different display card is based on a threshold number of data items of the pre-cached set of data that have changed from a previous update to the pre-cached set of data in the cache. 12. The system of claim 8, wherein determining, whether to update the pre-cached set of data for the different display card is based on i) a type of data stored in a cache on the client device, ii) an amount of data stored in the cache on the client device, or iii) a combination thereof. 13. The system of claim 8, wherein updating the pre-cached set of data for the different display card includes replacing previously cached data with updated data. 14. The system of claim 8, further comprising:
after pre-caching the set of data for the different display card, receiving the request to present the different display card from the client device; and generating, by the data processing apparatus, a visualization of the updated dashboard user interface that includes the different display card that was not included in the initial dashboard user interface and that was pre-cached at the client device prior to the request by the given user to present the different display card. 15. A non-transitory computer storage medium encoded with a computer program, the program comprising instructions that when executed by one or more data processing apparatus cause the data processing apparatus to perform operations comprising:
generating, by the data processing apparatus and for presentation on a client device, a visualization of an initial dashboard user interface that includes multiple different display cards that provide different reports for a given online account, wherein the multiple different display cards present different types of data in a same user interface; selecting, by the data processing apparatus, a set of data for a different display card that is not included in the initial dashboard user interface; and reducing latency for presenting an updated dashboard user interface at the client device during a same user session in which the initial dashboard user interface is displayed at the client device by pre-caching, at the client device, the set of data for the different display card that is not included in the initial dashboard, wherein the pre-caching is performed prior to a request from the client device to present the different display card and while the initial dashboard user interface is displayed at the client device during the user session; detecting a trigger to update the pre-cached set of data for the different display card; determining, in response to detecting the trigger, whether to update the pre-cached set of data for the different display card, including:
updating the pre-cached set of data for the different display card when an analysis indicates that the pre-cached set of data should be updated; and
waiting for another trigger before updating the pre-cached set of data for the different display card when the analysis indicates that the pre-cached set of data should not be updated. 16. The storage medium of claim 15, wherein the trigger to update the pre-cached set of data for the different display card is based on an amount of time that has elapsed since data was transmitted to the client device for storage in a cache of the client device that is at least a threshold amount of time. 17. The storage medium of claim 15, wherein the trigger to update the pre-cached set of data for the different display card is based on a value of the data stored in a cache on the client device that is a different value than a current value of the data. 18. The storage medium of claim 17, wherein the trigger to update the pre-cached set of data for the different display card is based on a threshold number of data items of the pre-cached set of data that have changed from a previous update to the pre-cached set of data in the cache. 19. The storage medium of claim 15, wherein determining, whether to update the pre-cached set of data for the different display card is based on i) a type of data stored in a cache on the client device, ii) an amount of data stored in the cache on the client device, or iii) a combination thereof. 20. The system of claim 15, further comprising:
after pre-caching the set of data for the different display card, receiving the request to present the different display card from the client device; and generating, by the data processing apparatus, a visualization of the updated dashboard user interface that includes the different display card that was not included in the initial dashboard user interface and that was pre-cached at the client device prior to the request by the given user to present the different display card. | 2,400 |
8,815 | 8,815 | 12,834,484 | 2,426 | A method and system is presented for utilizing an automation server and/or a traffic control manager in the content origination workflow to control a multiplexer, data carousel, and/or packager of an interactive television (iTV) system to synchronize the content (audio, video) with the interactive application data. Further, other aspects provide methods and systems for network ad insertion to generate iTV enhanced advertisements by placing a local ad splicer in the network to allow for splicing of both iTV enhanced advertisements and splicing of iTV applications into an MPEG-2 transport stream. | 1. A method comprising:
receiving a first transport stream with audio and video program identifiers representing multimedia content; receiving a second transport stream with application data program identifiers representing interactive application data associated with the multimedia content on the first transport stream; receiving control signals carrying information for synchronizing the application data program identifiers in the second transport stream with the audio and video program identifiers in the first transport stream; and generating, using at least the information in the control signals, a third transport stream with the audio and video program identifiers synchronized to the application data program identifiers such that the interactive application data are activated and deactivated at predetermined positions within the third transport stream as the multimedia content in the third transport stream is used by a user. 2. The method of claim 1, wherein the transport streams comprise MPEG-2 transport streams. 3. The method of claim 1, further comprising delivering the third transport stream to the customer via a hybrid fiber coaxial network. 4. The method of claim 1, wherein the interactive application data is defined by a specification chosen from the group consisting of: enhanced TV binary exchange format (EBIF), OpenCable Application Platform (OCAP), and tru2way™ specification. 5. The method of claim 1, wherein the control signals are transmitted by an automation server of a content origination system. 6. The method of claim 1, wherein the control signals are transmitted by a traffic and billing system of a content origination system. 7. The method of claim 1, wherein the interactive application data are received from a data carousel. 8. The method of claim 1, further comprising:
transmitting the third transport stream to a local advertisement insertion server for splicing local advertisements and associated interactive application data into the third transport stream to produce a fourth transport stream,
wherein the information in the control signals synchronizes audio and video program identifiers of the advertisements with application data program identifiers of the associated interactive application data. 9. The method of claim 1, further comprising:
transmitting the third transport stream to a network advertisement insertion server for splicing advertisements and associated interactive application data into the third transport stream to produce a fourth transport stream,
wherein the information in the control signals synchronizes audio and video program identifiers of the advertisements with application data program identifiers of the associated interactive application data. 10. The method of claim 9, further comprising transmitting the fourth transport stream to a local advertisement insertion server for splicing local advertisements and associated interactive application data into the fourth transport stream to produce a fifth transport stream wherein the splicing of local advertisements and associated interactive application data strips out selected audio, video, and application data program identifiers spliced into the third transport stream at the network advertisement insertion server. 11. The method of 9, further comprising transmitting the fourth transport stream to a local advertisement insertion server for splicing local advertisements and associated interactive application data into the fourth transport stream to produce a fifth transport stream wherein the splicing of local advertisements and associated interactive application data strips out selected audio, video, and application data program identifiers added from the second transport stream. 12. A computer-readable storage medium having computer-executable program instructions stored thereon that when executed by a processor, cause the processor to perform steps comprising:
receiving a transport stream representing audio, video, and data content; receiving network advertisements and a first set of associated interactive application data for insertion into the transport stream; receiving control signals carrying information for synchronizing the network advertisements and the first set of associated interactive application data; and splicing the network advertisements and the first set of associated interactive application data into the transport stream into predetermined locations in the transport stream based on the information in the control signals. 13. The computer-readable storage medium of claim 12, wherein the computer-executable instructions further perform: delivering the spliced transport stream to a local advertisement insertion server for splicing of new advertisements with a second set of associated interactive application data into the spliced transport stream wherein the splicing of the local advertisements and the second set of associated interactive application data strips out the network advertisements and first set of associated interactive application data spliced into the transport stream. 14. An apparatus comprising:
a processor; a memory having stored therein computer executable instructions, that when executed by the processor, cause the apparatus to perform a method of:
receiving a baseband multimedia stream with audio and video program identifiers representing multimedia content;
receiving application data program identifiers representing interactive application data associated with the baseband multimedia stream;
receiving control signals carrying information for synchronizing the application data program identifiers with the audio and video program identifiers in the baseband multimedia stream; and
generating, using at least the information in the control signals, a modified baseband multimedia stream with the audio and video program identifiers synchronized to the application data program identifiers such that
the interactive application data are activated and deactivated at predetermined positions within the baseband multimedia stream as the multimedia content in the modified baseband multimedia stream is used by a user. 15. The apparatus of claim 14, wherein the application data program identifiers are described in a markup language. 16. The apparatus of claim 15, wherein the markup language comprises an XML format. 17. The apparatus of claim 14, wherein the interactive application data and the control signals are embedded within the baseband multimedia stream in a location selected from the group consisting of: a vertical blanking interval (VBI) and a vertical ancillary. 18. The apparatus of claim 14, wherein the interactive application data is defined by a specification chosen from the group consisting of: enhanced TV binary exchange format (EBIF), OpenCable Application Platform (OCAP), and tru2way™ specification. 19. The apparatus of claim 14, wherein the control signals are transmitted by an automation server of a content origination system. 20. The apparatus of claim 14, wherein the control signals are transmitted by a traffic and billing system of a content origination system. | A method and system is presented for utilizing an automation server and/or a traffic control manager in the content origination workflow to control a multiplexer, data carousel, and/or packager of an interactive television (iTV) system to synchronize the content (audio, video) with the interactive application data. Further, other aspects provide methods and systems for network ad insertion to generate iTV enhanced advertisements by placing a local ad splicer in the network to allow for splicing of both iTV enhanced advertisements and splicing of iTV applications into an MPEG-2 transport stream.1. A method comprising:
receiving a first transport stream with audio and video program identifiers representing multimedia content; receiving a second transport stream with application data program identifiers representing interactive application data associated with the multimedia content on the first transport stream; receiving control signals carrying information for synchronizing the application data program identifiers in the second transport stream with the audio and video program identifiers in the first transport stream; and generating, using at least the information in the control signals, a third transport stream with the audio and video program identifiers synchronized to the application data program identifiers such that the interactive application data are activated and deactivated at predetermined positions within the third transport stream as the multimedia content in the third transport stream is used by a user. 2. The method of claim 1, wherein the transport streams comprise MPEG-2 transport streams. 3. The method of claim 1, further comprising delivering the third transport stream to the customer via a hybrid fiber coaxial network. 4. The method of claim 1, wherein the interactive application data is defined by a specification chosen from the group consisting of: enhanced TV binary exchange format (EBIF), OpenCable Application Platform (OCAP), and tru2way™ specification. 5. The method of claim 1, wherein the control signals are transmitted by an automation server of a content origination system. 6. The method of claim 1, wherein the control signals are transmitted by a traffic and billing system of a content origination system. 7. The method of claim 1, wherein the interactive application data are received from a data carousel. 8. The method of claim 1, further comprising:
transmitting the third transport stream to a local advertisement insertion server for splicing local advertisements and associated interactive application data into the third transport stream to produce a fourth transport stream,
wherein the information in the control signals synchronizes audio and video program identifiers of the advertisements with application data program identifiers of the associated interactive application data. 9. The method of claim 1, further comprising:
transmitting the third transport stream to a network advertisement insertion server for splicing advertisements and associated interactive application data into the third transport stream to produce a fourth transport stream,
wherein the information in the control signals synchronizes audio and video program identifiers of the advertisements with application data program identifiers of the associated interactive application data. 10. The method of claim 9, further comprising transmitting the fourth transport stream to a local advertisement insertion server for splicing local advertisements and associated interactive application data into the fourth transport stream to produce a fifth transport stream wherein the splicing of local advertisements and associated interactive application data strips out selected audio, video, and application data program identifiers spliced into the third transport stream at the network advertisement insertion server. 11. The method of 9, further comprising transmitting the fourth transport stream to a local advertisement insertion server for splicing local advertisements and associated interactive application data into the fourth transport stream to produce a fifth transport stream wherein the splicing of local advertisements and associated interactive application data strips out selected audio, video, and application data program identifiers added from the second transport stream. 12. A computer-readable storage medium having computer-executable program instructions stored thereon that when executed by a processor, cause the processor to perform steps comprising:
receiving a transport stream representing audio, video, and data content; receiving network advertisements and a first set of associated interactive application data for insertion into the transport stream; receiving control signals carrying information for synchronizing the network advertisements and the first set of associated interactive application data; and splicing the network advertisements and the first set of associated interactive application data into the transport stream into predetermined locations in the transport stream based on the information in the control signals. 13. The computer-readable storage medium of claim 12, wherein the computer-executable instructions further perform: delivering the spliced transport stream to a local advertisement insertion server for splicing of new advertisements with a second set of associated interactive application data into the spliced transport stream wherein the splicing of the local advertisements and the second set of associated interactive application data strips out the network advertisements and first set of associated interactive application data spliced into the transport stream. 14. An apparatus comprising:
a processor; a memory having stored therein computer executable instructions, that when executed by the processor, cause the apparatus to perform a method of:
receiving a baseband multimedia stream with audio and video program identifiers representing multimedia content;
receiving application data program identifiers representing interactive application data associated with the baseband multimedia stream;
receiving control signals carrying information for synchronizing the application data program identifiers with the audio and video program identifiers in the baseband multimedia stream; and
generating, using at least the information in the control signals, a modified baseband multimedia stream with the audio and video program identifiers synchronized to the application data program identifiers such that
the interactive application data are activated and deactivated at predetermined positions within the baseband multimedia stream as the multimedia content in the modified baseband multimedia stream is used by a user. 15. The apparatus of claim 14, wherein the application data program identifiers are described in a markup language. 16. The apparatus of claim 15, wherein the markup language comprises an XML format. 17. The apparatus of claim 14, wherein the interactive application data and the control signals are embedded within the baseband multimedia stream in a location selected from the group consisting of: a vertical blanking interval (VBI) and a vertical ancillary. 18. The apparatus of claim 14, wherein the interactive application data is defined by a specification chosen from the group consisting of: enhanced TV binary exchange format (EBIF), OpenCable Application Platform (OCAP), and tru2way™ specification. 19. The apparatus of claim 14, wherein the control signals are transmitted by an automation server of a content origination system. 20. The apparatus of claim 14, wherein the control signals are transmitted by a traffic and billing system of a content origination system. | 2,400 |
8,816 | 8,816 | 16,265,873 | 2,487 | Methods, systems, and techniques for tagless tracking of an object-of-interest are disclosed. Image and non-image data are generated across a plurality of camera-specific regions, and the object-of-interest is tracked over a global map formed as a composite of these regions. | 1. A method for tracking an object-of-interest over a global map formed as a composite of a plurality of camera-specific regions including a first region and a second region, the method comprising:
generating, within a first three-dimensional camera, first image data depicting the object-of-interest within the first region and first non-image data representing the object-of-interest within the first region; determining that the object-of-interest depicted in the first image data is corresponding to a same instance of the object-of-interest represented in the first non-image data by correlating the first image and first non-image data; deriving first region coordinates of the instance of the object-of-interest from at least one of the first image and first non-image data; employing a location of the first region and the first region coordinates to calculate first global coordinates of the instance of the object-of-interest; generating, within a second three-dimensional camera, second image data depicting the object-of-interest within the second region and second non-image data representing the object-of-interest within the second region; determining that the object-of-interest depicted in the second image data is corresponding to a same second instance of the object-of-interest represented in the second non-image data by correlating the second image and second non-image data; deriving second region coordinates of the second instance of the object-of-interest from at least one of the second image and second non-image data; and employing a location of the second region and the second region coordinates to calculate second global coordinates of the second instance of the object-of-interest, and wherein the object-of-interest is tracked over the global map as having moved from one of the first and second global coordinates to the other of the first and second global coordinates. 2. The method as claimed in claim 1 wherein at least one of the first three-dimensional camera and the second three-dimensional camera is mounted top down. 3. The method as claimed in claim 1 wherein the first three-dimensional camera and the second three-dimensional camera are mounted top down. 4. The method as claimed in claim 1 further comprising displaying the global map within a user interface within which an indicator of the object-of-interest is superimposed on the global map. 5. The method as claimed in claim 1 further comprising creating at least one access control rule following the first global coordinates or the second global coordinates being calculated. 6. A system for tracking an object-of-interest over a global map formed as a composite of a plurality of camera-specific regions including a first region and a second region, the system comprising:
a first three-dimensional camera configured to generate: i) first image data depicting the object-of-interest within the first region; and ii) first non-image data representing the object-of-interest within the first region; a second three-dimensional camera configured to generate: i) second image data depicting the object-of-interest within the second region; and ii) second non-image data representing the object-of-interest within the second region; at least one tangible, non-transitory, computer-readable storage medium; and at least one processor configured to:
determine that the object-of-interest depicted in the first image data is corresponding to a same instance of the object-of-interest represented in the first non-image data by correlating the first image and first non-image data;
derive first region coordinates of the instance of the object-of-interest from at least one of the first image and first non-image data;
calculate first global coordinates of the instance of the object-of-interest based on a location of the first region and the first region coordinates;
determine that the object-of-interest depicted in the second image data is corresponding to a same second instance of the object-of-interest represented in the second non-image data by correlating the second image and second non-image data;
derive second region coordinates of the second instance of the object-of-interest from at least one of the second image and second non-image data;
calculate second global coordinates of the second instance of the object-of-interest based on a location of the second region and the second region coordinates; and
initiate a storing of tracking data into the computer readable medium, the tracking data indicating that the object-of-interest has moved from one of the first and second global coordinates to the other of the first and second global coordinates. 7. The system as claimed in claim 6 wherein at least one of the first three-dimensional camera and the second three-dimensional camera is attached to a ceiling structure and mounted top down. 8. The system as claimed in claim 6 wherein the first three-dimensional camera and the second three-dimensional camera are attached to a ceiling structure and mounted top down. 9. The system as claimed in claim 6 wherein the at least one processor is further configured to create at least one access control rule following the first global coordinates or the second global coordinates being calculated. 10. A method for tracking an object-of-interest over a global map formed as a composite of a plurality of camera-specific regions including a first region and a second region, the method comprising:
deriving first region coordinates of an instance of the object-of-interest from a combination of first image data and first non-image data, both generated within a first three-dimensional camera and both corresponding to the instance of the object-of-interest in the first region; employing a location of the first region and the first region coordinates to calculate first global coordinates of the instance of the object-of-interest; deriving second region coordinates of another instance of the object-of-interest from a combination of second image data and second non-image data, both generated within a second three-dimensional camera and both corresponding to the another instance of the object-of-interest in the second region; and employing a location of the second region and the second region coordinates to calculate second global coordinates of the another instance of the object-of-interest, and wherein the object-of-interest is tracked over the global map as having moved from one of the first and second global coordinates to the other of the first and second global coordinates. 11. The method as claimed in claim 10 further comprising displaying the global map within a user interface within which an indicator of the object-of-interest is superimposed on the global map. 12. The method as claimed in claim 10 further comprising creating at least one access control rule following the first global coordinates or the second global coordinates being calculated. | Methods, systems, and techniques for tagless tracking of an object-of-interest are disclosed. Image and non-image data are generated across a plurality of camera-specific regions, and the object-of-interest is tracked over a global map formed as a composite of these regions.1. A method for tracking an object-of-interest over a global map formed as a composite of a plurality of camera-specific regions including a first region and a second region, the method comprising:
generating, within a first three-dimensional camera, first image data depicting the object-of-interest within the first region and first non-image data representing the object-of-interest within the first region; determining that the object-of-interest depicted in the first image data is corresponding to a same instance of the object-of-interest represented in the first non-image data by correlating the first image and first non-image data; deriving first region coordinates of the instance of the object-of-interest from at least one of the first image and first non-image data; employing a location of the first region and the first region coordinates to calculate first global coordinates of the instance of the object-of-interest; generating, within a second three-dimensional camera, second image data depicting the object-of-interest within the second region and second non-image data representing the object-of-interest within the second region; determining that the object-of-interest depicted in the second image data is corresponding to a same second instance of the object-of-interest represented in the second non-image data by correlating the second image and second non-image data; deriving second region coordinates of the second instance of the object-of-interest from at least one of the second image and second non-image data; and employing a location of the second region and the second region coordinates to calculate second global coordinates of the second instance of the object-of-interest, and wherein the object-of-interest is tracked over the global map as having moved from one of the first and second global coordinates to the other of the first and second global coordinates. 2. The method as claimed in claim 1 wherein at least one of the first three-dimensional camera and the second three-dimensional camera is mounted top down. 3. The method as claimed in claim 1 wherein the first three-dimensional camera and the second three-dimensional camera are mounted top down. 4. The method as claimed in claim 1 further comprising displaying the global map within a user interface within which an indicator of the object-of-interest is superimposed on the global map. 5. The method as claimed in claim 1 further comprising creating at least one access control rule following the first global coordinates or the second global coordinates being calculated. 6. A system for tracking an object-of-interest over a global map formed as a composite of a plurality of camera-specific regions including a first region and a second region, the system comprising:
a first three-dimensional camera configured to generate: i) first image data depicting the object-of-interest within the first region; and ii) first non-image data representing the object-of-interest within the first region; a second three-dimensional camera configured to generate: i) second image data depicting the object-of-interest within the second region; and ii) second non-image data representing the object-of-interest within the second region; at least one tangible, non-transitory, computer-readable storage medium; and at least one processor configured to:
determine that the object-of-interest depicted in the first image data is corresponding to a same instance of the object-of-interest represented in the first non-image data by correlating the first image and first non-image data;
derive first region coordinates of the instance of the object-of-interest from at least one of the first image and first non-image data;
calculate first global coordinates of the instance of the object-of-interest based on a location of the first region and the first region coordinates;
determine that the object-of-interest depicted in the second image data is corresponding to a same second instance of the object-of-interest represented in the second non-image data by correlating the second image and second non-image data;
derive second region coordinates of the second instance of the object-of-interest from at least one of the second image and second non-image data;
calculate second global coordinates of the second instance of the object-of-interest based on a location of the second region and the second region coordinates; and
initiate a storing of tracking data into the computer readable medium, the tracking data indicating that the object-of-interest has moved from one of the first and second global coordinates to the other of the first and second global coordinates. 7. The system as claimed in claim 6 wherein at least one of the first three-dimensional camera and the second three-dimensional camera is attached to a ceiling structure and mounted top down. 8. The system as claimed in claim 6 wherein the first three-dimensional camera and the second three-dimensional camera are attached to a ceiling structure and mounted top down. 9. The system as claimed in claim 6 wherein the at least one processor is further configured to create at least one access control rule following the first global coordinates or the second global coordinates being calculated. 10. A method for tracking an object-of-interest over a global map formed as a composite of a plurality of camera-specific regions including a first region and a second region, the method comprising:
deriving first region coordinates of an instance of the object-of-interest from a combination of first image data and first non-image data, both generated within a first three-dimensional camera and both corresponding to the instance of the object-of-interest in the first region; employing a location of the first region and the first region coordinates to calculate first global coordinates of the instance of the object-of-interest; deriving second region coordinates of another instance of the object-of-interest from a combination of second image data and second non-image data, both generated within a second three-dimensional camera and both corresponding to the another instance of the object-of-interest in the second region; and employing a location of the second region and the second region coordinates to calculate second global coordinates of the another instance of the object-of-interest, and wherein the object-of-interest is tracked over the global map as having moved from one of the first and second global coordinates to the other of the first and second global coordinates. 11. The method as claimed in claim 10 further comprising displaying the global map within a user interface within which an indicator of the object-of-interest is superimposed on the global map. 12. The method as claimed in claim 10 further comprising creating at least one access control rule following the first global coordinates or the second global coordinates being calculated. | 2,400 |
8,817 | 8,817 | 15,740,109 | 2,466 | The disclosure relates to a method in a Lawful Intercept, LI, management system for removing redundant content of communication, CC flows. Said LI management system is capable of receiving and handling one or more CC flows generated from intercepted target communication sessions. Each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow. The flow identity comprises an address of a sending intercept access point, IAP, at least one target identifier, TID, and a communication session Correlation Identifier, CI. The method enables the LI management system to forward only one CC flow of CC flows having identical TID and CI, respectively, but different sending intercept access points. | 1. A method for removing redundant content of communication, CC, flows, which are generated by Lawful Interception from one or more intercepted target communication sessions of intercepted users, targets, wherein each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow, wherein the flow identity comprises an address of a sending intercept access point, IAP, at least one identifier of the target, TID, and a communication session Correlation Identifier, CI, the method comprising:
Receiving a CC flow of data packets from an IAP; Retrieving the CC flow identity from the received CC flow; Identifying any other CC flow being delivered to a Law Enforcement Agency, LEA, wherein said other CC flow has identical TID and CI, respectively, as the received CC flow; Forwarding to the LEA only one of the CC flows of data packets having identical TID and CI, respectively, by dropping the received CC flow if having other sending IAP address than said other CC flow being delivered. 2. The method according to claim 1, wherein the identifying step comprises:
Checking and identifying if any other CC flow being delivered to a LEA has identical TID and CI, respectively, as the received CC flow; Temporary storing the flow identity of the received CC flow, if no other CC flow with the same TID and CI, respectively, is identified. 3. The method according to claim 1, wherein the retrieving step further comprises:
Checking for multi-identity in a data packet of the received CC flow; Determining a TID_master for said multi-identity from a Target Identifier List; Setting the determined TID_master as TID in the packets of the received CC flow. 4. The method according to claim 1, wherein the forwarding step further comprises:
Checking if the sending IAP address of the received CC flow is identical for identified other CC flow with the same TID and CI, respectively; Dropping the received CC flow, if its sending IAP address is different from said other CC flow with the same TID and CI, respectively; Forwarding the received CC flow if the sending IAP address is the same as for said other CC flow with the same TID and CI, respectively, or no other CC flow with the same TID and CI, respectively, has been identified. 5. The method according to claim 1, further comprising:
Sending metadata of dropped CC flow to a LEA. 6. The method according to claim 5, wherein the sending step comprising generating and sending of metadata for notifying that a CC flow has been dropped, said metadata involves at least one of following identifiers, related to the dropped CC flow:
Sending IAP address of the IAP sending the received CC flow; Target Identifier (TID); Correlation Information (CI). 7. A Lawful Intercept, LI, management system for removing redundant content of communication, CC, flows, said LI management system being capable of receiving and handling one or more CC flows generated from one or more intercepted communication sessions of intercepted users, targets, wherein each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow, wherein the flow identity comprises an address of a sending intercept access point, IAP, at least one target identifier, TID, and a communication session Correlation Identifier, CI, the LI management system comprises a processing circuitry, which is adapted to operatively perform the step of:
Receive a CC flow of data packets from an IAP; Retrieve the CC flow identity from the received CC flow; Identify any other CC flow being delivered to a Law Enforcement Agency, LEA, wherein said other CC flow has identical TID and CI, respectively, as the received CC flow; and Forward to the LEA only one of the CC flows of data packets having identical TID and CI, respectively, by dropping the received CC flow if having other sending IAP address than said other CC flow being delivered. 8. The LI management system according to claim 7, wherein the processing circuitry is further adapted to:
Check and identify if any other CC flow being delivered to a LEA has identical TID and CI, respectively, as the received CC flow; Temporary store the flow identity of the received CC flow, if no other CC flow with the same TID and CI, respectively, is identified. 9. The LI management system according to claim 7, wherein the processing circuitry is further adapted to:
Check for multi-identity in a data packet of the received CC flow; Determine a TID_master for said multi-identity from a Target Identifier List; Set the determined TID_master as TID in the packets of the received CC flow. 10. The LI management system according to claim 7, wherein the processing circuitry is further adapted to;
Check if the sending IAP address of the received CC flow is identical for identified other CC flow with the same TID and CI, respectively; Drop the received CC flow, if sending IAP address is different from said other CC flow with the same TID and CI, respectively; Forward the received CC flow if the sending IAP address is the same as for said other CC flow with the same TID and CI, respectively, or no other CC flow with the same TID and CI, respectively, has been identified. 11. The LI management system according to claim 7, wherein the processing circuitry is further adapted to:
Send metadata of dropped CC flow to a LEA. 12. The LI management system according to claim 11, wherein the said metadata notifies the LEA that a CC flow has been dropped and comprises the following identifiers, related to the dropped flow:
Sending IAP address of the IAP sending the received CC flow; Target Identifier (TID); Correlation Information (CI). 13. A computer program comprising computer program code which, when run in a processing circuitry of a LI management system, causes the system to perform the steps of the method according to claim 1. 14. A computer program product comprising a computer program according to claim 13 and a computer readable means on which the computer program is stored. 15. A carrier containing the computer program of claim 13, wherein the carrier is one of an electronic signal, optical signal, radio signal or computer readable storage medium. | The disclosure relates to a method in a Lawful Intercept, LI, management system for removing redundant content of communication, CC flows. Said LI management system is capable of receiving and handling one or more CC flows generated from intercepted target communication sessions. Each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow. The flow identity comprises an address of a sending intercept access point, IAP, at least one target identifier, TID, and a communication session Correlation Identifier, CI. The method enables the LI management system to forward only one CC flow of CC flows having identical TID and CI, respectively, but different sending intercept access points.1. A method for removing redundant content of communication, CC, flows, which are generated by Lawful Interception from one or more intercepted target communication sessions of intercepted users, targets, wherein each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow, wherein the flow identity comprises an address of a sending intercept access point, IAP, at least one identifier of the target, TID, and a communication session Correlation Identifier, CI, the method comprising:
Receiving a CC flow of data packets from an IAP; Retrieving the CC flow identity from the received CC flow; Identifying any other CC flow being delivered to a Law Enforcement Agency, LEA, wherein said other CC flow has identical TID and CI, respectively, as the received CC flow; Forwarding to the LEA only one of the CC flows of data packets having identical TID and CI, respectively, by dropping the received CC flow if having other sending IAP address than said other CC flow being delivered. 2. The method according to claim 1, wherein the identifying step comprises:
Checking and identifying if any other CC flow being delivered to a LEA has identical TID and CI, respectively, as the received CC flow; Temporary storing the flow identity of the received CC flow, if no other CC flow with the same TID and CI, respectively, is identified. 3. The method according to claim 1, wherein the retrieving step further comprises:
Checking for multi-identity in a data packet of the received CC flow; Determining a TID_master for said multi-identity from a Target Identifier List; Setting the determined TID_master as TID in the packets of the received CC flow. 4. The method according to claim 1, wherein the forwarding step further comprises:
Checking if the sending IAP address of the received CC flow is identical for identified other CC flow with the same TID and CI, respectively; Dropping the received CC flow, if its sending IAP address is different from said other CC flow with the same TID and CI, respectively; Forwarding the received CC flow if the sending IAP address is the same as for said other CC flow with the same TID and CI, respectively, or no other CC flow with the same TID and CI, respectively, has been identified. 5. The method according to claim 1, further comprising:
Sending metadata of dropped CC flow to a LEA. 6. The method according to claim 5, wherein the sending step comprising generating and sending of metadata for notifying that a CC flow has been dropped, said metadata involves at least one of following identifiers, related to the dropped CC flow:
Sending IAP address of the IAP sending the received CC flow; Target Identifier (TID); Correlation Information (CI). 7. A Lawful Intercept, LI, management system for removing redundant content of communication, CC, flows, said LI management system being capable of receiving and handling one or more CC flows generated from one or more intercepted communication sessions of intercepted users, targets, wherein each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow, wherein the flow identity comprises an address of a sending intercept access point, IAP, at least one target identifier, TID, and a communication session Correlation Identifier, CI, the LI management system comprises a processing circuitry, which is adapted to operatively perform the step of:
Receive a CC flow of data packets from an IAP; Retrieve the CC flow identity from the received CC flow; Identify any other CC flow being delivered to a Law Enforcement Agency, LEA, wherein said other CC flow has identical TID and CI, respectively, as the received CC flow; and Forward to the LEA only one of the CC flows of data packets having identical TID and CI, respectively, by dropping the received CC flow if having other sending IAP address than said other CC flow being delivered. 8. The LI management system according to claim 7, wherein the processing circuitry is further adapted to:
Check and identify if any other CC flow being delivered to a LEA has identical TID and CI, respectively, as the received CC flow; Temporary store the flow identity of the received CC flow, if no other CC flow with the same TID and CI, respectively, is identified. 9. The LI management system according to claim 7, wherein the processing circuitry is further adapted to:
Check for multi-identity in a data packet of the received CC flow; Determine a TID_master for said multi-identity from a Target Identifier List; Set the determined TID_master as TID in the packets of the received CC flow. 10. The LI management system according to claim 7, wherein the processing circuitry is further adapted to;
Check if the sending IAP address of the received CC flow is identical for identified other CC flow with the same TID and CI, respectively; Drop the received CC flow, if sending IAP address is different from said other CC flow with the same TID and CI, respectively; Forward the received CC flow if the sending IAP address is the same as for said other CC flow with the same TID and CI, respectively, or no other CC flow with the same TID and CI, respectively, has been identified. 11. The LI management system according to claim 7, wherein the processing circuitry is further adapted to:
Send metadata of dropped CC flow to a LEA. 12. The LI management system according to claim 11, wherein the said metadata notifies the LEA that a CC flow has been dropped and comprises the following identifiers, related to the dropped flow:
Sending IAP address of the IAP sending the received CC flow; Target Identifier (TID); Correlation Information (CI). 13. A computer program comprising computer program code which, when run in a processing circuitry of a LI management system, causes the system to perform the steps of the method according to claim 1. 14. A computer program product comprising a computer program according to claim 13 and a computer readable means on which the computer program is stored. 15. A carrier containing the computer program of claim 13, wherein the carrier is one of an electronic signal, optical signal, radio signal or computer readable storage medium. | 2,400 |
8,818 | 8,818 | 15,337,902 | 2,447 | Systems, methods, and apparatus to identify media devices are disclosed. An example apparatus includes a listing retriever to retrieve a list of device names corresponding to devices identified as present on a local area network, the list of device names retrieved from a network activity measurement system located outside of the local area network. The example apparatus includes a communications analyzer to identify a list of hardware addresses of devices on the local area network. The example apparatus includes a mapper to receive a mapping between a device in the list of devices and a hardware address in the hardware addresses. The mapper is to transmit the mapping to the network activity measurement system. | 1. An apparatus to facilitate mapping a device name to a hardware address, the apparatus comprising:
a listing retriever to retrieve a list of device names corresponding to devices identified as present on a local area network, the list of device names retrieved from a network activity measurement system located outside of the local area network; a communications analyzer to identify a list of hardware addresses of devices on the local area network; and a mapper to:
receive a mapping between a device in the list of devices and a hardware address in the hardware addresses; and
transmit the mapping to the network activity measurement system. 2. The apparatus of claim 1, wherein the mapper is further to generate a suggested mapping between the device in the list of devices and the hardware address in the list of hardware addresses. 3. The apparatus of claim 2, further including an interface presenter to display the suggested mapping. 4. The apparatus of claim 2, wherein the mapper is to inspect network communications of the devices on the local area network to determine a last domain visited based the network communications for each of the devices as a component of the suggested mapping, and further including:
an interface presenter to display the last domain visited for each hardware address in the list of hardware addresses. 5. The apparatus of claim 2, wherein the mapper is to identify an amount of network communications transmitted by each device on the local area network as a component of the suggested mapping, and further including:
an interface presenter to display the amount of network communications transmitted by each device on the local area network in connection with the hardware address of the corresponding device. 6. The apparatus of claim 2, wherein the mapper is to identify an organizationally unique identifier portion of the hardware address of each device on the local area network as a component of the suggested mapping, and further including:
an interface presenter to display the organizationally unique identifier of each device on the local area network in connection with a make of the corresponding device identified during a panelist registration process. 7. The apparatus of claim 1, wherein the list of devices is received at the network activity measurement system during a panelist registration process. 8. The apparatus of claim 1, wherein the hardware address is a media access control address. 9. The apparatus of claim 1, wherein the communications analyzer is to identify the list of hardware addresses of devices on the local area network by consulting an address resolution protocol table. 10. The apparatus of claim 1, wherein the communications analyzer is to identify the list of hardware addresses of devices on the local area network by performing a scan of the local area network. 11. The apparatus of claim 1, wherein the communications analyzer is further to monitor a network communication transmitted by a device on the local area network, identify a hardware address of the device transmitting the network communication, and provide the network communication and the hardware address to the network activity measurement system. 12. A method of identifying a media presentation device, the method comprising:
retrieving, by executing an instruction with a processor of a network communications monitor installed on a local area network, a list of devices identified as present within the local area network from a network activity measurement system located outside of the local area network; identifying, by executing an instruction with the processor, a list of hardware addresses of devices on the local area network; receiving, from a user, a mapping between a device in the list of devices and a hardware address in the hardware addresses; and providing the mapping from the network communications monitor to the network activity measurement system. 13. The method of claim 12, further including creating a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
inspecting, by executing an instruction with the processor of the network communications monitor, network communications of the devices on the local area network to determine a last domain visited based the network communications for each of the devices; and displaying the last domain visited for each hardware address in the list of hardware addresses. 14. The method of claim 12, further including creating a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
identifying an amount of network communications transmitted by each device on the local area network; and displaying the amount of network communications transmitted by each device on the local area network in connection with the hardware address of the corresponding device. 15. The method of claim 12, wherein the list of devices is received at the network activity measurement system during a panelist registration process. 16. The method of claim 12, further including:
monitoring, by executing an instruction with the processor of the network communications monitor, a network communication transmitted by a device on the local area network; identifying, by executing an instruction with the processor, a hardware address of the device transmitting the network communication; providing, by executing an instruction with the processor, the network communication and the hardware address to the network activity measurement system. 17. A non-transitory computer readable medium comprising instructions which, when executed, cause a processor of a network communications monitor installed on a local area network to at least:
retrieve a list of devices identified as present within the local area network from a network activity measurement system located outside of the local area network; identify a list of hardware addresses of devices on the local area network; receive, from a user, a mapping between a device in the list of devices and a hardware address in the hardware addresses; and provide the mapping from the network communications monitor to the network activity measurement system. 18. The non-transitory computer readable medium of claim 17, wherein the instructions, when executed, cause the processor to create a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
inspecting network communications of the devices on the local area network to determine a last domain visited based the network communications for each of the devices; and displaying the last domain visited for each hardware address in the list of hardware addresses. 19. The non-transitory computer readable medium of claim 17, wherein the instructions, when executed, cause the processor to create a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
identifying an amount of network communications transmitted by each device on the local area network; and displaying the amount of network communications transmitted by each device on the local area network in connection with the hardware address of the corresponding device. 20. The non-transitory computer readable medium of claim 17, wherein the instructions, when executed, cause the processor to at least:
monitor a network communication transmitted by a device on the local area network; identify a hardware address of the device transmitting the network communication; and provide the network communication and the hardware address to the network activity measurement system. | Systems, methods, and apparatus to identify media devices are disclosed. An example apparatus includes a listing retriever to retrieve a list of device names corresponding to devices identified as present on a local area network, the list of device names retrieved from a network activity measurement system located outside of the local area network. The example apparatus includes a communications analyzer to identify a list of hardware addresses of devices on the local area network. The example apparatus includes a mapper to receive a mapping between a device in the list of devices and a hardware address in the hardware addresses. The mapper is to transmit the mapping to the network activity measurement system.1. An apparatus to facilitate mapping a device name to a hardware address, the apparatus comprising:
a listing retriever to retrieve a list of device names corresponding to devices identified as present on a local area network, the list of device names retrieved from a network activity measurement system located outside of the local area network; a communications analyzer to identify a list of hardware addresses of devices on the local area network; and a mapper to:
receive a mapping between a device in the list of devices and a hardware address in the hardware addresses; and
transmit the mapping to the network activity measurement system. 2. The apparatus of claim 1, wherein the mapper is further to generate a suggested mapping between the device in the list of devices and the hardware address in the list of hardware addresses. 3. The apparatus of claim 2, further including an interface presenter to display the suggested mapping. 4. The apparatus of claim 2, wherein the mapper is to inspect network communications of the devices on the local area network to determine a last domain visited based the network communications for each of the devices as a component of the suggested mapping, and further including:
an interface presenter to display the last domain visited for each hardware address in the list of hardware addresses. 5. The apparatus of claim 2, wherein the mapper is to identify an amount of network communications transmitted by each device on the local area network as a component of the suggested mapping, and further including:
an interface presenter to display the amount of network communications transmitted by each device on the local area network in connection with the hardware address of the corresponding device. 6. The apparatus of claim 2, wherein the mapper is to identify an organizationally unique identifier portion of the hardware address of each device on the local area network as a component of the suggested mapping, and further including:
an interface presenter to display the organizationally unique identifier of each device on the local area network in connection with a make of the corresponding device identified during a panelist registration process. 7. The apparatus of claim 1, wherein the list of devices is received at the network activity measurement system during a panelist registration process. 8. The apparatus of claim 1, wherein the hardware address is a media access control address. 9. The apparatus of claim 1, wherein the communications analyzer is to identify the list of hardware addresses of devices on the local area network by consulting an address resolution protocol table. 10. The apparatus of claim 1, wherein the communications analyzer is to identify the list of hardware addresses of devices on the local area network by performing a scan of the local area network. 11. The apparatus of claim 1, wherein the communications analyzer is further to monitor a network communication transmitted by a device on the local area network, identify a hardware address of the device transmitting the network communication, and provide the network communication and the hardware address to the network activity measurement system. 12. A method of identifying a media presentation device, the method comprising:
retrieving, by executing an instruction with a processor of a network communications monitor installed on a local area network, a list of devices identified as present within the local area network from a network activity measurement system located outside of the local area network; identifying, by executing an instruction with the processor, a list of hardware addresses of devices on the local area network; receiving, from a user, a mapping between a device in the list of devices and a hardware address in the hardware addresses; and providing the mapping from the network communications monitor to the network activity measurement system. 13. The method of claim 12, further including creating a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
inspecting, by executing an instruction with the processor of the network communications monitor, network communications of the devices on the local area network to determine a last domain visited based the network communications for each of the devices; and displaying the last domain visited for each hardware address in the list of hardware addresses. 14. The method of claim 12, further including creating a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
identifying an amount of network communications transmitted by each device on the local area network; and displaying the amount of network communications transmitted by each device on the local area network in connection with the hardware address of the corresponding device. 15. The method of claim 12, wherein the list of devices is received at the network activity measurement system during a panelist registration process. 16. The method of claim 12, further including:
monitoring, by executing an instruction with the processor of the network communications monitor, a network communication transmitted by a device on the local area network; identifying, by executing an instruction with the processor, a hardware address of the device transmitting the network communication; providing, by executing an instruction with the processor, the network communication and the hardware address to the network activity measurement system. 17. A non-transitory computer readable medium comprising instructions which, when executed, cause a processor of a network communications monitor installed on a local area network to at least:
retrieve a list of devices identified as present within the local area network from a network activity measurement system located outside of the local area network; identify a list of hardware addresses of devices on the local area network; receive, from a user, a mapping between a device in the list of devices and a hardware address in the hardware addresses; and provide the mapping from the network communications monitor to the network activity measurement system. 18. The non-transitory computer readable medium of claim 17, wherein the instructions, when executed, cause the processor to create a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
inspecting network communications of the devices on the local area network to determine a last domain visited based the network communications for each of the devices; and displaying the last domain visited for each hardware address in the list of hardware addresses. 19. The non-transitory computer readable medium of claim 17, wherein the instructions, when executed, cause the processor to create a suggested mapping between a device in the list of devices and a hardware address in the list of hardware addresses by:
identifying an amount of network communications transmitted by each device on the local area network; and displaying the amount of network communications transmitted by each device on the local area network in connection with the hardware address of the corresponding device. 20. The non-transitory computer readable medium of claim 17, wherein the instructions, when executed, cause the processor to at least:
monitor a network communication transmitted by a device on the local area network; identify a hardware address of the device transmitting the network communication; and provide the network communication and the hardware address to the network activity measurement system. | 2,400 |
8,819 | 8,819 | 15,806,416 | 2,461 | Systems and methods of service enhancement in a Software Defined Networking (SDN) network include performing an evaluation of one or more services in the SDN network for service enhancements; performing a scoring of the service enhancements of the one or more services; and causing implementation of at least one of the service enhancements in the SDN network. The evaluation can be based on temporarily implementing the service enhancements and measuring a benefit thereof. The evaluation can also be based on estimating the service enhancements based on historical measurements from the SDN network. | 1. A method of service enhancement in a Software Defined Networking (SDN) network, the method comprising:
performing an evaluation of one or more services in the SDN network for service enhancements; performing a scoring of the service enhancements of the one or more services; and causing implementation of at least one of the service enhancements in the SDN network. 2. The method of claim 1, wherein the evaluation is based on temporarily implementing the service enhancements and measuring a benefit thereof. 3. The method of claim 1, wherein the evaluation is based on estimating the service enhancements based on historical measurements from the SDN network. 4. The method of claim 1, wherein the one or more services comprise Virtual Network Functions (VNFs) in a service chain and the evaluation is based on temporarily implementing new VNFs in the service chain and measuring a benefit thereof. 5. The method of claim 1, wherein the scoring is based on one or more of a lowest cost policy, a best Quality of Service (QoS) policy, a highest revenue enhancement policy, and a most profit enhancement policy. 6. The method of claim 1, further comprising:
providing the scoring of the service enhancements to a network operator and receiving approval of the at least one of the service enhancements from the network operator prior to causing the implementation thereof. 7. The method of claim 1, further comprising:
periodically obtaining network measurements; performing updated evaluations for the one or more services and updated scoring based thereon; and providing the updated scoring to a network operator for a determination of the implementation of at least one of the service enhancements. 8. The method of claim 1, wherein the evaluation is based on network measurements comprising traffic volume, packet loss, and latency. 9. The method of claim 1, wherein the evaluation is based on network measurements comprising Deep Packet Inspection (DPI). 10. A system configured to perform service enhancement in a Software Defined Networking (SDN) network, the system comprising:
a network interface communicatively coupled to the SDN network; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to
perform an evaluation of one or more services in the SDN network for service enhancements,
perform a scoring of the service enhancements of the one or more services, and
cause implementation of at least one of the service enhancements in the SDN network. 11. The system of claim 10, wherein the evaluation is based on temporarily implementing the service enhancements and measuring a benefit thereof. 12. The system of claim 10, wherein the evaluation is based on estimating the service enhancements based on historical measurements from the SDN network. 13. The system of claim 10, wherein the one or more services comprise Virtual Network Functions (VNFs) in a service chain and the evaluation is based on temporarily implementing new VNFs in the service chain and measuring a benefit thereof. 14. The system of claim 10, wherein the scoring is based on one or more of a lowest cost policy, a best Quality of Service (QoS) policy, a highest revenue enhancement policy, and a most profit enhancement policy. 15. The system of claim 10, wherein the memory storing instructions that, when executed, further causes the processor to
provide the scoring of the service enhancements to a network operator and receive approval of the at least one of the service enhancements from the network operator prior to causing the implementation thereof. 16. The system of claim 10, wherein the memory storing instructions that, when executed, further causes the processor to
periodically obtain network measurements; perform updated evaluations for the one or more services and updated scoring based thereon; and provide the updated scoring to a network operator for a determination of the implementation of at least one of the service enhancements. 17. The system of claim 10, wherein the evaluation is based on network measurements comprising traffic volume, packet loss, and latency. 18. The system of claim 10, wherein the evaluation is based on network measurements comprising Deep Packet Inspection (DPI). 19. A portal system used by a network operator for service enhancements in a Software Defined Networking (SDN) network, the portal system comprising:
a network interface communicatively coupled to the SDN network; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to
responsive to an evaluation of one or more services in the SDN network for service enhancements and a scoring based thereon, provide the scoring for the one or more services to the network operator;
receiving a selection of one or more service enhancements from the network operator based on the scoring; and
providing the one or more service enhancements to the SDN network for implementation therein. 20. The portal system of claim 19, wherein the scoring is based on one or more of a lowest cost policy, a best Quality of Service (QoS) policy, a highest revenue enhancement policy, and a most profit enhancement policy. | Systems and methods of service enhancement in a Software Defined Networking (SDN) network include performing an evaluation of one or more services in the SDN network for service enhancements; performing a scoring of the service enhancements of the one or more services; and causing implementation of at least one of the service enhancements in the SDN network. The evaluation can be based on temporarily implementing the service enhancements and measuring a benefit thereof. The evaluation can also be based on estimating the service enhancements based on historical measurements from the SDN network.1. A method of service enhancement in a Software Defined Networking (SDN) network, the method comprising:
performing an evaluation of one or more services in the SDN network for service enhancements; performing a scoring of the service enhancements of the one or more services; and causing implementation of at least one of the service enhancements in the SDN network. 2. The method of claim 1, wherein the evaluation is based on temporarily implementing the service enhancements and measuring a benefit thereof. 3. The method of claim 1, wherein the evaluation is based on estimating the service enhancements based on historical measurements from the SDN network. 4. The method of claim 1, wherein the one or more services comprise Virtual Network Functions (VNFs) in a service chain and the evaluation is based on temporarily implementing new VNFs in the service chain and measuring a benefit thereof. 5. The method of claim 1, wherein the scoring is based on one or more of a lowest cost policy, a best Quality of Service (QoS) policy, a highest revenue enhancement policy, and a most profit enhancement policy. 6. The method of claim 1, further comprising:
providing the scoring of the service enhancements to a network operator and receiving approval of the at least one of the service enhancements from the network operator prior to causing the implementation thereof. 7. The method of claim 1, further comprising:
periodically obtaining network measurements; performing updated evaluations for the one or more services and updated scoring based thereon; and providing the updated scoring to a network operator for a determination of the implementation of at least one of the service enhancements. 8. The method of claim 1, wherein the evaluation is based on network measurements comprising traffic volume, packet loss, and latency. 9. The method of claim 1, wherein the evaluation is based on network measurements comprising Deep Packet Inspection (DPI). 10. A system configured to perform service enhancement in a Software Defined Networking (SDN) network, the system comprising:
a network interface communicatively coupled to the SDN network; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to
perform an evaluation of one or more services in the SDN network for service enhancements,
perform a scoring of the service enhancements of the one or more services, and
cause implementation of at least one of the service enhancements in the SDN network. 11. The system of claim 10, wherein the evaluation is based on temporarily implementing the service enhancements and measuring a benefit thereof. 12. The system of claim 10, wherein the evaluation is based on estimating the service enhancements based on historical measurements from the SDN network. 13. The system of claim 10, wherein the one or more services comprise Virtual Network Functions (VNFs) in a service chain and the evaluation is based on temporarily implementing new VNFs in the service chain and measuring a benefit thereof. 14. The system of claim 10, wherein the scoring is based on one or more of a lowest cost policy, a best Quality of Service (QoS) policy, a highest revenue enhancement policy, and a most profit enhancement policy. 15. The system of claim 10, wherein the memory storing instructions that, when executed, further causes the processor to
provide the scoring of the service enhancements to a network operator and receive approval of the at least one of the service enhancements from the network operator prior to causing the implementation thereof. 16. The system of claim 10, wherein the memory storing instructions that, when executed, further causes the processor to
periodically obtain network measurements; perform updated evaluations for the one or more services and updated scoring based thereon; and provide the updated scoring to a network operator for a determination of the implementation of at least one of the service enhancements. 17. The system of claim 10, wherein the evaluation is based on network measurements comprising traffic volume, packet loss, and latency. 18. The system of claim 10, wherein the evaluation is based on network measurements comprising Deep Packet Inspection (DPI). 19. A portal system used by a network operator for service enhancements in a Software Defined Networking (SDN) network, the portal system comprising:
a network interface communicatively coupled to the SDN network; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to
responsive to an evaluation of one or more services in the SDN network for service enhancements and a scoring based thereon, provide the scoring for the one or more services to the network operator;
receiving a selection of one or more service enhancements from the network operator based on the scoring; and
providing the one or more service enhancements to the SDN network for implementation therein. 20. The portal system of claim 19, wherein the scoring is based on one or more of a lowest cost policy, a best Quality of Service (QoS) policy, a highest revenue enhancement policy, and a most profit enhancement policy. | 2,400 |
8,820 | 8,820 | 15,624,367 | 2,459 | A method includes, for each of a plurality of web resources, receiving, at a communications server, data indicating characteristics of a respective web resource, detecting, based on the received data, that the respective web resource provides functionality for live assistance by a third party content provider through a chat user interface on the respective web resource, and storing, in a database, an entry that indicates that the respective web resource has the functionality. The method includes receiving, from a user, a request to access a particular web resource hosted by a particular third party content provider, determining, based on a stored entry in the database representing the particular web resource, that the web resource provides functionality for live assistance by the particular third party content provider through a particular chat user interface on the web resource, and initiating a chat session between the user and the third party content provider. | 1. (canceled) 2. A method, comprising:
receiving, by a communications server and from a user, spoken input that was submitted through a microphone of a personal digital assistant; obtaining, by the communications server, search results using the spoken input; determining, by the communications server, that a content provider corresponding to one of the search results provides live interactive assistance by way of a chat function; providing, to the user through the personal digital assistant, an option to initiate a chat session using the chat function when the search results are delivered to the user; receiving, through the personal digital assistant, an affirmation that the user has requested the initiation of the chat session; and initiating, by the communications server, a chat session between the user and an agent of the content provider. 3. The method of claim 2, wherein:
providing an option to initiate a chat session comprises providing, through the personal digital assistant, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the personal digital assistant, a vocal response to the audible inquiry. 4. The method of claim 3, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, a vocal response to the audible inquiry. 5. The method of claim 3, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, interaction with a chat widget presented on the display of the second device. 6. The method of claim 2, wherein initiating the chat session comprises initiating an Internet Protocol voice telephone call with the agent. 7. The method of claim 2, comprising:
maintain a state of the chat session, including logging communications between the user and the agent during the chat session; determining that the chat session ended prior to completion of interaction between the agent and the user; initiating a subsequent chat session with a subsequent agent of the content provider; and providing, to the subsequent agent, the state of the chat session, including at least a portion of the logged communications between the user and the agent. 8. The method of claim 7, wherein determining that the chat session ended prior to completion of interaction between the agent and the user comprises determining a lack of activity through the chat function for at least a predetermined period of time. 9. A system, comprising:
a data store storing interaction data corresponding to client-side input to a chat session; a communications server in communication with a client device, wherein the communications server facilitates a chat session between the client device and a content provider, and performs operations including:
receiving, from a user of the client device, spoken input that was submitted through a microphone of a personal digital assistant;
obtaining search results using the spoken input;
determining that a content provider corresponding to one of the search results provides live interactive assistance by way of a chat function;
providing, to the user through the personal digital assistant, an option to initiate a chat session using the chat function when the search results are delivered to the user;
receiving, through the personal digital assistant, an affirmation that the user has requested the initiation of the chat session; and
initiating, by the communications server, a chat session between the user and an agent of the content provider. 10. The system of claim 9, wherein:
providing an option to initiate a chat session comprises providing, through the personal digital assistant, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the personal digital assistant, a vocal response to the audible inquiry. 11. The system of claim 10, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, a vocal response to the audible inquiry. 12. The system of claim 10, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, interaction with a chat widget presented on the display of the second device. 13. The system of claim 9, wherein initiating the chat session comprises initiating an Internet Protocol voice telephone call with the agent. 14. The system of claim 9, the operations comprising:
maintain a state of the chat session, including logging communications between the user and the agent during the chat session; determining that the chat session ended prior to completion of interaction between the agent and the user; initiating a subsequent chat session with a subsequent agent of the content provider; and providing, to the subsequent agent, the state of the chat session, including at least a portion of the logged communications between the user and the agent. 15. The system of claim 14, wherein determining that the chat session ended prior to completion of interaction between the agent and the user comprises determining a lack of activity through the chat function for at least a predetermined period of time. 16. A non-transitory computer readable medium storing instructions that when executed by one or more computing devices, cause the one or more computing devices to perform operations comprising:
receiving, from a user, spoken input that was submitted through a microphone of a personal digital assistant; obtaining search results using the spoken input; determining that a content provider corresponding to one of the search results provides live interactive assistance by way of a chat function; providing, to the user through the personal digital assistant, an option to initiate a chat session using the chat function when the search results are delivered to the user; receiving, through the personal digital assistant, an affirmation that the user has requested the initiation of the chat session; and initiating a chat session between the user and an agent of the content provider. 17. The non-transitory computer readable medium of claim 16, wherein:
providing an option to initiate a chat session comprises providing, through the personal digital assistant, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the personal digital assistant, a vocal response to the audible inquiry. 18. The method of claim 17, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, a vocal response to the audible inquiry. 19. The non-transitory computer readable medium of claim 17, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, interaction with a chat widget presented on the display of the second device. 20. The non-transitory computer readable medium of claim 16, wherein initiating the chat session comprises initiating an Internet Protocol voice telephone call with the agent. 21. The non-transitory computer readable medium of claim 16, the operations comprising:
maintain a state of the chat session, including logging communications between the user and the agent during the chat session; determining that the chat session ended prior to completion of interaction between the agent and the user; initiating a subsequent chat session with a subsequent agent of the content provider; and providing, to the subsequent agent, the state of the chat session, including at least a portion of the logged communications between the user and the agent. | A method includes, for each of a plurality of web resources, receiving, at a communications server, data indicating characteristics of a respective web resource, detecting, based on the received data, that the respective web resource provides functionality for live assistance by a third party content provider through a chat user interface on the respective web resource, and storing, in a database, an entry that indicates that the respective web resource has the functionality. The method includes receiving, from a user, a request to access a particular web resource hosted by a particular third party content provider, determining, based on a stored entry in the database representing the particular web resource, that the web resource provides functionality for live assistance by the particular third party content provider through a particular chat user interface on the web resource, and initiating a chat session between the user and the third party content provider.1. (canceled) 2. A method, comprising:
receiving, by a communications server and from a user, spoken input that was submitted through a microphone of a personal digital assistant; obtaining, by the communications server, search results using the spoken input; determining, by the communications server, that a content provider corresponding to one of the search results provides live interactive assistance by way of a chat function; providing, to the user through the personal digital assistant, an option to initiate a chat session using the chat function when the search results are delivered to the user; receiving, through the personal digital assistant, an affirmation that the user has requested the initiation of the chat session; and initiating, by the communications server, a chat session between the user and an agent of the content provider. 3. The method of claim 2, wherein:
providing an option to initiate a chat session comprises providing, through the personal digital assistant, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the personal digital assistant, a vocal response to the audible inquiry. 4. The method of claim 3, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, a vocal response to the audible inquiry. 5. The method of claim 3, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, interaction with a chat widget presented on the display of the second device. 6. The method of claim 2, wherein initiating the chat session comprises initiating an Internet Protocol voice telephone call with the agent. 7. The method of claim 2, comprising:
maintain a state of the chat session, including logging communications between the user and the agent during the chat session; determining that the chat session ended prior to completion of interaction between the agent and the user; initiating a subsequent chat session with a subsequent agent of the content provider; and providing, to the subsequent agent, the state of the chat session, including at least a portion of the logged communications between the user and the agent. 8. The method of claim 7, wherein determining that the chat session ended prior to completion of interaction between the agent and the user comprises determining a lack of activity through the chat function for at least a predetermined period of time. 9. A system, comprising:
a data store storing interaction data corresponding to client-side input to a chat session; a communications server in communication with a client device, wherein the communications server facilitates a chat session between the client device and a content provider, and performs operations including:
receiving, from a user of the client device, spoken input that was submitted through a microphone of a personal digital assistant;
obtaining search results using the spoken input;
determining that a content provider corresponding to one of the search results provides live interactive assistance by way of a chat function;
providing, to the user through the personal digital assistant, an option to initiate a chat session using the chat function when the search results are delivered to the user;
receiving, through the personal digital assistant, an affirmation that the user has requested the initiation of the chat session; and
initiating, by the communications server, a chat session between the user and an agent of the content provider. 10. The system of claim 9, wherein:
providing an option to initiate a chat session comprises providing, through the personal digital assistant, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the personal digital assistant, a vocal response to the audible inquiry. 11. The system of claim 10, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, a vocal response to the audible inquiry. 12. The system of claim 10, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, interaction with a chat widget presented on the display of the second device. 13. The system of claim 9, wherein initiating the chat session comprises initiating an Internet Protocol voice telephone call with the agent. 14. The system of claim 9, the operations comprising:
maintain a state of the chat session, including logging communications between the user and the agent during the chat session; determining that the chat session ended prior to completion of interaction between the agent and the user; initiating a subsequent chat session with a subsequent agent of the content provider; and providing, to the subsequent agent, the state of the chat session, including at least a portion of the logged communications between the user and the agent. 15. The system of claim 14, wherein determining that the chat session ended prior to completion of interaction between the agent and the user comprises determining a lack of activity through the chat function for at least a predetermined period of time. 16. A non-transitory computer readable medium storing instructions that when executed by one or more computing devices, cause the one or more computing devices to perform operations comprising:
receiving, from a user, spoken input that was submitted through a microphone of a personal digital assistant; obtaining search results using the spoken input; determining that a content provider corresponding to one of the search results provides live interactive assistance by way of a chat function; providing, to the user through the personal digital assistant, an option to initiate a chat session using the chat function when the search results are delivered to the user; receiving, through the personal digital assistant, an affirmation that the user has requested the initiation of the chat session; and initiating a chat session between the user and an agent of the content provider. 17. The non-transitory computer readable medium of claim 16, wherein:
providing an option to initiate a chat session comprises providing, through the personal digital assistant, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the personal digital assistant, a vocal response to the audible inquiry. 18. The method of claim 17, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, a vocal response to the audible inquiry. 19. The non-transitory computer readable medium of claim 17, wherein:
the personal digital assistant is implemented across two or more different devices including a first device that does not include a display and a second device that does include a display; providing an option to initiate a chat session comprises providing, through the first device, an audible inquiry asking whether the user would like to connect to, or chat with, an agent that can provide the user with more information from the content provider; and receiving an affirmation that the user has requested the initiation of the chat session comprises receiving, through the second device, interaction with a chat widget presented on the display of the second device. 20. The non-transitory computer readable medium of claim 16, wherein initiating the chat session comprises initiating an Internet Protocol voice telephone call with the agent. 21. The non-transitory computer readable medium of claim 16, the operations comprising:
maintain a state of the chat session, including logging communications between the user and the agent during the chat session; determining that the chat session ended prior to completion of interaction between the agent and the user; initiating a subsequent chat session with a subsequent agent of the content provider; and providing, to the subsequent agent, the state of the chat session, including at least a portion of the logged communications between the user and the agent. | 2,400 |
8,821 | 8,821 | 16,310,948 | 2,466 | A method and a base station for a mobile communications network. The base station includes a first transceiver configured to communicate over radio signals with a plurality of mobile terminals, in which the first transceiver configured to: transmit a first signal to serve a mobile terminal over multicast; receive from the mobile terminal information derived from the signal quality of a second signal received at the mobile terminal from a second transceiver; and receive from the mobile terminal further information on the quality of the first signal received at the mobile terminal from the first transceiver and on the quality of a third signal received at the mobile terminal from a third transceiver. The base station also includes a processor configured to, on the basis of a comparison of the quality of the second signal with a threshold, switch communications between the first transceiver and the mobile terminal from multicast to unicast; and on the basis of a comparison of the quality of the first signal and the quality of the third signal, instruct the mobile terminal to transition from being served by the first transceiver to being served by the third transceiver. | 1. A method of operating a mobile communications network comprising a plurality of base stations, in which each base station comprises at least one transceiver, in which a first transceiver is comprised in a first base station, in which the method comprises, at the first base station:
operating the first transceiver to:
transmit a first signal to serve a mobile terminal over multicast; and
receive information from the mobile terminal, in which the information is derived from the signal quality of a second signal received at the mobile terminal from a second transceiver; and
receive further information from the mobile terminal, in which the further information derives in part from the quality of the first signal received at the mobile terminal from the first transceiver and in which the information derives in part from the quality of a third signal received at the mobile terminal from a third transceiver;
on the basis of a comparison of the quality of the second signal received at the mobile terminal with a threshold, switching communications between the first transceiver and the mobile terminal from multicast to unicast; on the basis of a comparison of the quality of the first signal and the quality of the third signal, both received at the mobile terminal, providing to the mobile terminal an instruction; in which the instruction instructs the mobile terminal to transition from being served by the first transceiver to being served by the third transceiver. 2. The method of claim 1, in which the method further comprises, at the first base station:
monitoring loading of radio resources used by the first transceiver; and varying, the threshold in dependence on the monitored loading. 3. The method of claim 2, comprising, upon detecting an increase in the loading, varying the threshold so as to reduce the rate at which mobile terminals served by the first base station are switched to unicast. 4. The method of any one of claims 2 and 3, comprising, upon detecting a decrease in the loading, varying the threshold so as to increase the rate at which mobile terminals served by the first base station are switched to unicast. 5. The method of any one of claims 2 to 4, in which the loading comprises at least one of the radio resource usage load at the first base station and traffic levels on radio frequency transmissions between the first base station and at least one mobile terminal. 6. The method of any one of claims 1 to 5, comprising varying the threshold on the basis of a comparison with reference data, of data gathered through monitoring a plurality of mobile terminals being served by the first transceiver and transitioning to being served by the third transceiver, including data gathered through monitoring occurrences of switching communications between the first transceiver and the mobile terminal from multicast to unicast. 7. The method of any one of claims 1 to 6, in which the mobile terminal is in motion relative to the transceivers, in which the distance between the mobile terminal and the second transceiver at the point of providing to the mobile terminal the instruction is greater than the distance between the mobile terminal and the second transceiver at the point of switching communications between the first transceiver and the mobile terminal from multicast to unicast. 8. A computer program element comprising computer program code to, when loaded into a computer system and executed thereon, cause the computer to perform the steps of a method as claimed in any of claims 1 to 7. 9. A base station for a mobile communications network, in which the base station comprises:
a first transceiver configured to transmit radio signals to a plurality of mobile terminals and to receive radio signals from a plurality of mobile terminals; in which the first transceiver is configured to:
transmit a first signal to serve a mobile terminal over multicast;
receive information from the mobile terminal, in which the information is derived from the signal quality of a second signal received at the mobile terminal from a second transceiver; and
receive further information from the mobile terminal, in which the further information derives in part from the quality of the first signal received at the mobile terminal from the first transceiver and in which the information derives in part from the quality of a third signal received at the mobile terminal from a third transceiver; and
a processor configured to:
on the basis of a comparison of the quality of the second signal received at the mobile terminal with a threshold, switch communications between the first transceiver and the mobile terminal from multicast to unicast; and subsequently
on the basis of a comparison of the quality of the first signal and the quality of the third signal, both received at the mobile terminal, provide to the mobile terminal an instruction; in which the instruction instructs the mobile terminal to transition from being served by the first transceiver to being served by the third transceiver. | A method and a base station for a mobile communications network. The base station includes a first transceiver configured to communicate over radio signals with a plurality of mobile terminals, in which the first transceiver configured to: transmit a first signal to serve a mobile terminal over multicast; receive from the mobile terminal information derived from the signal quality of a second signal received at the mobile terminal from a second transceiver; and receive from the mobile terminal further information on the quality of the first signal received at the mobile terminal from the first transceiver and on the quality of a third signal received at the mobile terminal from a third transceiver. The base station also includes a processor configured to, on the basis of a comparison of the quality of the second signal with a threshold, switch communications between the first transceiver and the mobile terminal from multicast to unicast; and on the basis of a comparison of the quality of the first signal and the quality of the third signal, instruct the mobile terminal to transition from being served by the first transceiver to being served by the third transceiver.1. A method of operating a mobile communications network comprising a plurality of base stations, in which each base station comprises at least one transceiver, in which a first transceiver is comprised in a first base station, in which the method comprises, at the first base station:
operating the first transceiver to:
transmit a first signal to serve a mobile terminal over multicast; and
receive information from the mobile terminal, in which the information is derived from the signal quality of a second signal received at the mobile terminal from a second transceiver; and
receive further information from the mobile terminal, in which the further information derives in part from the quality of the first signal received at the mobile terminal from the first transceiver and in which the information derives in part from the quality of a third signal received at the mobile terminal from a third transceiver;
on the basis of a comparison of the quality of the second signal received at the mobile terminal with a threshold, switching communications between the first transceiver and the mobile terminal from multicast to unicast; on the basis of a comparison of the quality of the first signal and the quality of the third signal, both received at the mobile terminal, providing to the mobile terminal an instruction; in which the instruction instructs the mobile terminal to transition from being served by the first transceiver to being served by the third transceiver. 2. The method of claim 1, in which the method further comprises, at the first base station:
monitoring loading of radio resources used by the first transceiver; and varying, the threshold in dependence on the monitored loading. 3. The method of claim 2, comprising, upon detecting an increase in the loading, varying the threshold so as to reduce the rate at which mobile terminals served by the first base station are switched to unicast. 4. The method of any one of claims 2 and 3, comprising, upon detecting a decrease in the loading, varying the threshold so as to increase the rate at which mobile terminals served by the first base station are switched to unicast. 5. The method of any one of claims 2 to 4, in which the loading comprises at least one of the radio resource usage load at the first base station and traffic levels on radio frequency transmissions between the first base station and at least one mobile terminal. 6. The method of any one of claims 1 to 5, comprising varying the threshold on the basis of a comparison with reference data, of data gathered through monitoring a plurality of mobile terminals being served by the first transceiver and transitioning to being served by the third transceiver, including data gathered through monitoring occurrences of switching communications between the first transceiver and the mobile terminal from multicast to unicast. 7. The method of any one of claims 1 to 6, in which the mobile terminal is in motion relative to the transceivers, in which the distance between the mobile terminal and the second transceiver at the point of providing to the mobile terminal the instruction is greater than the distance between the mobile terminal and the second transceiver at the point of switching communications between the first transceiver and the mobile terminal from multicast to unicast. 8. A computer program element comprising computer program code to, when loaded into a computer system and executed thereon, cause the computer to perform the steps of a method as claimed in any of claims 1 to 7. 9. A base station for a mobile communications network, in which the base station comprises:
a first transceiver configured to transmit radio signals to a plurality of mobile terminals and to receive radio signals from a plurality of mobile terminals; in which the first transceiver is configured to:
transmit a first signal to serve a mobile terminal over multicast;
receive information from the mobile terminal, in which the information is derived from the signal quality of a second signal received at the mobile terminal from a second transceiver; and
receive further information from the mobile terminal, in which the further information derives in part from the quality of the first signal received at the mobile terminal from the first transceiver and in which the information derives in part from the quality of a third signal received at the mobile terminal from a third transceiver; and
a processor configured to:
on the basis of a comparison of the quality of the second signal received at the mobile terminal with a threshold, switch communications between the first transceiver and the mobile terminal from multicast to unicast; and subsequently
on the basis of a comparison of the quality of the first signal and the quality of the third signal, both received at the mobile terminal, provide to the mobile terminal an instruction; in which the instruction instructs the mobile terminal to transition from being served by the first transceiver to being served by the third transceiver. | 2,400 |
8,822 | 8,822 | 14,746,597 | 2,483 | A method for locating critical control points on a part or combination of parts during a manufacturing process involves mating, directly or indirectly, a jig extension to the part or parts. A pattern on the jig extension defines an origin point that is used to track the position of the part or parts during manufacturing, such as during location-sensitive operations. The jig extension may be a shoe last extension which connects to a shoe or shoe component via a shoe last. | 1. A method for manufacturing a shoe, the method comprising:
applying a shoe component to a last having a last extension, the last extension comprising a pattern defining an origin on the last extension; identifying the pattern on the last extension; scanning the shoe component to yield scan data for at least a portion of the shoe component; with the scan data, mapping at least a portion of the shoe component to the origin of the last extension; and using the map to perform location-sensitive operations involving at least a portion of the shoe component. 2. The method of claim 1, wherein the pattern comprises two intersecting lines. 3. The method of claim 2, wherein the two lines are orthogonal to one another. 4. The method of claim 3, wherein the lines are continuous grooves across at least a portion of the surface of the rigid body. 5. The method of claim 3, wherein the lines are formed of discrete pattern components. 6. The last extension of claim 5, wherein the discrete pattern components are arcuate. 7. The method of claim 1, wherein the last is reversibly attached to the last extension. 8. The method of claim 1, further comprising calibrating a vision or laser system, and using the vision or laser system to scan the shoe component. 9. The method of claim 8, wherein the calibrating comprises checkerboard calibration. 10. The method of claim 1, wherein the last extension is no wider than the last. 11. The method of claim 1, wherein the mapping correlates a plurality of locations on the shoe component to an origin point defined by the pattern of the last extension, such that the shoe component locations are determinable in subsequent operations based on the origin point on the last extension. 12. The method of claim 1, further comprising passing the last from a first location sensitive operation to a second location sensitive operation, wherein the pattern serves as an alignment mechanism between the first location sensitive operation and the second location sensitive operation. 13. A method for precisely determining the position of variable parts, the method comprising:
providing a jig extension, the jig extension comprising a connection to a part and a pattern defining an origin on the jig extension; identifying the pattern on the jig extension; scanning the part to yield scan data for at least a portion of the part; with the scan data, mapping at least a portion of the part to the origin on the jig extension; and using the map to perform location-sensitive operations involving at least a portion of the part. 14. The method of claim 13, wherein the pattern comprises two intersecting lines. 15. The method of claim 14, wherein the two lines are orthogonal to one another. 16. The method of claim 15, wherein the lines are continuous grooves across at least a portion of a surface of the jig extension. 17. The method of claim 15, wherein the lines are formed of discrete pattern components. 18. The last extension of claim 17, wherein the discrete pattern components are arcuate. 19. The method of claim 13, wherein the jig extension is reversibly attached to the part. 20. The method of claim 19, wherein the jig extension is indirectly attached to the part. 21. The method of claim 13, further comprising calibrating a vision or laser system, and using the vision or laser system to scan the part. 22. The method of claim 21, wherein the calibrating comprises checkerboard calibration. 23. A system for manufacturing a shoe, the system comprising:
a last; a last extension reversibly joinable to the last, the last extension comprising a pattern defining an origin on the last extension; a sensor for detecting the pattern; and a processor. 24. The system of claim 23, wherein the processor is configured to receive data regarding the last extension and the pattern on the last extension, and to use the data regarding the last extension and the pattern on the last extension to identify the point of origin on the last extension. 25. The system of claim 24, further comprising a laser scanner, wherein the processor is further configured to receive laser-scanned images of the last or a part overlying the last. 26. The system of claim 25, wherein the processor is configured to map the laser-scanned image of the last or the part overlying the last to the point of origin on the last extension. 27. The system of claim 26, wherein the map is used to monitor or control the position of the part on the last during other processing steps. 28. The system of claim 27, wherein the other processing steps rely solely on the map for locating the part or a portion thereof. 29. The system of claim 27, wherein the other processing comprises applying an adhesive to the part. 30. The system of claim 29, further comprising an attaching station, wherein at the attaching station a part on the last is irreversibly joined to another part. 31. The system of claim 23, wherein the pattern comprises two lines orthogonal to one another. 32. The system of claim 29, wherein the lines are continuous grooves across at least a portion of the surface of the rigid body. | A method for locating critical control points on a part or combination of parts during a manufacturing process involves mating, directly or indirectly, a jig extension to the part or parts. A pattern on the jig extension defines an origin point that is used to track the position of the part or parts during manufacturing, such as during location-sensitive operations. The jig extension may be a shoe last extension which connects to a shoe or shoe component via a shoe last.1. A method for manufacturing a shoe, the method comprising:
applying a shoe component to a last having a last extension, the last extension comprising a pattern defining an origin on the last extension; identifying the pattern on the last extension; scanning the shoe component to yield scan data for at least a portion of the shoe component; with the scan data, mapping at least a portion of the shoe component to the origin of the last extension; and using the map to perform location-sensitive operations involving at least a portion of the shoe component. 2. The method of claim 1, wherein the pattern comprises two intersecting lines. 3. The method of claim 2, wherein the two lines are orthogonal to one another. 4. The method of claim 3, wherein the lines are continuous grooves across at least a portion of the surface of the rigid body. 5. The method of claim 3, wherein the lines are formed of discrete pattern components. 6. The last extension of claim 5, wherein the discrete pattern components are arcuate. 7. The method of claim 1, wherein the last is reversibly attached to the last extension. 8. The method of claim 1, further comprising calibrating a vision or laser system, and using the vision or laser system to scan the shoe component. 9. The method of claim 8, wherein the calibrating comprises checkerboard calibration. 10. The method of claim 1, wherein the last extension is no wider than the last. 11. The method of claim 1, wherein the mapping correlates a plurality of locations on the shoe component to an origin point defined by the pattern of the last extension, such that the shoe component locations are determinable in subsequent operations based on the origin point on the last extension. 12. The method of claim 1, further comprising passing the last from a first location sensitive operation to a second location sensitive operation, wherein the pattern serves as an alignment mechanism between the first location sensitive operation and the second location sensitive operation. 13. A method for precisely determining the position of variable parts, the method comprising:
providing a jig extension, the jig extension comprising a connection to a part and a pattern defining an origin on the jig extension; identifying the pattern on the jig extension; scanning the part to yield scan data for at least a portion of the part; with the scan data, mapping at least a portion of the part to the origin on the jig extension; and using the map to perform location-sensitive operations involving at least a portion of the part. 14. The method of claim 13, wherein the pattern comprises two intersecting lines. 15. The method of claim 14, wherein the two lines are orthogonal to one another. 16. The method of claim 15, wherein the lines are continuous grooves across at least a portion of a surface of the jig extension. 17. The method of claim 15, wherein the lines are formed of discrete pattern components. 18. The last extension of claim 17, wherein the discrete pattern components are arcuate. 19. The method of claim 13, wherein the jig extension is reversibly attached to the part. 20. The method of claim 19, wherein the jig extension is indirectly attached to the part. 21. The method of claim 13, further comprising calibrating a vision or laser system, and using the vision or laser system to scan the part. 22. The method of claim 21, wherein the calibrating comprises checkerboard calibration. 23. A system for manufacturing a shoe, the system comprising:
a last; a last extension reversibly joinable to the last, the last extension comprising a pattern defining an origin on the last extension; a sensor for detecting the pattern; and a processor. 24. The system of claim 23, wherein the processor is configured to receive data regarding the last extension and the pattern on the last extension, and to use the data regarding the last extension and the pattern on the last extension to identify the point of origin on the last extension. 25. The system of claim 24, further comprising a laser scanner, wherein the processor is further configured to receive laser-scanned images of the last or a part overlying the last. 26. The system of claim 25, wherein the processor is configured to map the laser-scanned image of the last or the part overlying the last to the point of origin on the last extension. 27. The system of claim 26, wherein the map is used to monitor or control the position of the part on the last during other processing steps. 28. The system of claim 27, wherein the other processing steps rely solely on the map for locating the part or a portion thereof. 29. The system of claim 27, wherein the other processing comprises applying an adhesive to the part. 30. The system of claim 29, further comprising an attaching station, wherein at the attaching station a part on the last is irreversibly joined to another part. 31. The system of claim 23, wherein the pattern comprises two lines orthogonal to one another. 32. The system of claim 29, wherein the lines are continuous grooves across at least a portion of the surface of the rigid body. | 2,400 |
8,823 | 8,823 | 14,022,677 | 2,447 | An aspect provides a method, including: receiving, at an information handling device, a message directed to a human recipient; processing, using one or more processors of the information handling device, the message to identify one or more action items contained in content of the message; and executing one or more additional actions based on the one or more action items identified from the content of the message. Other aspects are described and claimed. | 1. A method, comprising:
receiving, at an information handling device, a message directed to a human recipient; processing, using one or more processors of the information handling device, the message to identify one or more action items contained in content of the message; and executing one or more additional actions based on the one or more action items identified from the content of the message. 2. The method of claim 1, wherein the processing comprises:
parsing the content of the message to analyze one or more of a word and a phrase contained therein; and comparing the one or more of a word and a phrase to a predetermined set of key words and key phrases associated with one or more action items. 3. The method of claim 2, wherein the receiving a message comprises receiving two or more messages from a sender within a predetermined time; and wherein processing the message comprises analyzing in combination one or more of words and phrases in the two or more messages to identify the one or more action items. 4. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises determining an urgency of an action item. 5. The method of claim 1, further comprising designating one or more contacts as a high priority contact permitted to create action items. 6. The method of claim 5, wherein the executing one or more additional actions based on the one or more action items identified comprises:
determining if a sender of the message is a high priority contact; and after determining the sender of the message is not a high priority contact, taking no additional action. 7. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises providing a separate notification to a user of the one or more action items identified. 8. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises adding a calendar entry on an electronic calendar application based on an action item. 9. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises translating the action item into a response to the sender. 10. The method of claim 9, further comprising providing an opportunity for user confirmation of the response prior to sending the response to the sender. 11. An information handling device, comprising:
one or more processors; a memory device accessible to the one or more processors and storing code executable by the one or more processors to: receive a message directed to a human recipient; process the message to identify one or more action items contained in content of the message; and execute one or more additional actions based on the one or more action items identified from the content of the message. 12. The information handling device of claim 11, wherein to process comprises:
parsing the content of the message to analyze one or more of a word and a phrase contained therein; and comparing the one or more of a word and a phrase to a predetermined set of key words and key phrases associated with one or more action items. 13. The information handling device of claim 12, wherein to receive a message comprises receiving two or more messages from a sender within a predetermined time; and wherein to process the message comprises analyzing in combination one or more of words and phrases in the two or more messages to identify the one or more action items. 14. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises determining an urgency of an action item. 15. The information handling device of claim 11, further comprising designating one or more contacts as a high priority contact permitted to create action items. 16. The information handling device of claim 15, wherein to execute one or more additional actions based on the one or more action items identified comprises:
determining if a sender of the message is a high priority contact; and after determining the sender of the message is not a high priority contact, taking no additional action. 17. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises providing a separate notification to a user of the one or more action items identified. 18. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises adding a calendar entry on an electronic calendar application based on an action item. 19. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises translating the action item into a response to the sender. 20. A program product, comprising:
a storage device having computer readable program code stored therewith, the computer readable program code comprising: computer readable program code configured to receive, at an information handling device, a message directed to a human recipient; computer readable program code configured to process, using one or more processors of the information handling device, the message to identify one or more action items contained in content of the message; and computer readable program code configured to execute one or more additional actions based on the one or more action items identified from the content of the message. | An aspect provides a method, including: receiving, at an information handling device, a message directed to a human recipient; processing, using one or more processors of the information handling device, the message to identify one or more action items contained in content of the message; and executing one or more additional actions based on the one or more action items identified from the content of the message. Other aspects are described and claimed.1. A method, comprising:
receiving, at an information handling device, a message directed to a human recipient; processing, using one or more processors of the information handling device, the message to identify one or more action items contained in content of the message; and executing one or more additional actions based on the one or more action items identified from the content of the message. 2. The method of claim 1, wherein the processing comprises:
parsing the content of the message to analyze one or more of a word and a phrase contained therein; and comparing the one or more of a word and a phrase to a predetermined set of key words and key phrases associated with one or more action items. 3. The method of claim 2, wherein the receiving a message comprises receiving two or more messages from a sender within a predetermined time; and wherein processing the message comprises analyzing in combination one or more of words and phrases in the two or more messages to identify the one or more action items. 4. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises determining an urgency of an action item. 5. The method of claim 1, further comprising designating one or more contacts as a high priority contact permitted to create action items. 6. The method of claim 5, wherein the executing one or more additional actions based on the one or more action items identified comprises:
determining if a sender of the message is a high priority contact; and after determining the sender of the message is not a high priority contact, taking no additional action. 7. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises providing a separate notification to a user of the one or more action items identified. 8. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises adding a calendar entry on an electronic calendar application based on an action item. 9. The method of claim 1, wherein the executing one or more additional actions based on the one or more action items identified comprises translating the action item into a response to the sender. 10. The method of claim 9, further comprising providing an opportunity for user confirmation of the response prior to sending the response to the sender. 11. An information handling device, comprising:
one or more processors; a memory device accessible to the one or more processors and storing code executable by the one or more processors to: receive a message directed to a human recipient; process the message to identify one or more action items contained in content of the message; and execute one or more additional actions based on the one or more action items identified from the content of the message. 12. The information handling device of claim 11, wherein to process comprises:
parsing the content of the message to analyze one or more of a word and a phrase contained therein; and comparing the one or more of a word and a phrase to a predetermined set of key words and key phrases associated with one or more action items. 13. The information handling device of claim 12, wherein to receive a message comprises receiving two or more messages from a sender within a predetermined time; and wherein to process the message comprises analyzing in combination one or more of words and phrases in the two or more messages to identify the one or more action items. 14. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises determining an urgency of an action item. 15. The information handling device of claim 11, further comprising designating one or more contacts as a high priority contact permitted to create action items. 16. The information handling device of claim 15, wherein to execute one or more additional actions based on the one or more action items identified comprises:
determining if a sender of the message is a high priority contact; and after determining the sender of the message is not a high priority contact, taking no additional action. 17. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises providing a separate notification to a user of the one or more action items identified. 18. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises adding a calendar entry on an electronic calendar application based on an action item. 19. The information handling device of claim 11, wherein to execute one or more additional actions based on the one or more action items identified comprises translating the action item into a response to the sender. 20. A program product, comprising:
a storage device having computer readable program code stored therewith, the computer readable program code comprising: computer readable program code configured to receive, at an information handling device, a message directed to a human recipient; computer readable program code configured to process, using one or more processors of the information handling device, the message to identify one or more action items contained in content of the message; and computer readable program code configured to execute one or more additional actions based on the one or more action items identified from the content of the message. | 2,400 |
8,824 | 8,824 | 15,420,865 | 2,431 | In one example in accordance with the present disclosure, a system may comprise a a combination engine to combine an encrypted device identification and a routing indicator resulting in a combined device identification. The system may also include an encryption engine to encrypt the combined device identification and a transmission engine to transmit the encrypted combined device identification. | 1. A system comprising:
a combination engine to combine an encrypted device identification and a routing indicator resulting in a combined device identification; an encryption engine to encrypt the combined device identification; and a transmission engine to transmit the encrypted combined device identification. 2. The system of claim 1 wherein the encryption engine encrypts the combined device identification via an encryption key that is unknown to devices on a network other than an authentication server. 3. The system of claim 2 wherein the encryption key is of a first type of encryption and the encrypted device identification is encrypted using a second type of encryption other than the first type. 4. The system of claim 2 wherein the encryption key is provided by a network operator. 5. The system of claim 1 wherein the transmission engine transmits the encrypted combined device identification to an access point indicated by the routing indicator. 6. The system of claim 1 wherein the encryption engine is to encrypt device identification resulting in the encrypted device identification. 7. The system of claim 1 wherein the combination engine combines the encrypted device identification with the routing indicator via affixation of the routing indicator to an end of the encrypted device identification. 8. The system of claim 1 wherein the encrypted device identification is at least eight bytes, the routing indicator is at least eight bytes and the combined device identification is at least 16 bytes. 9. The system of claim 1 wherein the combination engine is to combine the encrypted combined user identification with a tag and index value to create a temporary identification. 10. The system of claim 1 wherein the combination engine is to encode the temporary identification. 11. A method comprising:
combining, by the processor of an authentication server, an encrypted device information with a routing indicator; encrypting, by the processor, the combined device information via an encryption key; and transmitting, by the processor, the encrypted combined device information to an access point. 12. The method of claim 11 comprising:
generating, by the processor, a temporary identification corresponding to the device information using the encrypted combined device identification, a tag value and an index value. 13. The method of claim 11, wherein the encryption key is a second encryption key, the method comprising:
encrypting, by the processor, device information via a first encryption key, wherein the first encryption key is private to the authentication server; 14. The method of claim 11, wherein a device associated with the encrypted device information is connected to a first network and routing indicator identifies an access point associated with a second network. 15. The method of claim 14 wherein the encryption key is concealed from network entities on the first and second networks other than the authentication server. 16. A non-transitory machine-readable storage medium encoded with instructions, the instructions executable by a processor of a system to cause the system to:
combine an encrypted device identification with a routing indicator resulting in a combined device identification; encrypt the combined device identification via an encryption key; and transmit the encrypted combined device identification based on the routing indicator. 17. The non-transitory machine-readable storage medium of claim 16, wherein the encryption key is a second encryption key of a second type, the instructions executable by the processor of the system to cause the system to:
encrypt information of a user device via a first encryption key of a first type other than the second type, resulting in the encrypted device identification. 18. The non-transitory machine-readable storage medium of claim 17 wherein the second encryption key is provided by an operator of a network and the second encryption key is concealed from other network entities on the network. 19. The non-transitory machine-readable storage medium of claim 16, wherein the instructions executable by the processor of the system to combine the encrypted device identification with the routing indicator cause the system to affix the routing indicator to a beginning of the encrypted device identification. 20. The non-transitory machine-readable storage medium of claim 16, the instructions executable by the processor of the system to cause the system to:
generate a temporary identification using the encrypted combined device identification, a tag value and an index value. | In one example in accordance with the present disclosure, a system may comprise a a combination engine to combine an encrypted device identification and a routing indicator resulting in a combined device identification. The system may also include an encryption engine to encrypt the combined device identification and a transmission engine to transmit the encrypted combined device identification.1. A system comprising:
a combination engine to combine an encrypted device identification and a routing indicator resulting in a combined device identification; an encryption engine to encrypt the combined device identification; and a transmission engine to transmit the encrypted combined device identification. 2. The system of claim 1 wherein the encryption engine encrypts the combined device identification via an encryption key that is unknown to devices on a network other than an authentication server. 3. The system of claim 2 wherein the encryption key is of a first type of encryption and the encrypted device identification is encrypted using a second type of encryption other than the first type. 4. The system of claim 2 wherein the encryption key is provided by a network operator. 5. The system of claim 1 wherein the transmission engine transmits the encrypted combined device identification to an access point indicated by the routing indicator. 6. The system of claim 1 wherein the encryption engine is to encrypt device identification resulting in the encrypted device identification. 7. The system of claim 1 wherein the combination engine combines the encrypted device identification with the routing indicator via affixation of the routing indicator to an end of the encrypted device identification. 8. The system of claim 1 wherein the encrypted device identification is at least eight bytes, the routing indicator is at least eight bytes and the combined device identification is at least 16 bytes. 9. The system of claim 1 wherein the combination engine is to combine the encrypted combined user identification with a tag and index value to create a temporary identification. 10. The system of claim 1 wherein the combination engine is to encode the temporary identification. 11. A method comprising:
combining, by the processor of an authentication server, an encrypted device information with a routing indicator; encrypting, by the processor, the combined device information via an encryption key; and transmitting, by the processor, the encrypted combined device information to an access point. 12. The method of claim 11 comprising:
generating, by the processor, a temporary identification corresponding to the device information using the encrypted combined device identification, a tag value and an index value. 13. The method of claim 11, wherein the encryption key is a second encryption key, the method comprising:
encrypting, by the processor, device information via a first encryption key, wherein the first encryption key is private to the authentication server; 14. The method of claim 11, wherein a device associated with the encrypted device information is connected to a first network and routing indicator identifies an access point associated with a second network. 15. The method of claim 14 wherein the encryption key is concealed from network entities on the first and second networks other than the authentication server. 16. A non-transitory machine-readable storage medium encoded with instructions, the instructions executable by a processor of a system to cause the system to:
combine an encrypted device identification with a routing indicator resulting in a combined device identification; encrypt the combined device identification via an encryption key; and transmit the encrypted combined device identification based on the routing indicator. 17. The non-transitory machine-readable storage medium of claim 16, wherein the encryption key is a second encryption key of a second type, the instructions executable by the processor of the system to cause the system to:
encrypt information of a user device via a first encryption key of a first type other than the second type, resulting in the encrypted device identification. 18. The non-transitory machine-readable storage medium of claim 17 wherein the second encryption key is provided by an operator of a network and the second encryption key is concealed from other network entities on the network. 19. The non-transitory machine-readable storage medium of claim 16, wherein the instructions executable by the processor of the system to combine the encrypted device identification with the routing indicator cause the system to affix the routing indicator to a beginning of the encrypted device identification. 20. The non-transitory machine-readable storage medium of claim 16, the instructions executable by the processor of the system to cause the system to:
generate a temporary identification using the encrypted combined device identification, a tag value and an index value. | 2,400 |
8,825 | 8,825 | 15,428,713 | 2,447 | Disclosed herein are enhancements for operating a content delivery network to purge data objects from cache nodes of the content delivery network. In one implementation, a method of operating a cache node includes receiving purge messages and, for each message, identifying data objects to be purged based on a purge rule in each purge message, wherein the purge rule comprises at least one content attribute related to content in the identified data objects. The method further provides, purging the identified data objects. | 1. A method of operating a cache node in a content delivery network, the method comprising:
caching data objects in the cache node on behalf of at least one origin server; receiving a set of purge messages, wherein each purge message in the set of purge messages comprises a rule that specifies at least one content attribute to be purged from the cache node; applying the rule to the data objects to identify which subset of the data objects have the content attribute specified in the rule; and purging the subset of the data objects from the cache node. 2. The method of claim 1 wherein the at least one content attribute comprises at least one of text content, title information, author information, or subject information for the subset of the data objects. 3. The method of claim 1 further comprising caching the rules for the set of purge messages. 4. The method of claim 3 further comprising:
receiving a new data object from a second node;
identifying whether the new data object is purged based on the cached rules;
if the new data object is purged, preventing the data object from being cached in the cache node. 5. The method of claim 4 further comprising receiving a first object request from an end user device, and transferring a second object request to the second node based on the first object request, wherein receiving the new data object from the second node comprises receiving the new data object from the second node in response to the second object request. 6. The method of claim 5 wherein transferring the second object request to the second node based on the first object request comprises identifying that no data object cached in the cache node services the first object request and, in response to identifying that no data object cached in the cache node services the first object request, transferring the second object request to the second node to service the first object request. 7. The method of claim 5 further comprising, if the new data object is not purged, transferring the data object to the end user device. 8. The method of claim 5 further comprising, if the new data object is purged, providing an error message to the end user device. 9. The method of claim 5 wherein the second node comprises one of an origin server or a second cache node of the cache nodes. 10. The method of claim 3 further comprising:
receiving a first object request from an end user device;
identifying that no data object cached in the cache node services the first object request;
in response to identifying that no data object can service the first object request, transferring a second object request to a second node to service the first object request;
receiving an indication from the second node that an object to service the first object request has been purged; and
transferring an error notification to the end user device based on the indication. 11. The method of claim 3 wherein each purge message in the set of purge messages further comprises time to live information indicative of an amount of time that each rule is valid. 12. A computing apparatus comprising:
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; program instructions stored on the one or more computer readable storage media to operate a cache node of a content delivery network that, when read and executed by the processing system, direct the processing system to at least:
cache data objects in the cache node on behalf of at least one origin server;
receive a set of purge messages, wherein each purge message in the set of purge messages comprises a rule that specifies at least one content attribute to be purged from the cache node;
apply the rule to the data objects to identify which subset of the data objects have the content attribute specified in the rule; and
purge the subset of the data objects from the cache node. 13. The computing apparatus of claim 12 wherein the at least one content attribute comprises at least one of text content, title information, author information, or subject information for the subset of the data objects. 14. The computing apparatus of claim 12 wherein the program instructions further direct the processing system to cache the rules for the set of purge messages. 15. The computing apparatus of claim 14 wherein the program instructions further direct the processing system to:
receive a new data object from a second node;
identify whether the new data object is purged based on the cached rules; and
if the new data object is purged, prevent the data object from being cached in the cache node. 16. The computing apparatus of claim 15 wherein the program instructions further direct the processing system to:
receive a first object request from an end user device;
identify that no data object cached on the cache node services the first object request; and
transfer a second object request to the second node for a data object to service the first object request, and
wherein the program instructions to receive the new data object from the second node direct the processing system to receive the new data object from the second node in response to the second object request. 17. The computing apparatus of claim 16 wherein the program instructions further direct the processing system to, if the new data object is not purged, transfer the data object to the end user device. 18. The computing apparatus of claim 16 wherein the program instructions further direct the processing system to, if the new data object is purged, provide an error message to the end user device. 19. The computing apparatus of claim 16 wherein the second node comprises one of an origin server or a second cache node in the content delivery network. 20. The computing apparatus of claim 14 wherein the program instructions further direct the processing system to:
receive a first object request from an end user device;
identify that no data object cached in the cache node services the first object request;
in response to identifying that no data object can service the first object request, transfer a second object request to a second node to service the first object request;
receive an indication from the second node that an object to service the first object request has been purged; and
transfer an error notification to the end user device based on the indication. | Disclosed herein are enhancements for operating a content delivery network to purge data objects from cache nodes of the content delivery network. In one implementation, a method of operating a cache node includes receiving purge messages and, for each message, identifying data objects to be purged based on a purge rule in each purge message, wherein the purge rule comprises at least one content attribute related to content in the identified data objects. The method further provides, purging the identified data objects.1. A method of operating a cache node in a content delivery network, the method comprising:
caching data objects in the cache node on behalf of at least one origin server; receiving a set of purge messages, wherein each purge message in the set of purge messages comprises a rule that specifies at least one content attribute to be purged from the cache node; applying the rule to the data objects to identify which subset of the data objects have the content attribute specified in the rule; and purging the subset of the data objects from the cache node. 2. The method of claim 1 wherein the at least one content attribute comprises at least one of text content, title information, author information, or subject information for the subset of the data objects. 3. The method of claim 1 further comprising caching the rules for the set of purge messages. 4. The method of claim 3 further comprising:
receiving a new data object from a second node;
identifying whether the new data object is purged based on the cached rules;
if the new data object is purged, preventing the data object from being cached in the cache node. 5. The method of claim 4 further comprising receiving a first object request from an end user device, and transferring a second object request to the second node based on the first object request, wherein receiving the new data object from the second node comprises receiving the new data object from the second node in response to the second object request. 6. The method of claim 5 wherein transferring the second object request to the second node based on the first object request comprises identifying that no data object cached in the cache node services the first object request and, in response to identifying that no data object cached in the cache node services the first object request, transferring the second object request to the second node to service the first object request. 7. The method of claim 5 further comprising, if the new data object is not purged, transferring the data object to the end user device. 8. The method of claim 5 further comprising, if the new data object is purged, providing an error message to the end user device. 9. The method of claim 5 wherein the second node comprises one of an origin server or a second cache node of the cache nodes. 10. The method of claim 3 further comprising:
receiving a first object request from an end user device;
identifying that no data object cached in the cache node services the first object request;
in response to identifying that no data object can service the first object request, transferring a second object request to a second node to service the first object request;
receiving an indication from the second node that an object to service the first object request has been purged; and
transferring an error notification to the end user device based on the indication. 11. The method of claim 3 wherein each purge message in the set of purge messages further comprises time to live information indicative of an amount of time that each rule is valid. 12. A computing apparatus comprising:
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; program instructions stored on the one or more computer readable storage media to operate a cache node of a content delivery network that, when read and executed by the processing system, direct the processing system to at least:
cache data objects in the cache node on behalf of at least one origin server;
receive a set of purge messages, wherein each purge message in the set of purge messages comprises a rule that specifies at least one content attribute to be purged from the cache node;
apply the rule to the data objects to identify which subset of the data objects have the content attribute specified in the rule; and
purge the subset of the data objects from the cache node. 13. The computing apparatus of claim 12 wherein the at least one content attribute comprises at least one of text content, title information, author information, or subject information for the subset of the data objects. 14. The computing apparatus of claim 12 wherein the program instructions further direct the processing system to cache the rules for the set of purge messages. 15. The computing apparatus of claim 14 wherein the program instructions further direct the processing system to:
receive a new data object from a second node;
identify whether the new data object is purged based on the cached rules; and
if the new data object is purged, prevent the data object from being cached in the cache node. 16. The computing apparatus of claim 15 wherein the program instructions further direct the processing system to:
receive a first object request from an end user device;
identify that no data object cached on the cache node services the first object request; and
transfer a second object request to the second node for a data object to service the first object request, and
wherein the program instructions to receive the new data object from the second node direct the processing system to receive the new data object from the second node in response to the second object request. 17. The computing apparatus of claim 16 wherein the program instructions further direct the processing system to, if the new data object is not purged, transfer the data object to the end user device. 18. The computing apparatus of claim 16 wherein the program instructions further direct the processing system to, if the new data object is purged, provide an error message to the end user device. 19. The computing apparatus of claim 16 wherein the second node comprises one of an origin server or a second cache node in the content delivery network. 20. The computing apparatus of claim 14 wherein the program instructions further direct the processing system to:
receive a first object request from an end user device;
identify that no data object cached in the cache node services the first object request;
in response to identifying that no data object can service the first object request, transfer a second object request to a second node to service the first object request;
receive an indication from the second node that an object to service the first object request has been purged; and
transfer an error notification to the end user device based on the indication. | 2,400 |
8,826 | 8,826 | 14,487,957 | 2,449 | A streams manager creates one or more helper operators when a streaming application is initially deployed. As the streaming application runs, the streams manager monitors performance of the streaming application. When a bottleneck is detected, the streams manager automatically adjusts a helper operator to help the operator experiencing the bottleneck, thereby dynamically improving performance of the streaming application. Helper operators can be dynamically created and destroyed by the streams manager as needed, and can be deployed to virtual machines in a cloud. | 1. A computer-implemented method executed by at least one processor for managing a streaming application, the method comprising:
creating a streaming application that comprises a flow graph that includes a plurality of operators that process a plurality of data tuples; creating at least one helper operator that has an input and an output that initially are disconnected; monitoring performance of at least one of the plurality of operators in the streaming application; and when one of the at least one operators in the streaming application becomes a bottleneck, adjusting the at least one helper operator by connecting the input and the output of the helper operator to the flow graph to alleviate the bottleneck in the one operator. 2. The method of claim 1 wherein an operator becomes a bottleneck by processing incoming data tuples at a rate less than a rate of receiving the incoming data tuples. 3. The method of claim 1 wherein a streams manager detects when the one operator becomes a bottleneck. 4. The method of claim 3 wherein the streams manager detects when the one operator becomes a bottleneck by monitoring at least one condition in the one operator. 5. The method of claim 3 wherein the streams manager detects when the one operator becomes a bottleneck by comparing performance of the one operator with at least one threshold. 6. The method of claim 3 wherein the one operator detects when the one operator becomes a bottleneck and sends a notification to the streams manager, wherein the streams manager detects when the one operator becomes a bottleneck by receiving the notification from the one operator. 7. The method of claim 1 wherein monitoring the performance of the at least one of the plurality of operators is performed by comparing current performance of the at least one of the plurality of operators to at least one defined performance threshold. 8. The method of claim 1 wherein the helper operator implements logic for the one operator and processes data tuples in parallel with the one operator in the flow graph after the streams manager adjusts the at least one helper operator. 9. The method of claim 1 further comprising dynamically creating and destroying a plurality of helper operators as needed during execution of the streaming application. 10. A computer-implemented method executed by at least one processor for managing a streaming application, the method comprising:
creating a streaming application that comprises a flow graph that includes a plurality of operators that process a plurality of data tuples; creating at least one helper operator that has an input and an output that initially are disconnected by deploying the at least one helper operator to a virtual machine in a cloud; one of the plurality of operators monitoring a rate of receiving incoming data tuples with a rate of processing the incoming data tuples, and when the rate of receiving the incoming data tuples exceeds the rate of processing the incoming data tuples, the one operator notifying a streams manager that the one operator has become a bottleneck; in response to the notification received from the one operator that the one operator has become a bottleneck, the streams manager adjusting the at least one helper operator by connecting the input and the output of the helper operator to the flow graph to alleviate the bottleneck in the one operator, wherein the helper operator implements logic for the one operator and processes data tuples in parallel with the one operator in the flow graph after the streams manager adjusts the at least one helper operator; dynamically creating by the streams manager as needed any of a plurality of helper operators; and dynamically destroying by the streams manager as needed at least one of the plurality of helper operators when no longer needed. | A streams manager creates one or more helper operators when a streaming application is initially deployed. As the streaming application runs, the streams manager monitors performance of the streaming application. When a bottleneck is detected, the streams manager automatically adjusts a helper operator to help the operator experiencing the bottleneck, thereby dynamically improving performance of the streaming application. Helper operators can be dynamically created and destroyed by the streams manager as needed, and can be deployed to virtual machines in a cloud.1. A computer-implemented method executed by at least one processor for managing a streaming application, the method comprising:
creating a streaming application that comprises a flow graph that includes a plurality of operators that process a plurality of data tuples; creating at least one helper operator that has an input and an output that initially are disconnected; monitoring performance of at least one of the plurality of operators in the streaming application; and when one of the at least one operators in the streaming application becomes a bottleneck, adjusting the at least one helper operator by connecting the input and the output of the helper operator to the flow graph to alleviate the bottleneck in the one operator. 2. The method of claim 1 wherein an operator becomes a bottleneck by processing incoming data tuples at a rate less than a rate of receiving the incoming data tuples. 3. The method of claim 1 wherein a streams manager detects when the one operator becomes a bottleneck. 4. The method of claim 3 wherein the streams manager detects when the one operator becomes a bottleneck by monitoring at least one condition in the one operator. 5. The method of claim 3 wherein the streams manager detects when the one operator becomes a bottleneck by comparing performance of the one operator with at least one threshold. 6. The method of claim 3 wherein the one operator detects when the one operator becomes a bottleneck and sends a notification to the streams manager, wherein the streams manager detects when the one operator becomes a bottleneck by receiving the notification from the one operator. 7. The method of claim 1 wherein monitoring the performance of the at least one of the plurality of operators is performed by comparing current performance of the at least one of the plurality of operators to at least one defined performance threshold. 8. The method of claim 1 wherein the helper operator implements logic for the one operator and processes data tuples in parallel with the one operator in the flow graph after the streams manager adjusts the at least one helper operator. 9. The method of claim 1 further comprising dynamically creating and destroying a plurality of helper operators as needed during execution of the streaming application. 10. A computer-implemented method executed by at least one processor for managing a streaming application, the method comprising:
creating a streaming application that comprises a flow graph that includes a plurality of operators that process a plurality of data tuples; creating at least one helper operator that has an input and an output that initially are disconnected by deploying the at least one helper operator to a virtual machine in a cloud; one of the plurality of operators monitoring a rate of receiving incoming data tuples with a rate of processing the incoming data tuples, and when the rate of receiving the incoming data tuples exceeds the rate of processing the incoming data tuples, the one operator notifying a streams manager that the one operator has become a bottleneck; in response to the notification received from the one operator that the one operator has become a bottleneck, the streams manager adjusting the at least one helper operator by connecting the input and the output of the helper operator to the flow graph to alleviate the bottleneck in the one operator, wherein the helper operator implements logic for the one operator and processes data tuples in parallel with the one operator in the flow graph after the streams manager adjusts the at least one helper operator; dynamically creating by the streams manager as needed any of a plurality of helper operators; and dynamically destroying by the streams manager as needed at least one of the plurality of helper operators when no longer needed. | 2,400 |
8,827 | 8,827 | 14,877,130 | 2,463 | Instead of monitoring a wireless region for beacons, to learn of availability of different wireless access points in a particular geographical region, an end user-operated communication device generates a network discovery request message. The communication device initiates wireless broadcast of the network discovery request message from the user-operated communication device to any of one or more listening non-beacon-generating wireless access points in a wireless network environment. Each of the non-beacon generating wireless access points receiving the network discovery request message from the user-operated communication device produces a respective network discovery response message including network identity information (such as one or more SSIDs) associated with the respective non-beacon generating wireless access point. The non-beacon generating wireless access points transmit network discovery response messages to the user-operated communication device, informing the communication device of network availability. | 1. A method comprising:
at an end user communication device;
generating a network discovery request message;
initiating wireless broadcast of the network discovery request message from the end user communication device to a listening non-beacon-generating wireless access point in a wireless network environment; and
receiving a network discovery response message from the non-beacon-generating wireless access point, the network discovery response message including network identity information associated with the non-beacon-generating wireless access point. 2. The method as in claim 1, wherein the non-beacon-generating wireless access point measures a wireless power level of receiving the network discovery request message, the network discovery response message including power signal level information indicating the measured wireless power level at which the non-beacon-generating wireless access point received the network discovery request message. 3. The method as in claim 2 further comprising:
as a response to the broadcasted network discovery request message, receiving network discovery response messages from multiple non-beacon-generating wireless access points in the wireless network environment, each of the network discovery response messages indicating a power level of receiving the respective network discovery request message; and
analyzing the network discovery response messages to identify a non-beacon-generating wireless access point of the multiple non-beacon-generating wireless access points in which to establish a wireless communication link. 4. The method as in claim 1, wherein the non-beacon generating wireless access point is a first non-beacon-generating wireless access point in the network environment, the method further comprising:
generating a subsequent network discovery request message in response to detecting that a signal strength of wireless communications received from the first non-beacon-generating wireless access point is below a threshold level; receiving a response from a second non-beacon-generating wireless access point in which corresponding received communications are above the threshold value; and performing a wireless communication link handoff to the second non-beacon-generating wireless access point. 5. The method as in claim 1 further comprising:
generating and transmitting the network discovery request message to the non-beacon-generating wireless access point in response to receiving an input command to establish a wireless communication link to access the remote network. 6. The method as in claim 1, wherein the network discovery response message includes information indicating attributes of types of different networks supported by the non-beacon-generating wireless access point. 7. The method as in claim 1 further comprising:
repeatedly broadcasting the wireless network discovery request message in the wireless network environment to elicit generation of a network discovery response message by the non-beacon-generating wireless access point. 8. The method as in claim 1, wherein the network discovery request message specifies attributes of network types to which the end user communication device prefers to establish a wireless communication link. 9. The method as in claim 1, wherein the network discovery request message indicates that the end user communication device is passpoint enabled to support passpoint handoffs. 10. The method as in claim 9, wherein the network discovery response message indicates multiple network service providers supported by the wireless access point. 11. The method as in claim 1, wherein network discovery request message is a first wireless query generated by the end user communication device in the wireless network environment to establish a wireless communication link with the non-beacon-generating wireless access point; and
wherein the end user communication device transmits the first wireless query prior to receiving any presence notification from the non-beacon-generating wireless. 12. A method comprising:
at a wireless access point preventing non-solicited transmission of wireless communications indicating presence of the first wireless access point in a network environment, performing operations of:
receiving a network discovery request message from an end-user-operated communication device;
in response to receiving the network discovery request message, generating a network discovery response message including network identity information assigned to the wireless access point; and
transmitting the network discovery response message from the wireless access point to the end-user operated communication device. 13. The method as in claim 12 further comprising:
at the wireless access point:
measuring a wireless power level of receiving the network discovery request message; and
producing the network discovery response message to include power level information indicating the measured wireless power level at which the wireless access point received the network discovery request message. 14. The method as in claim 12, wherein the network discovery request message indicates that the end user communication device supports passpoint, the method further comprising:
producing the network discovery response message to include information indicating multiple service providers and corresponding networks supported by the wireless access point. 15. The method as in claim 12 further comprising:
producing the network discovery response message to include information indicating attributes of types of different networks supported by the non-beacon-generating wireless access point. 16. A system comprising:
a wireless access point comprising:
a first wireless communication interface to wirelessly communicate with multiple communication devices in a network environment, the first wireless communication interface being a passive interface configured to prevent non-solicited transmission of wireless communications indicating a presence of the first wireless access point in the network environment;
a second communication interface to communicate with a remote network; and
a communication management resource to facilitate conveying communications between the multiple communication devices and the remote network. 17. The system as in claim 16 further comprising:
a power monitor resource, the power monitor resource measuring a wireless power level of receiving a network discovery request message over the first wireless communication interface from a communication device; and
the communication management resource producing the network discovery response message to include power signal level information indicating the measured wireless power level at which the wireless access point received the network discovery request message. 18. The system as in claim 17, wherein the network discovery request message indicates that the communication device supports passpoint, the communication management resource producing the network discovery response message to include information indicating multiple service providers supported by the wireless access point. 19. The system as in claim 17, wherein the communication management resource produces the network discovery response message to include information indicating attributes of types of different networks supported by the wireless access point. 20. The system as in claim 17, wherein the communication management resource produces the network discovery response message to include network identity information assigned to the wireless access point in response to receiving the network discovery request message. 21. A system comprising:
computer processor hardware; and a hardware storage resource coupled to communicate with the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of:
receiving a network discovery request message from an end-user-operated communication device;
in response to receiving the network discovery request message, generating a network discovery response message including network identity information assigned to a wireless access point that receives the network discovery request message; and
transmitting the network discovery response message from the wireless access point to the end-user operated communication device. 22. The computer system as in claim 21, wherein the computer processor hardware further performs operations of:
measuring a wireless power level of receiving the network discovery request message; and producing the network discovery response message to include power signal level information indicating the measured wireless power level at which the wireless access point received the network discovery request message. 23. The computer system as in claim 21, wherein the network discovery request message indicates that the end user communication device supports passpoint, the computer processor hardware further performing operations of:
producing the network discovery response message to include information indicating multiple service providers supported by the wireless access point. 24. The computer system as in claim 21, wherein the computer processor hardware further performs operations of:
producing the network discovery response message to include information indicating attributes of types of different networks supported by the non-beacon-generating wireless access point. 25. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causing the computer processor hardware to perform operations of:
at a wireless access point preventing non-solicited transmission of wireless communications indicating presence of the first wireless access point in a network environment, receiving a network discovery request message from an end-user-operated communication device; in response to receiving the network discovery request message, generating a network discovery response message including network identity information assigned to the wireless access point; and from the wireless access point, transmitting the network discovery response message from the wireless access point to the end-user operated communication device. | Instead of monitoring a wireless region for beacons, to learn of availability of different wireless access points in a particular geographical region, an end user-operated communication device generates a network discovery request message. The communication device initiates wireless broadcast of the network discovery request message from the user-operated communication device to any of one or more listening non-beacon-generating wireless access points in a wireless network environment. Each of the non-beacon generating wireless access points receiving the network discovery request message from the user-operated communication device produces a respective network discovery response message including network identity information (such as one or more SSIDs) associated with the respective non-beacon generating wireless access point. The non-beacon generating wireless access points transmit network discovery response messages to the user-operated communication device, informing the communication device of network availability.1. A method comprising:
at an end user communication device;
generating a network discovery request message;
initiating wireless broadcast of the network discovery request message from the end user communication device to a listening non-beacon-generating wireless access point in a wireless network environment; and
receiving a network discovery response message from the non-beacon-generating wireless access point, the network discovery response message including network identity information associated with the non-beacon-generating wireless access point. 2. The method as in claim 1, wherein the non-beacon-generating wireless access point measures a wireless power level of receiving the network discovery request message, the network discovery response message including power signal level information indicating the measured wireless power level at which the non-beacon-generating wireless access point received the network discovery request message. 3. The method as in claim 2 further comprising:
as a response to the broadcasted network discovery request message, receiving network discovery response messages from multiple non-beacon-generating wireless access points in the wireless network environment, each of the network discovery response messages indicating a power level of receiving the respective network discovery request message; and
analyzing the network discovery response messages to identify a non-beacon-generating wireless access point of the multiple non-beacon-generating wireless access points in which to establish a wireless communication link. 4. The method as in claim 1, wherein the non-beacon generating wireless access point is a first non-beacon-generating wireless access point in the network environment, the method further comprising:
generating a subsequent network discovery request message in response to detecting that a signal strength of wireless communications received from the first non-beacon-generating wireless access point is below a threshold level; receiving a response from a second non-beacon-generating wireless access point in which corresponding received communications are above the threshold value; and performing a wireless communication link handoff to the second non-beacon-generating wireless access point. 5. The method as in claim 1 further comprising:
generating and transmitting the network discovery request message to the non-beacon-generating wireless access point in response to receiving an input command to establish a wireless communication link to access the remote network. 6. The method as in claim 1, wherein the network discovery response message includes information indicating attributes of types of different networks supported by the non-beacon-generating wireless access point. 7. The method as in claim 1 further comprising:
repeatedly broadcasting the wireless network discovery request message in the wireless network environment to elicit generation of a network discovery response message by the non-beacon-generating wireless access point. 8. The method as in claim 1, wherein the network discovery request message specifies attributes of network types to which the end user communication device prefers to establish a wireless communication link. 9. The method as in claim 1, wherein the network discovery request message indicates that the end user communication device is passpoint enabled to support passpoint handoffs. 10. The method as in claim 9, wherein the network discovery response message indicates multiple network service providers supported by the wireless access point. 11. The method as in claim 1, wherein network discovery request message is a first wireless query generated by the end user communication device in the wireless network environment to establish a wireless communication link with the non-beacon-generating wireless access point; and
wherein the end user communication device transmits the first wireless query prior to receiving any presence notification from the non-beacon-generating wireless. 12. A method comprising:
at a wireless access point preventing non-solicited transmission of wireless communications indicating presence of the first wireless access point in a network environment, performing operations of:
receiving a network discovery request message from an end-user-operated communication device;
in response to receiving the network discovery request message, generating a network discovery response message including network identity information assigned to the wireless access point; and
transmitting the network discovery response message from the wireless access point to the end-user operated communication device. 13. The method as in claim 12 further comprising:
at the wireless access point:
measuring a wireless power level of receiving the network discovery request message; and
producing the network discovery response message to include power level information indicating the measured wireless power level at which the wireless access point received the network discovery request message. 14. The method as in claim 12, wherein the network discovery request message indicates that the end user communication device supports passpoint, the method further comprising:
producing the network discovery response message to include information indicating multiple service providers and corresponding networks supported by the wireless access point. 15. The method as in claim 12 further comprising:
producing the network discovery response message to include information indicating attributes of types of different networks supported by the non-beacon-generating wireless access point. 16. A system comprising:
a wireless access point comprising:
a first wireless communication interface to wirelessly communicate with multiple communication devices in a network environment, the first wireless communication interface being a passive interface configured to prevent non-solicited transmission of wireless communications indicating a presence of the first wireless access point in the network environment;
a second communication interface to communicate with a remote network; and
a communication management resource to facilitate conveying communications between the multiple communication devices and the remote network. 17. The system as in claim 16 further comprising:
a power monitor resource, the power monitor resource measuring a wireless power level of receiving a network discovery request message over the first wireless communication interface from a communication device; and
the communication management resource producing the network discovery response message to include power signal level information indicating the measured wireless power level at which the wireless access point received the network discovery request message. 18. The system as in claim 17, wherein the network discovery request message indicates that the communication device supports passpoint, the communication management resource producing the network discovery response message to include information indicating multiple service providers supported by the wireless access point. 19. The system as in claim 17, wherein the communication management resource produces the network discovery response message to include information indicating attributes of types of different networks supported by the wireless access point. 20. The system as in claim 17, wherein the communication management resource produces the network discovery response message to include network identity information assigned to the wireless access point in response to receiving the network discovery request message. 21. A system comprising:
computer processor hardware; and a hardware storage resource coupled to communicate with the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of:
receiving a network discovery request message from an end-user-operated communication device;
in response to receiving the network discovery request message, generating a network discovery response message including network identity information assigned to a wireless access point that receives the network discovery request message; and
transmitting the network discovery response message from the wireless access point to the end-user operated communication device. 22. The computer system as in claim 21, wherein the computer processor hardware further performs operations of:
measuring a wireless power level of receiving the network discovery request message; and producing the network discovery response message to include power signal level information indicating the measured wireless power level at which the wireless access point received the network discovery request message. 23. The computer system as in claim 21, wherein the network discovery request message indicates that the end user communication device supports passpoint, the computer processor hardware further performing operations of:
producing the network discovery response message to include information indicating multiple service providers supported by the wireless access point. 24. The computer system as in claim 21, wherein the computer processor hardware further performs operations of:
producing the network discovery response message to include information indicating attributes of types of different networks supported by the non-beacon-generating wireless access point. 25. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causing the computer processor hardware to perform operations of:
at a wireless access point preventing non-solicited transmission of wireless communications indicating presence of the first wireless access point in a network environment, receiving a network discovery request message from an end-user-operated communication device; in response to receiving the network discovery request message, generating a network discovery response message including network identity information assigned to the wireless access point; and from the wireless access point, transmitting the network discovery response message from the wireless access point to the end-user operated communication device. | 2,400 |
8,828 | 8,828 | 15,644,559 | 2,483 | An example apparatus for measuring a feature of a tested component may include a lighting device, an imaging device, and a computing device. The computing device may receive, from the imaging device, a plurality of images the tested component in a plurality of states. The computing device may segment each image to isolate target areas from background areas. The computing device may measure a plurality of lengths of the target areas and compare corresponding lengths of two or more of the images. | 1. An apparatus for measuring a feature of a tested component comprising:
a lighting device configured output light to illuminate at least a portion of the tested component; an imaging device; and a computing device configured to:
receive, from the imaging device, a first image of the portion of the tested component in a first state;
segment the first image to isolate a first target area of the image from background areas of the first image;
measure a plurality of first lengths of at least one portion of the first target area;
receive, from the imaging device, a second image of the portion of the tested component in a second, different state;
segment the second image to isolate a second target area of the second image from background areas of the second image;
measure a plurality of second lengths of at least one portion of the second target area, wherein a respective first length of the plurality of first lengths corresponds to a respective second length of the plurality of second lengths; and
compare each respective first length of the plurality of first lengths to the corresponding second length of the plurality of second lengths. 2. The apparatus of claim 1, wherein the computing device is further configured to determine whether a difference between each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths is within a predetermined tolerance. 3. The apparatus of claim 1, wherein the computing device is further configured to determine, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the first target area substantially corresponds to the second target area. 4. The apparatus of claim 1, wherein the computing device is further configured to determine, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the second target area is within a predetermined tolerance. 5. The apparatus of claim 1, wherein the computing device is further configured to condition at least one of the first image or the second image by at least one of removing artifacts in the image, resizing a portion of the image, deforming a portion of the image, transforming a portion of the image, or adjusting at least one of a wavelength of light emitted from the lighting device, a color of the image, or a contrast of the image. 6. The apparatus of claim 1, wherein the computing device is further configured to output a graphical display indicative of the spatial relationship of the first target area and the second target area. 7. The apparatus of claim 1, wherein computing device is further configured to:
determine a first change in contrast between a first position in or near the first target area and a second, adjacent position in or near the first target area; determine, based on the first change in contrast, a first boundary in or near the first target area; determine a second change in contrast between a third position in or near the first target area and a fourth, adjacent position in or near the first target area; and determine, based on the second change in contrast, a second boundary in or near the first target area, and wherein the plurality of first lengths comprise a plurality of distances between the first boundary and the second boundary. 8. The apparatus of claim 7, wherein computing device is further configured to:
determine a third change in contrast between a fifth position in or near the second target area and a sixth, adjacent position in or near the second target area; determine, based on the third change in contrast, a third boundary in or near the second target area; determine a fourth change in contrast between a seventh position in or near the second target area and an eighth, adjacent position in or near the second target area; and determine, based on the fourth change in contrast, a fourth boundary in or near the second target area, and wherein the plurality of second lengths comprises a plurality of distances between the third boundary and the fourth boundary. 9. The apparatus of claim 1, wherein the computing device is further configured to:
receive, from the imaging device, a standard component image of a portion of a standard component; segment the standard component image to isolate a standard target area of the standard component image from background areas of the standard component image; determine, based on the standard target area, at least one of at least one portion of the first target area or at least one portion of the second target area. 10. The apparatus of claim 1, wherein the portion of the tested component is a portion of a turbine blade fin tip. 11. A method of measuring a feature of a tested component, the method comprising:
controlling, by a computing device, a lighting device to illuminate at least a portion of a tested component; controlling, by the computing device, an imaging device to acquire a first image of the portion of the tested component in a first state; segmenting, by the computing device, the first image to isolate a first target area of the image from background areas of the first image; measuring, by the computing device, a plurality of first lengths of at least one portion of the first target area; controlling, by the computing device, the imaging device to acquire a second image of the portion of the tested component in a second, different state; segmenting, by the computing device, the second image to isolate a second target area of the second image from background areas of the second image; measuring, by the computing device, a plurality of second lengths of at least one portion of the second target area, wherein a respective first length of the plurality of first lengths corresponds to a respective second length of the plurality of second lengths; and comparing, by the computing device, each respective first length of the plurality of first lengths to the corresponding second length of the plurality of second lengths. 12. The method of claim 11, wherein the method further comprises determining, by the computing device, whether a difference between each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths is within a predetermined tolerance. 13. The method of claim 11, wherein the method further comprises determining, by the computing device, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the first target area substantially corresponds to the second target area. 14. The method of claim 11, wherein the method further comprises determining, by the computing device, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the second target area is within a predetermined tolerance. 15. The method of claim 11, wherein the method further comprises conditioning, by the computing device, at least one of the first image or the second image by at least one of removing artifacts in the image, resizing a portion of the image, deforming a portion of the image, transforming a portion of the image, or adjusting at least one of a wavelength of light emitted from the lighting device, a color of the image, or a contrast of the image. 16. The method of claim 11, wherein the method further comprises outputting, by the computing device, a graphical display indicative of the spatial relationship of the first target area and the second target area. 17. The method of claim 11, wherein the method further comprises:
determining, by the computing device, a first change in contrast between a first position in or near the first target area and a second, adjacent position in or near the first target area; determining, by the computing device, based on the first change in contrast, a first boundary in or near the first target area; determining, by the computing device, a second change in contrast between a third position in or near the first target area and a fourth, adjacent position in or near the first target area; and determining, by the computing device, based on the second change in contrast, a second boundary in or near the first target area, and wherein the plurality of first lengths comprise a plurality of distances between the first boundary and the second boundary. 18. The method of claim 11, wherein the method further comprises:
determining, by the computing device, a third change in contrast between a fifth position in or near the second target area and a sixth, adjacent position in or near the second target area; determining, by the computing device, based on the third change in contrast, a third boundary in or near the second target area; determining, by the computing device, a fourth change in contrast between a seventh position in or near the second target area and an eighth, adjacent position in or near the second target area; and determining, by the computing device, based on the fourth change in contrast, a fourth boundary in or near the second target area, and wherein the plurality of second lengths comprises a plurality of distances between the third boundary and the fourth boundary. 19. The method of claim 11, wherein the method further comprises
controlling, by the computing device, the imaging device to acquire a standard component image of a portion of a standard component; segmenting, by the computing device, the standard component image to isolate a standard target area of the standard component image from background areas of the standard component image; determining, by the computing device, based on the standard target area, at least one of at least one portion of the first target area or at least one portion of the second target area. 20. The method of claim 11, wherein the portion of the tested component is a portion of a turbine blade fin tip. | An example apparatus for measuring a feature of a tested component may include a lighting device, an imaging device, and a computing device. The computing device may receive, from the imaging device, a plurality of images the tested component in a plurality of states. The computing device may segment each image to isolate target areas from background areas. The computing device may measure a plurality of lengths of the target areas and compare corresponding lengths of two or more of the images.1. An apparatus for measuring a feature of a tested component comprising:
a lighting device configured output light to illuminate at least a portion of the tested component; an imaging device; and a computing device configured to:
receive, from the imaging device, a first image of the portion of the tested component in a first state;
segment the first image to isolate a first target area of the image from background areas of the first image;
measure a plurality of first lengths of at least one portion of the first target area;
receive, from the imaging device, a second image of the portion of the tested component in a second, different state;
segment the second image to isolate a second target area of the second image from background areas of the second image;
measure a plurality of second lengths of at least one portion of the second target area, wherein a respective first length of the plurality of first lengths corresponds to a respective second length of the plurality of second lengths; and
compare each respective first length of the plurality of first lengths to the corresponding second length of the plurality of second lengths. 2. The apparatus of claim 1, wherein the computing device is further configured to determine whether a difference between each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths is within a predetermined tolerance. 3. The apparatus of claim 1, wherein the computing device is further configured to determine, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the first target area substantially corresponds to the second target area. 4. The apparatus of claim 1, wherein the computing device is further configured to determine, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the second target area is within a predetermined tolerance. 5. The apparatus of claim 1, wherein the computing device is further configured to condition at least one of the first image or the second image by at least one of removing artifacts in the image, resizing a portion of the image, deforming a portion of the image, transforming a portion of the image, or adjusting at least one of a wavelength of light emitted from the lighting device, a color of the image, or a contrast of the image. 6. The apparatus of claim 1, wherein the computing device is further configured to output a graphical display indicative of the spatial relationship of the first target area and the second target area. 7. The apparatus of claim 1, wherein computing device is further configured to:
determine a first change in contrast between a first position in or near the first target area and a second, adjacent position in or near the first target area; determine, based on the first change in contrast, a first boundary in or near the first target area; determine a second change in contrast between a third position in or near the first target area and a fourth, adjacent position in or near the first target area; and determine, based on the second change in contrast, a second boundary in or near the first target area, and wherein the plurality of first lengths comprise a plurality of distances between the first boundary and the second boundary. 8. The apparatus of claim 7, wherein computing device is further configured to:
determine a third change in contrast between a fifth position in or near the second target area and a sixth, adjacent position in or near the second target area; determine, based on the third change in contrast, a third boundary in or near the second target area; determine a fourth change in contrast between a seventh position in or near the second target area and an eighth, adjacent position in or near the second target area; and determine, based on the fourth change in contrast, a fourth boundary in or near the second target area, and wherein the plurality of second lengths comprises a plurality of distances between the third boundary and the fourth boundary. 9. The apparatus of claim 1, wherein the computing device is further configured to:
receive, from the imaging device, a standard component image of a portion of a standard component; segment the standard component image to isolate a standard target area of the standard component image from background areas of the standard component image; determine, based on the standard target area, at least one of at least one portion of the first target area or at least one portion of the second target area. 10. The apparatus of claim 1, wherein the portion of the tested component is a portion of a turbine blade fin tip. 11. A method of measuring a feature of a tested component, the method comprising:
controlling, by a computing device, a lighting device to illuminate at least a portion of a tested component; controlling, by the computing device, an imaging device to acquire a first image of the portion of the tested component in a first state; segmenting, by the computing device, the first image to isolate a first target area of the image from background areas of the first image; measuring, by the computing device, a plurality of first lengths of at least one portion of the first target area; controlling, by the computing device, the imaging device to acquire a second image of the portion of the tested component in a second, different state; segmenting, by the computing device, the second image to isolate a second target area of the second image from background areas of the second image; measuring, by the computing device, a plurality of second lengths of at least one portion of the second target area, wherein a respective first length of the plurality of first lengths corresponds to a respective second length of the plurality of second lengths; and comparing, by the computing device, each respective first length of the plurality of first lengths to the corresponding second length of the plurality of second lengths. 12. The method of claim 11, wherein the method further comprises determining, by the computing device, whether a difference between each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths is within a predetermined tolerance. 13. The method of claim 11, wherein the method further comprises determining, by the computing device, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the first target area substantially corresponds to the second target area. 14. The method of claim 11, wherein the method further comprises determining, by the computing device, based on the comparison of each respective first length of the plurality of first lengths and the corresponding second length of the plurality of second lengths, whether the second target area is within a predetermined tolerance. 15. The method of claim 11, wherein the method further comprises conditioning, by the computing device, at least one of the first image or the second image by at least one of removing artifacts in the image, resizing a portion of the image, deforming a portion of the image, transforming a portion of the image, or adjusting at least one of a wavelength of light emitted from the lighting device, a color of the image, or a contrast of the image. 16. The method of claim 11, wherein the method further comprises outputting, by the computing device, a graphical display indicative of the spatial relationship of the first target area and the second target area. 17. The method of claim 11, wherein the method further comprises:
determining, by the computing device, a first change in contrast between a first position in or near the first target area and a second, adjacent position in or near the first target area; determining, by the computing device, based on the first change in contrast, a first boundary in or near the first target area; determining, by the computing device, a second change in contrast between a third position in or near the first target area and a fourth, adjacent position in or near the first target area; and determining, by the computing device, based on the second change in contrast, a second boundary in or near the first target area, and wherein the plurality of first lengths comprise a plurality of distances between the first boundary and the second boundary. 18. The method of claim 11, wherein the method further comprises:
determining, by the computing device, a third change in contrast between a fifth position in or near the second target area and a sixth, adjacent position in or near the second target area; determining, by the computing device, based on the third change in contrast, a third boundary in or near the second target area; determining, by the computing device, a fourth change in contrast between a seventh position in or near the second target area and an eighth, adjacent position in or near the second target area; and determining, by the computing device, based on the fourth change in contrast, a fourth boundary in or near the second target area, and wherein the plurality of second lengths comprises a plurality of distances between the third boundary and the fourth boundary. 19. The method of claim 11, wherein the method further comprises
controlling, by the computing device, the imaging device to acquire a standard component image of a portion of a standard component; segmenting, by the computing device, the standard component image to isolate a standard target area of the standard component image from background areas of the standard component image; determining, by the computing device, based on the standard target area, at least one of at least one portion of the first target area or at least one portion of the second target area. 20. The method of claim 11, wherein the portion of the tested component is a portion of a turbine blade fin tip. | 2,400 |
8,829 | 8,829 | 15,974,978 | 2,459 | A computing system for interacting with a user comprises a processor and a memory storing executable software which, when executed by the processor, causes the processor to commence an interactive session with a user, receive input data from the user during the interactive session, analyze the received input data and output a response to the user to continue the interactive session with the user. The processor, prior to outputting the response, identifies one or more topics from the received input data, ascertains a tone of the received input data, generates a mirroring prompt based on the ascertained tone of the received input data, and output to the user the generated mirroring prompt. The processor outputs the mirroring prompt to the user during the interactive session to cause an increase in a level of engagement of the user with the interactive session. | 1. A computing system for interacting with a user, the computing system comprising:
at least one processor; at least one memory storing executable software which, when executed by the at least one processor, causes the at least one processor to:
commence an interactive session with a user;
receive input data from the user during the interactive session;
analyze the received input data; and
output a response to the user to continue the interactive session with the user,
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor, prior to outputting the response, to carry out the following steps:
identify one or more topics from the received input data;
ascertain a tone of the received input data;
generate a mirroring prompt based on the ascertained tone of the received input data; and
output to the user the generated mirroring prompt, and
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to output the mirroring prompt to the user during the interactive session to cause an increase in a level of engagement of the user with the interactive session. 2. The computing system of claim 1, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is reflective of the ascertained tone. 3. The computing system of claim 1, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is of a tone that has been previously determined as an appropriate tone for responding to the ascertained tone. 4. The computing system of claim 1, further comprising:
a database storing a plurality of selectable mirroring prompts, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt by selecting at least one of the stored selectable mirroring prompts. 5. The computing system of claim 1, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt by using natural language generation techniques. 6. The computing system of claim 1, further comprising:
a communication device capable of communicating with an external computer, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to, via the communication device, obtain from the external computer information about the identified one or more topics, and wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt using the obtained information. 7. The computing system of claim 6, wherein the information obtained from the external computer includes current information pertaining to the identified one or more topics accessible via the Internet. 8. The computing system of claim 1, further comprising:
at least one sensor in communication with the at least one processor, the at least one sensor being adapted to obtain supplemental user data, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt at least in part on the obtained supplemental user data. 9. The computing system of claim 1, wherein the interactive session is part of a happiness track selected by the user, and
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to output the mirroring prompt to the user during the interactive session to further cause an increase in a level of happiness of the user in accordance with the selected happiness track. 10. A method for a computing system to interact with a user, the computing system comprising at least one processor, the method comprising:
commencing, by the at least one processor, an interactive session with a user; receiving, by the at least one processor, input data from the user during the interactive session; analyzing, by the at least one processor, the received input data; and outputting, by the at least one processor, a response to the user to continue the interactive session with the user, wherein prior to outputting the response, the at least one processor:
identifies one or more topics from the received input data;
ascertains a tone of the received input data;
generates a mirroring prompt based on the ascertained tone of the received input data; and
output to the user the generated mirroring prompt, and
wherein the outputting of the mirroring prompt to the user during the interactive session causes an increase in a level of engagement of the user with the interactive session. 11. The method of claim 10, wherein the at least one processor generates the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is reflective of the ascertained tone. 12. The method of claim 10, wherein the at least one processor generates the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is of a tone that has been previously determined as an appropriate tone for responding to the ascertained tone. 13. The method of claim 10, wherein the computing system further comprises a database storing a plurality of selectable mirroring prompts, and
wherein the at least one processor generates the mirroring prompt by selecting at least one of the stored selectable mirroring prompts. 14. The method of claim 10, wherein the at least one processor generates the mirroring prompt by using natural language generation techniques. 15. The method of claim 10, wherein the computing system further comprises a communication device capable of communicating with an external computer,
wherein the at least one processor, via the communication device, obtains from the external computer information about the identified one or more topics, and wherein the at least one processor generates the mirroring prompt using the obtained information. 16. The method of claim 15, wherein the information obtained from the external computer includes current information pertaining to the identified one or more topics accessible via the Internet. 17. The method system of claim 10, wherein the computing system further comprises at least one sensor in communication with the at least one processor, the at least one sensor being adapted to obtain supplemental user data,
wherein the at least one processor generates the mirroring prompt at least in part on the obtained supplemental user data. 18. The method system of claim 10, wherein the interactive session is part of a happiness track selected by the user, and
wherein the at least one processor outputs the mirroring prompt to the user during the interactive session to further cause an increase in a level of happiness of the user in accordance with the selected happiness track. 19. A computing system for interacting with a user, the computing system comprising:
at least one processor; at least one memory storing executable software which, when executed by the at least one processor, causes the at least one processor to:
commence an interactive session with a user, the interactive session being part of a happiness track selected by the user;
receive input data from the user during the interactive session;
analyze the received input data; and
output a response, to the user, to continue the interactive session with the user,
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor, during the interactive session, to carry out the following steps:
identify one or more topics from the received input data; and
determine whether to output an option to the user for switching to a different happiness track. 20. The computing system of claim 19, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to determine to output the option to the user for switching to a different happiness track when relevance of the identified one or more topics to the selected happiness track is not greater than a threshold. 21. The computing system of claim 20, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to determine to output the option to the user for switching to a different happiness track when the identified one or more topics having relevance not greater than the threshold is detected a plurality of times. 22. The computing system of claim 19, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to determine to output the option to the user for switching to a different happiness track based on tone of the received input data. 23. A method for a computing system to interact with a user, the computing system comprising at least one processor, the method comprising:
commencing, by the at least one processor, an interactive session with a user, the interactive session being part of a happiness track selected by the user; receiving, by the at least one processor, input data from the user during the interactive session; analyzing, by the at least one processor, the received input data; and outputting, by the at least one processor, a response to the user to continue the interactive session with the user, wherein during the interactive session, the at least one processor:
identifies one or more topics from the received input data; and
determines whether to output an option to the user for switching to a different happiness track. 24. The method of claim 23, wherein the at least one processor determines to output the option to the user for switching to a different happiness track when relevance of the identified one or more topics to the selected happiness track is not greater than a threshold. 25. The method of claim 24, wherein the at least one processor determines to output the option to the user for switching to a different happiness track when the identified one or more topics having relevance not greater than the threshold is detected a plurality of times. 26. The method of claim 23, wherein the at least one processor determines to output the option to the user for switching to a different happiness track based on tone of the received input data. | A computing system for interacting with a user comprises a processor and a memory storing executable software which, when executed by the processor, causes the processor to commence an interactive session with a user, receive input data from the user during the interactive session, analyze the received input data and output a response to the user to continue the interactive session with the user. The processor, prior to outputting the response, identifies one or more topics from the received input data, ascertains a tone of the received input data, generates a mirroring prompt based on the ascertained tone of the received input data, and output to the user the generated mirroring prompt. The processor outputs the mirroring prompt to the user during the interactive session to cause an increase in a level of engagement of the user with the interactive session.1. A computing system for interacting with a user, the computing system comprising:
at least one processor; at least one memory storing executable software which, when executed by the at least one processor, causes the at least one processor to:
commence an interactive session with a user;
receive input data from the user during the interactive session;
analyze the received input data; and
output a response to the user to continue the interactive session with the user,
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor, prior to outputting the response, to carry out the following steps:
identify one or more topics from the received input data;
ascertain a tone of the received input data;
generate a mirroring prompt based on the ascertained tone of the received input data; and
output to the user the generated mirroring prompt, and
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to output the mirroring prompt to the user during the interactive session to cause an increase in a level of engagement of the user with the interactive session. 2. The computing system of claim 1, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is reflective of the ascertained tone. 3. The computing system of claim 1, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is of a tone that has been previously determined as an appropriate tone for responding to the ascertained tone. 4. The computing system of claim 1, further comprising:
a database storing a plurality of selectable mirroring prompts, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt by selecting at least one of the stored selectable mirroring prompts. 5. The computing system of claim 1, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt by using natural language generation techniques. 6. The computing system of claim 1, further comprising:
a communication device capable of communicating with an external computer, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to, via the communication device, obtain from the external computer information about the identified one or more topics, and wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt using the obtained information. 7. The computing system of claim 6, wherein the information obtained from the external computer includes current information pertaining to the identified one or more topics accessible via the Internet. 8. The computing system of claim 1, further comprising:
at least one sensor in communication with the at least one processor, the at least one sensor being adapted to obtain supplemental user data, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to generate the mirroring prompt at least in part on the obtained supplemental user data. 9. The computing system of claim 1, wherein the interactive session is part of a happiness track selected by the user, and
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to output the mirroring prompt to the user during the interactive session to further cause an increase in a level of happiness of the user in accordance with the selected happiness track. 10. A method for a computing system to interact with a user, the computing system comprising at least one processor, the method comprising:
commencing, by the at least one processor, an interactive session with a user; receiving, by the at least one processor, input data from the user during the interactive session; analyzing, by the at least one processor, the received input data; and outputting, by the at least one processor, a response to the user to continue the interactive session with the user, wherein prior to outputting the response, the at least one processor:
identifies one or more topics from the received input data;
ascertains a tone of the received input data;
generates a mirroring prompt based on the ascertained tone of the received input data; and
output to the user the generated mirroring prompt, and
wherein the outputting of the mirroring prompt to the user during the interactive session causes an increase in a level of engagement of the user with the interactive session. 11. The method of claim 10, wherein the at least one processor generates the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is reflective of the ascertained tone. 12. The method of claim 10, wherein the at least one processor generates the mirroring prompt having one or more phrases indicative of the identified one or more topics, and
wherein the generated mirroring prompt is of a tone that has been previously determined as an appropriate tone for responding to the ascertained tone. 13. The method of claim 10, wherein the computing system further comprises a database storing a plurality of selectable mirroring prompts, and
wherein the at least one processor generates the mirroring prompt by selecting at least one of the stored selectable mirroring prompts. 14. The method of claim 10, wherein the at least one processor generates the mirroring prompt by using natural language generation techniques. 15. The method of claim 10, wherein the computing system further comprises a communication device capable of communicating with an external computer,
wherein the at least one processor, via the communication device, obtains from the external computer information about the identified one or more topics, and wherein the at least one processor generates the mirroring prompt using the obtained information. 16. The method of claim 15, wherein the information obtained from the external computer includes current information pertaining to the identified one or more topics accessible via the Internet. 17. The method system of claim 10, wherein the computing system further comprises at least one sensor in communication with the at least one processor, the at least one sensor being adapted to obtain supplemental user data,
wherein the at least one processor generates the mirroring prompt at least in part on the obtained supplemental user data. 18. The method system of claim 10, wherein the interactive session is part of a happiness track selected by the user, and
wherein the at least one processor outputs the mirroring prompt to the user during the interactive session to further cause an increase in a level of happiness of the user in accordance with the selected happiness track. 19. A computing system for interacting with a user, the computing system comprising:
at least one processor; at least one memory storing executable software which, when executed by the at least one processor, causes the at least one processor to:
commence an interactive session with a user, the interactive session being part of a happiness track selected by the user;
receive input data from the user during the interactive session;
analyze the received input data; and
output a response, to the user, to continue the interactive session with the user,
wherein the executable software stored in the at least one memory is adapted to cause the at least one processor, during the interactive session, to carry out the following steps:
identify one or more topics from the received input data; and
determine whether to output an option to the user for switching to a different happiness track. 20. The computing system of claim 19, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to determine to output the option to the user for switching to a different happiness track when relevance of the identified one or more topics to the selected happiness track is not greater than a threshold. 21. The computing system of claim 20, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to determine to output the option to the user for switching to a different happiness track when the identified one or more topics having relevance not greater than the threshold is detected a plurality of times. 22. The computing system of claim 19, wherein the executable software stored in the at least one memory is adapted to cause the at least one processor to determine to output the option to the user for switching to a different happiness track based on tone of the received input data. 23. A method for a computing system to interact with a user, the computing system comprising at least one processor, the method comprising:
commencing, by the at least one processor, an interactive session with a user, the interactive session being part of a happiness track selected by the user; receiving, by the at least one processor, input data from the user during the interactive session; analyzing, by the at least one processor, the received input data; and outputting, by the at least one processor, a response to the user to continue the interactive session with the user, wherein during the interactive session, the at least one processor:
identifies one or more topics from the received input data; and
determines whether to output an option to the user for switching to a different happiness track. 24. The method of claim 23, wherein the at least one processor determines to output the option to the user for switching to a different happiness track when relevance of the identified one or more topics to the selected happiness track is not greater than a threshold. 25. The method of claim 24, wherein the at least one processor determines to output the option to the user for switching to a different happiness track when the identified one or more topics having relevance not greater than the threshold is detected a plurality of times. 26. The method of claim 23, wherein the at least one processor determines to output the option to the user for switching to a different happiness track based on tone of the received input data. | 2,400 |
8,830 | 8,830 | 15,054,103 | 2,441 | Techniques for messaging bots with rich communication are described. In one embodiment, an apparatus may comprise a messaging component operative to receive a message from a client device; and add the message to a message queue; a message queue monitoring component operative to monitor the message queue; detect that the message indicates messaging bot invocation; and submit the message to a bot framework component based on detecting that the message indicates messaging bot invocation; and the bot framework component operative to determine a messaging bot associated with the message; and submit the message to the messaging bot. Other embodiments are described and claimed. | 1. A computer-implemented method, comprising:
receiving a message from a client device; adding the message to a message queue; monitoring the message queue; detecting that the message indicates messaging bot invocation; and submitting the message to a bot framework component based on detecting that the message indicates messaging bot invocation; determining a messaging bot associated with the message; and submitting the message to the messaging bot. 2. The method of claim 1, the message comprising a text content portion, further comprising:
detecting a bot invocation symbol in the text content portion of the message; and detecting that the message indicates messaging bot invocation based on detecting the bot invocation symbol. 3. The method of claim 1, further comprising:
receiving a messaging bot response to the message; and inserting the messaging bot response in the message queue. 4. The method of claim 3, the message associated with a message thread, the messaging bot response inserted in the message queue marked for display in the message thread. 5. The method of claim 1, the message comprising a text portion, the text portion comprising a bot alias text segment, further comprising:
receiving an alias initial portion of the bot alias text segment; matching the alias initial portion against a bot alias registry to determine one or more predicted bot alias text segments, the one or more predicted bot alias text segments comprising the bot alias text segment; and transmitting the one or more predicted bot alias text segments to the client device. 6. The method of claim 1, the message comprising a text portion, the text portion comprising a bot command text segment, further comprising:
receiving a command initial portion of the bot command text segment; submitting the command initial portion to the messaging bot; receiving one or more predicted bot command text segments from the messaging bot, the one or more predicted bot command text segments comprising the bot command text segment; and transmitting the one or more predicted bot command text segment to the client device. 7. The method of claim 1, the message associated with a message thread, the message comprising a bot subscription command, further comprising:
subscribing the message thread to the messaging bot in response to the bot subscription command; receiving a broadcast message from the messaging bot; determining a plurality of subscriber threads for the broadcast message based on the messaging bot, the plurality of subscriber threads comprising the message thread; dividing the plurality of subscriber threads into a plurality of subscriber thread chunks; assigning each of the plurality of subscriber threads chunks to a broadcast worker of a plurality of broadcast workers; and adding the broadcast message to a plurality of message queues based on the plurality of subscriber threads chunks by the plurality of broadcast workers, the plurality of message queues comprising the message queue. 8. An apparatus, comprising:
a processor circuit on a device; a messaging component operative on the processor circuit to receive a message from a client device; and add the message to a message queue; a message queue monitoring component operative to monitor the message queue; detect that the message indicates messaging bot invocation; and submit the message to a bot framework component based on detecting that the message indicates messaging bot invocation; and the bot framework component operative to determine a messaging bot associated with the message; and submit the message to the messaging bot. 9. The apparatus of claim 8, the message comprising a text content portion, further comprising:
the message queue monitoring component operative to detect a bot invocation symbol in the text content portion of the message; and detect that the message indicates messaging bot invocation based on detecting the bot invocation symbol. 10. The apparatus of claim 8, further comprising:
the bot framework component operative to receive a messaging bot response to the message; and insert the messaging bot response in the message queue. 11. The apparatus of claim 10, the message associated with a message thread, the messaging bot response inserted in the message queue marked for display in the message thread. 12. The apparatus of claim 8, the message comprising a text portion, the text portion comprising a bot alias text segment, further comprising:
the bot framework component operative to receive an alias initial portion of the bot alias text segment; match the alias initial portion against a bot alias registry to determine one or more predicted bot alias text segments, the one or more predicted bot alias text segments comprising the bot alias text segment; and transmit the one or more predicted bot alias text segments to the client device. 13. The apparatus of claim 8, the message comprising a text portion, the text portion comprising a bot command text segment, further comprising:
the bot framework component operative to receive a command initial portion of the bot command text segment; submit the command initial portion to the messaging bot; receive one or more predicted bot command text segments from the messaging bot, the one or more predicted bot command text segments comprising the bot command text segment; and transmit the one or more predicted bot command text segment to the client device. 14. The apparatus of claim 8, the message associated with a message thread, the message comprising a bot subscription command, further comprising:
the bot framework component operative to subscribe the message thread to the messaging bot in response to the bot subscription command; a broadcast component operative to receive a broadcast message from the messaging bot; determine a plurality of subscriber threads for the broadcast message based on the messaging bot, the plurality of subscriber threads comprising the message thread; divide the plurality of subscriber threads into a plurality of subscriber thread chunks; and assign each of the plurality of subscriber threads chunks to a broadcast worker of a plurality of broadcast workers; and the plurality of broadcast workers operative to add the broadcast message to a plurality of message queues based on the plurality of subscriber threads chunks, the plurality of message queues comprising the message queue. 15. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to:
receive a message from a client device; add the message to a message queue; monitor the message queue; detect that the message indicates messaging bot invocation; and submit the message to a bot framework component based on detecting that the message indicates messaging bot invocation; determine a messaging bot associated with the message; and submit the message to the messaging bot. 16. The computer-readable storage medium of claim 15, the message comprising a text content portion, comprising further instructions that, when executed, cause a system to:
detect a bot invocation symbol in the text content portion of the message; and detect that the message indicates messaging bot invocation based on detecting the bot invocation symbol. 17. The computer-readable storage medium of claim 15, the message associated with a message thread, comprising further instructions that, when executed, cause a system to:
receive a messaging bot response to the message; and insert the messaging bot response in the message queue marked for display in the message thread. 18. The computer-readable storage medium of claim 15, the message comprising a text portion, the text portion comprising a bot alias text segment, comprising further instructions that, when executed, cause a system to:
receive an alias initial portion of the bot alias text segment; match the alias initial portion against a bot alias registry to determine one or more predicted bot alias text segments, the one or more predicted bot alias text segments comprising the bot alias text segment; and transmit the one or more predicted bot alias text segments to the client device. 19. The computer-readable storage medium of claim 15, the message comprising a text portion, the text portion comprising a bot command text segment, comprising further instructions that, when executed, cause a system to:
receive a command initial portion of the bot command text segment; submit the command initial portion to the messaging bot; receive one or more predicted bot command text segments from the messaging bot, the one or more predicted bot command text segments comprising the bot command text segment; and transmit the one or more predicted bot command text segment to the client device. 20. The computer-readable storage medium of claim 15, the message associated with a message thread, the message comprising a bot subscription command, comprising further instructions that, when executed, cause a system to:
subscribe the message thread to the messaging bot in response to the bot subscription command; receive a broadcast message from the messaging bot; determine a plurality of subscriber threads for the broadcast message based on the messaging bot, the plurality of subscriber threads comprising the message thread; divide the plurality of subscriber threads into a plurality of subscriber thread chunks; assign each of the plurality of subscriber threads chunks to a broadcast worker of a plurality of broadcast workers; and add the broadcast message to a plurality of message queues based on the plurality of subscriber threads chunks by the plurality of broadcast workers, the plurality of message queues comprising the message queue. | Techniques for messaging bots with rich communication are described. In one embodiment, an apparatus may comprise a messaging component operative to receive a message from a client device; and add the message to a message queue; a message queue monitoring component operative to monitor the message queue; detect that the message indicates messaging bot invocation; and submit the message to a bot framework component based on detecting that the message indicates messaging bot invocation; and the bot framework component operative to determine a messaging bot associated with the message; and submit the message to the messaging bot. Other embodiments are described and claimed.1. A computer-implemented method, comprising:
receiving a message from a client device; adding the message to a message queue; monitoring the message queue; detecting that the message indicates messaging bot invocation; and submitting the message to a bot framework component based on detecting that the message indicates messaging bot invocation; determining a messaging bot associated with the message; and submitting the message to the messaging bot. 2. The method of claim 1, the message comprising a text content portion, further comprising:
detecting a bot invocation symbol in the text content portion of the message; and detecting that the message indicates messaging bot invocation based on detecting the bot invocation symbol. 3. The method of claim 1, further comprising:
receiving a messaging bot response to the message; and inserting the messaging bot response in the message queue. 4. The method of claim 3, the message associated with a message thread, the messaging bot response inserted in the message queue marked for display in the message thread. 5. The method of claim 1, the message comprising a text portion, the text portion comprising a bot alias text segment, further comprising:
receiving an alias initial portion of the bot alias text segment; matching the alias initial portion against a bot alias registry to determine one or more predicted bot alias text segments, the one or more predicted bot alias text segments comprising the bot alias text segment; and transmitting the one or more predicted bot alias text segments to the client device. 6. The method of claim 1, the message comprising a text portion, the text portion comprising a bot command text segment, further comprising:
receiving a command initial portion of the bot command text segment; submitting the command initial portion to the messaging bot; receiving one or more predicted bot command text segments from the messaging bot, the one or more predicted bot command text segments comprising the bot command text segment; and transmitting the one or more predicted bot command text segment to the client device. 7. The method of claim 1, the message associated with a message thread, the message comprising a bot subscription command, further comprising:
subscribing the message thread to the messaging bot in response to the bot subscription command; receiving a broadcast message from the messaging bot; determining a plurality of subscriber threads for the broadcast message based on the messaging bot, the plurality of subscriber threads comprising the message thread; dividing the plurality of subscriber threads into a plurality of subscriber thread chunks; assigning each of the plurality of subscriber threads chunks to a broadcast worker of a plurality of broadcast workers; and adding the broadcast message to a plurality of message queues based on the plurality of subscriber threads chunks by the plurality of broadcast workers, the plurality of message queues comprising the message queue. 8. An apparatus, comprising:
a processor circuit on a device; a messaging component operative on the processor circuit to receive a message from a client device; and add the message to a message queue; a message queue monitoring component operative to monitor the message queue; detect that the message indicates messaging bot invocation; and submit the message to a bot framework component based on detecting that the message indicates messaging bot invocation; and the bot framework component operative to determine a messaging bot associated with the message; and submit the message to the messaging bot. 9. The apparatus of claim 8, the message comprising a text content portion, further comprising:
the message queue monitoring component operative to detect a bot invocation symbol in the text content portion of the message; and detect that the message indicates messaging bot invocation based on detecting the bot invocation symbol. 10. The apparatus of claim 8, further comprising:
the bot framework component operative to receive a messaging bot response to the message; and insert the messaging bot response in the message queue. 11. The apparatus of claim 10, the message associated with a message thread, the messaging bot response inserted in the message queue marked for display in the message thread. 12. The apparatus of claim 8, the message comprising a text portion, the text portion comprising a bot alias text segment, further comprising:
the bot framework component operative to receive an alias initial portion of the bot alias text segment; match the alias initial portion against a bot alias registry to determine one or more predicted bot alias text segments, the one or more predicted bot alias text segments comprising the bot alias text segment; and transmit the one or more predicted bot alias text segments to the client device. 13. The apparatus of claim 8, the message comprising a text portion, the text portion comprising a bot command text segment, further comprising:
the bot framework component operative to receive a command initial portion of the bot command text segment; submit the command initial portion to the messaging bot; receive one or more predicted bot command text segments from the messaging bot, the one or more predicted bot command text segments comprising the bot command text segment; and transmit the one or more predicted bot command text segment to the client device. 14. The apparatus of claim 8, the message associated with a message thread, the message comprising a bot subscription command, further comprising:
the bot framework component operative to subscribe the message thread to the messaging bot in response to the bot subscription command; a broadcast component operative to receive a broadcast message from the messaging bot; determine a plurality of subscriber threads for the broadcast message based on the messaging bot, the plurality of subscriber threads comprising the message thread; divide the plurality of subscriber threads into a plurality of subscriber thread chunks; and assign each of the plurality of subscriber threads chunks to a broadcast worker of a plurality of broadcast workers; and the plurality of broadcast workers operative to add the broadcast message to a plurality of message queues based on the plurality of subscriber threads chunks, the plurality of message queues comprising the message queue. 15. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to:
receive a message from a client device; add the message to a message queue; monitor the message queue; detect that the message indicates messaging bot invocation; and submit the message to a bot framework component based on detecting that the message indicates messaging bot invocation; determine a messaging bot associated with the message; and submit the message to the messaging bot. 16. The computer-readable storage medium of claim 15, the message comprising a text content portion, comprising further instructions that, when executed, cause a system to:
detect a bot invocation symbol in the text content portion of the message; and detect that the message indicates messaging bot invocation based on detecting the bot invocation symbol. 17. The computer-readable storage medium of claim 15, the message associated with a message thread, comprising further instructions that, when executed, cause a system to:
receive a messaging bot response to the message; and insert the messaging bot response in the message queue marked for display in the message thread. 18. The computer-readable storage medium of claim 15, the message comprising a text portion, the text portion comprising a bot alias text segment, comprising further instructions that, when executed, cause a system to:
receive an alias initial portion of the bot alias text segment; match the alias initial portion against a bot alias registry to determine one or more predicted bot alias text segments, the one or more predicted bot alias text segments comprising the bot alias text segment; and transmit the one or more predicted bot alias text segments to the client device. 19. The computer-readable storage medium of claim 15, the message comprising a text portion, the text portion comprising a bot command text segment, comprising further instructions that, when executed, cause a system to:
receive a command initial portion of the bot command text segment; submit the command initial portion to the messaging bot; receive one or more predicted bot command text segments from the messaging bot, the one or more predicted bot command text segments comprising the bot command text segment; and transmit the one or more predicted bot command text segment to the client device. 20. The computer-readable storage medium of claim 15, the message associated with a message thread, the message comprising a bot subscription command, comprising further instructions that, when executed, cause a system to:
subscribe the message thread to the messaging bot in response to the bot subscription command; receive a broadcast message from the messaging bot; determine a plurality of subscriber threads for the broadcast message based on the messaging bot, the plurality of subscriber threads comprising the message thread; divide the plurality of subscriber threads into a plurality of subscriber thread chunks; assign each of the plurality of subscriber threads chunks to a broadcast worker of a plurality of broadcast workers; and add the broadcast message to a plurality of message queues based on the plurality of subscriber threads chunks by the plurality of broadcast workers, the plurality of message queues comprising the message queue. | 2,400 |
8,831 | 8,831 | 15,017,677 | 2,419 | The current document is directed to an automated-application-release-management controller within an automated-application-release-management subsystem of a workflow-based cloud-management system that provides mechanisms for parameter-value exchanges between tasks of an application-release-management pipeline. Pipeline parameters and task-output parameters are stored in the execution context of the automated-application-release-management controller. During configuration of an automated-application-release-management pipeline, inputs to tasks may be specified as outputs from other tasks. When tasks finish executing, the output values are stored in the execution context of the management controller so that, when execution of subsequent tasks is launched, the stored output values from previously executed tasks can be furnished as input values to the subsequently executed tasks. In addition, pipeline parameters can be defined and initialized in advance of pipeline execution, with the values of pipeline parameters retrieved and/or set during task execution. | 1. A workflow-based cloud-management system incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the workflow-based cloud-management system comprising:
an infrastructure-management-and-administration subsystem; a workflow-execution engine; an automated-application-deployment subsystem; and an automated-application-release-management subsystem that executes application-release-management pipelines that each comprises one or more stages, each having one of more tasks including one or more tasks that, when executed, each receives, as one or more input parameter values, parameter values output by one or more previously executed tasks. 2. The workflow-based cloud-management system of claim 1 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
a management controller;
an interface to the workflow-execution engine; and
an artifact-storage-and-management subsystem. 3. The workflow-based cloud-management system of claim 2 wherein the automated-application-release-management subsystem and the infrastructure-management-and-administration subsystem include control logic at least partially implemented as workflows that are executed by the workflow-execution-engine subsystem. 4. The workflow-based cloud-management system of claim 2 wherein the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, during execution, each receives, as one or more input parameter values, one or more pipeline parameter values associated with the application-release-management pipeline in which the task is incorporated. 5. The workflow-based cloud-management system of claim 2 where the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, during execution, each accesses one or more pipeline parameters associated with the application-release-management pipeline in which the task is incorporated to store a new value in, or retrieve a previously stored value from, each oaf the one or more pipeline parameters. 6. The workflow-based cloud-management system of claim 2 wherein the management controller stores, in memory accessible from within the execution context of the management controller, one or more pipeline parameter values and one or more output parameter values, each generated by execution of a task incorporated within an application-release-management pipeline, execution of which is currently controlled by the management controller. 7. The workflow-based cloud-management system of claim 6 wherein tasks of application-release-management pipelines are developed and configured, through the dashboard user interface, to receive input parameter values, access pipeline parameters, and output parameters values. 8. The workflow-based cloud-management system of claim 7 wherein an input parameter is specified through the dashboard user interface as one of:
an input parameter with a value provided by the management controller to the workflow-execution engine;
an inter-task input parameter with a value generated by a previously executed task that is retrieved from memory by the management controller and provided by the management controller to the workflow-execution engine; and
a pipeline parameter with a value generated by one of the management controller and a previously executed task that is retrieved from memory by the management controller and provided by the management controller to the workflow-execution engine. 9. The workflow-based cloud-management system of claim 7 wherein an inter-task input parameter is specified using a notation that, includes:
one more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter;
one or more symbols that represent a stage/task path; and
one or more symbols that comprise a parameter name. 10. The workflow-based cloud-management system of claim 9 wherein the one or more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter is the symbol “$;” and wherein the one or more symbols that represent a stage/task path comprises a stage name, a first period, a task name, and a second period. 11. The workflow-based cloud-management system of claim 7 wherein a pipeline parameter is specified using a notation that includes:
one or more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter;
one or more symbols that indicate that the parameter is a pipeline parameter; and
one or more symbols that comprise a parameter name. 12. The workflow-based cloud-management system of claim 9 wherein the one or more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter is the symbol “$;” and wherein the one or more symbols that indicate that the parameter is a pipeline parameter comprises the word “pipeline”. 13. The workflow-based cloud-management system of claim 7 wherein a pipeline parameter is specified through the dashboard user interface as a global parameter, the value of which is set by one of the management controller, a previously executed task, and a currently executing task. 14. The workflow-based cloud-management system of claim 1 wherein a first pipeline task outputs the value of an output parameter of a first type that is automatically transformed from the first type to a second type for input to a second pipeline task that receives input values of an input parameter of the second type. 15. A method that provides one or more inter-task parameters for a task incorporated in an application-release-management pipeline executed by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the method comprising:
developing and configuring the task to receive, as one or more input-parameter values, one or more stored values, each output by a previously executed task; and launching, by a management controller, execution of the task by supplying a reference to the task and the one or more stored values to a task-execution engine. 16. The method of claim 15 wherein the workflow-based cloud-management system comprises:
infrastructure-management-and-administration subsystem;
a workflow-execution engine;
an automated-application-deployment subsystem; and
the automated-application-release-management subsystem that executes application-release-management pipelines that each comprises one or more stages, each having one of more tasks including one or more tasks that, when executed, each receives, as one or more input parameter values, parameter values output by one or mote previously executed tasks. 17. The method of claim 15 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
the management controller;
an interface to the workflow-execution engine; and
an artifact-storage-and-management subsystem. 18. The method of claim 15 wherein the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, diming execution, each receives, as one or more input parameter values, one or more pipeline parameter values associated with the application-release-management pipeline in which the task is incorporated. 19. The workflow-based cloud-management system of claim 18 wherein the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, during execution each accesses one or more pipeline parameters associated with the application-release-management pipeline in which the task is incorporated to store a new value in, or retrieve a previously stored value from each of the one or more pipeline parameters. 20. The workflow-based cloud-management system of claim 19 wherein the management controller stores, in memory accessible from within the execution context of the management controller, one or more pipeline parameter values and one or more output parameter values, each generated by execution of a task incorporated within an application-release-management pipeline, execution of which is currently controlled by the management controller. 21. Computer instructions, stored within one or more physical data-storage devices, that, when executed on one or more processors within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, control the cloud-computing facility to provide one or more inter-task parameters for a task incorporated in an application-release-management pipeline executed by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within the cloud-computing facility by:
developing and configuring the task to receive, as one or more input-parameter values, one or more stored values, each output by a previously executed task; and launching, by a management controller, execution of the task by supplying a reference to the task and the one or more stored values to a task-execution engine. | The current document is directed to an automated-application-release-management controller within an automated-application-release-management subsystem of a workflow-based cloud-management system that provides mechanisms for parameter-value exchanges between tasks of an application-release-management pipeline. Pipeline parameters and task-output parameters are stored in the execution context of the automated-application-release-management controller. During configuration of an automated-application-release-management pipeline, inputs to tasks may be specified as outputs from other tasks. When tasks finish executing, the output values are stored in the execution context of the management controller so that, when execution of subsequent tasks is launched, the stored output values from previously executed tasks can be furnished as input values to the subsequently executed tasks. In addition, pipeline parameters can be defined and initialized in advance of pipeline execution, with the values of pipeline parameters retrieved and/or set during task execution.1. A workflow-based cloud-management system incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the workflow-based cloud-management system comprising:
an infrastructure-management-and-administration subsystem; a workflow-execution engine; an automated-application-deployment subsystem; and an automated-application-release-management subsystem that executes application-release-management pipelines that each comprises one or more stages, each having one of more tasks including one or more tasks that, when executed, each receives, as one or more input parameter values, parameter values output by one or more previously executed tasks. 2. The workflow-based cloud-management system of claim 1 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
a management controller;
an interface to the workflow-execution engine; and
an artifact-storage-and-management subsystem. 3. The workflow-based cloud-management system of claim 2 wherein the automated-application-release-management subsystem and the infrastructure-management-and-administration subsystem include control logic at least partially implemented as workflows that are executed by the workflow-execution-engine subsystem. 4. The workflow-based cloud-management system of claim 2 wherein the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, during execution, each receives, as one or more input parameter values, one or more pipeline parameter values associated with the application-release-management pipeline in which the task is incorporated. 5. The workflow-based cloud-management system of claim 2 where the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, during execution, each accesses one or more pipeline parameters associated with the application-release-management pipeline in which the task is incorporated to store a new value in, or retrieve a previously stored value from, each oaf the one or more pipeline parameters. 6. The workflow-based cloud-management system of claim 2 wherein the management controller stores, in memory accessible from within the execution context of the management controller, one or more pipeline parameter values and one or more output parameter values, each generated by execution of a task incorporated within an application-release-management pipeline, execution of which is currently controlled by the management controller. 7. The workflow-based cloud-management system of claim 6 wherein tasks of application-release-management pipelines are developed and configured, through the dashboard user interface, to receive input parameter values, access pipeline parameters, and output parameters values. 8. The workflow-based cloud-management system of claim 7 wherein an input parameter is specified through the dashboard user interface as one of:
an input parameter with a value provided by the management controller to the workflow-execution engine;
an inter-task input parameter with a value generated by a previously executed task that is retrieved from memory by the management controller and provided by the management controller to the workflow-execution engine; and
a pipeline parameter with a value generated by one of the management controller and a previously executed task that is retrieved from memory by the management controller and provided by the management controller to the workflow-execution engine. 9. The workflow-based cloud-management system of claim 7 wherein an inter-task input parameter is specified using a notation that, includes:
one more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter;
one or more symbols that represent a stage/task path; and
one or more symbols that comprise a parameter name. 10. The workflow-based cloud-management system of claim 9 wherein the one or more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter is the symbol “$;” and wherein the one or more symbols that represent a stage/task path comprises a stage name, a first period, a task name, and a second period. 11. The workflow-based cloud-management system of claim 7 wherein a pipeline parameter is specified using a notation that includes:
one or more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter;
one or more symbols that indicate that the parameter is a pipeline parameter; and
one or more symbols that comprise a parameter name. 12. The workflow-based cloud-management system of claim 9 wherein the one or more symbols that identify the parameter as one of an inter-task parameter and a pipeline parameter is the symbol “$;” and wherein the one or more symbols that indicate that the parameter is a pipeline parameter comprises the word “pipeline”. 13. The workflow-based cloud-management system of claim 7 wherein a pipeline parameter is specified through the dashboard user interface as a global parameter, the value of which is set by one of the management controller, a previously executed task, and a currently executing task. 14. The workflow-based cloud-management system of claim 1 wherein a first pipeline task outputs the value of an output parameter of a first type that is automatically transformed from the first type to a second type for input to a second pipeline task that receives input values of an input parameter of the second type. 15. A method that provides one or more inter-task parameters for a task incorporated in an application-release-management pipeline executed by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, the method comprising:
developing and configuring the task to receive, as one or more input-parameter values, one or more stored values, each output by a previously executed task; and launching, by a management controller, execution of the task by supplying a reference to the task and the one or more stored values to a task-execution engine. 16. The method of claim 15 wherein the workflow-based cloud-management system comprises:
infrastructure-management-and-administration subsystem;
a workflow-execution engine;
an automated-application-deployment subsystem; and
the automated-application-release-management subsystem that executes application-release-management pipelines that each comprises one or more stages, each having one of more tasks including one or more tasks that, when executed, each receives, as one or more input parameter values, parameter values output by one or mote previously executed tasks. 17. The method of claim 15 wherein the automated-application-release-management subsystem comprises:
a dashboard user interface;
the management controller;
an interface to the workflow-execution engine; and
an artifact-storage-and-management subsystem. 18. The method of claim 15 wherein the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, diming execution, each receives, as one or more input parameter values, one or more pipeline parameter values associated with the application-release-management pipeline in which the task is incorporated. 19. The workflow-based cloud-management system of claim 18 wherein the application-release-management pipelines executed by the automated-application-release-management subsystem further include one or more tasks that, during execution each accesses one or more pipeline parameters associated with the application-release-management pipeline in which the task is incorporated to store a new value in, or retrieve a previously stored value from each of the one or more pipeline parameters. 20. The workflow-based cloud-management system of claim 19 wherein the management controller stores, in memory accessible from within the execution context of the management controller, one or more pipeline parameter values and one or more output parameter values, each generated by execution of a task incorporated within an application-release-management pipeline, execution of which is currently controlled by the management controller. 21. Computer instructions, stored within one or more physical data-storage devices, that, when executed on one or more processors within a cloud-computing facility having multiple servers, data-storage devices, and one or more internal networks, control the cloud-computing facility to provide one or more inter-task parameters for a task incorporated in an application-release-management pipeline executed by an automated-application-release-management-subsystem component of a workflow-based cloud-management system that is incorporated within the cloud-computing facility by:
developing and configuring the task to receive, as one or more input-parameter values, one or more stored values, each output by a previously executed task; and launching, by a management controller, execution of the task by supplying a reference to the task and the one or more stored values to a task-execution engine. | 2,400 |
8,832 | 8,832 | 15,979,740 | 2,426 | Methods and systems are disclosed for providing video content in response to requests in a content delivery system with more speed and efficiency. In some aspects, network monitoring devices may gather content specific and network performance metrics, from user devices and content delivery components, to provide input to a computing device for deciding whether to store or delete different versions of the same or different items of content. The decision may be based on a policy which may include a weighted score based on a combination of usage and network efficiency scores. In other aspects, methods and systems are provided to initially provide to a user device a stored version of a content item, and then switch, as needed, to a different version of the content item using on-demand transcoding. | 1. A method comprising:
receiving, by a computing device, usage information associated with a first portion of a content item; transcoding, based on the usage information, the first portion from a first format to a second format different from the first format; receiving, from a requesting device after transcoding the first portion, a first request for the content item; and after receiving the first request:
sending, to the requesting device, the transcoded first portion; and
transcoding a second portion of the content item from the first format to the second format. 2. The method of claim 1, further comprising:
determining that second usage information associated with the second portion satisfies a threshold; and designating, based on the second usage information satisfying the threshold, the second portion for an on-demand transcoding. 3. The method of claim 1, further comprising:
generating first manifest data indicating access locations for a first plurality of segments of the transcoded first portion; storing, before receiving the first request, the first manifest data and the first plurality of segments; and generating, after receiving the first request, second manifest data indicating access locations for a second plurality of segments of the transcoded second portion. 4. The method of claim 1, further comprising:
determining different popularities of different portions of the content item; determining the first portion based on a first popularity of the first portion; and determining the second portion based on a second popularity of the second portion. 5. The method of claim 1, wherein transcoding the first portion is further based on network efficiency information that is based on one or more of:
a bitrate corresponding to the first portion; or a cache efficiency corresponding to the first portion. 6. The method of claim 5, further comprising determining, based on a weighted combination of the usage information and the network efficiency information, a size of the first portion. 7. The method of claim 1, further comprising determining, based on the usage information:
an amount of the content item to be transcoded prior to receiving a request for the content item; and an amount of the content item that will be transcoded after receiving a request for the content item. 8. The method of claim 1, further comprising:
storing the transcoded first portion; sending, to the requesting device, the transcoded second portion; and discarding, after sending the transcoded second portion, the transcoded second portion. 9. A method comprising:
receiving, by a computing device, information associated with a plurality of requests for a content item; determining, based on the information, a first portion of the content item; generating, based on a first version of the first portion, a second version of the first portion, wherein the first version and the second version have different formats; receiving, from a requesting device and after generating the second version of the first portion, a first request for the content item; and after receiving the first request:
sending, to the requesting device, the second version of the first portion; and
generating, based on a first version of a second portion of the content item, a second version of the second portion. 10. The method of claim 9, further comprising:
determining that usage information associated with the second portion satisfies a threshold; and designating, based on the usage information satisfying the threshold, the second portion for an on-demand transcoding. 11. The method of claim 9, further comprising:
determining different popularities of different portions of the content item; and determining the second portion based on a second popularity of the second portion, and wherein determining the first portion is further based on a first popularity of the first portion. 12. The method of claim 9, wherein determining the first portion is further based on network efficiency information that is based on one or more of:
a bitrate corresponding to the first portion; or a cache efficiency corresponding to the first portion. 13. The method of claim 9, further comprising determining, based on the information, an amount of the content item to be transcoded prior to receiving a request for the content item. 14. The method of claim 9, further comprising:
storing, after determining that the information satisfies a threshold, the second version of the first portion; sending, to the requesting device, the second version of the second portion; and discarding, after sending the second version of the second portion, the second version of the second portion. 15. A method comprising:
receiving, by a computing device, usage information associated with a content item; determining, based on the usage information:
a first portion, of the content item, to be transcoded prior to receiving a request for the content item; and
a second portion, of the content item, to be transcoded after receiving a request for the content item;
transcoding a first version of the first portion to a second version, of the first portion, different from the first version; storing the second version of the first portion; and designating a first version of the second portion for an on-demand transcoding. 16. The method of claim 15, further comprising:
receiving, from a requesting device, a first request for the content item; and based on receiving the first request:
sending, to the requesting device, the second version of the first portion; and
transcoding the first version of the second portion to a second version of the second portion. 17. The method of claim 16, further comprising:
sending, to the requesting device, the second version of the second portion; and discarding, after sending the second version of the second portion, the second version of the second portion. 18. The method of claim 15, wherein determining the first portion comprises determining, based on the usage information, an amount of the content item to be transcoded prior to receiving a request for the content item. 19. The method of claim 15, further comprising:
generating manifest data indicating access locations for a first plurality of segments of the second version of the first portion; and storing, before receiving a request for the content item, the manifest data. 20. The method of claim 15, wherein transcoding the first version of the first portion is based on network efficiency information that is based on one or more of:
a bitrate corresponding to the first portion; or a cache efficiency corresponding to the first portion. | Methods and systems are disclosed for providing video content in response to requests in a content delivery system with more speed and efficiency. In some aspects, network monitoring devices may gather content specific and network performance metrics, from user devices and content delivery components, to provide input to a computing device for deciding whether to store or delete different versions of the same or different items of content. The decision may be based on a policy which may include a weighted score based on a combination of usage and network efficiency scores. In other aspects, methods and systems are provided to initially provide to a user device a stored version of a content item, and then switch, as needed, to a different version of the content item using on-demand transcoding.1. A method comprising:
receiving, by a computing device, usage information associated with a first portion of a content item; transcoding, based on the usage information, the first portion from a first format to a second format different from the first format; receiving, from a requesting device after transcoding the first portion, a first request for the content item; and after receiving the first request:
sending, to the requesting device, the transcoded first portion; and
transcoding a second portion of the content item from the first format to the second format. 2. The method of claim 1, further comprising:
determining that second usage information associated with the second portion satisfies a threshold; and designating, based on the second usage information satisfying the threshold, the second portion for an on-demand transcoding. 3. The method of claim 1, further comprising:
generating first manifest data indicating access locations for a first plurality of segments of the transcoded first portion; storing, before receiving the first request, the first manifest data and the first plurality of segments; and generating, after receiving the first request, second manifest data indicating access locations for a second plurality of segments of the transcoded second portion. 4. The method of claim 1, further comprising:
determining different popularities of different portions of the content item; determining the first portion based on a first popularity of the first portion; and determining the second portion based on a second popularity of the second portion. 5. The method of claim 1, wherein transcoding the first portion is further based on network efficiency information that is based on one or more of:
a bitrate corresponding to the first portion; or a cache efficiency corresponding to the first portion. 6. The method of claim 5, further comprising determining, based on a weighted combination of the usage information and the network efficiency information, a size of the first portion. 7. The method of claim 1, further comprising determining, based on the usage information:
an amount of the content item to be transcoded prior to receiving a request for the content item; and an amount of the content item that will be transcoded after receiving a request for the content item. 8. The method of claim 1, further comprising:
storing the transcoded first portion; sending, to the requesting device, the transcoded second portion; and discarding, after sending the transcoded second portion, the transcoded second portion. 9. A method comprising:
receiving, by a computing device, information associated with a plurality of requests for a content item; determining, based on the information, a first portion of the content item; generating, based on a first version of the first portion, a second version of the first portion, wherein the first version and the second version have different formats; receiving, from a requesting device and after generating the second version of the first portion, a first request for the content item; and after receiving the first request:
sending, to the requesting device, the second version of the first portion; and
generating, based on a first version of a second portion of the content item, a second version of the second portion. 10. The method of claim 9, further comprising:
determining that usage information associated with the second portion satisfies a threshold; and designating, based on the usage information satisfying the threshold, the second portion for an on-demand transcoding. 11. The method of claim 9, further comprising:
determining different popularities of different portions of the content item; and determining the second portion based on a second popularity of the second portion, and wherein determining the first portion is further based on a first popularity of the first portion. 12. The method of claim 9, wherein determining the first portion is further based on network efficiency information that is based on one or more of:
a bitrate corresponding to the first portion; or a cache efficiency corresponding to the first portion. 13. The method of claim 9, further comprising determining, based on the information, an amount of the content item to be transcoded prior to receiving a request for the content item. 14. The method of claim 9, further comprising:
storing, after determining that the information satisfies a threshold, the second version of the first portion; sending, to the requesting device, the second version of the second portion; and discarding, after sending the second version of the second portion, the second version of the second portion. 15. A method comprising:
receiving, by a computing device, usage information associated with a content item; determining, based on the usage information:
a first portion, of the content item, to be transcoded prior to receiving a request for the content item; and
a second portion, of the content item, to be transcoded after receiving a request for the content item;
transcoding a first version of the first portion to a second version, of the first portion, different from the first version; storing the second version of the first portion; and designating a first version of the second portion for an on-demand transcoding. 16. The method of claim 15, further comprising:
receiving, from a requesting device, a first request for the content item; and based on receiving the first request:
sending, to the requesting device, the second version of the first portion; and
transcoding the first version of the second portion to a second version of the second portion. 17. The method of claim 16, further comprising:
sending, to the requesting device, the second version of the second portion; and discarding, after sending the second version of the second portion, the second version of the second portion. 18. The method of claim 15, wherein determining the first portion comprises determining, based on the usage information, an amount of the content item to be transcoded prior to receiving a request for the content item. 19. The method of claim 15, further comprising:
generating manifest data indicating access locations for a first plurality of segments of the second version of the first portion; and storing, before receiving a request for the content item, the manifest data. 20. The method of claim 15, wherein transcoding the first version of the first portion is based on network efficiency information that is based on one or more of:
a bitrate corresponding to the first portion; or a cache efficiency corresponding to the first portion. | 2,400 |
8,833 | 8,833 | 16,053,834 | 2,454 | A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks. | 1. An AC-powered temperature control appliance for use with first and second wireless networks, the appliance comprising:
an AC connector for connecting to AC power source; a first antenna for communication over the first wireless network; a first wireless transceiver coupled to the first antenna for transmitting digital data to, and for receiving digital data from, the first wireless network; a second antenna for communication over the second wireless network; a second wireless transceiver coupled to the second antenna for transmitting digital data to, and for receiving digital data from, the second wireless network; a thermoelectric actuator that comprises a heater or cooler for affecting or changing the temperature of a solid, a liquid, or a gas object, the thermoelectric actuator is coupled to the AC connector for being powered from the AC power source; a software and a processor for executing the software, the processor is coupled to the first wireless transceiver for receiving first data from, and for transmitting second data to, the first wireless network, and the processor is coupled to the second wireless transceiver for receiving third data from, and for transmitting fourth data to, the second wireless network; and an enclosure housing the first and second wireless transceivers, the processor, and the thermoelectric actuator, wherein the thermoelectric actuator is coupled to the processor to be controlled by the first data or by the third data. 2. The appliance according to claim 1, wherein the thermoelectric actuator is coupled to the processor to be controlled by the first data and by the third data. 3. The appliance according to claim 1, further operative for temperature control of environment, air, gas, food, liquid, or water in a home, commercial, or industrial environment. 4. The appliance according to claim 3, further consisting of, integrated with, or being part of, a domestic or industrial air conditioner, water heater, HVAC system, washing machine, clothes dryer, vacuum cleaner, microwave oven, electric mixer, stove, oven, refrigerator, freezer, food processor, dishwasher, food blender, beverage maker, coffeemaker, iced-tea maker, induction cooker, electric furnace, or dehumidifier. 5. The appliance according to claim 1, wherein the thermoelectric actuator uses conduction, convection, thermal radiation, or by a transfer of energy by phase changes. 6. The appliance according to claim 5, wherein the heater uses radiative heating, wherein the heater comprises, or consists of: a convector using convection, or wherein the heater comprises, or consists of, a forced convection heater. 7. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, a heating or cooling heat pump, or wherein the thermoelectric actuator comprises, or consists of, a cooler based on an electric motor based compressor for driving a refrigeration cycle. 8. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, an electric heater that comprises, or consists of, a resistance heater or a dielectric heater. 9. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, an electric heater that is solid-state based or is based on the Peltier effect, or herein the thermoelectric actuator comprises, or consists of, a forced convection heater. 10. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, a radiative heater or an induction-based heater. 11. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, an electrically powered compression-based cooler that comprises or uses an electric motor to drive a refrigeration cycle. 12. The appliance according to claim 1, further comprising an electrically actuated switch coupled to be controlled by the processor and further coupled for switching the AC power from the AC connector to the thermoelectric actuator. 13. The appliance according to claim 12, wherein the electrically actuated switch is coupled to the first or second wireless transceiver for being respectively activated in response to the first or third data. 14. The appliance according to claim 12, wherein the electrically actuated switch is ‘normally open’ type, ‘normally closed’ type, or a changeover switch, wherein the electrically actuated switch is ‘make-before-break’ or ‘break-before-make’ type, or wherein the electrically actuated switch have two or more poles or two or more throws, and the contacts of the electrically actuated switch are arranged as a Single-Pole-Double-Throw (SPDT), Double-Pole-Double-Throw (DPDT), Double-Pole-Single-Throw (DPST), or Single-Pole-Changeover (SPCO). 15. The appliance according to claim 12, wherein the electrically actuated switch is a latching or a non-latching type relay. 16. The appliance according to claim 15, wherein the relay is a solenoid-based electromagnetic relay that is a reed relay, wherein the relay is solid-state or semiconductor based, or wherein the relay is a Solid State Relay (SSR). 17. The appliance according to claim 12, wherein the electrically actuated switch is based on an electrical circuit that comprises an open collector transistor, an open drain transistor, a thyristor, a TRIAC, or an opto-isolator. 18. The appliance according to claim 1, further comprising a sensor for producing sensor data in response to a sensed phenomenon, the sensor is coupled to the processor, and wherein the second or fourth data is in response to the sensor data. 19. The appliance according to claim 18, wherein the second and fourth data are in response to the sensor data. 20. The appliance according to claim 18, wherein the sensor comprises, or consists of, a current sensor for measuring Alternating Current (AC) or Direct Current (DC) current. 21. The appliance according to claim 20, wherein the current sensor is coupled for measuring the current in response to, used by, or via, the thermoelectric actuator or the appliance. 22. The appliance according to claim 20, wherein the current sensor comprises an ampermeter, galvanometer, or a hot-wire ampermeter. 23. The appliance according to claim 20, wherein the current sensor comprises a current clamp, a current probe, a current transformer, or uses a ‘Hall effect’. 24. The appliance according to claim 20, wherein the current sensor is a non-contact or a non-conductive current meter. 25. The appliance according to claim 20, further comprising a wattmeter that comprises the current sensor for measuring the magnitude of the active power or the electrical energy consumed by the appliance or by the thermoelectric actuator. 26. The appliance according to claim 25, wherein the wattmeter comprises single or multi-phase AC power or energy meter. 27. The appliance according to claim 25, wherein the wattmeter comprises a bolometer, or wherein the wattmeter accumulates or averages readings. 28. The appliance according to claim 25, wherein the wattmeter is based on multiplying a measured voltage and the current measured by the current sensor. 29. The appliance according to claim 25, wherein the wattmeter or the current sensor are induction based. 30. The appliance according to claim 1, wherein the first wireless network is a Wireless Personal Area Network (WPAN), the first antenna is a WPAN antenna, and the first wireless transceiver is a WPAN modem. 31. The appliance according to claim 30, wherein the WPAN is according to, based on, or compatible with, Bluetooth™ or IEEE 802.15.1-2005 standards. 32. The appliance according to claim 30, wherein the WPAN is according to, based on, or compatible with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standards. 33. The appliance according to claim 30, wherein the second wireless network is a Wireless Local Area Network (WLAN), the second antenna is a WLAN antenna, and the second wireless transceiver is a WLAN modem. 34. The appliance according to claim 30, wherein the second wireless network is a satellite network, the second antenna is a satellite antenna, and the second wireless transceiver is a satellite modem. 35. The appliance according to claim 30, wherein the second wireless network is a cellular telephone network, the second antenna is a cellular antenna, and the second wireless transceiver is a cellular modem. 36. The appliance according to claim 30, wherein the second wireless network is a wireless broadband network. 37. The appliance according to claim 30, wherein the second wireless network uses a licensed or unlicensed radio frequency band. 38. The appliance according to claim 37, wherein the unlicensed radio frequency band is an Industrial, Scientific and Medical (ISM) radio band. 39. The appliance according to claim 1, wherein the first wireless network is a Wireless Local Area Network (WLAN), the first antenna is a WLAN antenna, and the first wireless transceiver is a WLAN modem. 40. The appliance according to claim 39, wherein the WLAN is according to, based on, or compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac. 41. The appliance according to claim 39, wherein the second wireless network is a satellite network, the second antenna is a satellite antenna, and the second wireless transceiver is a satellite modem. 42. The appliance according to claim 39, wherein the second wireless network is a cellular telephone network, the second antenna is a cellular antenna, and the second wireless transceiver is a cellular modem. 43. The appliance according to claim 39, wherein the second wireless network is a wireless broadband network. 44. The appliance according to claim 39, wherein the second wireless network uses a licensed or unlicensed radio frequency band. 45. The appliance according to claim 39, wherein the second wireless network is a cellular telephone network, the antenna is a cellular antenna, and the second wireless transceiver is a cellular modem. 46. The appliance according to claim 45, wherein the cellular telephone network is a Third Generation (3G) network that uses UMTS W-CDMA, UMTS HSPA, UMTS TDD, CDMA2000 1×RTT, CDMA2000 EV-DO, or GSM EDGE-Evolution, or wherein the cellular telephone network is a Fourth Generation (4G) network that uses HSPA+, Mobile WiMAX, LTE, LTE-Advanced, MBWA, or is based on IEEE 802.20-2008. 47. The appliance according to claim 39, wherein the second wireless network is a WiMAX network, wherein the second antenna is a WiMAX antenna and the second wireless transceiver is a WiMAX modem, and wherein the WiMAX network is according to, or based on, or compatible with, IEEE 802.16-2009. 48. The appliance according to claim 1, further being addressable in the first wireless network using distinct locally administered addresses or a universally administered digital addresses stored in a volatile or non-volatile memory in the appliance and uniquely identifying the appliance in the first network. 49. The appliance according to claim 48, wherein the digital address is a MAC layer address that is MAC-48, EUI-48, or EUI-64 address type. 50. The appliance according to claim 48, wherein the digital address is a layer 3 address and is static or dynamic IP address that is IPv4 or IPv6 type address. 51. The appliance according to claim 48, wherein the digital address is autonomously assigned or is assigned by another device via the first or second wireless network using DHCP. 52. The appliance according to claim 1, further comprising a sensor for producing sensor data in response to a sensed phenomenon, the sensor is coupled to the processor, and wherein the second data is in response to the sensor data. 53. The appliance according to claim 52, wherein the thermoelectric actuator is activated or controlled in response to the sensor data. 54. The appliance according to claim 52, wherein the sensor is a piezoelectric sensor that includes single crystal material or a piezoelectric ceramics and uses a transverse, longitudinal, or shear effect mode of the piezoelectric effect. 55. The appliance according to claim 52, further comprising multiple sensors arranged as a directional sensor array operative to estimate the number, magnitude, frequency, Direction-Of-Arrival (DOA), distance, or speed of the phenomenon impinging the sensor array. 56. The appliance according to claim 52, wherein a single component consists of, or is part of, the sensor and the actuator. 57. The appliance according to claim 52, wherein the sensor is a thermoelectric sensor that responds to a temperature or to a temperature gradient of an object using conduction, convection, or radiation, and wherein the thermoelectric sensor consists of, or comprises, a Positive Temperature Coefficient (PTC) thermistor, a Negative Temperature Coefficient (NTC) thermistor, a thermocouple, a quartz crystal, or a Resistance Temperature Detector (RTD). 58. The appliance according to claim 52, wherein the sensor consists of, or comprises, a nanosensor, a crystal, or a semiconductor, or wherein: the sensor is an ultrasonic based, the sensor is an eddy-current sensor, the sensor is a proximity sensor, the sensor is a bulk or surface acoustic sensor, or the sensor is an atmospheric or an environmental sensor. 59. The appliance according to claim 52, wherein the sensor is a radiation sensor that responds to radioactivity, nuclear radiation, alpha particles, beta particles, or gamma rays, and is based on gas ionization. 60. The appliance according to claim 52, wherein the sensor is a photoelectric sensor that responds to a visible or an invisible light, the invisible light is infrared, ultraviolet, X-rays, or gamma rays, and wherein the photoelectric sensor is based on the photoelectric or photovoltaic effect, and consists of, or comprises, a semiconductor component that consists of, or comprises, a photodiode, a phototransistor, or a solar cell. 61. The appliance according to claim 60, wherein the photoelectric sensor is based on Charge-Coupled Device (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 62. The appliance according to claim 52, wherein the sensor is a photosensitive image sensor array comprising multiple photoelectric sensors, for capturing an image and producing electronic image information representing the image, and the appliance further comprising one or more optical lens for focusing the received light and to guide the image, and wherein the image sensor is disposed approximately at an image focal point plane of the one or more optical lens for properly capturing the image. 63. The appliance according to claim 62, further comprising an image processor coupled to the image sensor for providing a digital data video signal according to a digital video format, the digital video signal carrying digital data video based on the captured images, and wherein the digital video format is based on one out of: TIFF (Tagged Image File Format), RAW format, AVI, DV, MOV, WMV, MP4, DCF (Design Rule for Camera Format), ITU-T H.261, ITU-T H.263, ITU-T H.264, ITU-T CCIR 601, ASF, Exif (Exchangeable Image File Format), and DPOF (Digital Print Order Format) standards. 64. The appliance according to claim 52, wherein the sensor is an electrochemical sensor that responds to an object chemical structure, properties, composition, or reactions. 65. The appliance according to claim 64, wherein the electrochemical sensor is a pH meter or a gas sensor responding to a presence of radon, hydrogen, oxygen, or Carbon-Monoxide (CO), or wherein the electrochemical sensor is based on optical detection or on ionization and is a smoke, a flame, or a fire detector, or is responsive to combustible, flammable, or toxic gas. 66. The appliance according to claim 52, wherein the sensor is an electroacoustic sensor that responds to an audible or inaudible sound. 67. The appliance according to claim 66, wherein the electroacoustic sensor is an omnidirectional, unidirectional, or bidirectional microphone that is based on the sensing the incident sound based motion of a diaphragm or a ribbon, and the microphone consists of, or comprising, a condenser, an electret, a dynamic, a ribbon, a carbon, or a piezoelectric microphone. | A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.1. An AC-powered temperature control appliance for use with first and second wireless networks, the appliance comprising:
an AC connector for connecting to AC power source; a first antenna for communication over the first wireless network; a first wireless transceiver coupled to the first antenna for transmitting digital data to, and for receiving digital data from, the first wireless network; a second antenna for communication over the second wireless network; a second wireless transceiver coupled to the second antenna for transmitting digital data to, and for receiving digital data from, the second wireless network; a thermoelectric actuator that comprises a heater or cooler for affecting or changing the temperature of a solid, a liquid, or a gas object, the thermoelectric actuator is coupled to the AC connector for being powered from the AC power source; a software and a processor for executing the software, the processor is coupled to the first wireless transceiver for receiving first data from, and for transmitting second data to, the first wireless network, and the processor is coupled to the second wireless transceiver for receiving third data from, and for transmitting fourth data to, the second wireless network; and an enclosure housing the first and second wireless transceivers, the processor, and the thermoelectric actuator, wherein the thermoelectric actuator is coupled to the processor to be controlled by the first data or by the third data. 2. The appliance according to claim 1, wherein the thermoelectric actuator is coupled to the processor to be controlled by the first data and by the third data. 3. The appliance according to claim 1, further operative for temperature control of environment, air, gas, food, liquid, or water in a home, commercial, or industrial environment. 4. The appliance according to claim 3, further consisting of, integrated with, or being part of, a domestic or industrial air conditioner, water heater, HVAC system, washing machine, clothes dryer, vacuum cleaner, microwave oven, electric mixer, stove, oven, refrigerator, freezer, food processor, dishwasher, food blender, beverage maker, coffeemaker, iced-tea maker, induction cooker, electric furnace, or dehumidifier. 5. The appliance according to claim 1, wherein the thermoelectric actuator uses conduction, convection, thermal radiation, or by a transfer of energy by phase changes. 6. The appliance according to claim 5, wherein the heater uses radiative heating, wherein the heater comprises, or consists of: a convector using convection, or wherein the heater comprises, or consists of, a forced convection heater. 7. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, a heating or cooling heat pump, or wherein the thermoelectric actuator comprises, or consists of, a cooler based on an electric motor based compressor for driving a refrigeration cycle. 8. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, an electric heater that comprises, or consists of, a resistance heater or a dielectric heater. 9. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, an electric heater that is solid-state based or is based on the Peltier effect, or herein the thermoelectric actuator comprises, or consists of, a forced convection heater. 10. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, a radiative heater or an induction-based heater. 11. The appliance according to claim 1, wherein the thermoelectric actuator comprises, or consists of, an electrically powered compression-based cooler that comprises or uses an electric motor to drive a refrigeration cycle. 12. The appliance according to claim 1, further comprising an electrically actuated switch coupled to be controlled by the processor and further coupled for switching the AC power from the AC connector to the thermoelectric actuator. 13. The appliance according to claim 12, wherein the electrically actuated switch is coupled to the first or second wireless transceiver for being respectively activated in response to the first or third data. 14. The appliance according to claim 12, wherein the electrically actuated switch is ‘normally open’ type, ‘normally closed’ type, or a changeover switch, wherein the electrically actuated switch is ‘make-before-break’ or ‘break-before-make’ type, or wherein the electrically actuated switch have two or more poles or two or more throws, and the contacts of the electrically actuated switch are arranged as a Single-Pole-Double-Throw (SPDT), Double-Pole-Double-Throw (DPDT), Double-Pole-Single-Throw (DPST), or Single-Pole-Changeover (SPCO). 15. The appliance according to claim 12, wherein the electrically actuated switch is a latching or a non-latching type relay. 16. The appliance according to claim 15, wherein the relay is a solenoid-based electromagnetic relay that is a reed relay, wherein the relay is solid-state or semiconductor based, or wherein the relay is a Solid State Relay (SSR). 17. The appliance according to claim 12, wherein the electrically actuated switch is based on an electrical circuit that comprises an open collector transistor, an open drain transistor, a thyristor, a TRIAC, or an opto-isolator. 18. The appliance according to claim 1, further comprising a sensor for producing sensor data in response to a sensed phenomenon, the sensor is coupled to the processor, and wherein the second or fourth data is in response to the sensor data. 19. The appliance according to claim 18, wherein the second and fourth data are in response to the sensor data. 20. The appliance according to claim 18, wherein the sensor comprises, or consists of, a current sensor for measuring Alternating Current (AC) or Direct Current (DC) current. 21. The appliance according to claim 20, wherein the current sensor is coupled for measuring the current in response to, used by, or via, the thermoelectric actuator or the appliance. 22. The appliance according to claim 20, wherein the current sensor comprises an ampermeter, galvanometer, or a hot-wire ampermeter. 23. The appliance according to claim 20, wherein the current sensor comprises a current clamp, a current probe, a current transformer, or uses a ‘Hall effect’. 24. The appliance according to claim 20, wherein the current sensor is a non-contact or a non-conductive current meter. 25. The appliance according to claim 20, further comprising a wattmeter that comprises the current sensor for measuring the magnitude of the active power or the electrical energy consumed by the appliance or by the thermoelectric actuator. 26. The appliance according to claim 25, wherein the wattmeter comprises single or multi-phase AC power or energy meter. 27. The appliance according to claim 25, wherein the wattmeter comprises a bolometer, or wherein the wattmeter accumulates or averages readings. 28. The appliance according to claim 25, wherein the wattmeter is based on multiplying a measured voltage and the current measured by the current sensor. 29. The appliance according to claim 25, wherein the wattmeter or the current sensor are induction based. 30. The appliance according to claim 1, wherein the first wireless network is a Wireless Personal Area Network (WPAN), the first antenna is a WPAN antenna, and the first wireless transceiver is a WPAN modem. 31. The appliance according to claim 30, wherein the WPAN is according to, based on, or compatible with, Bluetooth™ or IEEE 802.15.1-2005 standards. 32. The appliance according to claim 30, wherein the WPAN is according to, based on, or compatible with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standards. 33. The appliance according to claim 30, wherein the second wireless network is a Wireless Local Area Network (WLAN), the second antenna is a WLAN antenna, and the second wireless transceiver is a WLAN modem. 34. The appliance according to claim 30, wherein the second wireless network is a satellite network, the second antenna is a satellite antenna, and the second wireless transceiver is a satellite modem. 35. The appliance according to claim 30, wherein the second wireless network is a cellular telephone network, the second antenna is a cellular antenna, and the second wireless transceiver is a cellular modem. 36. The appliance according to claim 30, wherein the second wireless network is a wireless broadband network. 37. The appliance according to claim 30, wherein the second wireless network uses a licensed or unlicensed radio frequency band. 38. The appliance according to claim 37, wherein the unlicensed radio frequency band is an Industrial, Scientific and Medical (ISM) radio band. 39. The appliance according to claim 1, wherein the first wireless network is a Wireless Local Area Network (WLAN), the first antenna is a WLAN antenna, and the first wireless transceiver is a WLAN modem. 40. The appliance according to claim 39, wherein the WLAN is according to, based on, or compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac. 41. The appliance according to claim 39, wherein the second wireless network is a satellite network, the second antenna is a satellite antenna, and the second wireless transceiver is a satellite modem. 42. The appliance according to claim 39, wherein the second wireless network is a cellular telephone network, the second antenna is a cellular antenna, and the second wireless transceiver is a cellular modem. 43. The appliance according to claim 39, wherein the second wireless network is a wireless broadband network. 44. The appliance according to claim 39, wherein the second wireless network uses a licensed or unlicensed radio frequency band. 45. The appliance according to claim 39, wherein the second wireless network is a cellular telephone network, the antenna is a cellular antenna, and the second wireless transceiver is a cellular modem. 46. The appliance according to claim 45, wherein the cellular telephone network is a Third Generation (3G) network that uses UMTS W-CDMA, UMTS HSPA, UMTS TDD, CDMA2000 1×RTT, CDMA2000 EV-DO, or GSM EDGE-Evolution, or wherein the cellular telephone network is a Fourth Generation (4G) network that uses HSPA+, Mobile WiMAX, LTE, LTE-Advanced, MBWA, or is based on IEEE 802.20-2008. 47. The appliance according to claim 39, wherein the second wireless network is a WiMAX network, wherein the second antenna is a WiMAX antenna and the second wireless transceiver is a WiMAX modem, and wherein the WiMAX network is according to, or based on, or compatible with, IEEE 802.16-2009. 48. The appliance according to claim 1, further being addressable in the first wireless network using distinct locally administered addresses or a universally administered digital addresses stored in a volatile or non-volatile memory in the appliance and uniquely identifying the appliance in the first network. 49. The appliance according to claim 48, wherein the digital address is a MAC layer address that is MAC-48, EUI-48, or EUI-64 address type. 50. The appliance according to claim 48, wherein the digital address is a layer 3 address and is static or dynamic IP address that is IPv4 or IPv6 type address. 51. The appliance according to claim 48, wherein the digital address is autonomously assigned or is assigned by another device via the first or second wireless network using DHCP. 52. The appliance according to claim 1, further comprising a sensor for producing sensor data in response to a sensed phenomenon, the sensor is coupled to the processor, and wherein the second data is in response to the sensor data. 53. The appliance according to claim 52, wherein the thermoelectric actuator is activated or controlled in response to the sensor data. 54. The appliance according to claim 52, wherein the sensor is a piezoelectric sensor that includes single crystal material or a piezoelectric ceramics and uses a transverse, longitudinal, or shear effect mode of the piezoelectric effect. 55. The appliance according to claim 52, further comprising multiple sensors arranged as a directional sensor array operative to estimate the number, magnitude, frequency, Direction-Of-Arrival (DOA), distance, or speed of the phenomenon impinging the sensor array. 56. The appliance according to claim 52, wherein a single component consists of, or is part of, the sensor and the actuator. 57. The appliance according to claim 52, wherein the sensor is a thermoelectric sensor that responds to a temperature or to a temperature gradient of an object using conduction, convection, or radiation, and wherein the thermoelectric sensor consists of, or comprises, a Positive Temperature Coefficient (PTC) thermistor, a Negative Temperature Coefficient (NTC) thermistor, a thermocouple, a quartz crystal, or a Resistance Temperature Detector (RTD). 58. The appliance according to claim 52, wherein the sensor consists of, or comprises, a nanosensor, a crystal, or a semiconductor, or wherein: the sensor is an ultrasonic based, the sensor is an eddy-current sensor, the sensor is a proximity sensor, the sensor is a bulk or surface acoustic sensor, or the sensor is an atmospheric or an environmental sensor. 59. The appliance according to claim 52, wherein the sensor is a radiation sensor that responds to radioactivity, nuclear radiation, alpha particles, beta particles, or gamma rays, and is based on gas ionization. 60. The appliance according to claim 52, wherein the sensor is a photoelectric sensor that responds to a visible or an invisible light, the invisible light is infrared, ultraviolet, X-rays, or gamma rays, and wherein the photoelectric sensor is based on the photoelectric or photovoltaic effect, and consists of, or comprises, a semiconductor component that consists of, or comprises, a photodiode, a phototransistor, or a solar cell. 61. The appliance according to claim 60, wherein the photoelectric sensor is based on Charge-Coupled Device (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 62. The appliance according to claim 52, wherein the sensor is a photosensitive image sensor array comprising multiple photoelectric sensors, for capturing an image and producing electronic image information representing the image, and the appliance further comprising one or more optical lens for focusing the received light and to guide the image, and wherein the image sensor is disposed approximately at an image focal point plane of the one or more optical lens for properly capturing the image. 63. The appliance according to claim 62, further comprising an image processor coupled to the image sensor for providing a digital data video signal according to a digital video format, the digital video signal carrying digital data video based on the captured images, and wherein the digital video format is based on one out of: TIFF (Tagged Image File Format), RAW format, AVI, DV, MOV, WMV, MP4, DCF (Design Rule for Camera Format), ITU-T H.261, ITU-T H.263, ITU-T H.264, ITU-T CCIR 601, ASF, Exif (Exchangeable Image File Format), and DPOF (Digital Print Order Format) standards. 64. The appliance according to claim 52, wherein the sensor is an electrochemical sensor that responds to an object chemical structure, properties, composition, or reactions. 65. The appliance according to claim 64, wherein the electrochemical sensor is a pH meter or a gas sensor responding to a presence of radon, hydrogen, oxygen, or Carbon-Monoxide (CO), or wherein the electrochemical sensor is based on optical detection or on ionization and is a smoke, a flame, or a fire detector, or is responsive to combustible, flammable, or toxic gas. 66. The appliance according to claim 52, wherein the sensor is an electroacoustic sensor that responds to an audible or inaudible sound. 67. The appliance according to claim 66, wherein the electroacoustic sensor is an omnidirectional, unidirectional, or bidirectional microphone that is based on the sensing the incident sound based motion of a diaphragm or a ribbon, and the microphone consists of, or comprising, a condenser, an electret, a dynamic, a ribbon, a carbon, or a piezoelectric microphone. | 2,400 |
8,834 | 8,834 | 15,847,060 | 2,421 | Systems and methods for synchronizing the playback of network media across multiple content playback devices, termed herein as “playback devices”, “clients”, or “client devices”. In one implementation, client devices are controlled to parse and buffer media content separately. Once all clients are ready, a controller may cause the client devices to start in a synchronized fashion based on signals sent by the controller. The controller adjusts the timing of the signal so that the outputs are displayed in synchronization on each client device. In other implementations, device lag times may be measured. In still other implementations, a master device may synchronize playback of media content on slave devices. In yet other implementations, devices may buffer and join playback of media content occurring on other devices. In further implementations, the systems and methods may be expanded to include steps of processing authentication for service providers prior to arranging synchronized playback. | 1. A method of synchronizing playback of IPTV content between a first content playback device and a second content playback device, comprising: a. playing back a content item on a first content playback device; b. buffering but not playing back the content item on a second content playback device, the buffering but not playing back occurring at least until the buffer includes a portion of the content item currently being played back on the first content playback device; and c. sending a signal to begin playback of the content item on the second content playback device, such that the playback of the content item on the first and second content playback devices is synchronized. 2. The method of claim 1, wherein the first and second content playback devices are in data communication with a controller, and further comprising: a. sending data about a device lag time associated with the second content playback device to the controller; and b. sending a signal to the second content playback device to begin playback of the partially buffered content item, the time of the sending a signal based on the device lag time. 3. The method of claim 1, wherein the buffering is in response to a request from the second content playback device to join the playback of the content item. 4. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 1. 5. A method of determining a device lag time, comprising:
a. generating a test signal; b. sending the test signal to initiate a signal indicating that rendering of a content item should begin; c. detecting the rendering of the content item; and d. measuring a time between the sending and the detecting to calculate a device lag time. 6. The method of claim 5, further comprising sending the device lag time to a controller. 7. The method of claim 5, wherein the rendering of a content item causes a change in brightness or volume. 8. The method of claim 5, wherein the detecting includes detecting with a microphone or an optical sensor. 9. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 5. 10. A method of playback of at least a portion of a content item on a second content playback device based on a presence of the content item at a first content playback device, comprising:
a. at least partially receiving a content item on a first content playback device; b. transmitting at least a portion of the received content item to a second content playback device; and c. encoding or encrypting the content item by the first content playback device prior to the transmitting. 11. The method of claim 10, wherein the first content playback device generates a portion of the content item using a tuner. 12. The method of claim 10, wherein the first content playback device has received a portion of the content item from another content playback device. 13. The method of claim 10, further comprising controlling operation of the first content playback device using the second content playback device. 14. The method of claim 10, wherein the transmitting is performed immediately upon the receiving. 15. The method of claim 10, further comprising receiving device or network lag information at the first content playback device, and wherein the transmitting is performed following a time differential based on the received device or network lag information. 16. The method of claim 10, wherein the transmitting is performed while the first content playback device is playing back the content item, playing back another content item, or not playing a content item. 17. The method of claim 16, wherein the transmitting is performed while the first content playback device is playing back the content item, and wherein the transmitting is performed such that the second content playback device plays back the content item in synchronization with the first content playback device. 18. The method of claim 10, wherein multiple second content playback devices are in data communication with the first content playback device, and further comprising selecting a second content playback device to receive the content item prior to the transmitting. 19. The method of claim 10, wherein a plurality of second content playback devices are in data communication with the first content playback device, and further comprising transmitting the content item to the plurality of second content playback devices. 20. The method of claim 10, wherein a plurality of second content playback devices are in data communication with the first content playback device, and further comprising transmitting the content item using a multicasting method to the plurality of second content playback devices. 21. The method of claim 10, wherein a plurality of second content playback devices are in data communication with the first content playback device, and further comprising:
a. at least partially receiving another content item on the first content playback device; and b. transmitting at least a portion of the received content item to one content playback device of the plurality and transmitting at least a portion of the received another content item to another content playback device of the plurality. 22. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 10. | Systems and methods for synchronizing the playback of network media across multiple content playback devices, termed herein as “playback devices”, “clients”, or “client devices”. In one implementation, client devices are controlled to parse and buffer media content separately. Once all clients are ready, a controller may cause the client devices to start in a synchronized fashion based on signals sent by the controller. The controller adjusts the timing of the signal so that the outputs are displayed in synchronization on each client device. In other implementations, device lag times may be measured. In still other implementations, a master device may synchronize playback of media content on slave devices. In yet other implementations, devices may buffer and join playback of media content occurring on other devices. In further implementations, the systems and methods may be expanded to include steps of processing authentication for service providers prior to arranging synchronized playback.1. A method of synchronizing playback of IPTV content between a first content playback device and a second content playback device, comprising: a. playing back a content item on a first content playback device; b. buffering but not playing back the content item on a second content playback device, the buffering but not playing back occurring at least until the buffer includes a portion of the content item currently being played back on the first content playback device; and c. sending a signal to begin playback of the content item on the second content playback device, such that the playback of the content item on the first and second content playback devices is synchronized. 2. The method of claim 1, wherein the first and second content playback devices are in data communication with a controller, and further comprising: a. sending data about a device lag time associated with the second content playback device to the controller; and b. sending a signal to the second content playback device to begin playback of the partially buffered content item, the time of the sending a signal based on the device lag time. 3. The method of claim 1, wherein the buffering is in response to a request from the second content playback device to join the playback of the content item. 4. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 1. 5. A method of determining a device lag time, comprising:
a. generating a test signal; b. sending the test signal to initiate a signal indicating that rendering of a content item should begin; c. detecting the rendering of the content item; and d. measuring a time between the sending and the detecting to calculate a device lag time. 6. The method of claim 5, further comprising sending the device lag time to a controller. 7. The method of claim 5, wherein the rendering of a content item causes a change in brightness or volume. 8. The method of claim 5, wherein the detecting includes detecting with a microphone or an optical sensor. 9. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 5. 10. A method of playback of at least a portion of a content item on a second content playback device based on a presence of the content item at a first content playback device, comprising:
a. at least partially receiving a content item on a first content playback device; b. transmitting at least a portion of the received content item to a second content playback device; and c. encoding or encrypting the content item by the first content playback device prior to the transmitting. 11. The method of claim 10, wherein the first content playback device generates a portion of the content item using a tuner. 12. The method of claim 10, wherein the first content playback device has received a portion of the content item from another content playback device. 13. The method of claim 10, further comprising controlling operation of the first content playback device using the second content playback device. 14. The method of claim 10, wherein the transmitting is performed immediately upon the receiving. 15. The method of claim 10, further comprising receiving device or network lag information at the first content playback device, and wherein the transmitting is performed following a time differential based on the received device or network lag information. 16. The method of claim 10, wherein the transmitting is performed while the first content playback device is playing back the content item, playing back another content item, or not playing a content item. 17. The method of claim 16, wherein the transmitting is performed while the first content playback device is playing back the content item, and wherein the transmitting is performed such that the second content playback device plays back the content item in synchronization with the first content playback device. 18. The method of claim 10, wherein multiple second content playback devices are in data communication with the first content playback device, and further comprising selecting a second content playback device to receive the content item prior to the transmitting. 19. The method of claim 10, wherein a plurality of second content playback devices are in data communication with the first content playback device, and further comprising transmitting the content item to the plurality of second content playback devices. 20. The method of claim 10, wherein a plurality of second content playback devices are in data communication with the first content playback device, and further comprising transmitting the content item using a multicasting method to the plurality of second content playback devices. 21. The method of claim 10, wherein a plurality of second content playback devices are in data communication with the first content playback device, and further comprising:
a. at least partially receiving another content item on the first content playback device; and b. transmitting at least a portion of the received content item to one content playback device of the plurality and transmitting at least a portion of the received another content item to another content playback device of the plurality. 22. A non-transitory computer-readable medium, comprising instructions for causing a computing device to implement the method of claim 10. | 2,400 |
8,835 | 8,835 | 15,736,241 | 2,462 | A network node and a wireless device as well as respective method performed thereby for communication with each other are provided. The method performed by the network node comprises receiving, from the wireless device, a measurement report indicating a channel quality of the channel between the network node and the wireless device; and determining whether the channel quality is acceptable or unacceptable. The method further comprises transmitting, to the wireless device, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. | 1. A method performed by a network node for communicating with a wireless device, the network node and the wireless device being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the method comprising:
receiving, from the wireless device, a measurement report indicating a channel quality of the channel between the network node and the wireless device, determining whether the channel quality is acceptable or unacceptable, and transmitting, to the wireless device, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 2. The method according to claim 1, wherein the determining of whether the channel quality is acceptable or unacceptable comprises comparing the channel quality to a quality threshold. 3. The method according to claim 1, further comprising selecting which RBG(s) to be included in the indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 4. The method according to claim 1, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 5. The method according to claim 1, wherein the RBGs to report channel quality measurements for excludes at least the first RBG and the last RBG at the frequency band edges of the bandwidth of the channel. 6. The method according to claim 1, wherein the indication is associated with a bitmap indicating which RBG to report channel quality for and which RBGs to exclude. 7. The method according to claim 1, further comprising, scheduling transmissions to the wireless device on the RBG that are comprised in the indication of which RBG to report channel quality measurements for. 8. A method performed by a wireless device for communicating with a network node, the wireless device and the network node being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the method comprising:
receiving, from the network node, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable, wherein the indication excludes at least the first and the last RBG at the frequency band edges, performing a channel quality measurement at least for the RBG(s) specified in the indication, and transmitting, to the network node, a channel quality measurement report for the RBG(s) specified in the indication. 9. The method according to claim 8, wherein the indication is associated with a bitmap indicating which RBG(s) to report channel quality for and which RBGs to exclude. 10. The method according to claim 8, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 11. The method according to claim 8, further comprising, when the wireless device is currently reporting channel quality measurements for RBG(s) specified by the network node:
receiving, from the network node, an indication to stop limiting the reporting of channel quality for the RBG(s) specified by the network node, performing a channel quality measurement for all, or any, RBGs of the channel, and transmitting a measurement report for the performed measurements to the network node. 12. A network node for communicating with a wireless device, the network node and the wireless device being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the network node being configured for:
receiving, from the wireless device, a measurement report indicating a channel quality of the channel between the network node and the wireless device, determining whether the channel quality is acceptable or unacceptable, and transmitting, to the wireless device, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 13. The network node according to claim 12, further being configured for determining whether the channel quality is acceptable or unacceptable by comparing the channel quality to a quality threshold. 14. The network node according to claim 13, further being configured for selecting which RBG(s) to be included in the indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 15. The network node according to claim 12, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 16. The network node according to claim 12, wherein the RBGs to report channel quality measurements for excludes at least the first RBG and the last RBG at the frequency band edges of the bandwidth of the channel. 17. The network node according to claim 12, wherein the indication is associated with a bitmap indicating which RBG(s) to report channel quality for and which RBGs to exclude. 18. The network node according to claim 12, further being configured for scheduling transmissions to the wireless device on the RBG(s) that are comprised in the indication of which RBG(s) to report channel quality measurements for. 19. A wireless device for communicating with a network node, the wireless device and the network node being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the wireless device being configured for:
receiving, from the network node, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable, wherein the indication excludes at least the first and the last RBG at the frequency band edges, performing a channel quality measurement at least for the RBG(s) specified in the indication, and transmitting, to the network node, a channel quality measurement report for the RBG(s) specified in the indication. 20. The wireless device according to claim 19, wherein the indication is associated with a bitmap indicating which RBG(s) to report channel quality for and which RBGs to exclude. 21. The wireless device according to claim 19, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 22. The wireless device according to claim 19, further being configured for, when the wireless device is currently reporting channel quality measurements for RBG(s) specified by the network node:
receiving, from the network node, an indication to stop limiting the reporting of channel quality for the RBG(s) specified by the network node, performing a channel quality measurement for all, or any, RBGs of the channel, and transmitting a measurement report for the performed measurements to the network node. 23-26. (canceled) | A network node and a wireless device as well as respective method performed thereby for communication with each other are provided. The method performed by the network node comprises receiving, from the wireless device, a measurement report indicating a channel quality of the channel between the network node and the wireless device; and determining whether the channel quality is acceptable or unacceptable. The method further comprises transmitting, to the wireless device, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable.1. A method performed by a network node for communicating with a wireless device, the network node and the wireless device being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the method comprising:
receiving, from the wireless device, a measurement report indicating a channel quality of the channel between the network node and the wireless device, determining whether the channel quality is acceptable or unacceptable, and transmitting, to the wireless device, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 2. The method according to claim 1, wherein the determining of whether the channel quality is acceptable or unacceptable comprises comparing the channel quality to a quality threshold. 3. The method according to claim 1, further comprising selecting which RBG(s) to be included in the indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 4. The method according to claim 1, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 5. The method according to claim 1, wherein the RBGs to report channel quality measurements for excludes at least the first RBG and the last RBG at the frequency band edges of the bandwidth of the channel. 6. The method according to claim 1, wherein the indication is associated with a bitmap indicating which RBG to report channel quality for and which RBGs to exclude. 7. The method according to claim 1, further comprising, scheduling transmissions to the wireless device on the RBG that are comprised in the indication of which RBG to report channel quality measurements for. 8. A method performed by a wireless device for communicating with a network node, the wireless device and the network node being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the method comprising:
receiving, from the network node, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable, wherein the indication excludes at least the first and the last RBG at the frequency band edges, performing a channel quality measurement at least for the RBG(s) specified in the indication, and transmitting, to the network node, a channel quality measurement report for the RBG(s) specified in the indication. 9. The method according to claim 8, wherein the indication is associated with a bitmap indicating which RBG(s) to report channel quality for and which RBGs to exclude. 10. The method according to claim 8, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 11. The method according to claim 8, further comprising, when the wireless device is currently reporting channel quality measurements for RBG(s) specified by the network node:
receiving, from the network node, an indication to stop limiting the reporting of channel quality for the RBG(s) specified by the network node, performing a channel quality measurement for all, or any, RBGs of the channel, and transmitting a measurement report for the performed measurements to the network node. 12. A network node for communicating with a wireless device, the network node and the wireless device being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the network node being configured for:
receiving, from the wireless device, a measurement report indicating a channel quality of the channel between the network node and the wireless device, determining whether the channel quality is acceptable or unacceptable, and transmitting, to the wireless device, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 13. The network node according to claim 12, further being configured for determining whether the channel quality is acceptable or unacceptable by comparing the channel quality to a quality threshold. 14. The network node according to claim 13, further being configured for selecting which RBG(s) to be included in the indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable. 15. The network node according to claim 12, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 16. The network node according to claim 12, wherein the RBGs to report channel quality measurements for excludes at least the first RBG and the last RBG at the frequency band edges of the bandwidth of the channel. 17. The network node according to claim 12, wherein the indication is associated with a bitmap indicating which RBG(s) to report channel quality for and which RBGs to exclude. 18. The network node according to claim 12, further being configured for scheduling transmissions to the wireless device on the RBG(s) that are comprised in the indication of which RBG(s) to report channel quality measurements for. 19. A wireless device for communicating with a network node, the wireless device and the network node being operable in a wireless communication network employing Orthogonal Frequency Division Multiplexing, OFDM technology wherein a channel between the network node and the wireless device comprises a set of Resource Block Groups, RBGs, the wireless device being configured for:
receiving, from the network node, an indication of which RBG(s) to report channel quality measurements for, when the channel quality is unacceptable, wherein the indication excludes at least the first and the last RBG at the frequency band edges, performing a channel quality measurement at least for the RBG(s) specified in the indication, and transmitting, to the network node, a channel quality measurement report for the RBG(s) specified in the indication. 20. The wireless device according to claim 19, wherein the indication is associated with a bitmap indicating which RBG(s) to report channel quality for and which RBGs to exclude. 21. The wireless device according to claim 19, wherein the measurement report indicating the channel quality channel quality comprises a wideband Channel Quality Indicator, CQI. 22. The wireless device according to claim 19, further being configured for, when the wireless device is currently reporting channel quality measurements for RBG(s) specified by the network node:
receiving, from the network node, an indication to stop limiting the reporting of channel quality for the RBG(s) specified by the network node, performing a channel quality measurement for all, or any, RBGs of the channel, and transmitting a measurement report for the performed measurements to the network node. 23-26. (canceled) | 2,400 |
8,836 | 8,836 | 14,056,645 | 2,419 | A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The access-seeker has a peripheral device operative within an authentication channel to communicate with the security system. The access-seeker initially presents identification and password data over an access channel which is intercepted and transmitted to the security computer. The security computer then communicates with the access-seeker. A biometric analyzer—a voice or fingerprint recognition device—operates upon instructions from the authentication program to analyze the monitored parameter of the individual. In the security computer, a comparator matches the biometric sample with stored data, and, upon obtaining a match, provides authentication. The security computer instructs the host computer to grant access and communicates the same to the access-seeker, whereupon access is initiated over the access channel. | 1-20. (canceled) 21. A system for granting or denying use of a computer by a user, said system comprising:
a first communication path for enabling the use of the computer by the user; and a second and different communication path for communicating over said second path to a peripheral device of said user, receiving a response to said communication from the user over said second path, and granting or denying the use of the computer in accordance with the response. 22. The system of claim 21, wherein said first and second communication paths are each one of the Internet and a wireless network. 23. The system of claim 21, wherein the response comprises biometric data. 24. The system of claim 23, wherein said biometric data comprise fingerprint data. 25. A method for granting or denying use of a computer, said method comprising:
(a) establishing a first communication channel via a computer network between a user at a first location and the computer at a second location; (b) retrieving an address for the user for establishing a second and different communication channel with said user; (c) initiating communication with the user at the retrieved address via the second communication channel; (d) transmitting at least one first authentication communication to the user using said second communication channel; (e) receiving a second authentication communication from said user over said second communication channel; (f) determining whether to grant or to deny the use of the computer by the user in accordance with the second authentication communication; (g) granting the use of the computer by the user only if it is determined in step (f) that the use of the computer by the user should be granted; and (h) denying the use of the computer by the user if it is not determined in step (f) that the use of the computer should be granted. 26. The method of claim 25, wherein said first and second communication channels are each one of the Internet and a wireless network. 27. The method of claim 25, wherein said first authentication communication is a request for biometric data, and wherein said second authentication communication comprises said biometric data. 28. The method of claim 27, wherein said biometric data comprise fingerprint data. 29. A system for granting or denying use of a computer by a user, the system comprising:
an access channel for receiving information for using said computer; and an authentication channel, separate from said access channel, said authentication channel comprising:
a security computer for communicating a use instruction to said computer and for communicating with a peripheral device of said user;
a database having at least one address record of said peripheral device;
a prompt mechanism for instructing said user to enter a response into and transmit said response from said peripheral device; and
a comparator for granting or denying use demands in response to the transmission of said response, wherein said security computer outputs said use instruction to the computer to either grant or deny the use of said computer. 30. The system of claim 29, wherein:
said peripheral device is a telephone with a tone generating keypad for entering data; and said prompt mechanism outputs an auditory message describing the authentication data to be entered. 31. The system of claim 29, wherein said comparator comprises:
a biometric analyzer for analyzing a monitored parameter of said user; and a biometric parameter database addressable by said biometric analyzer for retrieval of a previously registered sample of said user. 32. The system of claim 31, wherein said biometric analyzer comprises a fingerprint-verification analyzer. 33. A method for granting or denying use of a computer by a user, the method comprising:
(a) receiving, over an access channel, information for using said computer; (b) retrieving, from a database, at least one address record of peripheral device used by said user; (c) instructing said user to enter response data into and transmit said response data from said peripheral device, said peripheral device transmitting said response data over an authentication channel that is separate from said access channel; and (d) granting or denying use demands in response to the transmission of said response data and outputting a use instruction to the computer to either grant or deny the use of the computer. 34. The method of claim 33, wherein the response data comprise biometric data. 35. The method of claim 34, wherein said biometric data comprise fingerprint data. 36. A system for authenticating a user of a computer, said system comprising:
a first communication path for enabling use of the computer by the user; and a second and different communication path for communicating over said second path to a peripheral device of said user, receiving a response to said communication from the user over said second path, and authenticating the use of the computer by the user in accordance with the response. 37. The system of claim 36, wherein said first and second communication paths are each one of the Internet and a wireless network. 38. The system of claim 36, wherein the response comprises biometric data. 39. The system of claim 38, wherein said biometric data comprise fingerprint data. 40. A method for authenticating a user of a computer, said method comprising:
(a) establishing a first communication channel via a computer network between the user at a first location and the computer at a second location; (b) retrieving an address for the user for establishing a second and different communication channel with said user; (c) initiating communication with the user at the retrieved address via the second communication channel; (d) transmitting at least one first authentication communication to the user using said second communication channel; (e) receiving a second authentication communication from said user over said second communication channel; (f) determining whether to authenticate the user in accordance with the second authentication communication; and (g) authenticating the user only if it is determined in step (f) that the user should be authenticated. 41. The method of claim 40, wherein said first and second communication channels are each one of the Internet and a wireless network. 42. The method of claim 40, wherein said first authentication communication is a request for biometric data, and wherein said second authentication communication comprises said biometric data. 43. The method of claim 42, wherein said biometric data comprise fingerprint data. 44. A system for authenticating a transaction to be performed by a user using a computer, said system comprising:
a first communication path for enabling use of the computer by the user; and a second and different communication path for communicating over said second path to a peripheral device of said user, receiving a response to said communication from the user over said second path, and authenticating the transaction in accordance with the response. 45. The system of claim 44, wherein said first and second communication paths are each one of the Internet and a wireless network. 46. The system of claim 45, wherein the response comprises biometric data. 47. The system of claim 46, wherein said biometric data comprise fingerprint data. 48. A method for authenticating a transaction to be performed by a user using a computer, said method comprising:
(a) establishing a first communication channel via a computer network between the user at a first location and the computer at a second location; (b) retrieving an address for the user for establishing a second and different communication channel with said user; (c) initiating communication with the user at the retrieved address via the second communication channel; (d) transmitting at least one first authentication communication to the user using said second communication channel; (e) receiving a second authentication communication from said user over said second communication channel; (f) determining whether to authenticate the transaction in accordance with the second authentication communication; and (g) authenticating the transaction only if it is determined in step (f) that the transaction should be authenticated. 49. The method of claim 48, wherein said first and second communication channels are each one of the Internet and a wireless network. 50. The method of claim 48, wherein said first authentication communication is a request for biometric data, and wherein said second authentication communication comprises said biometric data. 51. The method of claim 50, wherein said biometric data comprise fingerprint data. | A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The access-seeker has a peripheral device operative within an authentication channel to communicate with the security system. The access-seeker initially presents identification and password data over an access channel which is intercepted and transmitted to the security computer. The security computer then communicates with the access-seeker. A biometric analyzer—a voice or fingerprint recognition device—operates upon instructions from the authentication program to analyze the monitored parameter of the individual. In the security computer, a comparator matches the biometric sample with stored data, and, upon obtaining a match, provides authentication. The security computer instructs the host computer to grant access and communicates the same to the access-seeker, whereupon access is initiated over the access channel.1-20. (canceled) 21. A system for granting or denying use of a computer by a user, said system comprising:
a first communication path for enabling the use of the computer by the user; and a second and different communication path for communicating over said second path to a peripheral device of said user, receiving a response to said communication from the user over said second path, and granting or denying the use of the computer in accordance with the response. 22. The system of claim 21, wherein said first and second communication paths are each one of the Internet and a wireless network. 23. The system of claim 21, wherein the response comprises biometric data. 24. The system of claim 23, wherein said biometric data comprise fingerprint data. 25. A method for granting or denying use of a computer, said method comprising:
(a) establishing a first communication channel via a computer network between a user at a first location and the computer at a second location; (b) retrieving an address for the user for establishing a second and different communication channel with said user; (c) initiating communication with the user at the retrieved address via the second communication channel; (d) transmitting at least one first authentication communication to the user using said second communication channel; (e) receiving a second authentication communication from said user over said second communication channel; (f) determining whether to grant or to deny the use of the computer by the user in accordance with the second authentication communication; (g) granting the use of the computer by the user only if it is determined in step (f) that the use of the computer by the user should be granted; and (h) denying the use of the computer by the user if it is not determined in step (f) that the use of the computer should be granted. 26. The method of claim 25, wherein said first and second communication channels are each one of the Internet and a wireless network. 27. The method of claim 25, wherein said first authentication communication is a request for biometric data, and wherein said second authentication communication comprises said biometric data. 28. The method of claim 27, wherein said biometric data comprise fingerprint data. 29. A system for granting or denying use of a computer by a user, the system comprising:
an access channel for receiving information for using said computer; and an authentication channel, separate from said access channel, said authentication channel comprising:
a security computer for communicating a use instruction to said computer and for communicating with a peripheral device of said user;
a database having at least one address record of said peripheral device;
a prompt mechanism for instructing said user to enter a response into and transmit said response from said peripheral device; and
a comparator for granting or denying use demands in response to the transmission of said response, wherein said security computer outputs said use instruction to the computer to either grant or deny the use of said computer. 30. The system of claim 29, wherein:
said peripheral device is a telephone with a tone generating keypad for entering data; and said prompt mechanism outputs an auditory message describing the authentication data to be entered. 31. The system of claim 29, wherein said comparator comprises:
a biometric analyzer for analyzing a monitored parameter of said user; and a biometric parameter database addressable by said biometric analyzer for retrieval of a previously registered sample of said user. 32. The system of claim 31, wherein said biometric analyzer comprises a fingerprint-verification analyzer. 33. A method for granting or denying use of a computer by a user, the method comprising:
(a) receiving, over an access channel, information for using said computer; (b) retrieving, from a database, at least one address record of peripheral device used by said user; (c) instructing said user to enter response data into and transmit said response data from said peripheral device, said peripheral device transmitting said response data over an authentication channel that is separate from said access channel; and (d) granting or denying use demands in response to the transmission of said response data and outputting a use instruction to the computer to either grant or deny the use of the computer. 34. The method of claim 33, wherein the response data comprise biometric data. 35. The method of claim 34, wherein said biometric data comprise fingerprint data. 36. A system for authenticating a user of a computer, said system comprising:
a first communication path for enabling use of the computer by the user; and a second and different communication path for communicating over said second path to a peripheral device of said user, receiving a response to said communication from the user over said second path, and authenticating the use of the computer by the user in accordance with the response. 37. The system of claim 36, wherein said first and second communication paths are each one of the Internet and a wireless network. 38. The system of claim 36, wherein the response comprises biometric data. 39. The system of claim 38, wherein said biometric data comprise fingerprint data. 40. A method for authenticating a user of a computer, said method comprising:
(a) establishing a first communication channel via a computer network between the user at a first location and the computer at a second location; (b) retrieving an address for the user for establishing a second and different communication channel with said user; (c) initiating communication with the user at the retrieved address via the second communication channel; (d) transmitting at least one first authentication communication to the user using said second communication channel; (e) receiving a second authentication communication from said user over said second communication channel; (f) determining whether to authenticate the user in accordance with the second authentication communication; and (g) authenticating the user only if it is determined in step (f) that the user should be authenticated. 41. The method of claim 40, wherein said first and second communication channels are each one of the Internet and a wireless network. 42. The method of claim 40, wherein said first authentication communication is a request for biometric data, and wherein said second authentication communication comprises said biometric data. 43. The method of claim 42, wherein said biometric data comprise fingerprint data. 44. A system for authenticating a transaction to be performed by a user using a computer, said system comprising:
a first communication path for enabling use of the computer by the user; and a second and different communication path for communicating over said second path to a peripheral device of said user, receiving a response to said communication from the user over said second path, and authenticating the transaction in accordance with the response. 45. The system of claim 44, wherein said first and second communication paths are each one of the Internet and a wireless network. 46. The system of claim 45, wherein the response comprises biometric data. 47. The system of claim 46, wherein said biometric data comprise fingerprint data. 48. A method for authenticating a transaction to be performed by a user using a computer, said method comprising:
(a) establishing a first communication channel via a computer network between the user at a first location and the computer at a second location; (b) retrieving an address for the user for establishing a second and different communication channel with said user; (c) initiating communication with the user at the retrieved address via the second communication channel; (d) transmitting at least one first authentication communication to the user using said second communication channel; (e) receiving a second authentication communication from said user over said second communication channel; (f) determining whether to authenticate the transaction in accordance with the second authentication communication; and (g) authenticating the transaction only if it is determined in step (f) that the transaction should be authenticated. 49. The method of claim 48, wherein said first and second communication channels are each one of the Internet and a wireless network. 50. The method of claim 48, wherein said first authentication communication is a request for biometric data, and wherein said second authentication communication comprises said biometric data. 51. The method of claim 50, wherein said biometric data comprise fingerprint data. | 2,400 |
8,837 | 8,837 | 15,289,477 | 2,483 | A method and apparatus for an aircraft monitoring system. The aircraft monitoring system comprises targets associated with the wing of the aircraft, a camera system and a monitor. The camera system is configured to generate images of the targets on the wing during operation of the aircraft. The monitor is configured to measure movement of the targets using images, enabling identifying wing movement. | 1. An aircraft monitoring system comprising:
targets associated with a wing of an aircraft; a camera system configured to generate images of the targets on the wing during operation of the aircraft; and a monitor configured to measure a movement of the targets using the images, enabling identifying wing movement. 2. The aircraft monitoring system of claim 1, wherein the monitor measures the movement of the targets at a location on the wing using the images. 3. The aircraft monitoring system of claim 2, wherein the monitor is configured to identify stress in the wing at the location in real time using vibrations detected in dynamic movement of an aircraft structure. 4. The aircraft monitoring system of claim 3, wherein the monitor is configured to identify maintenance for the aircraft based on the stress in the wing at the location. 5. The aircraft monitoring system of claim 1, wherein in measuring the movement of the targets using the images, the monitor compensates for additional movement from the camera system. 6. The aircraft monitoring system of claim 1 further comprising:
an optical window in a body of the aircraft, wherein the camera system is positioned to generate the images from inside the aircraft with a view through the optical window. 7. The aircraft monitoring system of claim 1, wherein the camera system is selected from at least one of a photogrammetry camera system or a stereo photogrammetry system. 8. The aircraft monitoring system of claim 1, wherein the camera system comprises:
a fixture system; and a plurality of cameras associated with the fixture system in which orientations for the plurality of cameras are set independently. 9. The aircraft monitoring system of claim 1, wherein the targets are elliptical targets, and wherein the elliptical targets in the images are circular based on an angle of the camera system to the elliptical targets. 10. The aircraft monitoring system of claim 1, wherein the targets are selected to be visible to the camera system in sunlight. 11. The aircraft monitoring system of claim 1, wherein the wing movement is selected from at least one of bending, deflection or a twisting. 12. The aircraft monitoring system of claim 1, wherein operation of the aircraft is selected from one of taxiing, cruising, ascending, descending, taking off, or landing. 13. A real-time aircraft stress monitoring system comprising:
elliptical targets associated with a wing of an aircraft; a camera system configured to generate images of the elliptical targets on the wing during operation of the aircraft, wherein the elliptical targets in the images are circular based on an angle of the camera system to the elliptical targets; and a monitor that measures a movement of the elliptical targets using the images and identifies stress in the wing based on the movement of the elliptical targets. 14. The real-time aircraft stress monitoring system of claim 13, wherein the monitor generates an alert for maintenance using the stress identified in the wing. 15. A method for monitoring movement of an aircraft structure, the method comprising:
generating images of targets on the aircraft structure using a camera system associated with an interior of an aircraft during operation of the aircraft; and measuring movement of the targets using the images, enabling identifying the movement of the aircraft structure. 16. The method of claim 15, wherein measuring the movement of the targets using the images comprises:
measuring the movement of the targets at a location on a wing using the images. 17. The method of claim 16 further comprising:
identifying a stress in the wing at the location in real-time. 18. The method of claim 17, wherein a monitor is configured to identify maintenance for the aircraft based on the stress in the wing at the location. 19. The method of claim 15, wherein in measuring the movement of the targets using the images, a monitor compensates for additional movement from the camera system. 20. The method of claim 15, wherein an optical window is present in a body of the aircraft and wherein the camera system is positioned to generate the images from inside of the aircraft with a view through the optical window. 21. The method of claim 15, wherein the camera system is selected from at least one of a photogrammetry camera system or a stereo photogrammetry system. 22. The method of claim 15, wherein the targets are elliptical targets, and wherein the elliptical targets in the images are circular based on an angle of the camera system to the elliptical targets. 23. The method of claim 15, wherein the movement of the aircraft structure is selected from at least one of a bending, deflection, or twisting. 24. The method of claim 15, wherein the operation of the aircraft is selected from one of taxiing, cruising, ascending, descending, taking off, and landing. | A method and apparatus for an aircraft monitoring system. The aircraft monitoring system comprises targets associated with the wing of the aircraft, a camera system and a monitor. The camera system is configured to generate images of the targets on the wing during operation of the aircraft. The monitor is configured to measure movement of the targets using images, enabling identifying wing movement.1. An aircraft monitoring system comprising:
targets associated with a wing of an aircraft; a camera system configured to generate images of the targets on the wing during operation of the aircraft; and a monitor configured to measure a movement of the targets using the images, enabling identifying wing movement. 2. The aircraft monitoring system of claim 1, wherein the monitor measures the movement of the targets at a location on the wing using the images. 3. The aircraft monitoring system of claim 2, wherein the monitor is configured to identify stress in the wing at the location in real time using vibrations detected in dynamic movement of an aircraft structure. 4. The aircraft monitoring system of claim 3, wherein the monitor is configured to identify maintenance for the aircraft based on the stress in the wing at the location. 5. The aircraft monitoring system of claim 1, wherein in measuring the movement of the targets using the images, the monitor compensates for additional movement from the camera system. 6. The aircraft monitoring system of claim 1 further comprising:
an optical window in a body of the aircraft, wherein the camera system is positioned to generate the images from inside the aircraft with a view through the optical window. 7. The aircraft monitoring system of claim 1, wherein the camera system is selected from at least one of a photogrammetry camera system or a stereo photogrammetry system. 8. The aircraft monitoring system of claim 1, wherein the camera system comprises:
a fixture system; and a plurality of cameras associated with the fixture system in which orientations for the plurality of cameras are set independently. 9. The aircraft monitoring system of claim 1, wherein the targets are elliptical targets, and wherein the elliptical targets in the images are circular based on an angle of the camera system to the elliptical targets. 10. The aircraft monitoring system of claim 1, wherein the targets are selected to be visible to the camera system in sunlight. 11. The aircraft monitoring system of claim 1, wherein the wing movement is selected from at least one of bending, deflection or a twisting. 12. The aircraft monitoring system of claim 1, wherein operation of the aircraft is selected from one of taxiing, cruising, ascending, descending, taking off, or landing. 13. A real-time aircraft stress monitoring system comprising:
elliptical targets associated with a wing of an aircraft; a camera system configured to generate images of the elliptical targets on the wing during operation of the aircraft, wherein the elliptical targets in the images are circular based on an angle of the camera system to the elliptical targets; and a monitor that measures a movement of the elliptical targets using the images and identifies stress in the wing based on the movement of the elliptical targets. 14. The real-time aircraft stress monitoring system of claim 13, wherein the monitor generates an alert for maintenance using the stress identified in the wing. 15. A method for monitoring movement of an aircraft structure, the method comprising:
generating images of targets on the aircraft structure using a camera system associated with an interior of an aircraft during operation of the aircraft; and measuring movement of the targets using the images, enabling identifying the movement of the aircraft structure. 16. The method of claim 15, wherein measuring the movement of the targets using the images comprises:
measuring the movement of the targets at a location on a wing using the images. 17. The method of claim 16 further comprising:
identifying a stress in the wing at the location in real-time. 18. The method of claim 17, wherein a monitor is configured to identify maintenance for the aircraft based on the stress in the wing at the location. 19. The method of claim 15, wherein in measuring the movement of the targets using the images, a monitor compensates for additional movement from the camera system. 20. The method of claim 15, wherein an optical window is present in a body of the aircraft and wherein the camera system is positioned to generate the images from inside of the aircraft with a view through the optical window. 21. The method of claim 15, wherein the camera system is selected from at least one of a photogrammetry camera system or a stereo photogrammetry system. 22. The method of claim 15, wherein the targets are elliptical targets, and wherein the elliptical targets in the images are circular based on an angle of the camera system to the elliptical targets. 23. The method of claim 15, wherein the movement of the aircraft structure is selected from at least one of a bending, deflection, or twisting. 24. The method of claim 15, wherein the operation of the aircraft is selected from one of taxiing, cruising, ascending, descending, taking off, and landing. | 2,400 |
8,838 | 8,838 | 15,228,370 | 2,483 | A data structure defining a high dynamic range image comprises a tone map having a reduced dynamic range and HDR information. The high dynamic range image can be reconstructed from the tone map and the
HDR information. The data structure can be backwards compatible with legacy hardware or software viewers. The data structure may comprise a JFIF file having the tone map encoded as a JPEG image with the HDR information in an application extension or comment field of the JFIF file, or a MPEG file having the tone map encoded as a MPEG image with the
HDR information in a video or audio channel of the MPEG file. Apparatus and methods for encoding or decoding the data structure may apply pre- or post correction to compensate for lossy encoding of the high dynamic range information. | 1. A decoding method comprising:
receiving a JPEG compressed file, the JPEG compressed file includes a low dynamic range (LDR) image and a ratio image, the ratio image separated as an application extension from the LDR image; and reconstructing a reconstructed HDR image, the reconstructed HDR image determined by the LDR image and the ratio image, wherein LDR image has a lower dynamic range than the reconstructed HDR image, and wherein a pixel value of the ratio image is from a logarithm of a ratio of a luminance of a pixel of an HDR image and a luminance of a corresponding pixel of the LDR image. | A data structure defining a high dynamic range image comprises a tone map having a reduced dynamic range and HDR information. The high dynamic range image can be reconstructed from the tone map and the
HDR information. The data structure can be backwards compatible with legacy hardware or software viewers. The data structure may comprise a JFIF file having the tone map encoded as a JPEG image with the HDR information in an application extension or comment field of the JFIF file, or a MPEG file having the tone map encoded as a MPEG image with the
HDR information in a video or audio channel of the MPEG file. Apparatus and methods for encoding or decoding the data structure may apply pre- or post correction to compensate for lossy encoding of the high dynamic range information.1. A decoding method comprising:
receiving a JPEG compressed file, the JPEG compressed file includes a low dynamic range (LDR) image and a ratio image, the ratio image separated as an application extension from the LDR image; and reconstructing a reconstructed HDR image, the reconstructed HDR image determined by the LDR image and the ratio image, wherein LDR image has a lower dynamic range than the reconstructed HDR image, and wherein a pixel value of the ratio image is from a logarithm of a ratio of a luminance of a pixel of an HDR image and a luminance of a corresponding pixel of the LDR image. | 2,400 |
8,839 | 8,839 | 15,709,130 | 2,481 | An alternative design is presented and analyzed for providing a just in time video such that even though multiple variants are advertised to a client, the bit streams need not be present. Instead, the videos are generated just in time when a client requests them. At a given time instant, only that video stream is generated which corresponds to the bit rate requested by the client and streams with other bit rates advertised in the manifest file are not generated. This saves storage cost and/or lowers the numbers of transcoders needed to generate full manifest file all the time. Two different architectures are presented and analyzed. Analysis of impacts of the encoding/transcoding speed on the behavior of such a system is presented and used in designing an optimal solution based on desired price and performance points. | 1. A method of data delivery comprising:
accessing a data file; publishing a pseudo-manifest of two or more available data bit rates; receiving a request for delivery of one of said two or more available data bit rates; encoding a first chunk of said data file in response to said request for delivery of said one of said two or more available data bit rates; and transmitting said chuck, wherein said encoding of said first chunk is processed at a rate greater than a real-time transcoding rate. 2. The method of claim 1 further comprising:
determining an encoding rate for said first chunk of said data file based at least in part on said request. 3. The method of claim 1 further comprising:
determining a transmission time of said encoded first chunk of said data file; and
determining an encoding rate for said first chunk of said data file based at least in part on said request and said transmission time. 4. The method of claim 2 wherein said encoding of said first chunk occurs at a rate at least four times a real-time transcoding rate. 5. The method of claim 1 wherein said encoding of said first chunk occurs at a rate at least four times a real-time transcoding rate. 6. The method of claim 5 wherein said encoding of said first chunk occurs at a rate of at least eight times a real-time transcoding rate. 7. The method of claim 1 further comprising:
receiving a second request for delivery of one of said two or more available data bit rates; and
in response to at least said request for delivery of one of said two or more available data bit rates and said second request for delivery of one of said two or more available data bit rates, encoding a second chunk of said data file,
wherein said encoding rate of said second chunk can be greater than, less than or the same as the encoding rate for said first chunk. 8. The method of claim 7 wherein the encoding rate of said first chunk is at least four times a real-time transcoding rate. 9. The method of claim 8 wherein the encoding rate of said second chunk is at least four times a real-time transcoding rate. 10. A system for encoding a data file comprising:
providing a data file in non-transitory media; instantiating in memory a pseudo-manifest of two or more available data bit rates; receiving via an input interface a request for delivery of one of said two or more available data bit rates; encoding in memory a first chunk of said data file in response to said request for delivery of said one of said two or more available data bit rates; and transmitting said chuck via an output interface, wherein said encoding of said first chunk is processed at a rate greater than a real-time transcoding rate. | An alternative design is presented and analyzed for providing a just in time video such that even though multiple variants are advertised to a client, the bit streams need not be present. Instead, the videos are generated just in time when a client requests them. At a given time instant, only that video stream is generated which corresponds to the bit rate requested by the client and streams with other bit rates advertised in the manifest file are not generated. This saves storage cost and/or lowers the numbers of transcoders needed to generate full manifest file all the time. Two different architectures are presented and analyzed. Analysis of impacts of the encoding/transcoding speed on the behavior of such a system is presented and used in designing an optimal solution based on desired price and performance points.1. A method of data delivery comprising:
accessing a data file; publishing a pseudo-manifest of two or more available data bit rates; receiving a request for delivery of one of said two or more available data bit rates; encoding a first chunk of said data file in response to said request for delivery of said one of said two or more available data bit rates; and transmitting said chuck, wherein said encoding of said first chunk is processed at a rate greater than a real-time transcoding rate. 2. The method of claim 1 further comprising:
determining an encoding rate for said first chunk of said data file based at least in part on said request. 3. The method of claim 1 further comprising:
determining a transmission time of said encoded first chunk of said data file; and
determining an encoding rate for said first chunk of said data file based at least in part on said request and said transmission time. 4. The method of claim 2 wherein said encoding of said first chunk occurs at a rate at least four times a real-time transcoding rate. 5. The method of claim 1 wherein said encoding of said first chunk occurs at a rate at least four times a real-time transcoding rate. 6. The method of claim 5 wherein said encoding of said first chunk occurs at a rate of at least eight times a real-time transcoding rate. 7. The method of claim 1 further comprising:
receiving a second request for delivery of one of said two or more available data bit rates; and
in response to at least said request for delivery of one of said two or more available data bit rates and said second request for delivery of one of said two or more available data bit rates, encoding a second chunk of said data file,
wherein said encoding rate of said second chunk can be greater than, less than or the same as the encoding rate for said first chunk. 8. The method of claim 7 wherein the encoding rate of said first chunk is at least four times a real-time transcoding rate. 9. The method of claim 8 wherein the encoding rate of said second chunk is at least four times a real-time transcoding rate. 10. A system for encoding a data file comprising:
providing a data file in non-transitory media; instantiating in memory a pseudo-manifest of two or more available data bit rates; receiving via an input interface a request for delivery of one of said two or more available data bit rates; encoding in memory a first chunk of said data file in response to said request for delivery of said one of said two or more available data bit rates; and transmitting said chuck via an output interface, wherein said encoding of said first chunk is processed at a rate greater than a real-time transcoding rate. | 2,400 |
8,840 | 8,840 | 15,258,884 | 2,468 | A contactless communication circuit (card) communicates with a proximity coupling device (reader). The card hosts at least two applications. The card detects initialization of a first anticollision process by the reader and transmits two communication protocol identifiers in response to the detection of the first anticollision process. The communication protocol identifiers are associated with respective applications supported by the card. Transmission of the two communication protocol identifiers triggers detection of a collision by the reader. | 1. A method, comprising:
detecting, by a contactless communication circuit hosting at least two applications compatible with different communication protocols, initiation of a first anticollision process by a proximity coupling device; and responding, by the contactless communication circuit, to the detection of the first anticollision process by transmitting two communication protocol identifiers (SAK) to cause detection of a collision by the proximity coupling device. 2. The method of claim 1, comprising:
responding, by the contactless communication circuit, to a second anticollision process following the first anticollision process by transmitting a single communication protocol identifier selected according to a protocol used by the first anticollision process. 3. The method of claim 1 wherein the transmission of two communication protocol identifiers occurs until the contactless communication circuit detects a condition change in an anticollision transmission by the proximity coupling device. 4. The method of claim 1 wherein a value of a communication protocol identifier indicates a communication protocol accepted by the contactless communication circuit. 5. The method of claim 4 wherein a first identifier indicates an ISO 14443-4 protocol and a second identifier indicates an ISO 14443-3 protocol. 6. The method of claim 1 wherein the contactless communication circuit transmits a circuit identification code. 7. The method of claim 1 wherein a first application is an EMV application. 8. The method of claim 7 wherein a second application is a MIFARE Classic or MIFARE Classic+ application. 9. A device, comprising:
one or more memories; and contactless communication circuitry coupled to the one or more memories, wherein the contactless communication circuitry, in operation:
detects initiation of a first anticollision process by a proximity coupling device; and
responds to the detection of the first anticollision process by transmitting two communication protocol identifiers (SAK) associated with respective applications supported by the contactless communication circuitry, to cause detection of a collision by the proximity coupling device. 10. The device of claim 9 wherein, in operation, the contactless communication circuitry responds to a second anticollision process following the first anticollision process by transmitting a single communication protocol identifier (SAK) selected according to a protocol used by the first anticollision process. 11. The device of claim 9 wherein, in operation, the transmission of two communication protocol identifiers occurs until the contactless communication circuitry detects a condition change in an anticollision transmission by the proximity coupling device. 12. The device of claim 9 wherein a value of a communication protocol identifier indicates a communication protocol accepted by the contactless communication circuitry. 13. The device of claim 12 wherein a first identifier indicates an ISO 14443-4 protocol and a second identifier indicates an ISO 14443-3 protocol. 14. The device of claim 9 wherein, in operation, the contactless communication circuitry transmits a circuit identification code. 15. The device of claim 9 wherein a first application supported by the contactless communication circuitry is an EMV application. 16. The device of claim 15 wherein a second application supported by the contactless communication circuitry is a MIFARE Classic or MIFARE Classic+ application. 17. The device of claim 9, comprising:
a microcircuit card including the one or more memories and the contactless communication circuitry. 18. The device of claim 9, comprising:
mobile telecommunication circuitry. 19. A system, comprising:
one or more circuits; and contactless communication circuitry coupled to the one or more circuits, wherein the contactless communication circuitry, in operation:
detects initiation of a first anticollision process by a proximity coupling device; and
responds to the detection of the first anticollision process by transmitting two communication protocol identifiers (SAK) associated with respective applications supported by the contactless communication circuitry, to cause detection of a collision by the proximity coupling device. 20. The system of claim 19 wherein, in operation, the contactless communication circuitry responds to a second anticollision process following the first anticollision process by transmitting a single communication protocol identifier (SAK) selected according to a protocol used by the first anticollision process. 21. The system of claim 19, comprising:
the proximity coupling device. 22. The system of claim 19 wherein the contactless communication circuitry comprises a near-field communication (NFC) router operating in card mode. | A contactless communication circuit (card) communicates with a proximity coupling device (reader). The card hosts at least two applications. The card detects initialization of a first anticollision process by the reader and transmits two communication protocol identifiers in response to the detection of the first anticollision process. The communication protocol identifiers are associated with respective applications supported by the card. Transmission of the two communication protocol identifiers triggers detection of a collision by the reader.1. A method, comprising:
detecting, by a contactless communication circuit hosting at least two applications compatible with different communication protocols, initiation of a first anticollision process by a proximity coupling device; and responding, by the contactless communication circuit, to the detection of the first anticollision process by transmitting two communication protocol identifiers (SAK) to cause detection of a collision by the proximity coupling device. 2. The method of claim 1, comprising:
responding, by the contactless communication circuit, to a second anticollision process following the first anticollision process by transmitting a single communication protocol identifier selected according to a protocol used by the first anticollision process. 3. The method of claim 1 wherein the transmission of two communication protocol identifiers occurs until the contactless communication circuit detects a condition change in an anticollision transmission by the proximity coupling device. 4. The method of claim 1 wherein a value of a communication protocol identifier indicates a communication protocol accepted by the contactless communication circuit. 5. The method of claim 4 wherein a first identifier indicates an ISO 14443-4 protocol and a second identifier indicates an ISO 14443-3 protocol. 6. The method of claim 1 wherein the contactless communication circuit transmits a circuit identification code. 7. The method of claim 1 wherein a first application is an EMV application. 8. The method of claim 7 wherein a second application is a MIFARE Classic or MIFARE Classic+ application. 9. A device, comprising:
one or more memories; and contactless communication circuitry coupled to the one or more memories, wherein the contactless communication circuitry, in operation:
detects initiation of a first anticollision process by a proximity coupling device; and
responds to the detection of the first anticollision process by transmitting two communication protocol identifiers (SAK) associated with respective applications supported by the contactless communication circuitry, to cause detection of a collision by the proximity coupling device. 10. The device of claim 9 wherein, in operation, the contactless communication circuitry responds to a second anticollision process following the first anticollision process by transmitting a single communication protocol identifier (SAK) selected according to a protocol used by the first anticollision process. 11. The device of claim 9 wherein, in operation, the transmission of two communication protocol identifiers occurs until the contactless communication circuitry detects a condition change in an anticollision transmission by the proximity coupling device. 12. The device of claim 9 wherein a value of a communication protocol identifier indicates a communication protocol accepted by the contactless communication circuitry. 13. The device of claim 12 wherein a first identifier indicates an ISO 14443-4 protocol and a second identifier indicates an ISO 14443-3 protocol. 14. The device of claim 9 wherein, in operation, the contactless communication circuitry transmits a circuit identification code. 15. The device of claim 9 wherein a first application supported by the contactless communication circuitry is an EMV application. 16. The device of claim 15 wherein a second application supported by the contactless communication circuitry is a MIFARE Classic or MIFARE Classic+ application. 17. The device of claim 9, comprising:
a microcircuit card including the one or more memories and the contactless communication circuitry. 18. The device of claim 9, comprising:
mobile telecommunication circuitry. 19. A system, comprising:
one or more circuits; and contactless communication circuitry coupled to the one or more circuits, wherein the contactless communication circuitry, in operation:
detects initiation of a first anticollision process by a proximity coupling device; and
responds to the detection of the first anticollision process by transmitting two communication protocol identifiers (SAK) associated with respective applications supported by the contactless communication circuitry, to cause detection of a collision by the proximity coupling device. 20. The system of claim 19 wherein, in operation, the contactless communication circuitry responds to a second anticollision process following the first anticollision process by transmitting a single communication protocol identifier (SAK) selected according to a protocol used by the first anticollision process. 21. The system of claim 19, comprising:
the proximity coupling device. 22. The system of claim 19 wherein the contactless communication circuitry comprises a near-field communication (NFC) router operating in card mode. | 2,400 |
8,841 | 8,841 | 13,793,519 | 2,421 | A current geographical location of a portable device is used to facilitate selection of channel lineup that is appropriate for a Multi-System Operator (MSO) provider and the current geographical location of the portable device. A program guide GUI of the portable device is then configured using the selected channel lineup. The configured GUI is displayable to a user of the portable device whereupon the configured GUI is available for use in commanding tuning operations of a set-top box. | 1. A method for configuring a program guide graphical user interface (GUI) on a portable device, comprising:
determining a current geographical location of the portable device; receiving by the portable device data indicative of an identity of a set-top box; using the data indicative of the identity of the set-top box to identify a one of a plurality of Multi-System Operator (MSO) providers; using the determined current geographical location of the portable device to select from a MSO map associated with the identified one of the plurality of MSO providers a channel lineup wherein the selected channel lineup is appropriate for the identified one of the plurality of MSO providers and the current geographical location of the portable device; and configuring the program guide GUI on the portable device whereby the selected channel lineup is displayable to a user of the portable device for use in commanding tuning operations of the set-top box. 2. The method as recited in claim 1, wherein the current geographical location of the portable device is determined using a GPS device resident on the portable device. 3. The method as recited in claim 1, wherein the current geographical location of the portable device is determined using a location service of a network on which the portable device communicates. 4. The method as recited in claim 1, wherein the portable device receives the data indicative of an identity of a set-top box in response to the portable device joining a network which includes the set-top box. 5. The method as recited in claim 1, wherein the selected channel lineup is retrieved from the set-top box and returned to the portable device whereupon an app resident on the portable device uses the selected channel lineup in configuring the program guide GUI on the portable device. 6. The method as recited in claim 1, wherein the selected channel lineup is retrieved from an Internet cloud device and returned to the portable device whereupon an app resident on the portable device uses the selected channel lineup in configuring the program guide GUI on the portable device. 7. The method as recited in claim 1, comprising displaying on the portable device indicia of the identified one of the plurality of MSO providers for confirmation by the user. 8. The method as recited in claim 1, comprising displaying on the portable device indicia of the determined geographic location of the portable device for confirmation by the user. 9. The method as recited in claim 1, comprising storing the selected channel lineup in the portable device in association with the data indicative of an identity of a set-top box and periodically causing the selected channel lineup to be updated 10. The method as recited in claim 9, comprising storing plural channel lineups in the portable device each in association with data indicative of an identify of a corresponding plurality of set-top boxes. 11-18. (canceled) | A current geographical location of a portable device is used to facilitate selection of channel lineup that is appropriate for a Multi-System Operator (MSO) provider and the current geographical location of the portable device. A program guide GUI of the portable device is then configured using the selected channel lineup. The configured GUI is displayable to a user of the portable device whereupon the configured GUI is available for use in commanding tuning operations of a set-top box.1. A method for configuring a program guide graphical user interface (GUI) on a portable device, comprising:
determining a current geographical location of the portable device; receiving by the portable device data indicative of an identity of a set-top box; using the data indicative of the identity of the set-top box to identify a one of a plurality of Multi-System Operator (MSO) providers; using the determined current geographical location of the portable device to select from a MSO map associated with the identified one of the plurality of MSO providers a channel lineup wherein the selected channel lineup is appropriate for the identified one of the plurality of MSO providers and the current geographical location of the portable device; and configuring the program guide GUI on the portable device whereby the selected channel lineup is displayable to a user of the portable device for use in commanding tuning operations of the set-top box. 2. The method as recited in claim 1, wherein the current geographical location of the portable device is determined using a GPS device resident on the portable device. 3. The method as recited in claim 1, wherein the current geographical location of the portable device is determined using a location service of a network on which the portable device communicates. 4. The method as recited in claim 1, wherein the portable device receives the data indicative of an identity of a set-top box in response to the portable device joining a network which includes the set-top box. 5. The method as recited in claim 1, wherein the selected channel lineup is retrieved from the set-top box and returned to the portable device whereupon an app resident on the portable device uses the selected channel lineup in configuring the program guide GUI on the portable device. 6. The method as recited in claim 1, wherein the selected channel lineup is retrieved from an Internet cloud device and returned to the portable device whereupon an app resident on the portable device uses the selected channel lineup in configuring the program guide GUI on the portable device. 7. The method as recited in claim 1, comprising displaying on the portable device indicia of the identified one of the plurality of MSO providers for confirmation by the user. 8. The method as recited in claim 1, comprising displaying on the portable device indicia of the determined geographic location of the portable device for confirmation by the user. 9. The method as recited in claim 1, comprising storing the selected channel lineup in the portable device in association with the data indicative of an identity of a set-top box and periodically causing the selected channel lineup to be updated 10. The method as recited in claim 9, comprising storing plural channel lineups in the portable device each in association with data indicative of an identify of a corresponding plurality of set-top boxes. 11-18. (canceled) | 2,400 |
8,842 | 8,842 | 15,702,229 | 2,421 | A system for quantifying viewer engagement with a video playing on a display includes at least one camera to acquire image data of a viewing area in front of the display. A microphone acquires audio data emitted by a speaker coupled to the display. The system also includes a memory to store processor-executable instructions and a processor. Upon execution of the processor-executable instructions, the processor receives the image data and the audio data and determines an identity of the video displayed on the display based on the audio data. The processor also estimates a first number of people present in the viewing area and a second number of people engaged with the video. The processor further quantifies the viewer engagement of the video based on the first number of people and the second number of people. | 1. A method of quantifying viewer engagement with a video shown on a display, the method comprising:
acquiring, with at least one camera, images of a viewing area in front of the display while the video is being shown on the display; acquiring, with a microphone, audio data representing a soundtrack of the video emitted by a speaker coupled to the display; determining, with a processor operably coupled to the at least one camera and the processor, an identity of the video based at least in part on the audio data; estimating, with the processor and based at least in part on the image data, a first number of people present in the viewing area while the video is being shown on the display and a second number of people engaged with the video in the viewing area; and transmitting, by the processor, the identity of the video, the first number of people, and the second number of people to a remote server. 2. The method of claim 1, wherein acquiring the images comprises acquiring a first image of the viewing area using a visible camera and acquiring a second image of the viewing area using an infrared (IR) camera. 3. The method of claim 2, wherein estimating the first number of people in the viewing area comprises:
estimating a first raw number of people from the first image data and a second raw number of people from the second image data; and comparing the first raw number with the second raw number to detect possible error in at least one of the first raw number or the second raw number. 4. The method of claim 1, wherein acquiring the image data comprises acquiring images of the viewing area at a frame rate substantially equal to or greater than 20 frames per second. 5. The method of claim 1, wherein acquiring the audio data comprises acquiring the audio data at an acquisition rate of about 0.1 Hz. 6. The method of claim 1, wherein determining the identity of the video is based on audio signal fingerprinting. 7. The method of claim 1, wherein estimating the first number of people present in the viewing area is based on body skeleton detection. 8. The method of claim 1, wherein estimating the second number of people engaged with the at least on video is based on eye tracking. 9. The method of claim 1, further comprising:
quantifying the viewer engagement of the video based at least in part on the first number of people and the second number of people at each house household in the plurality of households. 10. The method of claim 9, wherein quantifying the viewer engagement comprises:
estimating an attention rate for the video, the attention rate representing a ratio of the second number of people engaged with the video to the first number of people in the viewing area; and for each unique video in the plurality of videos, determining an attention index based on the attention rates of the videos in the plurality of videos. 11. The method of claim 10, wherein the video is a unique video in a plurality of videos and the method further comprises:
estimating a viewer count and a positive duration ratio based on the image data and on demographic information about each household in the plurality of households, the viewer count representing the second number of people engaged with each unique video and the positive duration ratio representing a ratio of total time spent by people in the plurality of households watching the unique video to a duration of the unique video. 12. The method of claim 9, further comprising:
determining an identity of each person present in the viewing area based at least in part on the image data, wherein quantifying the viewer engagement of the video comprises quantifying the viewer engagement for each identified person. 13. The method of claim 9, further comprising:
transmitting the first number of people and the second number of people to a remote server, wherein quantifying the viewer engagement is carried out at the remote server. 14. The method of claim 9, further comprising:
determining whether a predetermined video in the plurality of videos is being displayed on the display based at least in part on the audio data, wherein quantifying the viewer engagement is based at least in part on whether the predetermined video is being displayed. 15. The method of claim 1, further comprising:
storing the first number of people and the second number of people in a memory operably coupled to the processor; and erasing and/or overwriting the image data. 16. The method of claim 1, further comprising:
estimating an emotion of each person present in the viewing area. 17. The method of claim 1, further comprising:
estimating demographic information for each person in the viewing area from the image data. 18. The method of claim 17, wherein estimating the demographic information comprises estimating age, gender, ethnicity group, and facial expression. 19. A method of quantifying viewer engagement for unique videos in a plurality of videos, the method comprising:
at each household in a plurality of households, acquiring image data of a viewing area in front of a display; determining if the display is showing a video in the plurality of videos; for each unique video in the plurality of videos, estimating (i) a viewing rate and (ii) a watching rate based on the image data and on demographic information about each household in the plurality of households, the viewing rate representing a ratio of a total number of people in the viewing areas to a total number of displays showing videos and the watching rate representing a ratio of a total number of people in households with display showing videos to a total number of people in the plurality of households; and for each unique video in the plurality of videos, determining a viewability index based on the viewing rate and the watching rate. 20. The method of claim 19, further comprising:
for each unique video in the plurality of videos, estimating (iii) a viewer count and (iv) a positive duration ratio based on the image data and on demographic information about each household in the plurality of households, the viewer count representing a total number of people engaged with each unique video and the positive duration ratio representing a ratio of total time spent by people in the plurality of households watching the unique video to a duration of the unique video; and weighting the viewability index based on the viewer count and the positive duration ratio. 21. The method of claim 20, further comprising:
normalizing the viewability index across the unique videos in the plurality of videos. 22. The method of claim 19, wherein acquiring the image data comprises acquiring a first image of the viewing area using an optical camera and acquiring a second image of the viewing area using an infrared (IR) camera. 23. The method of claim 19, wherein determining if the display is showing the video is based at least in part on audio data of the viewing area via signal fingerprinting technique. 24. The method of claim 19, further comprising:
transmitting the viewing rate and the watching rate to a remote server, wherein the viewability index is estimated by the remote server. 25. A system for quantifying viewer engagement with a video playing on a display, the system comprising:
at least one camera, disposed to image a viewing area in front of the display, to acquire image data of the viewing area; a microphone, disposed in proximity to the display, to acquire audio data representing a soundtrack of the video emitted by a speaker coupled to the display; a memory, operably coupled to the at least one camera and the microphone, to store processor-executable instructions; and a processor, operably coupled to the at least one camera, the microphone, and the memory, wherein upon execution of the processor-executable instructions, the processor:
determines an identity of the video based at least in part on the audio data;
estimates, based at least in part on the image data, a first number of people present in the viewing area while the video is being shown on the display and a second number of people engaged with the video in the viewing area; and
transmits the identity of the video, the first number of people, and the second number of people to a remote server. 26. The system of claim 25, wherein the video comprises a television program provided via a set-top box and the processor is not connected to the set-top box. 27. The system of claim 25, wherein the at least one camera comprises a visible camera and an infrared camera and the image data comprises a first image acquired by the visible camera and a second image acquired by the infrared camera. 28. The system of claim 27, wherein upon execution of the processor-executable instructions, the processor further:
estimates a first raw number of people from the first image and a second raw number of people from the second image; and compares the first raw number with the second raw number to detect possible error in at least one of the first raw number or the second raw number. 29. The system of claim 25, wherein upon execution of the processor-executable instructions, the processor:
stores the first number of people and the second number of people in the memory; and erases and/or overwrites the image data. 30. The system of claim 25, further comprising:
a network interface, operably coupled to the processor, to transmit the first number of people and the second number of people to a remote server. | A system for quantifying viewer engagement with a video playing on a display includes at least one camera to acquire image data of a viewing area in front of the display. A microphone acquires audio data emitted by a speaker coupled to the display. The system also includes a memory to store processor-executable instructions and a processor. Upon execution of the processor-executable instructions, the processor receives the image data and the audio data and determines an identity of the video displayed on the display based on the audio data. The processor also estimates a first number of people present in the viewing area and a second number of people engaged with the video. The processor further quantifies the viewer engagement of the video based on the first number of people and the second number of people.1. A method of quantifying viewer engagement with a video shown on a display, the method comprising:
acquiring, with at least one camera, images of a viewing area in front of the display while the video is being shown on the display; acquiring, with a microphone, audio data representing a soundtrack of the video emitted by a speaker coupled to the display; determining, with a processor operably coupled to the at least one camera and the processor, an identity of the video based at least in part on the audio data; estimating, with the processor and based at least in part on the image data, a first number of people present in the viewing area while the video is being shown on the display and a second number of people engaged with the video in the viewing area; and transmitting, by the processor, the identity of the video, the first number of people, and the second number of people to a remote server. 2. The method of claim 1, wherein acquiring the images comprises acquiring a first image of the viewing area using a visible camera and acquiring a second image of the viewing area using an infrared (IR) camera. 3. The method of claim 2, wherein estimating the first number of people in the viewing area comprises:
estimating a first raw number of people from the first image data and a second raw number of people from the second image data; and comparing the first raw number with the second raw number to detect possible error in at least one of the first raw number or the second raw number. 4. The method of claim 1, wherein acquiring the image data comprises acquiring images of the viewing area at a frame rate substantially equal to or greater than 20 frames per second. 5. The method of claim 1, wherein acquiring the audio data comprises acquiring the audio data at an acquisition rate of about 0.1 Hz. 6. The method of claim 1, wherein determining the identity of the video is based on audio signal fingerprinting. 7. The method of claim 1, wherein estimating the first number of people present in the viewing area is based on body skeleton detection. 8. The method of claim 1, wherein estimating the second number of people engaged with the at least on video is based on eye tracking. 9. The method of claim 1, further comprising:
quantifying the viewer engagement of the video based at least in part on the first number of people and the second number of people at each house household in the plurality of households. 10. The method of claim 9, wherein quantifying the viewer engagement comprises:
estimating an attention rate for the video, the attention rate representing a ratio of the second number of people engaged with the video to the first number of people in the viewing area; and for each unique video in the plurality of videos, determining an attention index based on the attention rates of the videos in the plurality of videos. 11. The method of claim 10, wherein the video is a unique video in a plurality of videos and the method further comprises:
estimating a viewer count and a positive duration ratio based on the image data and on demographic information about each household in the plurality of households, the viewer count representing the second number of people engaged with each unique video and the positive duration ratio representing a ratio of total time spent by people in the plurality of households watching the unique video to a duration of the unique video. 12. The method of claim 9, further comprising:
determining an identity of each person present in the viewing area based at least in part on the image data, wherein quantifying the viewer engagement of the video comprises quantifying the viewer engagement for each identified person. 13. The method of claim 9, further comprising:
transmitting the first number of people and the second number of people to a remote server, wherein quantifying the viewer engagement is carried out at the remote server. 14. The method of claim 9, further comprising:
determining whether a predetermined video in the plurality of videos is being displayed on the display based at least in part on the audio data, wherein quantifying the viewer engagement is based at least in part on whether the predetermined video is being displayed. 15. The method of claim 1, further comprising:
storing the first number of people and the second number of people in a memory operably coupled to the processor; and erasing and/or overwriting the image data. 16. The method of claim 1, further comprising:
estimating an emotion of each person present in the viewing area. 17. The method of claim 1, further comprising:
estimating demographic information for each person in the viewing area from the image data. 18. The method of claim 17, wherein estimating the demographic information comprises estimating age, gender, ethnicity group, and facial expression. 19. A method of quantifying viewer engagement for unique videos in a plurality of videos, the method comprising:
at each household in a plurality of households, acquiring image data of a viewing area in front of a display; determining if the display is showing a video in the plurality of videos; for each unique video in the plurality of videos, estimating (i) a viewing rate and (ii) a watching rate based on the image data and on demographic information about each household in the plurality of households, the viewing rate representing a ratio of a total number of people in the viewing areas to a total number of displays showing videos and the watching rate representing a ratio of a total number of people in households with display showing videos to a total number of people in the plurality of households; and for each unique video in the plurality of videos, determining a viewability index based on the viewing rate and the watching rate. 20. The method of claim 19, further comprising:
for each unique video in the plurality of videos, estimating (iii) a viewer count and (iv) a positive duration ratio based on the image data and on demographic information about each household in the plurality of households, the viewer count representing a total number of people engaged with each unique video and the positive duration ratio representing a ratio of total time spent by people in the plurality of households watching the unique video to a duration of the unique video; and weighting the viewability index based on the viewer count and the positive duration ratio. 21. The method of claim 20, further comprising:
normalizing the viewability index across the unique videos in the plurality of videos. 22. The method of claim 19, wherein acquiring the image data comprises acquiring a first image of the viewing area using an optical camera and acquiring a second image of the viewing area using an infrared (IR) camera. 23. The method of claim 19, wherein determining if the display is showing the video is based at least in part on audio data of the viewing area via signal fingerprinting technique. 24. The method of claim 19, further comprising:
transmitting the viewing rate and the watching rate to a remote server, wherein the viewability index is estimated by the remote server. 25. A system for quantifying viewer engagement with a video playing on a display, the system comprising:
at least one camera, disposed to image a viewing area in front of the display, to acquire image data of the viewing area; a microphone, disposed in proximity to the display, to acquire audio data representing a soundtrack of the video emitted by a speaker coupled to the display; a memory, operably coupled to the at least one camera and the microphone, to store processor-executable instructions; and a processor, operably coupled to the at least one camera, the microphone, and the memory, wherein upon execution of the processor-executable instructions, the processor:
determines an identity of the video based at least in part on the audio data;
estimates, based at least in part on the image data, a first number of people present in the viewing area while the video is being shown on the display and a second number of people engaged with the video in the viewing area; and
transmits the identity of the video, the first number of people, and the second number of people to a remote server. 26. The system of claim 25, wherein the video comprises a television program provided via a set-top box and the processor is not connected to the set-top box. 27. The system of claim 25, wherein the at least one camera comprises a visible camera and an infrared camera and the image data comprises a first image acquired by the visible camera and a second image acquired by the infrared camera. 28. The system of claim 27, wherein upon execution of the processor-executable instructions, the processor further:
estimates a first raw number of people from the first image and a second raw number of people from the second image; and compares the first raw number with the second raw number to detect possible error in at least one of the first raw number or the second raw number. 29. The system of claim 25, wherein upon execution of the processor-executable instructions, the processor:
stores the first number of people and the second number of people in the memory; and erases and/or overwrites the image data. 30. The system of claim 25, further comprising:
a network interface, operably coupled to the processor, to transmit the first number of people and the second number of people to a remote server. | 2,400 |
8,843 | 8,843 | 15,386,001 | 2,482 | The present application relates to a system for generating a surround view and a method of operating the system. A synthesizer module synthesizes an output frame from input frames in accordance with predefined calibration data. The input frames have an overlapping region imaging an overlapping field of view captured by two adjacent cameras. An adjustment module receives height level information representative of a height level in the overlapping region; selects a data record out of a set of predefined calibration data records in accordance with the height level information; and updates the predefined a part of the calibration data with the selected data record. | 1. A method of adjusting predefined calibration data for generating a perspective view,
wherein the perspective view is synthesized in an output frame from input frames in accordance with the predefined calibration data, wherein each input frame originates from one of a plurality of cameras comprising two adjacent cameras, the input frames of which have an overlapping region imaging an overlapping field of view captured by the two adjacent cameras, wherein the method comprises: providing a set of predefined calibration data records each of which relating to a different height level; receiving height level information representative of a height level in the overlapping region, selecting a data record out of the set of predefined calibration data records in accordance with the height level; and updating the predefined calibration data with the selected data record. 2. The method according to claim 1,
wherein each data record of the set of predefined calibration data records comprises a predefined number of predefined calibration data sub-records, each of which relates to a sub-region of the overlapping region, wherein the height level information is representative of height levels of the sub-regions of the overlapping region; wherein the adjusting of the predefined calibration data further comprises: selecting a data sub-record out of the predefined number of predefined calibration data sub-records for each sub-region in accordance with the height level information; and updating the predefined calibration data with the selected data sub-records. 3. The method according to claim 1,
wherein the input frames have a plurality of overlapping regions, each of which images an overlapping field of view captured by two adjacent cameras, wherein the adjusting of the predefined calibration data further comprises: providing a set of predefined calibration data records for each overlapping region; receiving height level information representative of several height levels each relating to one of the overlapping regions; selecting data records out of the respective set of predefined calibration data records in accordance with the height level information, wherein each selected data record relates to a different one of the overlapping regions; and updating the predefined calibration data with the selected data records. 4. The method according to claim 1,
wherein the adjusting of the predefined calibration data is performed independently of the synthesizing of the output frame. 5. The method according to claim 1,
wherein each two adjacent cameras of the plurality of cameras capture an overlapping field of view, which is imaged in an overlapping region of the respective two different input frames. 6. The method according to claim 1,
wherein the synthesizing further comprises stitching the overlapping region. 7. The method according to claim 1, further comprising:
providing the predefined calibration data, which maps each pixel location of the output frame to a location in at least one of the input frames. 8. The method according to claim 1,
wherein the predefined calibration data includes optical correction data and/or blending parameters. 9. The method according to claim 1, further comprising:
providing the input frames synchronized in time for synthesizing. 10. A system for adjusting predefined calibration data for generating a perspective view,
wherein the perspective view is synthesized in an output frame by a synthesizer module from input frames in accordance with predefined calibration data, wherein each input frame originates from a different one of a plurality of cameras comprising two adjacent cameras, the input frames of which have an overlapping region imaging an overlapping field of view captured by the two adjacent cameras, a set of predefined calibration data records each of which relating to a different height level, wherein the system comprises an adjustment module configured
to receive height level information representative of a height level in the overlapping region;
to select a data record out of the set of predefined calibration data records in accordance with the height level information; and
to update the predefined calibration data with the selected data record. 11. The system according to claim 10,
wherein each data record of the set of predefined calibration data records comprises a predefined number of predefined calibration data sub-records, each of which relates to a sub-region of the overlapping region, wherein the height level information is representative of height levels of the sub-regions of the overlapping region, wherein the adjustment module is further configured
to select a data sub-record out of the predefined number of predefined calibration data sub-records for each sub-region in accordance with the height level information; and
to update the predefined calibration data with the selected data sub-records. 12. The system according to claim 10,
wherein the input frames have a plurality of overlapping regions, each of which images an overlapping field of view captured by two adjacent cameras, wherein the system comprises a set of predefined calibration data records for each overlapping region, wherein the an adjustment module is further configured
to receive height level information representative of one or more height levels each relating to one of the overlapping regions;
to select one or more data records out of the one or more respective sets of predefined calibration data records in accordance with the height level information; and
to update the predefined calibration data with the one or more selected data records,
wherein each of the one or more selected data records relates to a different one of the overlapping regions. 13. The system according to claim 10, further comprising:
wherein the predefined calibration data maps each pixel location of the output frame to a location in at least one of the input frames. 14. The system according to claim 10, further comprising:
wherein the height level information is determined on the basis of sensor outputs or on the basis of an analysis of the images in the overlapping regions of the input frames. 15. A computer program product computer executable instructions, which, when executing on one or more processing devices, cause the one or more processing devices to perform a method of generating a perspective view according to claim 1. | The present application relates to a system for generating a surround view and a method of operating the system. A synthesizer module synthesizes an output frame from input frames in accordance with predefined calibration data. The input frames have an overlapping region imaging an overlapping field of view captured by two adjacent cameras. An adjustment module receives height level information representative of a height level in the overlapping region; selects a data record out of a set of predefined calibration data records in accordance with the height level information; and updates the predefined a part of the calibration data with the selected data record.1. A method of adjusting predefined calibration data for generating a perspective view,
wherein the perspective view is synthesized in an output frame from input frames in accordance with the predefined calibration data, wherein each input frame originates from one of a plurality of cameras comprising two adjacent cameras, the input frames of which have an overlapping region imaging an overlapping field of view captured by the two adjacent cameras, wherein the method comprises: providing a set of predefined calibration data records each of which relating to a different height level; receiving height level information representative of a height level in the overlapping region, selecting a data record out of the set of predefined calibration data records in accordance with the height level; and updating the predefined calibration data with the selected data record. 2. The method according to claim 1,
wherein each data record of the set of predefined calibration data records comprises a predefined number of predefined calibration data sub-records, each of which relates to a sub-region of the overlapping region, wherein the height level information is representative of height levels of the sub-regions of the overlapping region; wherein the adjusting of the predefined calibration data further comprises: selecting a data sub-record out of the predefined number of predefined calibration data sub-records for each sub-region in accordance with the height level information; and updating the predefined calibration data with the selected data sub-records. 3. The method according to claim 1,
wherein the input frames have a plurality of overlapping regions, each of which images an overlapping field of view captured by two adjacent cameras, wherein the adjusting of the predefined calibration data further comprises: providing a set of predefined calibration data records for each overlapping region; receiving height level information representative of several height levels each relating to one of the overlapping regions; selecting data records out of the respective set of predefined calibration data records in accordance with the height level information, wherein each selected data record relates to a different one of the overlapping regions; and updating the predefined calibration data with the selected data records. 4. The method according to claim 1,
wherein the adjusting of the predefined calibration data is performed independently of the synthesizing of the output frame. 5. The method according to claim 1,
wherein each two adjacent cameras of the plurality of cameras capture an overlapping field of view, which is imaged in an overlapping region of the respective two different input frames. 6. The method according to claim 1,
wherein the synthesizing further comprises stitching the overlapping region. 7. The method according to claim 1, further comprising:
providing the predefined calibration data, which maps each pixel location of the output frame to a location in at least one of the input frames. 8. The method according to claim 1,
wherein the predefined calibration data includes optical correction data and/or blending parameters. 9. The method according to claim 1, further comprising:
providing the input frames synchronized in time for synthesizing. 10. A system for adjusting predefined calibration data for generating a perspective view,
wherein the perspective view is synthesized in an output frame by a synthesizer module from input frames in accordance with predefined calibration data, wherein each input frame originates from a different one of a plurality of cameras comprising two adjacent cameras, the input frames of which have an overlapping region imaging an overlapping field of view captured by the two adjacent cameras, a set of predefined calibration data records each of which relating to a different height level, wherein the system comprises an adjustment module configured
to receive height level information representative of a height level in the overlapping region;
to select a data record out of the set of predefined calibration data records in accordance with the height level information; and
to update the predefined calibration data with the selected data record. 11. The system according to claim 10,
wherein each data record of the set of predefined calibration data records comprises a predefined number of predefined calibration data sub-records, each of which relates to a sub-region of the overlapping region, wherein the height level information is representative of height levels of the sub-regions of the overlapping region, wherein the adjustment module is further configured
to select a data sub-record out of the predefined number of predefined calibration data sub-records for each sub-region in accordance with the height level information; and
to update the predefined calibration data with the selected data sub-records. 12. The system according to claim 10,
wherein the input frames have a plurality of overlapping regions, each of which images an overlapping field of view captured by two adjacent cameras, wherein the system comprises a set of predefined calibration data records for each overlapping region, wherein the an adjustment module is further configured
to receive height level information representative of one or more height levels each relating to one of the overlapping regions;
to select one or more data records out of the one or more respective sets of predefined calibration data records in accordance with the height level information; and
to update the predefined calibration data with the one or more selected data records,
wherein each of the one or more selected data records relates to a different one of the overlapping regions. 13. The system according to claim 10, further comprising:
wherein the predefined calibration data maps each pixel location of the output frame to a location in at least one of the input frames. 14. The system according to claim 10, further comprising:
wherein the height level information is determined on the basis of sensor outputs or on the basis of an analysis of the images in the overlapping regions of the input frames. 15. A computer program product computer executable instructions, which, when executing on one or more processing devices, cause the one or more processing devices to perform a method of generating a perspective view according to claim 1. | 2,400 |
8,844 | 8,844 | 14,725,982 | 2,456 | Disclosed are systems, methods, and non-transitory computer-readable storage media for shared folder backed integrated workspaces. In some implementations, a content management system can provide a graphical user interface (GUI) that integrates communications and content management into a single user interface. The user interface can include mechanisms that allow a user to provide input to generate a new workspace. The user interface can provide a mechanism to allow a user to view conversations related to the workspace and/or content items associated with the workspace. The user interface can present representations of content items associated with the workspace and allow the user to provide input to generate, view, edit, and share content items associated with the workspace. | 1. A method comprising:
generating, by an online content management system, a graphical user interface including a message stream, where the message stream includes an existing message; receiving, by the online content management system, a new message for the message stream; determining, by the online content management system, whether a user is interacting with the existing message in the message stream; scrolling, by the online content management system, the message stream in response to receiving the new message when the user is not providing input with respect to the existing message in the message stream; and freezing, by the online content management system, the message stream in response to receiving the new message while the user is providing input with respect to the existing message in the message stream; and inserting, by the online content management system, the new message in the message stream. 2. The method of claim 1, further comprising:
determining that the user is no longer providing input with respect to the existing message in the message stream; and scrolling the message stream to cause the new message to be displayed in the message stream. 3. The method of claim 1, wherein the new message is an individual message. 4. The method of claim 1, wherein the existing message is an individual message. 5. The method of claim 1, wherein the existing message is one of a plurality of messages in a message thread. 6. The method of claim 1, wherein the input provided by the user includes hovering a cursor over the existing message. 7. The method of claim 1, wherein the input provided by the user includes entering text for a reply message in reply to the existing message. 8. A non-transitory computer-readable medium including one or more sequences of instructions that, when executed by one or more processors, cause:
generating, by an online content management system, a shared-folder backed workspace graphical user interface that provides an integrated environment for manipulating content items in an online shared folder and for communicating with the authorized users of the online shared folder, the workspace including a message stream for sharing messages with authorized users of the online shared folder, the message stream including at least one existing message; receiving, by the online content management system, a new message for the message stream; determining, by the online content management system, whether a user is interacting with the existing message in the message stream; scrolling, by the online content management system, the message stream in response to receiving the new message when the user is not interacting with an existing message in the message stream; and freezing, by the online content management system, the message stream in response to receiving the new message while the user is interacting with the existing message in the message stream; and inserting, by the online content management system, the new message into the message stream. 9. The non-transitory computer-readable medium of claim 8, wherein the instructions cause:
determining that the user is no longer interacting with the existing message in the message stream; and scrolling the message stream to cause the new message to be displayed in the message stream. 10. The non-transitory computer-readable medium of claim 8, wherein the new message is an individual message. 11. The non-transitory computer-readable medium of claim 8, wherein the existing message is an individual message. 12. The non-transitory computer-readable medium of claim 8, wherein the existing message is one of a plurality of messages in a message thread. 13. The non-transitory computer-readable medium of claim 8, wherein the user interaction includes hovering a cursor over the existing message. 14. The non-transitory computer-readable medium of claim 8, wherein the user interaction includes providing text for a reply message in reply to the existing message. 15. An online content management system comprising:
one or more processors; and a computer-readable medium including one or more sequences of instructions that, when executed by the one or more processors, cause:
generating, by an online content management system, a shared-folder backed workspace graphical user interface that provides an integrated environment for manipulating content items in an online shared folder and for communicating with the authorized users of the online shared folder, the workspace including a message stream for sharing messages with authorized users of the online shared folder, the message stream including at least one existing message;
receiving, by the online content management system, a new message for the message stream;
determining, by the online content management system, whether a user is interacting with the existing message in the message stream;
scrolling, by the online content management system, the message stream in response to receiving the new message when the user is not interacting with an existing message in the message stream; and
freezing, by the online content management system, the message stream in response to receiving the new message while the user is interacting with the existing message in the message stream; and
inserting, by the online content management system, the new message into the message stream. 16. The system of claim 15, further comprising:
determining that the user is no longer interacting with the existing message in the message stream; and scrolling the message stream to cause the new message to be displayed in the message stream. 17. The system of claim 15, wherein the new message is an individual message. 18. The system of claim 15, wherein the existing message is an individual message. 19. The system of claim 15, wherein the existing message is one of a plurality of messages in a message thread. 20. The system of claim 15, wherein the user interaction includes hovering a cursor over the existing message. 21. The system of claim 15, wherein the user interaction includes providing text for a reply message in reply to the existing message. | Disclosed are systems, methods, and non-transitory computer-readable storage media for shared folder backed integrated workspaces. In some implementations, a content management system can provide a graphical user interface (GUI) that integrates communications and content management into a single user interface. The user interface can include mechanisms that allow a user to provide input to generate a new workspace. The user interface can provide a mechanism to allow a user to view conversations related to the workspace and/or content items associated with the workspace. The user interface can present representations of content items associated with the workspace and allow the user to provide input to generate, view, edit, and share content items associated with the workspace.1. A method comprising:
generating, by an online content management system, a graphical user interface including a message stream, where the message stream includes an existing message; receiving, by the online content management system, a new message for the message stream; determining, by the online content management system, whether a user is interacting with the existing message in the message stream; scrolling, by the online content management system, the message stream in response to receiving the new message when the user is not providing input with respect to the existing message in the message stream; and freezing, by the online content management system, the message stream in response to receiving the new message while the user is providing input with respect to the existing message in the message stream; and inserting, by the online content management system, the new message in the message stream. 2. The method of claim 1, further comprising:
determining that the user is no longer providing input with respect to the existing message in the message stream; and scrolling the message stream to cause the new message to be displayed in the message stream. 3. The method of claim 1, wherein the new message is an individual message. 4. The method of claim 1, wherein the existing message is an individual message. 5. The method of claim 1, wherein the existing message is one of a plurality of messages in a message thread. 6. The method of claim 1, wherein the input provided by the user includes hovering a cursor over the existing message. 7. The method of claim 1, wherein the input provided by the user includes entering text for a reply message in reply to the existing message. 8. A non-transitory computer-readable medium including one or more sequences of instructions that, when executed by one or more processors, cause:
generating, by an online content management system, a shared-folder backed workspace graphical user interface that provides an integrated environment for manipulating content items in an online shared folder and for communicating with the authorized users of the online shared folder, the workspace including a message stream for sharing messages with authorized users of the online shared folder, the message stream including at least one existing message; receiving, by the online content management system, a new message for the message stream; determining, by the online content management system, whether a user is interacting with the existing message in the message stream; scrolling, by the online content management system, the message stream in response to receiving the new message when the user is not interacting with an existing message in the message stream; and freezing, by the online content management system, the message stream in response to receiving the new message while the user is interacting with the existing message in the message stream; and inserting, by the online content management system, the new message into the message stream. 9. The non-transitory computer-readable medium of claim 8, wherein the instructions cause:
determining that the user is no longer interacting with the existing message in the message stream; and scrolling the message stream to cause the new message to be displayed in the message stream. 10. The non-transitory computer-readable medium of claim 8, wherein the new message is an individual message. 11. The non-transitory computer-readable medium of claim 8, wherein the existing message is an individual message. 12. The non-transitory computer-readable medium of claim 8, wherein the existing message is one of a plurality of messages in a message thread. 13. The non-transitory computer-readable medium of claim 8, wherein the user interaction includes hovering a cursor over the existing message. 14. The non-transitory computer-readable medium of claim 8, wherein the user interaction includes providing text for a reply message in reply to the existing message. 15. An online content management system comprising:
one or more processors; and a computer-readable medium including one or more sequences of instructions that, when executed by the one or more processors, cause:
generating, by an online content management system, a shared-folder backed workspace graphical user interface that provides an integrated environment for manipulating content items in an online shared folder and for communicating with the authorized users of the online shared folder, the workspace including a message stream for sharing messages with authorized users of the online shared folder, the message stream including at least one existing message;
receiving, by the online content management system, a new message for the message stream;
determining, by the online content management system, whether a user is interacting with the existing message in the message stream;
scrolling, by the online content management system, the message stream in response to receiving the new message when the user is not interacting with an existing message in the message stream; and
freezing, by the online content management system, the message stream in response to receiving the new message while the user is interacting with the existing message in the message stream; and
inserting, by the online content management system, the new message into the message stream. 16. The system of claim 15, further comprising:
determining that the user is no longer interacting with the existing message in the message stream; and scrolling the message stream to cause the new message to be displayed in the message stream. 17. The system of claim 15, wherein the new message is an individual message. 18. The system of claim 15, wherein the existing message is an individual message. 19. The system of claim 15, wherein the existing message is one of a plurality of messages in a message thread. 20. The system of claim 15, wherein the user interaction includes hovering a cursor over the existing message. 21. The system of claim 15, wherein the user interaction includes providing text for a reply message in reply to the existing message. | 2,400 |
8,845 | 8,845 | 15,749,112 | 2,433 | A computer program product for providing notifications to a user of an intrusion into firmware includes, in one example, non-transitory computer readable medium including computer usable program code embodied therewith to, when executed by a processor, detect intrusion to the firmware of a computing system during runtime in a system management mode. | 1. A computer program product for providing notifications to a user of an intrusion into firmware comprising:
non-transitory computer readable medium comprising computer usable program code embodied therewith to, when executed by a processor, detect intrusion to the firmware of a computing system during runtime in a system management mode. 2. The computer program product of claim 1, further comprising computer usable program code to, when executed by a processor, provide a notification via a user interface to a user when attempted or successful changes to the firmware are detected or when attempting to execute code from an area of the computer readable memory where authorization has not been provided to execute code therefrom. 3. The computer program product of claim 2, wherein the notification is provided to a user via an operating system event viewer log, an immediate user notification, a boot notification, or combinations thereof. 4. The computer program product of claim 1, comprising computer usable program code to, when executed by a processor, execute a system center configuration manager (SCCM) agent to receive a number of policy settings from a user of the computing system. 5. The computer program product of claim 4, wherein the policy settings comprise enablement of a restart procedure of the computing system upon detection of an intrusion; enablement of runtime notifications to be presented to the user; enablement of a notification presenting to a user options on how to address the intrusion, or combinations thereof. 6. The computer program product of claim 3, wherein the operating system event viewer log accumulates a plurality of event logs by synchronizing them with an audit log when the computing device boots up, when the computing device is resumed from a hibernation state, when the computing device is resumed from a sleep state, when notified via a WMI event of a new log entry, or combinations thereof. 7. The computer program product of claim 1, wherein the detection of intrusions to the firmware occur during execution of an operating system. 8. A method for logging events and providing notification of intrusions to SMM firmware on a computing device during runtime, comprising:
storing an event data structure describing intrusions to SMM firmware on a computing device during runtime in a non-volatile memory in a computing system. 9. The method of claim 8, wherein the embedded controller causes a WMI to present to a user of the computing system a notification of the event. 10. The method of claim 9, wherein the notification of the event is a result of a real-time intrusion into a firmware of the computing system. 11. The method of claim 9, wherein the WMI comprises a BIOS WMI provider on a WMI provider stack level and a WMI consumer on a WMI consumer level. 12. A computer user interface comprising:
a first window indicating a notice that an intrusion into SMM firmware of a computing system has occurred; and an indicator describing how a user is to obtain more details on the event. 13. The computer user interface of claim 12, further comprising an event viewer associated with the first window wherein the event viewer comprises a number of events describing intrusions into the firmware of the computing system. 14. The computer user interface of claim 13, wherein each of the number of events comprises a timestamp of when the event occurred. 15. The computer user interface of claim 14, wherein each of the number of events comprises an event identification indicating what type of event had occurred during the intrusion of the firmware. | A computer program product for providing notifications to a user of an intrusion into firmware includes, in one example, non-transitory computer readable medium including computer usable program code embodied therewith to, when executed by a processor, detect intrusion to the firmware of a computing system during runtime in a system management mode.1. A computer program product for providing notifications to a user of an intrusion into firmware comprising:
non-transitory computer readable medium comprising computer usable program code embodied therewith to, when executed by a processor, detect intrusion to the firmware of a computing system during runtime in a system management mode. 2. The computer program product of claim 1, further comprising computer usable program code to, when executed by a processor, provide a notification via a user interface to a user when attempted or successful changes to the firmware are detected or when attempting to execute code from an area of the computer readable memory where authorization has not been provided to execute code therefrom. 3. The computer program product of claim 2, wherein the notification is provided to a user via an operating system event viewer log, an immediate user notification, a boot notification, or combinations thereof. 4. The computer program product of claim 1, comprising computer usable program code to, when executed by a processor, execute a system center configuration manager (SCCM) agent to receive a number of policy settings from a user of the computing system. 5. The computer program product of claim 4, wherein the policy settings comprise enablement of a restart procedure of the computing system upon detection of an intrusion; enablement of runtime notifications to be presented to the user; enablement of a notification presenting to a user options on how to address the intrusion, or combinations thereof. 6. The computer program product of claim 3, wherein the operating system event viewer log accumulates a plurality of event logs by synchronizing them with an audit log when the computing device boots up, when the computing device is resumed from a hibernation state, when the computing device is resumed from a sleep state, when notified via a WMI event of a new log entry, or combinations thereof. 7. The computer program product of claim 1, wherein the detection of intrusions to the firmware occur during execution of an operating system. 8. A method for logging events and providing notification of intrusions to SMM firmware on a computing device during runtime, comprising:
storing an event data structure describing intrusions to SMM firmware on a computing device during runtime in a non-volatile memory in a computing system. 9. The method of claim 8, wherein the embedded controller causes a WMI to present to a user of the computing system a notification of the event. 10. The method of claim 9, wherein the notification of the event is a result of a real-time intrusion into a firmware of the computing system. 11. The method of claim 9, wherein the WMI comprises a BIOS WMI provider on a WMI provider stack level and a WMI consumer on a WMI consumer level. 12. A computer user interface comprising:
a first window indicating a notice that an intrusion into SMM firmware of a computing system has occurred; and an indicator describing how a user is to obtain more details on the event. 13. The computer user interface of claim 12, further comprising an event viewer associated with the first window wherein the event viewer comprises a number of events describing intrusions into the firmware of the computing system. 14. The computer user interface of claim 13, wherein each of the number of events comprises a timestamp of when the event occurred. 15. The computer user interface of claim 14, wherein each of the number of events comprises an event identification indicating what type of event had occurred during the intrusion of the firmware. | 2,400 |
8,846 | 8,846 | 14,539,960 | 2,416 | The present invention provides an asymmetric duplex transmission device and a switching system employing the same. The master device and the slave device communicate with each other through a single clock and full duplex data channels. It can also switch the duplex data channels between a plurality of slave devices under limited resources. | 1. An asymmetric duplex transmission device, comprising:
a master device, comprising a first phase lock loop and a master transceiver module coupled to the first phase lock loop; and at least one slave device coupled to the master device, each slave device comprising a slave transceiver module; wherein the master transceiver module transmits a forward clock to the slave transceiver module through a first transmission medium, transmits a forward data to the slave transceiver module through a second transmission medium, and receives a backward data transmitted from the slave transceiver module through a third transmission medium; and wherein the first phase lock loop provides a first clock that is used when the master transceiver module transmits the forward clock and the forward data to the at least one slave device and receives the backward data from the at least one slave device. 2. The asymmetric duplex transmission device of claim 1, wherein the master device further comprises an oscillator coupled to the first phase lock loop. 3. The asymmetric duplex transmission device of claim 1, wherein the master transceiver module comprises:
a first transmission module coupled to the first transmission medium; a second transmission module coupled to the second transmission medium; and a first receiving module coupled to the third transmission medium; and
wherein the slave transceiver module comprises:
a second receiving module coupled to the first transmission medium;
a third receiving module coupled to the second transmission medium; and
a third transmission module coupled to the third transmission medium. 4. The asymmetric duplex transmission device of claim 1, wherein the slave device further comprises a second phase lock loop coupled to the slave transceiver module, wherein the second phase lock loop provides a second clock based on the forward clock received from the master device, and wherein the second clock is used when the slave transceiver module receives the forward data and transmits the backward data. 5. The asymmetric duplex transmission device of claim 1, wherein each of the master transceiver module and the slave transceiver module is a serializer/deserializer. 6. The asymmetric duplex transmission device of claim 5, wherein each of the first clock and the second clock comprises an IO clock and a base clock. 7. The asymmetric duplex transmission device of claim 1, wherein each of the forward clock, the forward data and the backward data is a differential signal. 8. The asymmetric duplex transmission device of claim 1, wherein the master transceiver module further adjusts a phase of the backward data according to a phase of the first clock. 9. A switching system employing a asymmetric duplex transmission device, comprising:
a master device, comprising:
a first phase lock loop;
at least one packet generator, each packet generator outputting at least one package data;
a matrix switching module coupled to the packet generator, the matrix switching module transmitting at least one data stream to the packet generator to be converted into the package data; and
at least one master transceiver module, each coupled to the first phase lock loop and one of the at least one packet generator, each master transceiver module converting the package data into the forward data; and
at least one slave device, each of which is coupled to one of the master transceiver modules and has a slave transceiver module; wherein the master transceiver module transmits a forward clock to the slave transceiver module through a first transmission medium, transmits a forward data to the slave transceiver module through a second transmission medium, and receives a backward data transmitted from the slave transceiver module through a third transmission medium; and wherein the first phase lock loop provides a first clock that is used when the master transceiver module transmits the forward clock and the forward data to the at least one slave device and receives the backward data from the at least one slave device. 10. The switching system of claim 9, wherein the master device further comprises an oscillator coupled to the first phase lock loop. 11. The switching system of claim 9, wherein the master transceiver module further comprises:
a first transmission module coupled to the first transmission medium; a second transmission module coupled to the second transmission medium; and a first receiving module coupled to the third transmission medium; and
wherein the slave transceiver module further comprises:
a second receiving module coupled to the first transmission medium;
a third receiving module coupled to the second transmission medium; and
a third transmission module coupled to the third transmission medium. 12. The switching system of claim 9, wherein the master device further comprises:
at least one packet extractor each coupled to one of the at least one master transceiver module, each packet extractor receiving the backward data transmitted from the master transceiver module, and converting the backward data into a plurality of data streams and transmitting them to the matrix switching module, and wherein each slave device further comprises a slave packet generator and a slave packet extractor, wherein the slave packet generator converts at least one backward data stream into the backward package data and transmits the backward package data to the slave transceiver module, and the slave packet extractor receives at least one forward package data from the slave receiver module and converts the at least one package data to the at least one data stream. 13. The switching system of claim 9, wherein the slave device further comprises a second phase lock loop coupled to the slave transceiver module, wherein the second phase lock loop provides a second clock based on the forward clock received from the master device, and wherein the second clock is used when the slave transceiver module receives the forward data and transmits the backward data. 14. The switching system of claim 9, wherein each of the master transceiver module and the slave transceiver module is a serializer/deserializer. 15. The switching system of claim 13, wherein each of the first clock and the second clock comprises an IO clock and a base clock. 16. The switching system of claim 9, wherein each of the forward clock, the forward data and the backward data is a differential signal. 17. The switching system of claim 9, wherein the master transceiver module further adjusts a phase of the backward data according to a phase of the first clock. 18. A method implemented in an asymmetric duplex transmission system having a master device and a slave device coupled to each other by a plurality of transmission media, the method comprising:
a phase lock loop of the master device generating a first clock; a master transceiver module of the master device transmitting a forward clock to the slave device through a first transmission medium using the first clock, and transmitting a forward data to the slave device through a second transmission medium using the first clock; and the master transceiver module receiving a backward data from the slave device through a third transmission medium using the first clock. 19. The method of claim 18, further comprising:
a phase lock loop of the slave device generating a second clock based on the forward clock received from the master device through the first transmission medium; a slave transceiver module of the slave device receiving the forward data from the master device through the second transmission medium using the second clock; and the slave transceiver module transmitting the backward data to the master device through the third transmission medium using the second clock. 20. The method of claim 18, further comprising: the master transceiver module adjusting a phase of the backward data according to a phase of the first clock. | The present invention provides an asymmetric duplex transmission device and a switching system employing the same. The master device and the slave device communicate with each other through a single clock and full duplex data channels. It can also switch the duplex data channels between a plurality of slave devices under limited resources.1. An asymmetric duplex transmission device, comprising:
a master device, comprising a first phase lock loop and a master transceiver module coupled to the first phase lock loop; and at least one slave device coupled to the master device, each slave device comprising a slave transceiver module; wherein the master transceiver module transmits a forward clock to the slave transceiver module through a first transmission medium, transmits a forward data to the slave transceiver module through a second transmission medium, and receives a backward data transmitted from the slave transceiver module through a third transmission medium; and wherein the first phase lock loop provides a first clock that is used when the master transceiver module transmits the forward clock and the forward data to the at least one slave device and receives the backward data from the at least one slave device. 2. The asymmetric duplex transmission device of claim 1, wherein the master device further comprises an oscillator coupled to the first phase lock loop. 3. The asymmetric duplex transmission device of claim 1, wherein the master transceiver module comprises:
a first transmission module coupled to the first transmission medium; a second transmission module coupled to the second transmission medium; and a first receiving module coupled to the third transmission medium; and
wherein the slave transceiver module comprises:
a second receiving module coupled to the first transmission medium;
a third receiving module coupled to the second transmission medium; and
a third transmission module coupled to the third transmission medium. 4. The asymmetric duplex transmission device of claim 1, wherein the slave device further comprises a second phase lock loop coupled to the slave transceiver module, wherein the second phase lock loop provides a second clock based on the forward clock received from the master device, and wherein the second clock is used when the slave transceiver module receives the forward data and transmits the backward data. 5. The asymmetric duplex transmission device of claim 1, wherein each of the master transceiver module and the slave transceiver module is a serializer/deserializer. 6. The asymmetric duplex transmission device of claim 5, wherein each of the first clock and the second clock comprises an IO clock and a base clock. 7. The asymmetric duplex transmission device of claim 1, wherein each of the forward clock, the forward data and the backward data is a differential signal. 8. The asymmetric duplex transmission device of claim 1, wherein the master transceiver module further adjusts a phase of the backward data according to a phase of the first clock. 9. A switching system employing a asymmetric duplex transmission device, comprising:
a master device, comprising:
a first phase lock loop;
at least one packet generator, each packet generator outputting at least one package data;
a matrix switching module coupled to the packet generator, the matrix switching module transmitting at least one data stream to the packet generator to be converted into the package data; and
at least one master transceiver module, each coupled to the first phase lock loop and one of the at least one packet generator, each master transceiver module converting the package data into the forward data; and
at least one slave device, each of which is coupled to one of the master transceiver modules and has a slave transceiver module; wherein the master transceiver module transmits a forward clock to the slave transceiver module through a first transmission medium, transmits a forward data to the slave transceiver module through a second transmission medium, and receives a backward data transmitted from the slave transceiver module through a third transmission medium; and wherein the first phase lock loop provides a first clock that is used when the master transceiver module transmits the forward clock and the forward data to the at least one slave device and receives the backward data from the at least one slave device. 10. The switching system of claim 9, wherein the master device further comprises an oscillator coupled to the first phase lock loop. 11. The switching system of claim 9, wherein the master transceiver module further comprises:
a first transmission module coupled to the first transmission medium; a second transmission module coupled to the second transmission medium; and a first receiving module coupled to the third transmission medium; and
wherein the slave transceiver module further comprises:
a second receiving module coupled to the first transmission medium;
a third receiving module coupled to the second transmission medium; and
a third transmission module coupled to the third transmission medium. 12. The switching system of claim 9, wherein the master device further comprises:
at least one packet extractor each coupled to one of the at least one master transceiver module, each packet extractor receiving the backward data transmitted from the master transceiver module, and converting the backward data into a plurality of data streams and transmitting them to the matrix switching module, and wherein each slave device further comprises a slave packet generator and a slave packet extractor, wherein the slave packet generator converts at least one backward data stream into the backward package data and transmits the backward package data to the slave transceiver module, and the slave packet extractor receives at least one forward package data from the slave receiver module and converts the at least one package data to the at least one data stream. 13. The switching system of claim 9, wherein the slave device further comprises a second phase lock loop coupled to the slave transceiver module, wherein the second phase lock loop provides a second clock based on the forward clock received from the master device, and wherein the second clock is used when the slave transceiver module receives the forward data and transmits the backward data. 14. The switching system of claim 9, wherein each of the master transceiver module and the slave transceiver module is a serializer/deserializer. 15. The switching system of claim 13, wherein each of the first clock and the second clock comprises an IO clock and a base clock. 16. The switching system of claim 9, wherein each of the forward clock, the forward data and the backward data is a differential signal. 17. The switching system of claim 9, wherein the master transceiver module further adjusts a phase of the backward data according to a phase of the first clock. 18. A method implemented in an asymmetric duplex transmission system having a master device and a slave device coupled to each other by a plurality of transmission media, the method comprising:
a phase lock loop of the master device generating a first clock; a master transceiver module of the master device transmitting a forward clock to the slave device through a first transmission medium using the first clock, and transmitting a forward data to the slave device through a second transmission medium using the first clock; and the master transceiver module receiving a backward data from the slave device through a third transmission medium using the first clock. 19. The method of claim 18, further comprising:
a phase lock loop of the slave device generating a second clock based on the forward clock received from the master device through the first transmission medium; a slave transceiver module of the slave device receiving the forward data from the master device through the second transmission medium using the second clock; and the slave transceiver module transmitting the backward data to the master device through the third transmission medium using the second clock. 20. The method of claim 18, further comprising: the master transceiver module adjusting a phase of the backward data according to a phase of the first clock. | 2,400 |
8,847 | 8,847 | 12,936,332 | 2,432 | A method, apparatus and computer program product are provided to provide cryptographical key separation for handovers. A method is provided which includes calculating a key based at least in part upon a previously stored first intermediary value. The method also includes calculating a second intermediary value based at least in part upon the calculated key. The method additionally includes sending a path switch acknowledgement including the second intermediary value to a target access point. The method may further include receiving a path switch message including an indication of a cell identification and calculating the encryption key based upon the indication of the cell identification. The method may further include storing the second intermediary value. The calculation of the key may further comprise calculating the key following a radio link handover. Corresponding apparatuses and computer program products are also provided. | 1.-49. (canceled) 50. An apparatus comprising a processor and a memory storing executable instructions that when executed by the processor cause the apparatus to at least:
calculate, in response to a handover of a user equipment device from a source access point to a target access point, a key based at least in part upon a previously stored first intermediary value; calculate a second intermediary value based at least in part upon the calculated key; and send a path switch acknowledgement message including the second intermediary value to the target access point for use in a subsequent handover of the user equipment device. 51. The apparatus of claim 50, wherein the executable instructions when executed further cause the apparatus to receive a path switch message from the target access point; and
wherein the executable instructions when executed cause the apparatus to calculate the key in response to receipt of the path switch message. 52. The apparatus of claim 51, wherein the path switch message comprises an indication of a cell identification; and wherein
the executable instructions when executed cause the apparatus to calculate the key by calculating the key based at least in part upon the cell identification and the previously stored first intermediary value. 53. The apparatus of claim 51, wherein the path switch message has been protected by the target access point based at least in part upon the first intermediary value; and
wherein the executable instructions when executed further cause the apparatus to verify the path switch message based at least in part upon the first intermediary value prior to calculating the key. 54. The apparatus of claim 50, wherein the executable instructions when executed cause the apparatus to calculate the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context. 55. The apparatus of claim 50, wherein the executable instructions when executed further cause the apparatus to store the second intermediary value in the memory. 56. The apparatus of claim 50, wherein the executable instructions when executed cause the apparatus to calculate the key following a radio link handover of the user equipment device. 57. An apparatus comprising a processor and a memory storing executable instructions that when executed by the processor cause the apparatus to at least:
receive a handover command from a source access point; calculate, in response to receipt of the handover command, a key based at least in part upon a first intermediary value; and calculate a second intermediary value based at least in part upon the first intermediary value, wherein the second intermediary value is to be used for calculation of one or more keys in a subsequent handover. 58. The apparatus of claim 57, wherein the handover command further comprises an indication of a cell identification; and wherein
the executable instructions when executed cause the apparatus to calculate the key by calculating the key based at least in part upon the cell identification and the first intermediary value. 59. The apparatus of claim 57, wherein the executable instructions when executed cause the apparatus to calculate the second intermediary value by calculating the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context. 60. The apparatus of claim 57, wherein the handover command indicates a handover of a user equipment device from the source access point to a target access point. 61. The apparatus of claim 57, wherein the executable instructions when executed further cause the apparatus to use the calculated key to facilitate communications with a target access point following handover. 62. The apparatus of claim 57, wherein the executable instructions when executed further cause the apparatus to store the second intermediary value in the memory. 63. A computer program product comprising at least one computer-readable storage medium having computer-readable program instructions stored therein, the computer-readable program instructions comprising:
a program instruction for calculating, in response to a handover of a user equipment device from a source access point to a target access point, a key based at least in part upon a previously stored first intermediary value; a program instruction for calculating a second intermediary value based at least in part upon the calculated key; and a program instruction for sending a path switch acknowledgement message including the second intermediary value to the target access point for use in a subsequent handover of the user equipment device. 64. The computer program product of claim 63, further comprising:
a program instruction for receiving a path switch message from the target access point; and wherein the program instruction for calculating the key comprises instructions for calculating the key in response to receipt of the path switch message. 65. The computer program product of claim 64, wherein:
the program instruction for receiving a path switch message further comprises instructions for receiving a path switch message comprising an indication of a cell identification; and the program instruction for calculating the key comprises instructions for calculating the key based at least in part upon the cell identification and the previously stored first intermediary value. 66. The computer program product of claim 64, wherein the program instruction for receiving a path switch message further comprises instructions for receiving a path switch message that has been protected by the target access point based at least in part upon the first intermediary value; and further comprising:
a program instruction for verifying the path switch message based at least in part upon the first intermediary value prior to calculating the key. 67. The computer program product of claim 63, wherein the program instruction for calculating the second intermediary value comprises instructions for calculating the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context known by the user equipment device. 68. The computer program product of claim 63, further comprising a program instruction for storing the second intermediary value in a memory. 69. The computer program product of claim 63, wherein the program instruction for calculating a key comprises instructions for calculating the key following a radio link handover of the user equipment device. 70. A computer program product comprising at least one computer-readable storage medium having computer-readable program instructions stored therein, the computer-readable program instructions comprising:
a program instruction for receiving a handover command from a source access point; a program instruction for calculating, in response to receipt of the handover command, a key based at least in part upon a first intermediary value; and a program instruction for calculating a second intermediary value based at least in part upon the first intermediary value, wherein the second intermediary value is to be used for calculation of one or more keys in a subsequent handover. 71. The computer program product of claim 70, wherein the handover command further comprises an indication of a cell identification; and wherein
the program instruction for calculating the key comprises instructions for calculating the key based at least in part upon the cell identification and the first intermediary value. 72. The computer program product of claim 70, wherein the program instruction for calculating the second intermediary value comprises instructions for calculating the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context. 73. The computer program product of claim 70, wherein the handover command indicates a handover of a user equipment device from the source access point to a target access point. 74. The computer program product of claim 70, further comprising a program instruction for using the calculated key to facilitate communications with a target access point following handover. 75. The computer program product of claim 70, further comprising a program instruction for storing the second intermediary value in a memory. | A method, apparatus and computer program product are provided to provide cryptographical key separation for handovers. A method is provided which includes calculating a key based at least in part upon a previously stored first intermediary value. The method also includes calculating a second intermediary value based at least in part upon the calculated key. The method additionally includes sending a path switch acknowledgement including the second intermediary value to a target access point. The method may further include receiving a path switch message including an indication of a cell identification and calculating the encryption key based upon the indication of the cell identification. The method may further include storing the second intermediary value. The calculation of the key may further comprise calculating the key following a radio link handover. Corresponding apparatuses and computer program products are also provided.1.-49. (canceled) 50. An apparatus comprising a processor and a memory storing executable instructions that when executed by the processor cause the apparatus to at least:
calculate, in response to a handover of a user equipment device from a source access point to a target access point, a key based at least in part upon a previously stored first intermediary value; calculate a second intermediary value based at least in part upon the calculated key; and send a path switch acknowledgement message including the second intermediary value to the target access point for use in a subsequent handover of the user equipment device. 51. The apparatus of claim 50, wherein the executable instructions when executed further cause the apparatus to receive a path switch message from the target access point; and
wherein the executable instructions when executed cause the apparatus to calculate the key in response to receipt of the path switch message. 52. The apparatus of claim 51, wherein the path switch message comprises an indication of a cell identification; and wherein
the executable instructions when executed cause the apparatus to calculate the key by calculating the key based at least in part upon the cell identification and the previously stored first intermediary value. 53. The apparatus of claim 51, wherein the path switch message has been protected by the target access point based at least in part upon the first intermediary value; and
wherein the executable instructions when executed further cause the apparatus to verify the path switch message based at least in part upon the first intermediary value prior to calculating the key. 54. The apparatus of claim 50, wherein the executable instructions when executed cause the apparatus to calculate the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context. 55. The apparatus of claim 50, wherein the executable instructions when executed further cause the apparatus to store the second intermediary value in the memory. 56. The apparatus of claim 50, wherein the executable instructions when executed cause the apparatus to calculate the key following a radio link handover of the user equipment device. 57. An apparatus comprising a processor and a memory storing executable instructions that when executed by the processor cause the apparatus to at least:
receive a handover command from a source access point; calculate, in response to receipt of the handover command, a key based at least in part upon a first intermediary value; and calculate a second intermediary value based at least in part upon the first intermediary value, wherein the second intermediary value is to be used for calculation of one or more keys in a subsequent handover. 58. The apparatus of claim 57, wherein the handover command further comprises an indication of a cell identification; and wherein
the executable instructions when executed cause the apparatus to calculate the key by calculating the key based at least in part upon the cell identification and the first intermediary value. 59. The apparatus of claim 57, wherein the executable instructions when executed cause the apparatus to calculate the second intermediary value by calculating the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context. 60. The apparatus of claim 57, wherein the handover command indicates a handover of a user equipment device from the source access point to a target access point. 61. The apparatus of claim 57, wherein the executable instructions when executed further cause the apparatus to use the calculated key to facilitate communications with a target access point following handover. 62. The apparatus of claim 57, wherein the executable instructions when executed further cause the apparatus to store the second intermediary value in the memory. 63. A computer program product comprising at least one computer-readable storage medium having computer-readable program instructions stored therein, the computer-readable program instructions comprising:
a program instruction for calculating, in response to a handover of a user equipment device from a source access point to a target access point, a key based at least in part upon a previously stored first intermediary value; a program instruction for calculating a second intermediary value based at least in part upon the calculated key; and a program instruction for sending a path switch acknowledgement message including the second intermediary value to the target access point for use in a subsequent handover of the user equipment device. 64. The computer program product of claim 63, further comprising:
a program instruction for receiving a path switch message from the target access point; and wherein the program instruction for calculating the key comprises instructions for calculating the key in response to receipt of the path switch message. 65. The computer program product of claim 64, wherein:
the program instruction for receiving a path switch message further comprises instructions for receiving a path switch message comprising an indication of a cell identification; and the program instruction for calculating the key comprises instructions for calculating the key based at least in part upon the cell identification and the previously stored first intermediary value. 66. The computer program product of claim 64, wherein the program instruction for receiving a path switch message further comprises instructions for receiving a path switch message that has been protected by the target access point based at least in part upon the first intermediary value; and further comprising:
a program instruction for verifying the path switch message based at least in part upon the first intermediary value prior to calculating the key. 67. The computer program product of claim 63, wherein the program instruction for calculating the second intermediary value comprises instructions for calculating the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context known by the user equipment device. 68. The computer program product of claim 63, further comprising a program instruction for storing the second intermediary value in a memory. 69. The computer program product of claim 63, wherein the program instruction for calculating a key comprises instructions for calculating the key following a radio link handover of the user equipment device. 70. A computer program product comprising at least one computer-readable storage medium having computer-readable program instructions stored therein, the computer-readable program instructions comprising:
a program instruction for receiving a handover command from a source access point; a program instruction for calculating, in response to receipt of the handover command, a key based at least in part upon a first intermediary value; and a program instruction for calculating a second intermediary value based at least in part upon the first intermediary value, wherein the second intermediary value is to be used for calculation of one or more keys in a subsequent handover. 71. The computer program product of claim 70, wherein the handover command further comprises an indication of a cell identification; and wherein
the program instruction for calculating the key comprises instructions for calculating the key based at least in part upon the cell identification and the first intermediary value. 72. The computer program product of claim 70, wherein the program instruction for calculating the second intermediary value comprises instructions for calculating the second intermediary value based at least in part upon the calculated key, the first intermediary value, and KASME, wherein the KASME is part of a security context. 73. The computer program product of claim 70, wherein the handover command indicates a handover of a user equipment device from the source access point to a target access point. 74. The computer program product of claim 70, further comprising a program instruction for using the calculated key to facilitate communications with a target access point following handover. 75. The computer program product of claim 70, further comprising a program instruction for storing the second intermediary value in a memory. | 2,400 |
8,848 | 8,848 | 14,821,040 | 2,483 | Systems, devices, features, and methods for detecting common geographic features in images, such as, for example, to develop a navigation database are disclosed. For example, a method of detecting a common text pattern, such as for a road or path sign, from collected images includes collecting a plurality of images of geographic areas along a road or path. An image of the plurality of images is selected. Components that correspond to an object about the road or path in the selected image are determined. In one embodiment, the determined components are independent or invariant to scale of the object. The determined components are compared to reference components in a data library. If the determined components substantially match the reference components, the object in the selected image is identified to be a common pattern, such as for a standard road or path sign, corresponding to the reference components in the data library. | 1. A non-transitory computer readable medium configured to store a computer program that performs a method of identifying a commonly labeled path sign in an image corresponding to a path, the method comprising:
identifying a standard path sign in an image of a path; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a text pattern of the standard path sign; storing the data components that correspond to the standard path sign in a navigation library of a map database developer; selecting another image representing another path; determining scale-invariant components of the other image; and comparing the determined scale-invariant components of the other image with the data components stored in the navigation library to determine if the other image includes a path sign substantially similar to the standard path sign. 2. The non-transitory computer readable medium of claim 1, the method further comprising:
generating a modification for a navigational database based on the comparison. 3. The non-transitory computer readable medium of claim 1, wherein the standard path sign comprises a speed limit sign or a stop sign. 4. The non-transitory computer readable medium of claim 1, wherein determining the scale-invariant components of the standard path sign comprises:
determining amplitude extrema in regions of a difference image, the difference image comprising an image generated from a difference between the image of the path and a blurred image of the path. 5. The non-transitory computer readable medium of claim 1, wherein the data components are substantially invariant to rotation. 6. The non-transitory computer readable medium of claim 1, wherein the data components are substantially invariant to illumination. 7. The non-transitory computer readable medium of claim 1, further comprising:
if the determined scale-invariant components substantially match the data components in the navigation library, providing identification of the selected other image to the map database developer. 8. The non-transitory computer readable medium of claim 7, wherein providing the identification includes providing a text file. 9. The non-transitory computer readable medium of claim 8, wherein the text file includes location information of where the selected other image was taken. 10. A method comprising:
identifying a path sign in an image of a path; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a pattern of the standard path sign; performing a comparison of the data components that correspond to the standard path sign to a navigation library to determine if the other image includes the path sign; and generating a modification for a navigational database based on the comparison. 11. The method of claim 10, further comprising:
identifying a standard path sign in an image; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a pattern of the standard path sign; and storing the data components that correspond to the standard path sign in a navigation library. 12. The method of claim 10, wherein the path sign comprises a speed limit sign or a stop sign. 13. The method of claim 10, wherein determining the scale-invariant components of the path sign comprises:
determining amplitude extrema in regions of a difference image, the difference image comprising an image generated from a difference between the image of the path and a blurred image of the path. 14. The method of claim 10, wherein the data components are substantially invariant to rotation. 15. The method of claim 10, wherein the data components are substantially invariant to illumination. 16. The method of claim 1, wherein the modification to the navigational database includes a speed limit assigned to a road segment. 17. The method of claim 1, wherein the modification to the navigational database includes a road marking or a street name. 18. The method of claim 1, wherein the modification to the navigational database includes turn restrictions at intersections. 19. The method of claim 1, wherein the modification to the navigational database includes a point of interest name. 20. An apparatus comprising:
at least one processor; and at least one memory including computer program code for one or more programs; the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least perform: identifying a standard path sign in an image of a path; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a pattern of the standard path sign; storing the data components that correspond to the standard path sign in a navigation library of a map database developer; selecting another image representing another path; determining scale-invariant components of the other image; comparing the determined scale-invariant components of the other image with the data components stored in the navigation library to determine if the other image matches the standard path sign. | Systems, devices, features, and methods for detecting common geographic features in images, such as, for example, to develop a navigation database are disclosed. For example, a method of detecting a common text pattern, such as for a road or path sign, from collected images includes collecting a plurality of images of geographic areas along a road or path. An image of the plurality of images is selected. Components that correspond to an object about the road or path in the selected image are determined. In one embodiment, the determined components are independent or invariant to scale of the object. The determined components are compared to reference components in a data library. If the determined components substantially match the reference components, the object in the selected image is identified to be a common pattern, such as for a standard road or path sign, corresponding to the reference components in the data library.1. A non-transitory computer readable medium configured to store a computer program that performs a method of identifying a commonly labeled path sign in an image corresponding to a path, the method comprising:
identifying a standard path sign in an image of a path; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a text pattern of the standard path sign; storing the data components that correspond to the standard path sign in a navigation library of a map database developer; selecting another image representing another path; determining scale-invariant components of the other image; and comparing the determined scale-invariant components of the other image with the data components stored in the navigation library to determine if the other image includes a path sign substantially similar to the standard path sign. 2. The non-transitory computer readable medium of claim 1, the method further comprising:
generating a modification for a navigational database based on the comparison. 3. The non-transitory computer readable medium of claim 1, wherein the standard path sign comprises a speed limit sign or a stop sign. 4. The non-transitory computer readable medium of claim 1, wherein determining the scale-invariant components of the standard path sign comprises:
determining amplitude extrema in regions of a difference image, the difference image comprising an image generated from a difference between the image of the path and a blurred image of the path. 5. The non-transitory computer readable medium of claim 1, wherein the data components are substantially invariant to rotation. 6. The non-transitory computer readable medium of claim 1, wherein the data components are substantially invariant to illumination. 7. The non-transitory computer readable medium of claim 1, further comprising:
if the determined scale-invariant components substantially match the data components in the navigation library, providing identification of the selected other image to the map database developer. 8. The non-transitory computer readable medium of claim 7, wherein providing the identification includes providing a text file. 9. The non-transitory computer readable medium of claim 8, wherein the text file includes location information of where the selected other image was taken. 10. A method comprising:
identifying a path sign in an image of a path; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a pattern of the standard path sign; performing a comparison of the data components that correspond to the standard path sign to a navigation library to determine if the other image includes the path sign; and generating a modification for a navigational database based on the comparison. 11. The method of claim 10, further comprising:
identifying a standard path sign in an image; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a pattern of the standard path sign; and storing the data components that correspond to the standard path sign in a navigation library. 12. The method of claim 10, wherein the path sign comprises a speed limit sign or a stop sign. 13. The method of claim 10, wherein determining the scale-invariant components of the path sign comprises:
determining amplitude extrema in regions of a difference image, the difference image comprising an image generated from a difference between the image of the path and a blurred image of the path. 14. The method of claim 10, wherein the data components are substantially invariant to rotation. 15. The method of claim 10, wherein the data components are substantially invariant to illumination. 16. The method of claim 1, wherein the modification to the navigational database includes a speed limit assigned to a road segment. 17. The method of claim 1, wherein the modification to the navigational database includes a road marking or a street name. 18. The method of claim 1, wherein the modification to the navigational database includes turn restrictions at intersections. 19. The method of claim 1, wherein the modification to the navigational database includes a point of interest name. 20. An apparatus comprising:
at least one processor; and at least one memory including computer program code for one or more programs; the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least perform: identifying a standard path sign in an image of a path; determining data components that correspond to the standard path sign, the data components being scale-invariant components representing a pattern of the standard path sign; storing the data components that correspond to the standard path sign in a navigation library of a map database developer; selecting another image representing another path; determining scale-invariant components of the other image; comparing the determined scale-invariant components of the other image with the data components stored in the navigation library to determine if the other image matches the standard path sign. | 2,400 |
8,849 | 8,849 | 14,684,172 | 2,486 | This disclosure relates to a system configured to facilitate remote verification of alarm events. Responsive to detection of an alarm event at a location of interest, clips of security video information and/or substantially real-time images may be presented to an end user on a user device associated with the end user, and/or to a reviewer via a central station, to facilitate determination of whether or not the detected alarm event is false. The system is configured to facilitate remote verification of alarm events by the end user and/or the reviewer while still protecting the privacy of the end user. The system may be configured to allow review of the clips and/or the substantially live images by the reviewer at the central station only responsive to detection of an alarm event, and only for a temporary period of time following the detection of the alarm event. | 1. A system configured to facilitate remote verification of alarm events by an end user, the system comprising one or more physical computer processors configured by computer readable instructions to:
receive security video information from one or more cameras monitoring a location of interest; determine whether an alarm event has occurred for the location of interest; and responsive to determining that an alarm event has occurred:
cause electronic recording of one or more clips of security video information from the one or more cameras monitoring the location of interest, an individual clip comprising security video information from an individual camera for a period of time that corresponds to a time of the determined alarm event;
cause a user device associated with the end user to present a selectable list of the clips to the end user for review;
cause the user device associated with the end user to present substantially real-time images from the one or more cameras to the end user for review, wherein an individual substantially real-time image is associated with an individual camera;
facilitate determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event based on the clips and the substantially real-time images; and facilitate communication of verification information that indicates the determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event from the user device. 2. The system of claim 1, wherein the one or more physical computer processors are configured such that determining whether an alarm event has occurred for the location of interest includes receiving an indication that an alarm event has occurred from a security system monitoring the location of interest. 3. The system of claim 1, wherein the one or more physical computer processors are configured such that determining whether an alarm event has occurred for the location of interest includes:
determining one or more alarm event parameters based on the security video information from the one or more cameras; obtaining alarm event criteria that describe alarm events at the location of interest; and detecting an alarm event responsive to one or more alarm event parameters satisfying one or more alarm event criteria. 4. The system of claim 1, further comprising non-transient electronic storage configured to store the one or more clips of security video information. 5. The system of claim 1, wherein the one or more physical computer processors are configured such that at least one clip includes security video information from a period of time that includes the time of the determined alarm event. 6. The system of claim 1, wherein the one or more physical computer processors are configured such that the substantially real-time images presented to the end user are streaming images from the one or more cameras. 7. The system of claim 1, wherein the one or more physical computer processors are configured such that the substantially real-time images presented to the end user are images updated responsive to requests from the end user. 8. The system of claim 1, wherein the one or more physical computer processors are configured such that the substantially real-time images presented to the end user are updated up to about five times per second. 9. The system of claim 1, wherein the one or more physical computer processors are configured to allow the end user to direct the system to store one or more of the clips in the selectable list for a predetermined period of time. 10. The system of claim 1, wherein the one or more physical computer processors are configured to allow the end user to direct the system to store one or more of the substantially real-time images for a predetermined period of time. 11. The system of claim 1, wherein the one or more physical computer processors are further configured, responsive to determining that an alarm event has occurred, to generate substantially real-time image information for the one or more cameras, and then cause the user device associated with the end user to present the substantially real-time images from the one or more cameras based on the generated substantially real-time image information. 12. A method for facilitating remote verification of alarm events by an end user, the method comprising:
receiving security video information from one or more cameras monitoring a location of interest; determining whether an alarm event has occurred for the location of interest; and responsive to determining that an alarm event has occurred:
causing electronic recording of one or more clips of security video information from the one or more cameras monitoring the location of interest, an individual clip comprising security video information from an individual camera for a period of time that corresponds to a time of the determined alarm event;
causing a user device associated with the end user to present a selectable list of the clips to the end user for review;
causing the user device associated with the end user to present substantially real-time images from the one or more cameras to the end user for review, wherein an individual substantially real-time image is associated with an individual camera;
facilitating determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event based on the clips and the substantially real-time images; and
facilitating communication of verification information that indicates the determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event from the user device. 13. The method of claim 12, wherein determining whether an alarm event has occurred for the location of interest includes receiving an indication that an alarm event has occurred from a security system monitoring the location of interest. 14. The method of claim 12, wherein determining whether an alarm event has occurred for the location of interest includes:
determining one or more alarm event parameters based on the security video information from the one or more cameras; obtaining alarm event criteria that describe alarm events at the location of interest; and detecting an alarm event responsive to one or more alarm event parameters satisfying one or more alarm event criteria. 15. The method of claim 12, further comprising storing the one or more clips of security video information in non-transient electronic storage. 16. The method of claim 12, wherein at least one clip includes security video information from a period of time that includes the time of the determined alarm event. 17. The method of claim 12, wherein the substantially real-time images presented to the end user are streaming images from the one or more cameras. 18. The method of claim 12, wherein the substantially real-time images presented to the end user are images updated responsive to requests from the end user. 19. The method of claim 12, wherein the substantially real-time images presented to the end user are updated up to about five times per second. 20. The method of claim 12, further comprising allowing the end user to direct electronic storage of one or more of the clips in the selectable list for a predetermined period of time. 21. The method of claim 12, further comprising allowing the end user to direct electronic storage of one or more of the substantially real-time images for a predetermined period of time. 22. The method of claim 12, wherein the one or more physical computer processors are further configured, responsive to determining that an alarm event has occurred, to generate substantially real-time image information for the one or more cameras, and then cause the user device associated with the end user to present the substantially real-time images from the one or more cameras based on the generated substantially real-time image information. | This disclosure relates to a system configured to facilitate remote verification of alarm events. Responsive to detection of an alarm event at a location of interest, clips of security video information and/or substantially real-time images may be presented to an end user on a user device associated with the end user, and/or to a reviewer via a central station, to facilitate determination of whether or not the detected alarm event is false. The system is configured to facilitate remote verification of alarm events by the end user and/or the reviewer while still protecting the privacy of the end user. The system may be configured to allow review of the clips and/or the substantially live images by the reviewer at the central station only responsive to detection of an alarm event, and only for a temporary period of time following the detection of the alarm event.1. A system configured to facilitate remote verification of alarm events by an end user, the system comprising one or more physical computer processors configured by computer readable instructions to:
receive security video information from one or more cameras monitoring a location of interest; determine whether an alarm event has occurred for the location of interest; and responsive to determining that an alarm event has occurred:
cause electronic recording of one or more clips of security video information from the one or more cameras monitoring the location of interest, an individual clip comprising security video information from an individual camera for a period of time that corresponds to a time of the determined alarm event;
cause a user device associated with the end user to present a selectable list of the clips to the end user for review;
cause the user device associated with the end user to present substantially real-time images from the one or more cameras to the end user for review, wherein an individual substantially real-time image is associated with an individual camera;
facilitate determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event based on the clips and the substantially real-time images; and facilitate communication of verification information that indicates the determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event from the user device. 2. The system of claim 1, wherein the one or more physical computer processors are configured such that determining whether an alarm event has occurred for the location of interest includes receiving an indication that an alarm event has occurred from a security system monitoring the location of interest. 3. The system of claim 1, wherein the one or more physical computer processors are configured such that determining whether an alarm event has occurred for the location of interest includes:
determining one or more alarm event parameters based on the security video information from the one or more cameras; obtaining alarm event criteria that describe alarm events at the location of interest; and detecting an alarm event responsive to one or more alarm event parameters satisfying one or more alarm event criteria. 4. The system of claim 1, further comprising non-transient electronic storage configured to store the one or more clips of security video information. 5. The system of claim 1, wherein the one or more physical computer processors are configured such that at least one clip includes security video information from a period of time that includes the time of the determined alarm event. 6. The system of claim 1, wherein the one or more physical computer processors are configured such that the substantially real-time images presented to the end user are streaming images from the one or more cameras. 7. The system of claim 1, wherein the one or more physical computer processors are configured such that the substantially real-time images presented to the end user are images updated responsive to requests from the end user. 8. The system of claim 1, wherein the one or more physical computer processors are configured such that the substantially real-time images presented to the end user are updated up to about five times per second. 9. The system of claim 1, wherein the one or more physical computer processors are configured to allow the end user to direct the system to store one or more of the clips in the selectable list for a predetermined period of time. 10. The system of claim 1, wherein the one or more physical computer processors are configured to allow the end user to direct the system to store one or more of the substantially real-time images for a predetermined period of time. 11. The system of claim 1, wherein the one or more physical computer processors are further configured, responsive to determining that an alarm event has occurred, to generate substantially real-time image information for the one or more cameras, and then cause the user device associated with the end user to present the substantially real-time images from the one or more cameras based on the generated substantially real-time image information. 12. A method for facilitating remote verification of alarm events by an end user, the method comprising:
receiving security video information from one or more cameras monitoring a location of interest; determining whether an alarm event has occurred for the location of interest; and responsive to determining that an alarm event has occurred:
causing electronic recording of one or more clips of security video information from the one or more cameras monitoring the location of interest, an individual clip comprising security video information from an individual camera for a period of time that corresponds to a time of the determined alarm event;
causing a user device associated with the end user to present a selectable list of the clips to the end user for review;
causing the user device associated with the end user to present substantially real-time images from the one or more cameras to the end user for review, wherein an individual substantially real-time image is associated with an individual camera;
facilitating determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event based on the clips and the substantially real-time images; and
facilitating communication of verification information that indicates the determination by the end user of whether the determined alarm event is a false alarm event or a verified alarm event from the user device. 13. The method of claim 12, wherein determining whether an alarm event has occurred for the location of interest includes receiving an indication that an alarm event has occurred from a security system monitoring the location of interest. 14. The method of claim 12, wherein determining whether an alarm event has occurred for the location of interest includes:
determining one or more alarm event parameters based on the security video information from the one or more cameras; obtaining alarm event criteria that describe alarm events at the location of interest; and detecting an alarm event responsive to one or more alarm event parameters satisfying one or more alarm event criteria. 15. The method of claim 12, further comprising storing the one or more clips of security video information in non-transient electronic storage. 16. The method of claim 12, wherein at least one clip includes security video information from a period of time that includes the time of the determined alarm event. 17. The method of claim 12, wherein the substantially real-time images presented to the end user are streaming images from the one or more cameras. 18. The method of claim 12, wherein the substantially real-time images presented to the end user are images updated responsive to requests from the end user. 19. The method of claim 12, wherein the substantially real-time images presented to the end user are updated up to about five times per second. 20. The method of claim 12, further comprising allowing the end user to direct electronic storage of one or more of the clips in the selectable list for a predetermined period of time. 21. The method of claim 12, further comprising allowing the end user to direct electronic storage of one or more of the substantially real-time images for a predetermined period of time. 22. The method of claim 12, wherein the one or more physical computer processors are further configured, responsive to determining that an alarm event has occurred, to generate substantially real-time image information for the one or more cameras, and then cause the user device associated with the end user to present the substantially real-time images from the one or more cameras based on the generated substantially real-time image information. | 2,400 |
8,850 | 8,850 | 15,114,478 | 2,482 | The decode time of big frames may be reduced by starting big frame decoding much earlier than normal decoding order. In a multi-threaded decoder, decoding one frame can be divided into several stages and stages of different frames can run in parallel like a pipeline. The first stage may be the token parser which is the most time consuming among all the stages because it is sensitive to bitstream size. If one or more stages of big frame decoding can be done much earlier than normal decoding order, the decode time spent exclusively on the big frame (not including the time shared with other frame decoding) may be much less in some embodiments. In this way, big frame decoding time may be reduced and in addition, depending on how big the big frame is, the decoder control can control how early to start decoding, so that frame drops caused by big frames can be reduced or eliminated. | 1. A method comprising:
determining whether there is a probability adaption dependency; if there is a dependency, removing said dependency; and determining a number of frames to early decode. 2. The method of claim 1 including determining a number of frames to decode by comparing a key frame size to an average frame size and early decoding only key frames, when there is no dependency. 3. The method of claim 1 including determining a number of frames to early decode by comparing a big frame size to an average frame size to a reference. 4. The method of claim 1 including performing VP9 decoding. 5. The method of claim 1 including token parsing different frames in parallel. 6. The method of claim 1, including removing probability adaptation dependency by parsing motion vectors and segment identifiers in a token parser and deriving motion vectors and segment identifiers in an in-loop filter. 7. The method of claim 1 including deciding when a dependency exists by checking a dependency condition. 8. The method of claim 8 including checking the condition:
Key frame∥error_resilient_mode==true∥(intra_only && reset_frame_context==3)∥
(intra_only && reset_frame_context==2 && frame_context_idx==0) 9. One or more non-transitory computer readable media storing instructions to perform a sequence comprising:
determining whether there is a probability adaption dependency; if there is a dependency, removing said dependency; and determining a number of frames to early decode. 10. The media of claim 9, further storing instructions to perform a sequence including determining a number of frames to decode by comparing a key frame size to an average frame size and early decoding only key frames, when there is no dependency. 11. The media of claim 9, further storing instructions to perform a sequence including determining a number of frames to early decode by comparing a big frame size to an average frame size to a reference. 12. The media of claim 9, further storing instructions to perform a sequence including performing VP9 decoding. 13. The media of claim 9, further storing instructions to perform a sequence including token parsing different frames in parallel. 14. The media of claim 9, further storing instructions to perform a sequence including removing probability adaptation dependency by parsing motion vectors and segment identifiers in a token parser and deriving motion vectors and segment identifiers in an in-loop filter. 15. The media of claim 9, further storing instructions to perform a sequence including deciding when a dependency exists by checking a dependency condition. 16. The media of claim 15, further storing instructions to perform a sequence including checking the condition:
Key frame∥error_resilient_mode==true∥(intra_only && reset_frame_context==3)∥ (intra_only && reset_frame_context==2 && frame_context_idx==0) 17. An apparatus comprising:
a processor to determine whether there is a probability adaption dependency, if there is a dependency, remove said dependency, and determine a number of frames to early decode; and a memory coupled to said processor. 18. The apparatus of claim 17, said processor to determine a number of frames to decode by comparing a key frame size to an average frame size and early decoding only key frames, when there is no dependency. 19. The apparatus of claim 17, said processor to determine a number of frames to early decode by comparing a big frame size to an average frame size to a reference. 20. The apparatus of claim 17, said processor to perform VP9 decoding. 21. The apparatus of claim 17, said processor to token parse different frames in parallel. 22. The apparatus of claim 17, said processor to remove probability adaptation dependency by parsing motion vectors and segment identifiers in a token parser and deriving motion vectors and segment identifiers in an in-loop filter. 23. The apparatus of claim 17, said processor to decide when a dependency exists by checking a dependency condition. 24. The apparatus of claim 23, said processor to check the condition:
Key frame∥error_resilient_mode==true∥(intra_only && reset_frame_context==3)∥ (intra_only && reset_frame_context==2 && frame_context_idx==0) 25. The apparatus of claim 17 including a battery coupled to the processor. 26. The apparatus of claim 19 including firmware and a module to update said firmware. | The decode time of big frames may be reduced by starting big frame decoding much earlier than normal decoding order. In a multi-threaded decoder, decoding one frame can be divided into several stages and stages of different frames can run in parallel like a pipeline. The first stage may be the token parser which is the most time consuming among all the stages because it is sensitive to bitstream size. If one or more stages of big frame decoding can be done much earlier than normal decoding order, the decode time spent exclusively on the big frame (not including the time shared with other frame decoding) may be much less in some embodiments. In this way, big frame decoding time may be reduced and in addition, depending on how big the big frame is, the decoder control can control how early to start decoding, so that frame drops caused by big frames can be reduced or eliminated.1. A method comprising:
determining whether there is a probability adaption dependency; if there is a dependency, removing said dependency; and determining a number of frames to early decode. 2. The method of claim 1 including determining a number of frames to decode by comparing a key frame size to an average frame size and early decoding only key frames, when there is no dependency. 3. The method of claim 1 including determining a number of frames to early decode by comparing a big frame size to an average frame size to a reference. 4. The method of claim 1 including performing VP9 decoding. 5. The method of claim 1 including token parsing different frames in parallel. 6. The method of claim 1, including removing probability adaptation dependency by parsing motion vectors and segment identifiers in a token parser and deriving motion vectors and segment identifiers in an in-loop filter. 7. The method of claim 1 including deciding when a dependency exists by checking a dependency condition. 8. The method of claim 8 including checking the condition:
Key frame∥error_resilient_mode==true∥(intra_only && reset_frame_context==3)∥
(intra_only && reset_frame_context==2 && frame_context_idx==0) 9. One or more non-transitory computer readable media storing instructions to perform a sequence comprising:
determining whether there is a probability adaption dependency; if there is a dependency, removing said dependency; and determining a number of frames to early decode. 10. The media of claim 9, further storing instructions to perform a sequence including determining a number of frames to decode by comparing a key frame size to an average frame size and early decoding only key frames, when there is no dependency. 11. The media of claim 9, further storing instructions to perform a sequence including determining a number of frames to early decode by comparing a big frame size to an average frame size to a reference. 12. The media of claim 9, further storing instructions to perform a sequence including performing VP9 decoding. 13. The media of claim 9, further storing instructions to perform a sequence including token parsing different frames in parallel. 14. The media of claim 9, further storing instructions to perform a sequence including removing probability adaptation dependency by parsing motion vectors and segment identifiers in a token parser and deriving motion vectors and segment identifiers in an in-loop filter. 15. The media of claim 9, further storing instructions to perform a sequence including deciding when a dependency exists by checking a dependency condition. 16. The media of claim 15, further storing instructions to perform a sequence including checking the condition:
Key frame∥error_resilient_mode==true∥(intra_only && reset_frame_context==3)∥ (intra_only && reset_frame_context==2 && frame_context_idx==0) 17. An apparatus comprising:
a processor to determine whether there is a probability adaption dependency, if there is a dependency, remove said dependency, and determine a number of frames to early decode; and a memory coupled to said processor. 18. The apparatus of claim 17, said processor to determine a number of frames to decode by comparing a key frame size to an average frame size and early decoding only key frames, when there is no dependency. 19. The apparatus of claim 17, said processor to determine a number of frames to early decode by comparing a big frame size to an average frame size to a reference. 20. The apparatus of claim 17, said processor to perform VP9 decoding. 21. The apparatus of claim 17, said processor to token parse different frames in parallel. 22. The apparatus of claim 17, said processor to remove probability adaptation dependency by parsing motion vectors and segment identifiers in a token parser and deriving motion vectors and segment identifiers in an in-loop filter. 23. The apparatus of claim 17, said processor to decide when a dependency exists by checking a dependency condition. 24. The apparatus of claim 23, said processor to check the condition:
Key frame∥error_resilient_mode==true∥(intra_only && reset_frame_context==3)∥ (intra_only && reset_frame_context==2 && frame_context_idx==0) 25. The apparatus of claim 17 including a battery coupled to the processor. 26. The apparatus of claim 19 including firmware and a module to update said firmware. | 2,400 |
8,851 | 8,851 | 15,436,951 | 2,444 | An electronic mail computing system has a smart reply system that that enables a smart reply feature that surfaces a user input mechanism that allows a user to reply to an e-mail message without downloading full content of the e-mail message to the user's client computing system. A draft roaming system interacts with the client computing system to allow a plurality of different user devices to access a draft electronic mail message, and interacts with the smart reply system so a draft can be generated using the smart reply feature. | 1. A computing system, comprising:
electronic mail (email) functionality on an email service that determines that a user is generating, on a first client device, a draft response to an email message in a mailbox for the user, the email message including a full content portion; a smart reply system that truncates the email message, to obtain a truncated email message that is less than the full content portion of the email message, and sends the truncated email message to the first client device for generation of the draft response; and a draft roaming system that saves the draft response on the email service for access by the user from a second client device, the smart reply system sending the truncated message and a unique portion of the draft response, entered in the draft response, to the second client device in response to detection of the user accessing the draft response from the second client device. 2. The computing system of claim 1 wherein the smart reply system comprises:
full message generation logic configured to detect actuation of a send actuator to send the draft response and to generate a full message including the unique portion of the draft response and the full content portion of the email message, the email functionality sending the full message. 3. The computing system of claim 2 wherein the smart reply system comprises:
message truncation logic configured to generate the truncated message; and
smart reply detection logic configured to detect a smart reply input from the first client device and, in response, control the message truncation logic to generate the truncated message. 4. The computing system of claim 3 wherein the smart reply system comprises:
draft change detector logic configured to detect a change in the full content portion of the draft response and control the draft roaming system to send the full content portion of the draft response, along with the unique portion, to the second client device in response to detection of the user accessing the draft response from the second client device. 5. The computing system of claim 3 wherein the draft roaming system comprises:
draft maintenance logic configured to save the draft response on the email service as a draft in the mailbox for the user with a smart reply indicator indicating that the smart reply input, corresponding to the draft response, was detected by the smart reply detection logic. 6. The computing system of claim 5 and further comprising:
a data store storing the draft response, accessible by the first and second client devices. 7. The computing system of claim 6 wherein the full content portion of the email message comprises a mail thread portion indicative of a full message thread corresponding to the email message, and an attachment, and wherein the full message generation logic is configured to detect actuation of the send actuator to send the draft response and to generate the full message including the unique portion of the draft response, the mail thread portion and the attachment. 8. A computer implemented method, comprising:
detecting, on an email server, that a user is generating, on a first client device, a draft response to an email message in a mailbox for the user, the email message including a full content portion; truncating the email message, to obtain a truncated email message that is less than the full content portion of the email message, on the email server; sending the truncated email message to the first client device for generation of the draft response; saving the draft response on the email server for access by the user from a second client device; detecting, on the email server, the user accessing the draft response from the second client device; and sending the truncated message and a unique portion of the draft response, entered in the draft response, to the second client device in response to detecting the user accessing the draft response from the second client device. 9. The computer implemented method of claim 8 and further comprising:
detecting, at the email server, actuation of a send actuator, on the second client device, to send the draft response;
generating, at the email server, a full message including the unique portion of the draft response and the full content portion of the email message; and
sending the full message to a recipient. 10. The computer implemented method of claim 9 and further comprising:
detecting a smart reply input from the first client device; and
in response, generating the truncated message. 11. The computer implemented method of claim 10 and further comprising:
detecting the user accessing the draft response from the second client device;
detecting a change in the full content portion of the draft response; and
sending the full content portion of the draft response, along with the unique portion, to the second client device. 12. The computer implemented method of claim 10 wherein saving the draft response on the email server comprises:
saving the draft response on the email service as a draft in the mailbox for the user with a smart reply indicator indicating that the smart reply input, corresponding to the draft response, was detected. 13. The computer implemented method of claim 12 and further comprising:
storing the draft response in a cloud-based data store, accessible by the first and second client devices through the email server. 14. The computer implemented method of claim 13 wherein the full content portion of the email message comprises a mail thread portion indicative of a full message thread corresponding to the email message, and an attachment, and wherein generating the full message comprises:
detecting actuation of the send actuator to send the draft response; and
generating the full message including the unique portion of the draft response, the mail thread portion and the attachment. 15. A computing system, comprising:
electronic mail (email) functionality on a hosted email service that determines that a user is generating, on a first client device, a draft response to an email message in a mailbox for the user, the email message including a full content portion; a smart reply system that truncates the email message, to obtain a truncated email message that is less than the full content portion of the email message, and sends the truncated email message to the first client device for generation of the draft response; a draft roaming system that saves the draft response on the hosted email service for access by the user from a second client device, the smart reply system sending the truncated message and a unique portion of the draft response, entered in the draft response, to the second client device in response to detection of the user accessing the draft response from the second client device; and full message generation logic configured to detect actuation of a send actuator to send the draft response and to generate a full message including the unique portion of the draft response and the full content portion of the email message, the email functionality sending the full message. 16. The computing system of claim 15 wherein the smart reply system comprises:
message truncation logic configured to generate the truncated message; and
smart reply detection logic configured to detect a smart reply input from the first client device and, in response, control the message truncation logic to generate the truncated message. 17. The computing system of claim 16 wherein the smart reply system comprises:
draft change detector logic configured to detect a change in the full content portion of the draft response and control the draft roaming system to send the full content portion of the draft response, along with the unique portion, to the second client device in response to detection of the user accessing the draft response from the second client device. 18. The computing system of claim 17 wherein the draft roaming system comprises:
draft maintenance logic configured to save the draft response on hosted the email service as a draft in the mailbox for the user with a smart reply indicator indicating that the smart reply input, corresponding to the draft response, was detected by the smart reply detection logic. 19. The computing system of claim 18 and further comprising:
a cloud-based data store storing the draft response, accessible by the first and second client devices through the hosted email service. 20. The computing system of claim 19 wherein the full content portion of the email message comprises a mail thread portion indicative of a full message thread corresponding to the email message, and an attachment, and wherein the full message generation logic is configured to detect actuation of the send actuator to send the draft response and to generate the full message including the unique portion of the draft response, the mail thread portion and the attachment. | An electronic mail computing system has a smart reply system that that enables a smart reply feature that surfaces a user input mechanism that allows a user to reply to an e-mail message without downloading full content of the e-mail message to the user's client computing system. A draft roaming system interacts with the client computing system to allow a plurality of different user devices to access a draft electronic mail message, and interacts with the smart reply system so a draft can be generated using the smart reply feature.1. A computing system, comprising:
electronic mail (email) functionality on an email service that determines that a user is generating, on a first client device, a draft response to an email message in a mailbox for the user, the email message including a full content portion; a smart reply system that truncates the email message, to obtain a truncated email message that is less than the full content portion of the email message, and sends the truncated email message to the first client device for generation of the draft response; and a draft roaming system that saves the draft response on the email service for access by the user from a second client device, the smart reply system sending the truncated message and a unique portion of the draft response, entered in the draft response, to the second client device in response to detection of the user accessing the draft response from the second client device. 2. The computing system of claim 1 wherein the smart reply system comprises:
full message generation logic configured to detect actuation of a send actuator to send the draft response and to generate a full message including the unique portion of the draft response and the full content portion of the email message, the email functionality sending the full message. 3. The computing system of claim 2 wherein the smart reply system comprises:
message truncation logic configured to generate the truncated message; and
smart reply detection logic configured to detect a smart reply input from the first client device and, in response, control the message truncation logic to generate the truncated message. 4. The computing system of claim 3 wherein the smart reply system comprises:
draft change detector logic configured to detect a change in the full content portion of the draft response and control the draft roaming system to send the full content portion of the draft response, along with the unique portion, to the second client device in response to detection of the user accessing the draft response from the second client device. 5. The computing system of claim 3 wherein the draft roaming system comprises:
draft maintenance logic configured to save the draft response on the email service as a draft in the mailbox for the user with a smart reply indicator indicating that the smart reply input, corresponding to the draft response, was detected by the smart reply detection logic. 6. The computing system of claim 5 and further comprising:
a data store storing the draft response, accessible by the first and second client devices. 7. The computing system of claim 6 wherein the full content portion of the email message comprises a mail thread portion indicative of a full message thread corresponding to the email message, and an attachment, and wherein the full message generation logic is configured to detect actuation of the send actuator to send the draft response and to generate the full message including the unique portion of the draft response, the mail thread portion and the attachment. 8. A computer implemented method, comprising:
detecting, on an email server, that a user is generating, on a first client device, a draft response to an email message in a mailbox for the user, the email message including a full content portion; truncating the email message, to obtain a truncated email message that is less than the full content portion of the email message, on the email server; sending the truncated email message to the first client device for generation of the draft response; saving the draft response on the email server for access by the user from a second client device; detecting, on the email server, the user accessing the draft response from the second client device; and sending the truncated message and a unique portion of the draft response, entered in the draft response, to the second client device in response to detecting the user accessing the draft response from the second client device. 9. The computer implemented method of claim 8 and further comprising:
detecting, at the email server, actuation of a send actuator, on the second client device, to send the draft response;
generating, at the email server, a full message including the unique portion of the draft response and the full content portion of the email message; and
sending the full message to a recipient. 10. The computer implemented method of claim 9 and further comprising:
detecting a smart reply input from the first client device; and
in response, generating the truncated message. 11. The computer implemented method of claim 10 and further comprising:
detecting the user accessing the draft response from the second client device;
detecting a change in the full content portion of the draft response; and
sending the full content portion of the draft response, along with the unique portion, to the second client device. 12. The computer implemented method of claim 10 wherein saving the draft response on the email server comprises:
saving the draft response on the email service as a draft in the mailbox for the user with a smart reply indicator indicating that the smart reply input, corresponding to the draft response, was detected. 13. The computer implemented method of claim 12 and further comprising:
storing the draft response in a cloud-based data store, accessible by the first and second client devices through the email server. 14. The computer implemented method of claim 13 wherein the full content portion of the email message comprises a mail thread portion indicative of a full message thread corresponding to the email message, and an attachment, and wherein generating the full message comprises:
detecting actuation of the send actuator to send the draft response; and
generating the full message including the unique portion of the draft response, the mail thread portion and the attachment. 15. A computing system, comprising:
electronic mail (email) functionality on a hosted email service that determines that a user is generating, on a first client device, a draft response to an email message in a mailbox for the user, the email message including a full content portion; a smart reply system that truncates the email message, to obtain a truncated email message that is less than the full content portion of the email message, and sends the truncated email message to the first client device for generation of the draft response; a draft roaming system that saves the draft response on the hosted email service for access by the user from a second client device, the smart reply system sending the truncated message and a unique portion of the draft response, entered in the draft response, to the second client device in response to detection of the user accessing the draft response from the second client device; and full message generation logic configured to detect actuation of a send actuator to send the draft response and to generate a full message including the unique portion of the draft response and the full content portion of the email message, the email functionality sending the full message. 16. The computing system of claim 15 wherein the smart reply system comprises:
message truncation logic configured to generate the truncated message; and
smart reply detection logic configured to detect a smart reply input from the first client device and, in response, control the message truncation logic to generate the truncated message. 17. The computing system of claim 16 wherein the smart reply system comprises:
draft change detector logic configured to detect a change in the full content portion of the draft response and control the draft roaming system to send the full content portion of the draft response, along with the unique portion, to the second client device in response to detection of the user accessing the draft response from the second client device. 18. The computing system of claim 17 wherein the draft roaming system comprises:
draft maintenance logic configured to save the draft response on hosted the email service as a draft in the mailbox for the user with a smart reply indicator indicating that the smart reply input, corresponding to the draft response, was detected by the smart reply detection logic. 19. The computing system of claim 18 and further comprising:
a cloud-based data store storing the draft response, accessible by the first and second client devices through the hosted email service. 20. The computing system of claim 19 wherein the full content portion of the email message comprises a mail thread portion indicative of a full message thread corresponding to the email message, and an attachment, and wherein the full message generation logic is configured to detect actuation of the send actuator to send the draft response and to generate the full message including the unique portion of the draft response, the mail thread portion and the attachment. | 2,400 |
8,852 | 8,852 | 15,515,472 | 2,454 | A method for transmitting messages from a server to a client in an internet transmission system includes: (a) the client sends to the server a request for transmitting a picture file, (b) in response to the reception of the request the server generates a picture file with a first content, in case that no message is available for the client, and delays the transmission of the picture file to the client for a time interval, (c) in response to the reception of the picture file with the first content, the client again sends a request for sending (transmitting) a picture file, (d) the steps (a) to (c) are repeated till, upon the last request, a message is available at the server for transmission to the client, (e) the server transmits, in response to the last request of the client, the picture file with a second content, (f) in response to the reception of the picture file with the second content, the client then sends a request for transmitting the message, (g) in response to the reception of the request for transmitting the message, the server then transmits the message to the client. | 1. A method for transmitting messages from a server to a client in an internet transmission system, comprising:
a. the client sends to the server a request for transmitting a picture file, b. in response to the reception of the request, the server generates a picture file with a first content, in case no message is available for the client, and delays the transmission of the picture file to the client for a certain time interval, c. in response to the reception of the picture file with the first content, the client again sends a request for transmitting a picture file, d. the steps (a) to (c) are repeated till, upon the last request, a message is available for transmission to the client, e. the server transmits, in response to the last request of the client, the picture file with a second content, f. in response to the reception of the picture file with the second content, the client sends a request for transmitting the message, g. in response to the reception of the request for transmitting the message, the server transmits the message to the client. 2. The method as claimed in claim 1, wherein in step e, the server transmits the picture file with the second content immediately after the message for the client has become available in the server. 3. The method as claimed in claim 1, wherein the picture file is a GIF or a JPEG file. 4. The method as claimed in claim 1, wherein the two picture files are distinguishable by their picture sizes. 5. The method as claimed in claim 4, wherein the picture file with the first content is a picture file comprising one pixel. 6. The method as claimed in claim 4, wherein the picture file with the second content is a picture file comprising two pixels. 7. The method as claimed in claim 1, wherein JsonP is used for the transmission of the message. 8. The method as claimed in claim 1, wherein the requests are carried out as HTTP-Requests. 9. The method as claimed in claim 1, wherein the requests of the client are carried out in a communication application. 10. The method as claimed in claim 9, wherein the client receives a link in a further application from a further server, and the communication application is loaded from the first mentioned server to the client via this link. 11. The method as claimed in claim 9, wherein both applications are carried out in a browser environment in the client. 12. The method as claimed in claim 10, wherein the further application is loaded from the further server to the client. 13. The method as claimed in claim 10, wherein both servers work on different domains. 14. The method as claimed in claim 1, wherein the requests and the transmission of the picture files are realized by means of a repeated Long-Polling on the picture files, and the transmission of the message is carried out by means of a Short-Polling method via JSonP. 15. A client for carrying out the method as claimed in claim 1. 16. A server for carrying out the method as claimed in claim 1. 17. A client for receiving messages in an internet transmission system, wherein the client is adapted to:
send a request to a server for transmitting a picture file, for receiving a picture file from the server and for establishing the contents of the picture file, and that, if the picture file has a first content, the client is further adapted to:
repeat the sending of a request to the server for transmitting a picture file,
and that, if the picture file has a second content, the client is further adapted to:
send a request to the server for transmitting the message, and for receiving the message. 18. The client as claimed in claim 15, wherein the picture file is a GIF or a JPEG file. 19. The client as claimed in claim 15, wherein the client is provided with a detection unit for establishing whether the picture file is a picture file having the first content or a picture file having the second content. 20. The client as claimed in claim 19, wherein the detection unit is further adapted to establish whether the picture file is a picture file comprising one pixel or a picture file comprising two pixels. 21. The client as claimed in claim 15, wherein JsonP is used for the transmission of the message. 22. The client as claimed in claim 15, wherein the requests are carried out as HTTP-requests. 23. The client as claimed in claim 15, wherein the client is adapted to carry out the requests in a communication application. 24. The client as claimed in claim 23, wherein the client is adapted to receive a link in a further application from a further server, and is adapted to store the communication application via this link from the first mentioned server. 25. The client as claimed in claim 23, wherein the client is adapted to carry out both applications in a browser environment. 26. The client as claimed in claim 23, wherein the client is adapted to receive the further application from the further server. 27. The client as claimed in claim 15, wherein the requests and the transmission of the picture files is realized by means of a repeated Long-Polling on the picture files, and the transmission of the message is realized by means of a Short-Polling method via JSonP. 28. A server for transmitting messages in an internet transmission system, wherein the server is adapted to:
receive a request for transmitting a picture file from a client, in response to the reception of the request, generate a picture file having a first content, in case no message for the client is available, and to send an, over a certain time interval delayed, version of the picture file to the client, or in response to the reception of the request, transmitting a picture file having a second content, in case a message for the client is available, to receive a request for transmitting the message from the client, and to transmit the message after the reception of the request for transmitting the message. 29. The server as claimed in claim 28, wherein the server is adapted to transmit, in response to the reception of the request for transmitting the picture file, the picture file having the second content immediately after the message for the client has become available on the server. 30. The server as claimed in claim 28, wherein the server is further adapted to transmit the message immediately after the reception of the request for transmitting the message. 31. The server as claimed in claim 28, wherein the picture file is a GIF file or a JPEG file. 32. The server as claimed in claim 28, wherein the two picture files are distinguishable by their picture sizes. 33. The server as claimed in claim 32, wherein the picture file having the first content is a picture file having one pixel. 34. The server as claimed in claim 32, wherein, the picture file having the second content is a picture file having two pixels. 35. The server as claimed in claim 28, wherein JsonP is used for the transmission of the message. 36. The server as claimed in claim 28, wherein the requests of the client and the transmission of the picture files is carried out by means of a repeated Long-Polling on the picture files, and the transmission of the message is realized by means of a Short-Polling method via JSonP. 37. The server as claimed in claim 28, wherein for realizing the communication between client and server for transmitting the message, the server is adapted to initially loading a communication application to the client, in response to the reception of a request thereto from the client. | A method for transmitting messages from a server to a client in an internet transmission system includes: (a) the client sends to the server a request for transmitting a picture file, (b) in response to the reception of the request the server generates a picture file with a first content, in case that no message is available for the client, and delays the transmission of the picture file to the client for a time interval, (c) in response to the reception of the picture file with the first content, the client again sends a request for sending (transmitting) a picture file, (d) the steps (a) to (c) are repeated till, upon the last request, a message is available at the server for transmission to the client, (e) the server transmits, in response to the last request of the client, the picture file with a second content, (f) in response to the reception of the picture file with the second content, the client then sends a request for transmitting the message, (g) in response to the reception of the request for transmitting the message, the server then transmits the message to the client.1. A method for transmitting messages from a server to a client in an internet transmission system, comprising:
a. the client sends to the server a request for transmitting a picture file, b. in response to the reception of the request, the server generates a picture file with a first content, in case no message is available for the client, and delays the transmission of the picture file to the client for a certain time interval, c. in response to the reception of the picture file with the first content, the client again sends a request for transmitting a picture file, d. the steps (a) to (c) are repeated till, upon the last request, a message is available for transmission to the client, e. the server transmits, in response to the last request of the client, the picture file with a second content, f. in response to the reception of the picture file with the second content, the client sends a request for transmitting the message, g. in response to the reception of the request for transmitting the message, the server transmits the message to the client. 2. The method as claimed in claim 1, wherein in step e, the server transmits the picture file with the second content immediately after the message for the client has become available in the server. 3. The method as claimed in claim 1, wherein the picture file is a GIF or a JPEG file. 4. The method as claimed in claim 1, wherein the two picture files are distinguishable by their picture sizes. 5. The method as claimed in claim 4, wherein the picture file with the first content is a picture file comprising one pixel. 6. The method as claimed in claim 4, wherein the picture file with the second content is a picture file comprising two pixels. 7. The method as claimed in claim 1, wherein JsonP is used for the transmission of the message. 8. The method as claimed in claim 1, wherein the requests are carried out as HTTP-Requests. 9. The method as claimed in claim 1, wherein the requests of the client are carried out in a communication application. 10. The method as claimed in claim 9, wherein the client receives a link in a further application from a further server, and the communication application is loaded from the first mentioned server to the client via this link. 11. The method as claimed in claim 9, wherein both applications are carried out in a browser environment in the client. 12. The method as claimed in claim 10, wherein the further application is loaded from the further server to the client. 13. The method as claimed in claim 10, wherein both servers work on different domains. 14. The method as claimed in claim 1, wherein the requests and the transmission of the picture files are realized by means of a repeated Long-Polling on the picture files, and the transmission of the message is carried out by means of a Short-Polling method via JSonP. 15. A client for carrying out the method as claimed in claim 1. 16. A server for carrying out the method as claimed in claim 1. 17. A client for receiving messages in an internet transmission system, wherein the client is adapted to:
send a request to a server for transmitting a picture file, for receiving a picture file from the server and for establishing the contents of the picture file, and that, if the picture file has a first content, the client is further adapted to:
repeat the sending of a request to the server for transmitting a picture file,
and that, if the picture file has a second content, the client is further adapted to:
send a request to the server for transmitting the message, and for receiving the message. 18. The client as claimed in claim 15, wherein the picture file is a GIF or a JPEG file. 19. The client as claimed in claim 15, wherein the client is provided with a detection unit for establishing whether the picture file is a picture file having the first content or a picture file having the second content. 20. The client as claimed in claim 19, wherein the detection unit is further adapted to establish whether the picture file is a picture file comprising one pixel or a picture file comprising two pixels. 21. The client as claimed in claim 15, wherein JsonP is used for the transmission of the message. 22. The client as claimed in claim 15, wherein the requests are carried out as HTTP-requests. 23. The client as claimed in claim 15, wherein the client is adapted to carry out the requests in a communication application. 24. The client as claimed in claim 23, wherein the client is adapted to receive a link in a further application from a further server, and is adapted to store the communication application via this link from the first mentioned server. 25. The client as claimed in claim 23, wherein the client is adapted to carry out both applications in a browser environment. 26. The client as claimed in claim 23, wherein the client is adapted to receive the further application from the further server. 27. The client as claimed in claim 15, wherein the requests and the transmission of the picture files is realized by means of a repeated Long-Polling on the picture files, and the transmission of the message is realized by means of a Short-Polling method via JSonP. 28. A server for transmitting messages in an internet transmission system, wherein the server is adapted to:
receive a request for transmitting a picture file from a client, in response to the reception of the request, generate a picture file having a first content, in case no message for the client is available, and to send an, over a certain time interval delayed, version of the picture file to the client, or in response to the reception of the request, transmitting a picture file having a second content, in case a message for the client is available, to receive a request for transmitting the message from the client, and to transmit the message after the reception of the request for transmitting the message. 29. The server as claimed in claim 28, wherein the server is adapted to transmit, in response to the reception of the request for transmitting the picture file, the picture file having the second content immediately after the message for the client has become available on the server. 30. The server as claimed in claim 28, wherein the server is further adapted to transmit the message immediately after the reception of the request for transmitting the message. 31. The server as claimed in claim 28, wherein the picture file is a GIF file or a JPEG file. 32. The server as claimed in claim 28, wherein the two picture files are distinguishable by their picture sizes. 33. The server as claimed in claim 32, wherein the picture file having the first content is a picture file having one pixel. 34. The server as claimed in claim 32, wherein, the picture file having the second content is a picture file having two pixels. 35. The server as claimed in claim 28, wherein JsonP is used for the transmission of the message. 36. The server as claimed in claim 28, wherein the requests of the client and the transmission of the picture files is carried out by means of a repeated Long-Polling on the picture files, and the transmission of the message is realized by means of a Short-Polling method via JSonP. 37. The server as claimed in claim 28, wherein for realizing the communication between client and server for transmitting the message, the server is adapted to initially loading a communication application to the client, in response to the reception of a request thereto from the client. | 2,400 |
8,853 | 8,853 | 14,994,380 | 2,441 | A method in which a monitoring unit allocated to a communication device checks, based on a name resolution protocol, whether a second communication network address allocated to the first communication device becomes valid in order to set up an uninterrupted communication connection to the communication device that is allocated to an industrial automation system, where in cases of an allocation of a new valid communication network address and an existing communication connection, the monitoring unit initiates a set-up of an additional communication connection using the new communication network address. | 1. A method for setting up an uninterrupted communication connection with a communication device allocated to an industrial automation system, comprising:
setting up a first communication connection between a first communication device and a second communication device in accordance with a transmission control protocol using a first communication network address allocated to the first communication device; checking, by a monitoring unit allocated to the first communication device, based on a name resolution protocol, whether a second communication network address allocated to the first communication device becomes valid; initiating, by the monitoring unit a set-up of an additional second communication connection between a transport and switching function unit allocated to the first communication device and the second communication device in cases of an allocation of a second valid communication network address and an existing first communication connection; setting up, by the transport and switching function unit allocated to the first communication device, the second communication connection using the communication network address allocated to the first communication device; and clearing the first communication connection if the second communication connection is successfully set-up. 2. The method as claimed in claim 1, wherein at least one of the first communication connection and the second communication connection is set-up in accordance with a connection-oriented connection control protocol. 3. The method as claimed in claim 2, wherein at least one of the first communication connection and the second communication connection is set-up in accordance with a Transmission Control Protocol (TCP). 4. The method as claimed in claim 3, wherein the transport and switching function unit has a multipath TCP functionality. 5. The method as claimed in claim 1, wherein the transport and switching function unit is configured to process an Internet protocol stack. 6. The method as claimed in claim 1, wherein the transport and switching function unit is integrated one of (i) into the first communication device, (ii) into a router allocated to the first communication device or (iii) into a gateway allocated to the first communication device. 7. The method as claimed in claim 1, wherein the transport and switching function unit is integrated into the first communication device, and wherein the transport and switching function unit accesses a communication network adapter of the first communication device via a communication network adapter driver. 8. The method as claimed in claim 7, wherein the communication network adapter comprises a transceiver unit and a control unit for coordinating access to a communication medium. 9. The method as claimed in one of claim 8, wherein a name resolution unit is allocated to the monitoring unit, said name resolution unit checking continuously, based on a name resolution service, whether a second communication network address allocated to the first communication device becomes valid. 10. The method as claimed in claim 9, wherein the name resolution service is provided by at least one Domain Name System (DNS) Server (DNS), and wherein the name resolution unit is a DNS client. 11. The method as claimed in claim 10, wherein the DNS client monitors a change of an IPv6 prefix allocated to the first communication device. 12. The method as claimed in claim 11, wherein, in an event of a change of the IPv6 prefix, the monitoring unit initiates the set-up of the additional second communication connection. 13. The method as claimed in claim 1, wherein the monitoring unit is integrated one of (i) into the first communication device, (ii) into a router allocated to the first communication device or (iii) into a gateway allocated to the first communication device. 14. The method as claimed in claim 1, wherein the second communication device and the first communication device have the same configuration;
wherein the first communication connection is set-up using a first communication network address allocated to the second communication device; and wherein a monitoring unit allocated to the second communication device checks whether a second communication network address allocated to the second communication device becomes valid, and, in an event of at least one of (i) an address change and (ii) a validity change, initiates a set-up of the additional second communication connection; and wherein a transport and switching function unit allocated to the second communication device, in the event of at least one of (i) the address change and (ii) the validity change, sets up the second communication connection using the second communication network address allocated to the second communication device. 15. The method as claimed in claim 14, wherein the monitoring unit allocated to the first communication device checks, only in the case of a set-up of the first communication connection initiated by the first communication device, whether a second communication network address allocated to the first communication device or a second communication network address allocated to the second communication device becomes valid, and, in the event of at least one of (i) the address change and (ii) the validity change, initiates the set-up of the additional second communication connection. 16. The method as claimed in claim 14, wherein the monitoring unit allocated to the second communication device checks, only in the case of a set-up of the first communication connection initiated by the first communication device, whether at least one of (i) a second communication network address allocated to the first communication device and (ii) a second communication network address allocated to the second communication device becomes valid, and, in the event of at least one of (i) the address change and (ii) the validity change, initiates the set-up of the additional second communication connection. 17. The method as claimed in claim 15, wherein the monitoring unit allocated to the second communication device checks, only in the case of a set-up of the first communication connection initiated by the first communication device, whether at least one of (i) a second communication network address allocated to the first communication device and (ii) a second communication network address allocated to the second communication device becomes valid, and, in the event of at least one of (i) the address change and (ii) the validity change, initiates the set-up of the additional second communication connection. 18. The method as claimed in claim 1, wherein at least one of (i) the first communication device and (ii) the second communication device is allocated to the industrial automation system. 18. A communication device comprising:
at least one transceiver unit; at least one control unit for coordinating access to a communication medium; a monitoring unit for checking, based on a name resolution protocol, whether at least one of (i) a new communication network address and (ii) an additional communication network address allocated to the communication device becomes valid, the monitoring unit being configured to initiate a set-up of the an additional communication connection between at least one of (i) a transport function unit and (ii) switching function unit allocated to the communication device and the selected communication device in cases of the allocation of at least one of (i) a new valid communication network address and (ii) an additional valid communication network address and an existing communication connection to a selective communication device; a transport and switching function unit to set-up the additional communication connection using at least one of (i) the new communication network address and (ii) the additional communication network address allocated to the communication device, and configured to clear a previously existing communication connection if the additional communication connection is successfully set-up. | A method in which a monitoring unit allocated to a communication device checks, based on a name resolution protocol, whether a second communication network address allocated to the first communication device becomes valid in order to set up an uninterrupted communication connection to the communication device that is allocated to an industrial automation system, where in cases of an allocation of a new valid communication network address and an existing communication connection, the monitoring unit initiates a set-up of an additional communication connection using the new communication network address.1. A method for setting up an uninterrupted communication connection with a communication device allocated to an industrial automation system, comprising:
setting up a first communication connection between a first communication device and a second communication device in accordance with a transmission control protocol using a first communication network address allocated to the first communication device; checking, by a monitoring unit allocated to the first communication device, based on a name resolution protocol, whether a second communication network address allocated to the first communication device becomes valid; initiating, by the monitoring unit a set-up of an additional second communication connection between a transport and switching function unit allocated to the first communication device and the second communication device in cases of an allocation of a second valid communication network address and an existing first communication connection; setting up, by the transport and switching function unit allocated to the first communication device, the second communication connection using the communication network address allocated to the first communication device; and clearing the first communication connection if the second communication connection is successfully set-up. 2. The method as claimed in claim 1, wherein at least one of the first communication connection and the second communication connection is set-up in accordance with a connection-oriented connection control protocol. 3. The method as claimed in claim 2, wherein at least one of the first communication connection and the second communication connection is set-up in accordance with a Transmission Control Protocol (TCP). 4. The method as claimed in claim 3, wherein the transport and switching function unit has a multipath TCP functionality. 5. The method as claimed in claim 1, wherein the transport and switching function unit is configured to process an Internet protocol stack. 6. The method as claimed in claim 1, wherein the transport and switching function unit is integrated one of (i) into the first communication device, (ii) into a router allocated to the first communication device or (iii) into a gateway allocated to the first communication device. 7. The method as claimed in claim 1, wherein the transport and switching function unit is integrated into the first communication device, and wherein the transport and switching function unit accesses a communication network adapter of the first communication device via a communication network adapter driver. 8. The method as claimed in claim 7, wherein the communication network adapter comprises a transceiver unit and a control unit for coordinating access to a communication medium. 9. The method as claimed in one of claim 8, wherein a name resolution unit is allocated to the monitoring unit, said name resolution unit checking continuously, based on a name resolution service, whether a second communication network address allocated to the first communication device becomes valid. 10. The method as claimed in claim 9, wherein the name resolution service is provided by at least one Domain Name System (DNS) Server (DNS), and wherein the name resolution unit is a DNS client. 11. The method as claimed in claim 10, wherein the DNS client monitors a change of an IPv6 prefix allocated to the first communication device. 12. The method as claimed in claim 11, wherein, in an event of a change of the IPv6 prefix, the monitoring unit initiates the set-up of the additional second communication connection. 13. The method as claimed in claim 1, wherein the monitoring unit is integrated one of (i) into the first communication device, (ii) into a router allocated to the first communication device or (iii) into a gateway allocated to the first communication device. 14. The method as claimed in claim 1, wherein the second communication device and the first communication device have the same configuration;
wherein the first communication connection is set-up using a first communication network address allocated to the second communication device; and wherein a monitoring unit allocated to the second communication device checks whether a second communication network address allocated to the second communication device becomes valid, and, in an event of at least one of (i) an address change and (ii) a validity change, initiates a set-up of the additional second communication connection; and wherein a transport and switching function unit allocated to the second communication device, in the event of at least one of (i) the address change and (ii) the validity change, sets up the second communication connection using the second communication network address allocated to the second communication device. 15. The method as claimed in claim 14, wherein the monitoring unit allocated to the first communication device checks, only in the case of a set-up of the first communication connection initiated by the first communication device, whether a second communication network address allocated to the first communication device or a second communication network address allocated to the second communication device becomes valid, and, in the event of at least one of (i) the address change and (ii) the validity change, initiates the set-up of the additional second communication connection. 16. The method as claimed in claim 14, wherein the monitoring unit allocated to the second communication device checks, only in the case of a set-up of the first communication connection initiated by the first communication device, whether at least one of (i) a second communication network address allocated to the first communication device and (ii) a second communication network address allocated to the second communication device becomes valid, and, in the event of at least one of (i) the address change and (ii) the validity change, initiates the set-up of the additional second communication connection. 17. The method as claimed in claim 15, wherein the monitoring unit allocated to the second communication device checks, only in the case of a set-up of the first communication connection initiated by the first communication device, whether at least one of (i) a second communication network address allocated to the first communication device and (ii) a second communication network address allocated to the second communication device becomes valid, and, in the event of at least one of (i) the address change and (ii) the validity change, initiates the set-up of the additional second communication connection. 18. The method as claimed in claim 1, wherein at least one of (i) the first communication device and (ii) the second communication device is allocated to the industrial automation system. 18. A communication device comprising:
at least one transceiver unit; at least one control unit for coordinating access to a communication medium; a monitoring unit for checking, based on a name resolution protocol, whether at least one of (i) a new communication network address and (ii) an additional communication network address allocated to the communication device becomes valid, the monitoring unit being configured to initiate a set-up of the an additional communication connection between at least one of (i) a transport function unit and (ii) switching function unit allocated to the communication device and the selected communication device in cases of the allocation of at least one of (i) a new valid communication network address and (ii) an additional valid communication network address and an existing communication connection to a selective communication device; a transport and switching function unit to set-up the additional communication connection using at least one of (i) the new communication network address and (ii) the additional communication network address allocated to the communication device, and configured to clear a previously existing communication connection if the additional communication connection is successfully set-up. | 2,400 |
8,854 | 8,854 | 15,318,868 | 2,494 | In one implementation, an identity management system includes an authority engine to provide an agency identifier based on an authority relationship between a first identity and an second identity and a duty engine to provide a duty identifier based on the agency identifier and a first end point, identify a second end point based on the first end point, and associate authority to access the second end point with the duty identifier. | 1. An identity management system comprising:
an authority engine to provide an agency identifier based on an authority relationship between a first identity and a second identity, the authority relationship comprising an authorization to access a first service on behalf of the first identity; a duty engine to:
provide a duty identifier based on the agency identifier and a first end point of a plurality of end points, the first end point being a destination to access the first service and the duty identifier to define authorization to interact with the first service provided at the first end point;
identify a second end point of a plurality of end points based on the first end point, the second end point associated with a second service;
associate authority to access the second end point with the duty identifier, the duty identifier to define authorization to interact with the second service provided at the second end point. 2. The system of claim 1, wherein the duty engine identifies the second end point based on one of:
a mapping of the plurality of end points, each end point of the plurality of end points being associated with one of a plurality of services; and a semantic selection of services, the semantic selection to relate the first end point and the second end point based on a language structure. 3. The system of claim 1, comprising:
a termination engine to provide a termination end point based on the agency identifier and a termination data structure, the termination data structure to include the first end point and a termination condition associated with the termination end point. 4. The system of claim 1, comprising:
an audit engine to:
maintain a history of actions performed by the second entity on behalf of the first identity;
cause an action performed by the second identity on behalf of the first identity to present via a portal based on the agency identifier, the portal providing an interface for selection of the first service from a catalog of services. 5. The system of claim 1, comprising:
a liability engine to provide an approved action of the first service and a potential impact based on the agency identifier and the duty identifier. 6. A computer readable storage medium comprising a set of instructions executable by a processor resource to:
identify a plurality of end points based on a service destination, the service destination designated to an authority relationship between a first identity and an second identity; associate the plurality of end points with the authority relationship between the first identity and the second identity using a duty identifier; and provide the duty identifier. 7. The medium of claim 6, wherein the set of instructions is executable by the processor resource to:
map the plurality of end points from the service destination based on a semantic service selection. 8. The medium of claim 6, wherein the set of instructions is executable by the processor resource to:
identify a first end point of the plurality of end points based on a certificate associated with an action of the first end point. 9. The medium of claim 6, wherein the set of instructions is executable by the processor resource to:
identify a termination data structure based on the duty identifier, the termination data structure to include a termination condition associated with a first end point of the plurality of end points; compare a request to the termination data structure; and perform a termination action when the request achieves the termination condition. 10. The medium of claim 9, wherein the set of instructions is executable by the processor resource to:
identify a termination condition based on a maximum relationship age; and send a notification to the first identity with information regarding a cancellation process of the agency identifier when the termination condition is satisfied. 11. A method of ostensible impersonation comprising:
creating an agency identifier based on a first identity and an second identity; identifying a potential service end point based on a designated service end point; associating a plurality of end points with the agency identifier, the plurality of end points to include the designated service end point and the potential service end point; calculate the authorized actions based on the plurality of end points associated with the agency identifier; and provide a termination end point based on a termination condition associated with one of the plurality of end points. 12. The method of claim 11, comprising:
receiving a uniform resource locator (“URL”) and action using one method from the group consisting of a PUT, a POST, a GET, and a DELETE; receiving a certificate of authorization based on an authority relationship between the second identity and the first identity; receiving a termination definition data structure, the termination definition data structure to include the plurality of end points and plurality of termination conditions; receiving a maximum time period to permit the authorized actions of the authority relationship. 13. The method of claim 11, comprising:
terminating the agency relationship between the second identity and the first identity based on the termination condition. 14. The method of claim 11, comprising:
provide a formatted plurality of actions based on the plurality of end points, the plurality of actions to delimit an allowed impersonation of the first identity by the second identity based on a plurality of action potential data structures including an action and potential impact of the action. 15. The method of claim 11, comprising:
provide a plurality of action history data structures performed by the second identity on behalf of the first identity based on an agency identifier, the plurality of action history data structures to include a service end point, an action, and a timestamp. | In one implementation, an identity management system includes an authority engine to provide an agency identifier based on an authority relationship between a first identity and an second identity and a duty engine to provide a duty identifier based on the agency identifier and a first end point, identify a second end point based on the first end point, and associate authority to access the second end point with the duty identifier.1. An identity management system comprising:
an authority engine to provide an agency identifier based on an authority relationship between a first identity and a second identity, the authority relationship comprising an authorization to access a first service on behalf of the first identity; a duty engine to:
provide a duty identifier based on the agency identifier and a first end point of a plurality of end points, the first end point being a destination to access the first service and the duty identifier to define authorization to interact with the first service provided at the first end point;
identify a second end point of a plurality of end points based on the first end point, the second end point associated with a second service;
associate authority to access the second end point with the duty identifier, the duty identifier to define authorization to interact with the second service provided at the second end point. 2. The system of claim 1, wherein the duty engine identifies the second end point based on one of:
a mapping of the plurality of end points, each end point of the plurality of end points being associated with one of a plurality of services; and a semantic selection of services, the semantic selection to relate the first end point and the second end point based on a language structure. 3. The system of claim 1, comprising:
a termination engine to provide a termination end point based on the agency identifier and a termination data structure, the termination data structure to include the first end point and a termination condition associated with the termination end point. 4. The system of claim 1, comprising:
an audit engine to:
maintain a history of actions performed by the second entity on behalf of the first identity;
cause an action performed by the second identity on behalf of the first identity to present via a portal based on the agency identifier, the portal providing an interface for selection of the first service from a catalog of services. 5. The system of claim 1, comprising:
a liability engine to provide an approved action of the first service and a potential impact based on the agency identifier and the duty identifier. 6. A computer readable storage medium comprising a set of instructions executable by a processor resource to:
identify a plurality of end points based on a service destination, the service destination designated to an authority relationship between a first identity and an second identity; associate the plurality of end points with the authority relationship between the first identity and the second identity using a duty identifier; and provide the duty identifier. 7. The medium of claim 6, wherein the set of instructions is executable by the processor resource to:
map the plurality of end points from the service destination based on a semantic service selection. 8. The medium of claim 6, wherein the set of instructions is executable by the processor resource to:
identify a first end point of the plurality of end points based on a certificate associated with an action of the first end point. 9. The medium of claim 6, wherein the set of instructions is executable by the processor resource to:
identify a termination data structure based on the duty identifier, the termination data structure to include a termination condition associated with a first end point of the plurality of end points; compare a request to the termination data structure; and perform a termination action when the request achieves the termination condition. 10. The medium of claim 9, wherein the set of instructions is executable by the processor resource to:
identify a termination condition based on a maximum relationship age; and send a notification to the first identity with information regarding a cancellation process of the agency identifier when the termination condition is satisfied. 11. A method of ostensible impersonation comprising:
creating an agency identifier based on a first identity and an second identity; identifying a potential service end point based on a designated service end point; associating a plurality of end points with the agency identifier, the plurality of end points to include the designated service end point and the potential service end point; calculate the authorized actions based on the plurality of end points associated with the agency identifier; and provide a termination end point based on a termination condition associated with one of the plurality of end points. 12. The method of claim 11, comprising:
receiving a uniform resource locator (“URL”) and action using one method from the group consisting of a PUT, a POST, a GET, and a DELETE; receiving a certificate of authorization based on an authority relationship between the second identity and the first identity; receiving a termination definition data structure, the termination definition data structure to include the plurality of end points and plurality of termination conditions; receiving a maximum time period to permit the authorized actions of the authority relationship. 13. The method of claim 11, comprising:
terminating the agency relationship between the second identity and the first identity based on the termination condition. 14. The method of claim 11, comprising:
provide a formatted plurality of actions based on the plurality of end points, the plurality of actions to delimit an allowed impersonation of the first identity by the second identity based on a plurality of action potential data structures including an action and potential impact of the action. 15. The method of claim 11, comprising:
provide a plurality of action history data structures performed by the second identity on behalf of the first identity based on an agency identifier, the plurality of action history data structures to include a service end point, an action, and a timestamp. | 2,400 |
8,855 | 8,855 | 15,241,301 | 2,482 | In accordance with one aspect of the present invention, a driver assist system for a vehicle includes a housing and a camera extending from the housing. A data processing circuit is mounted within the housing for processing and analyzing image data provided by the camera. A fluid filled heat sink transfers heat from the data processing circuit to the environment for cooling the data processing circuit. | 1. A driver assist system for a vehicle comprising:
a housing; a camera extending from the housing; a data processing circuit mounted within the housing for processing and analyzing image data provided by the camera; and a fluid filled heat sink that transfers heat from the data processing circuit to the environment for cooling the data processing circuit. 2. The driver assist system of claim 1 further including a reservoir in fluid communication with the heat sink and a pump for circulating fluid from the reservoir through the heat sink. 3. The driver assist system of claim 1 wherein the heat sink includes fins extending away from the data processing circuit into the vehicle when the driver assist system is connected to the vehicle. 4. The driver assist system of claim 3 wherein the fins are fluid filled. 5. The driver assist system of claim 3 wherein the fins are solid. 6. The driver assist system of claim 3 wherein the fins extend through an opening into a camera viewing window of the housing. 7. The driver assist system of claim 6 wherein the fins extend through an opening in a bottom wall defining the camera viewing window. 8. The driver assist system of claim 1 wherein the heat sink closes the housing. 9. The driver assist system of claim 1 wherein the heat sink engages the data processing circuit. 10. The driver assist system of claim 1 wherein a fluid tight cover encases the data processing circuit and the heat sink surrounds the fluid tight cover. 11. The driver assist system of claim 10 wherein the heat sink is directly connected to a printed circuit board to which the data processing circuit is connected. 12. The driver assist system of claim 11 wherein the heat sink includes fins extending away from the data processing circuit. 13. The driver assist system of claim 1 wherein a circuit housing surrounds the data processing circuit, a thermal pad engages the circuit housing and transfers heat from the circuit housing to the heat sink. 14. The driver assist system of claim 13 wherein the circuit housing is directly connected to a printed circuit board to which the data processing circuit is connected. | In accordance with one aspect of the present invention, a driver assist system for a vehicle includes a housing and a camera extending from the housing. A data processing circuit is mounted within the housing for processing and analyzing image data provided by the camera. A fluid filled heat sink transfers heat from the data processing circuit to the environment for cooling the data processing circuit.1. A driver assist system for a vehicle comprising:
a housing; a camera extending from the housing; a data processing circuit mounted within the housing for processing and analyzing image data provided by the camera; and a fluid filled heat sink that transfers heat from the data processing circuit to the environment for cooling the data processing circuit. 2. The driver assist system of claim 1 further including a reservoir in fluid communication with the heat sink and a pump for circulating fluid from the reservoir through the heat sink. 3. The driver assist system of claim 1 wherein the heat sink includes fins extending away from the data processing circuit into the vehicle when the driver assist system is connected to the vehicle. 4. The driver assist system of claim 3 wherein the fins are fluid filled. 5. The driver assist system of claim 3 wherein the fins are solid. 6. The driver assist system of claim 3 wherein the fins extend through an opening into a camera viewing window of the housing. 7. The driver assist system of claim 6 wherein the fins extend through an opening in a bottom wall defining the camera viewing window. 8. The driver assist system of claim 1 wherein the heat sink closes the housing. 9. The driver assist system of claim 1 wherein the heat sink engages the data processing circuit. 10. The driver assist system of claim 1 wherein a fluid tight cover encases the data processing circuit and the heat sink surrounds the fluid tight cover. 11. The driver assist system of claim 10 wherein the heat sink is directly connected to a printed circuit board to which the data processing circuit is connected. 12. The driver assist system of claim 11 wherein the heat sink includes fins extending away from the data processing circuit. 13. The driver assist system of claim 1 wherein a circuit housing surrounds the data processing circuit, a thermal pad engages the circuit housing and transfers heat from the circuit housing to the heat sink. 14. The driver assist system of claim 13 wherein the circuit housing is directly connected to a printed circuit board to which the data processing circuit is connected. | 2,400 |
8,856 | 8,856 | 13,746,046 | 2,439 | An apparatus for producing a message authentication code based on a first message and an original key is provided. The apparatus includes a key generator configured to produce a generated key based on the original key and the first message. Furthermore, the apparatus includes a message authentication code generator configured to produce the message authentication code based on the generated key and the first message. | 1. An apparatus for producing a message authentication code based on a first message and an original key, comprising:
a key generator configured to produce a generated key based on the original key and the first message; and a message authentication code generator configured to produce the message authentication code based on the generated key and the first message. 2. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key by using a cryptographic encryption algorithm. 3. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key by a hash calculation for the first message. 4. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key by performing a hash calculation for a portion of the first message. 5. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key such that an entropy of the generated key is not lower than the entropy of the original key. 6. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key such that when precisely one bit of the first message or of the original key is changed, between 45% and 55% of the bits of the generated key change on average when the generated key is produced again. 7. The apparatus according to claim 1, wherein the key generator is configured to use AES encryption for producing the generated key. 8. The apparatus according to claim 1, wherein the key generator is configured to apply AESk(H(M)), where M denotes the first message, H(M) denotes the hash calculation of the first message M, k denotes the original key and AESk denotes an AES encryption using the original key k. 9. The apparatus according to claim 1, wherein the key generator is configured to protect the production of the generated key against side channel attacks. 10. The apparatus according to claim 9, wherein the key generator is configured to perform a masking operation for the first message in order to obtain a masked message, and produce the generated key based on the original key and the masked message. 11. The apparatus according to claim 10, wherein the masking operation comprises exchange of bits of the first message or XORing, ANDing or ORing of the first message with a bit string. 12. The apparatus according to claim 1, wherein the message authentication code generator is configured to perform a hash calculation for the first message to produce the message authentication code. 13. The apparatus according to claim 12, wherein the message authentication code generator is configured to use a first XOR operation to logically combine the generated key with a first constant, and use a second XOR operation to logically combine the generated key with a second constant. 14. The apparatus according to claim 13, wherein the message authentication code generator is configured to apply HMACk′(M)=H((k′⊕opad)∥H((k′⊕ipad)∥M)) in order to calculate the message authentication code, where M is the first message, k′ is the generated key, ⊕ is an XOR operation, ∥ is a concatenation and H is a hash operation. 15. An apparatus for checking correctness and authenticity of a message, comprising:
a key generator configured to produce a generated key based on the original key and the first message; a message authentication code generator configured to produce the message authentication code based on the generated key and the first message; and a comparison unit configured to check the message authentication code and a received message authentication code for a match in order to check correctness and authenticity of the message. 16. A method for producing a message authentication code based on a first message and an original key, the method comprising:
producing a generated key based on the original key and the first message; and producing the message authentication code based on the generated key and the first message. 17. The method according to claim 16, wherein the generated key is produced by using a cryptographic encryption algorithm. 18. The method according to claim 16, wherein the generated key is produced by a hash calculation for the first message. 19. The method according to claim 16, wherein the message authentication code is calculated by applying HMACk′(M)=H((k′⊕opad)∥H((k′⊕ipad)∥M)), where M is the first message, k′ is the generated key, ⊕ is an XOR operation, ∥ is a concatenation and H is a hash operation. 20. The method according to claim 16, further comprising checking the message authentication code and a received message authentication code for a match in order to check correctness and authenticity of the message. | An apparatus for producing a message authentication code based on a first message and an original key is provided. The apparatus includes a key generator configured to produce a generated key based on the original key and the first message. Furthermore, the apparatus includes a message authentication code generator configured to produce the message authentication code based on the generated key and the first message.1. An apparatus for producing a message authentication code based on a first message and an original key, comprising:
a key generator configured to produce a generated key based on the original key and the first message; and a message authentication code generator configured to produce the message authentication code based on the generated key and the first message. 2. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key by using a cryptographic encryption algorithm. 3. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key by a hash calculation for the first message. 4. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key by performing a hash calculation for a portion of the first message. 5. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key such that an entropy of the generated key is not lower than the entropy of the original key. 6. The apparatus according to claim 1, wherein the key generator is configured to produce the generated key such that when precisely one bit of the first message or of the original key is changed, between 45% and 55% of the bits of the generated key change on average when the generated key is produced again. 7. The apparatus according to claim 1, wherein the key generator is configured to use AES encryption for producing the generated key. 8. The apparatus according to claim 1, wherein the key generator is configured to apply AESk(H(M)), where M denotes the first message, H(M) denotes the hash calculation of the first message M, k denotes the original key and AESk denotes an AES encryption using the original key k. 9. The apparatus according to claim 1, wherein the key generator is configured to protect the production of the generated key against side channel attacks. 10. The apparatus according to claim 9, wherein the key generator is configured to perform a masking operation for the first message in order to obtain a masked message, and produce the generated key based on the original key and the masked message. 11. The apparatus according to claim 10, wherein the masking operation comprises exchange of bits of the first message or XORing, ANDing or ORing of the first message with a bit string. 12. The apparatus according to claim 1, wherein the message authentication code generator is configured to perform a hash calculation for the first message to produce the message authentication code. 13. The apparatus according to claim 12, wherein the message authentication code generator is configured to use a first XOR operation to logically combine the generated key with a first constant, and use a second XOR operation to logically combine the generated key with a second constant. 14. The apparatus according to claim 13, wherein the message authentication code generator is configured to apply HMACk′(M)=H((k′⊕opad)∥H((k′⊕ipad)∥M)) in order to calculate the message authentication code, where M is the first message, k′ is the generated key, ⊕ is an XOR operation, ∥ is a concatenation and H is a hash operation. 15. An apparatus for checking correctness and authenticity of a message, comprising:
a key generator configured to produce a generated key based on the original key and the first message; a message authentication code generator configured to produce the message authentication code based on the generated key and the first message; and a comparison unit configured to check the message authentication code and a received message authentication code for a match in order to check correctness and authenticity of the message. 16. A method for producing a message authentication code based on a first message and an original key, the method comprising:
producing a generated key based on the original key and the first message; and producing the message authentication code based on the generated key and the first message. 17. The method according to claim 16, wherein the generated key is produced by using a cryptographic encryption algorithm. 18. The method according to claim 16, wherein the generated key is produced by a hash calculation for the first message. 19. The method according to claim 16, wherein the message authentication code is calculated by applying HMACk′(M)=H((k′⊕opad)∥H((k′⊕ipad)∥M)), where M is the first message, k′ is the generated key, ⊕ is an XOR operation, ∥ is a concatenation and H is a hash operation. 20. The method according to claim 16, further comprising checking the message authentication code and a received message authentication code for a match in order to check correctness and authenticity of the message. | 2,400 |
8,857 | 8,857 | 15,155,565 | 2,452 | The disclosed embodiments relate generally to efficient data transmission and receipt. Specifically, the disclosed embodiments provide systems and methods for selectively combining multiple, disparate message types and transmitting same via one data feed. A consolidation system determines whether data resulting from an event can be combined or merged based on pre-determined message characteristics and state or environment information, or should be sent via two separate feeds. The merged message may be backwards-compatible so that data recipient computing systems can easily and selectively decide which portion of the merged data is relevant to the data recipient computing system, only read the relevant portions. Thus, multiple data receivers, which typically consume different message types, can receive and consume the same merged or consolidated message. | 1. A computer implemented method for generating messages in response to electronic data transaction request messages processed in a data transaction processing system, the computer implemented method including:
receiving, by a processor, an electronic data transaction request message; modifying, by the processor, at least one of first and second data objects stored in a memory based on the electronic data transaction request message, wherein the first data object includes data about a plurality of unique orders, each unique order associated with a value and an order quantity, and wherein the second data object includes data about a plurality of unique values, each unique value associated with an aggregate quantity and a number of orders aggregated; upon determining, by the processor, that the first data object has been modified and the second data object has not been modified, generating data indicating the modification to the first data object and generating a first message including the data indicating the modification to the first data object; and upon determining, by the processor, that a unique order of the first data object and the second data object have been modified, generating data indicating the modification to the unique order of the first data object, generating data indicating the modification to the second data object, and generating a consolidated message including the data indicating the modifications to the unique order of the first data object and the second data object. 2. The computer implemented method of claim 1, wherein values associated with at least two of the unique orders of the first data object correspond to one of the unique values of the second data object. 3. The computer implemented method of claim 1, wherein each of the unique values of the second data object values corresponds to at least one of the unique orders of the first data object. 4. The computer implemented method of claim 1, wherein the electronic data transaction request message includes a request to perform a transaction related to a product represented by one of the data objects. 5. The computer implemented method of claim 1, which includes, upon determining, by the processor, that multiple unique orders of the first data object corresponding to the same unique value of the second data object have been modified and the second data object has been modified, generating data indicating the modifications to the multiple unique orders of the first data object, generating a first message including the data indicating the modifications to the multiple unique orders of the first data object, generating data indicating the modification to the second data object, and generating a second message including the data indicating the modification to the second data object. 6. The computer implemented method of claim 1, which includes determining that one unique order of the first data object has been modified by determining that one of: (i) a unique order has been added to the first data object, (ii) a unique order has been removed from the first data object or (iii) a quantity, a priority, or a value associated with the unique order has been modified. 7. The computer implemented method of claim 1, which includes determining that the second data object has been modified by determining that one of: (i) a unique value has been added to the second data object, (ii) a unique value has been removed from the second data object, or (iii) an aggregate quantity or a number of orders associated with a unique value of the second data object has been modified. 8. The computer implemented method of claim 1, wherein the first and consolidated messages are published to data recipient computing system via different data feeds. 9. The computer implemented method of claim 1, wherein the data objects comprise queues, and wherein the method includes, for each data object, storing data related to transactions of a first type in a first queue, and storing data related to transactions of a second type in a second queue. 10. The computer implemented method of claim 9, wherein transactions of the first type are one of purchasing or relinquishing a financial instrument, and transactions of the second type are the other of purchasing or relinquishing the financial instrument. 11. The computer implemented method of claim 1, wherein the data transaction processing system is an exchange computing system, and wherein the data objects represent order books for a financial instrument traded in the exchange computing system. 12. The computer implemented method of claim 11, wherein the first data object includes data about all unique orders pending and related to the financial instrument. 13. The computer implemented method of claim 12, wherein the second data object includes data about a predetermined number of unique values corresponding to the orders. 14. The computer implemented method of claim 12, wherein at least one unique value corresponding to an order in the first data object is not included in the second data object. 15. The computer implemented method of claim 1, wherein the first data object is a per order (“PO”) data object and the second data object is an aggregated by value (“ABV”) data object. 16. The computer implemented method of claim 1, wherein the electronic data transaction request messages are submitted by client computers in communication with the data transaction processing system 17. A computer system operative to generate messages in response to processing of electronic data transaction request messages in a data transaction processing system, the computer system including a computer processor coupled with a memory, the computer processor specifically configured to:
receive, by the processor, an electronic data transaction request message; modify, by the processor, at least one of first and second data objects stored in the memory based on the electronic data transaction request message, the first data object including data about a plurality of unique orders, each unique order associated with a value and an order quantity, and the second data object including data about a plurality of unique values, each unique value associated with an aggregate quantity and a number of orders aggregated; upon determining, by the processor, that the first data object has been modified and the second data object has not been modified, generate data indicating the modification to the first data object and generate a first message including the data indicating the modification to the first data object; and upon determining, by the processor, that a unique order of the first data object and the second data object have been modified, generate data indicating the modification to the unique order of the first data object, generate data indicating the modification to the second data object, and generate a consolidated message including the data indicating the modifications to the unique order of the first data object and the second data object. 18. The computer system of claim 17, wherein the computer processor is further specifically configured to, upon determining that multiple unique orders of the first data object corresponding to the same unique value of the second data object have been modified and the second data object has been modified, generate data indicating the modifications to the multiple unique orders of the first data object, generate a first message including the data indicating the modifications to the multiple unique orders of the first data object, generate data indicating the modification to the second data object, and generate a second message including the data indicating the modification to the second data object. 19. A computer system which processes electronic data transaction request messages for a data object in a data transaction processing system, the system comprising:
an electronic data transaction request message receiver that receives an electronic data transaction request message to perform a transaction on a data object; a data object processor coupled with the electronic data transaction request message receiver for modifying at least one of first and second data objects stored in a memory, wherein the first data object includes data about a plurality of unique orders, each unique order associated with a value and an order quantity, and wherein the second data object includes data about a plurality of unique values, each unique value associated with an aggregate quantity and a number of orders aggregated; and a data generator coupled with the data object processor which,
upon determining, by the data object processor, that the first data object has been modified and the second data object has not been modified, generates data indicating the modification to the first data object; and
upon determining, by the data object processor, that a unique order of the first data object and the second data object have been modified, generates data indicating the modification to the unique order of the first data object and generates data indicating the modification to the second data object; and
a message generator coupled with the data generator which,
upon determining, by the data object processor, that the first data object has been modified and the second data object has not been modified, generates a first message including the data indicating the modification to the first data object; and
upon determining, by the data object processor, that a unique order of the first data object and the second data object have been modified, generates a consolidated message including the data indicating the modifications to the unique order of the first data object and the second data object. 20. The computer system of claim 19, wherein upon determining, by the data object processor, that multiple unique orders of the first data object corresponding to the same unique value of the second data object have been modified and the second data object has been modified,
the data generator generates data indicating the modifications to the multiple unique orders of the first data object and data indicating the modification to the second data object, and the message generator generates a first message including the data indicating the modifications to the multiple unique orders of the first data object and a second message including the data indicating the modification to the second data object. | The disclosed embodiments relate generally to efficient data transmission and receipt. Specifically, the disclosed embodiments provide systems and methods for selectively combining multiple, disparate message types and transmitting same via one data feed. A consolidation system determines whether data resulting from an event can be combined or merged based on pre-determined message characteristics and state or environment information, or should be sent via two separate feeds. The merged message may be backwards-compatible so that data recipient computing systems can easily and selectively decide which portion of the merged data is relevant to the data recipient computing system, only read the relevant portions. Thus, multiple data receivers, which typically consume different message types, can receive and consume the same merged or consolidated message.1. A computer implemented method for generating messages in response to electronic data transaction request messages processed in a data transaction processing system, the computer implemented method including:
receiving, by a processor, an electronic data transaction request message; modifying, by the processor, at least one of first and second data objects stored in a memory based on the electronic data transaction request message, wherein the first data object includes data about a plurality of unique orders, each unique order associated with a value and an order quantity, and wherein the second data object includes data about a plurality of unique values, each unique value associated with an aggregate quantity and a number of orders aggregated; upon determining, by the processor, that the first data object has been modified and the second data object has not been modified, generating data indicating the modification to the first data object and generating a first message including the data indicating the modification to the first data object; and upon determining, by the processor, that a unique order of the first data object and the second data object have been modified, generating data indicating the modification to the unique order of the first data object, generating data indicating the modification to the second data object, and generating a consolidated message including the data indicating the modifications to the unique order of the first data object and the second data object. 2. The computer implemented method of claim 1, wherein values associated with at least two of the unique orders of the first data object correspond to one of the unique values of the second data object. 3. The computer implemented method of claim 1, wherein each of the unique values of the second data object values corresponds to at least one of the unique orders of the first data object. 4. The computer implemented method of claim 1, wherein the electronic data transaction request message includes a request to perform a transaction related to a product represented by one of the data objects. 5. The computer implemented method of claim 1, which includes, upon determining, by the processor, that multiple unique orders of the first data object corresponding to the same unique value of the second data object have been modified and the second data object has been modified, generating data indicating the modifications to the multiple unique orders of the first data object, generating a first message including the data indicating the modifications to the multiple unique orders of the first data object, generating data indicating the modification to the second data object, and generating a second message including the data indicating the modification to the second data object. 6. The computer implemented method of claim 1, which includes determining that one unique order of the first data object has been modified by determining that one of: (i) a unique order has been added to the first data object, (ii) a unique order has been removed from the first data object or (iii) a quantity, a priority, or a value associated with the unique order has been modified. 7. The computer implemented method of claim 1, which includes determining that the second data object has been modified by determining that one of: (i) a unique value has been added to the second data object, (ii) a unique value has been removed from the second data object, or (iii) an aggregate quantity or a number of orders associated with a unique value of the second data object has been modified. 8. The computer implemented method of claim 1, wherein the first and consolidated messages are published to data recipient computing system via different data feeds. 9. The computer implemented method of claim 1, wherein the data objects comprise queues, and wherein the method includes, for each data object, storing data related to transactions of a first type in a first queue, and storing data related to transactions of a second type in a second queue. 10. The computer implemented method of claim 9, wherein transactions of the first type are one of purchasing or relinquishing a financial instrument, and transactions of the second type are the other of purchasing or relinquishing the financial instrument. 11. The computer implemented method of claim 1, wherein the data transaction processing system is an exchange computing system, and wherein the data objects represent order books for a financial instrument traded in the exchange computing system. 12. The computer implemented method of claim 11, wherein the first data object includes data about all unique orders pending and related to the financial instrument. 13. The computer implemented method of claim 12, wherein the second data object includes data about a predetermined number of unique values corresponding to the orders. 14. The computer implemented method of claim 12, wherein at least one unique value corresponding to an order in the first data object is not included in the second data object. 15. The computer implemented method of claim 1, wherein the first data object is a per order (“PO”) data object and the second data object is an aggregated by value (“ABV”) data object. 16. The computer implemented method of claim 1, wherein the electronic data transaction request messages are submitted by client computers in communication with the data transaction processing system 17. A computer system operative to generate messages in response to processing of electronic data transaction request messages in a data transaction processing system, the computer system including a computer processor coupled with a memory, the computer processor specifically configured to:
receive, by the processor, an electronic data transaction request message; modify, by the processor, at least one of first and second data objects stored in the memory based on the electronic data transaction request message, the first data object including data about a plurality of unique orders, each unique order associated with a value and an order quantity, and the second data object including data about a plurality of unique values, each unique value associated with an aggregate quantity and a number of orders aggregated; upon determining, by the processor, that the first data object has been modified and the second data object has not been modified, generate data indicating the modification to the first data object and generate a first message including the data indicating the modification to the first data object; and upon determining, by the processor, that a unique order of the first data object and the second data object have been modified, generate data indicating the modification to the unique order of the first data object, generate data indicating the modification to the second data object, and generate a consolidated message including the data indicating the modifications to the unique order of the first data object and the second data object. 18. The computer system of claim 17, wherein the computer processor is further specifically configured to, upon determining that multiple unique orders of the first data object corresponding to the same unique value of the second data object have been modified and the second data object has been modified, generate data indicating the modifications to the multiple unique orders of the first data object, generate a first message including the data indicating the modifications to the multiple unique orders of the first data object, generate data indicating the modification to the second data object, and generate a second message including the data indicating the modification to the second data object. 19. A computer system which processes electronic data transaction request messages for a data object in a data transaction processing system, the system comprising:
an electronic data transaction request message receiver that receives an electronic data transaction request message to perform a transaction on a data object; a data object processor coupled with the electronic data transaction request message receiver for modifying at least one of first and second data objects stored in a memory, wherein the first data object includes data about a plurality of unique orders, each unique order associated with a value and an order quantity, and wherein the second data object includes data about a plurality of unique values, each unique value associated with an aggregate quantity and a number of orders aggregated; and a data generator coupled with the data object processor which,
upon determining, by the data object processor, that the first data object has been modified and the second data object has not been modified, generates data indicating the modification to the first data object; and
upon determining, by the data object processor, that a unique order of the first data object and the second data object have been modified, generates data indicating the modification to the unique order of the first data object and generates data indicating the modification to the second data object; and
a message generator coupled with the data generator which,
upon determining, by the data object processor, that the first data object has been modified and the second data object has not been modified, generates a first message including the data indicating the modification to the first data object; and
upon determining, by the data object processor, that a unique order of the first data object and the second data object have been modified, generates a consolidated message including the data indicating the modifications to the unique order of the first data object and the second data object. 20. The computer system of claim 19, wherein upon determining, by the data object processor, that multiple unique orders of the first data object corresponding to the same unique value of the second data object have been modified and the second data object has been modified,
the data generator generates data indicating the modifications to the multiple unique orders of the first data object and data indicating the modification to the second data object, and the message generator generates a first message including the data indicating the modifications to the multiple unique orders of the first data object and a second message including the data indicating the modification to the second data object. | 2,400 |
8,858 | 8,858 | 15,574,012 | 2,416 | The discovery and establishment of communication groups is described for wireless vehicular communications. Some embodiments include receiving a registration request from a user equipment (UE) in a vehicular environment to provide services over a wireless access in vehicular environments (WAVE) basic service set (WBSS) in wireless channels 5 at a vehicular proximity services (ProSe) function, deciding at the ProSe function to authorize registration of the UE to provide services over the WBSS, and sending a registration response from the ProSe function confirming WBSS information to be used for the services after deciding to authorize the UE. | 1.-21. (canceled) 23. A machine-readable medium having instructions thereon that when operated on by the machine cause the machine to perform operations comprising;
receiving a registration request from a user equipment (UE) in a vehicular environment to provide services over a wireless access in vehicular environments (WAVE) basic service set (WBSS) in wireless channels at a vehicular proximity services (ProSe) function; deciding at the ProSe function to authorize registration of the UE to provide services over the WBSS; and sending a registration response from the ProSe function confirming WBSS information to be used for the services after deciding to authorize the UE. 24. The medium of claim 23, wherein the wireless channels are dedicated short range communications channels.) 23. The medium of claim 23, wherein the wireless channels are 802.11p channels. 26. The medium of claim 23, wherein the registration request includes WBSS information including configuration parameters from the UE. 27. The medium of claim 26, wherein the WBSS information corresponds to a WBSS from which the UE wishes to obtain announcements. 28. The medium of claim 26, wherein the WBSS information corresponds to a WBSS within which the UE wishes to transmit messages 29. The medium of claim 28, wherein the messages comprise basic safety messages (BSM). 30. The medium of claim 23, wherein sending a registration response comprises sending WBSS information from the ProSe function to change WBSS configuration parameters from parameters of the registration request. 31. The medium of claim 23, wherein the WBSS information include one or more of:
a basic service set identifier (BSSID); as DSRC channel number, for example a control channel (CCH) or a service channel (SCH); UE authentication information; and one or more service ids, such as a Provider Service Identifier (PSID) which uniquely defines application services provided by a higher layer entity. 32. The medium of claim 23, wherein deciding to authorize comprises Authenticating the UE's credentials with an intelligent transportation system (ITS) server. 33. The medium of claim 23, wherein receiving the registration request comprises receiving the registration request at an evolved node B (eNB) and wherein deciding comprises confirming authorization of the UE at a ProSe function in a core network (CN). 34. The medium of claim 23, wherein receiving the registration request comprises receiving the registration request in an Attach Request or Tracking Area Update Request message. 35. Processing circuitry of a user equipment (UE) in a vehicular environment, the processing circuitry to:
receive an announcement of availability of a wireless access in vehicular environments (WAVE) basic service set (WBSS) at the UE from a vehicular environment proximity services (ProSe) Function, the announcement including a list of services provided by the announced WBSS; determine at the UE whether the UE is subscribed to a listed service of the announced WBSS; and start operation by the UE in the announced WBSS if the UE is subscribed by joining the WBSS without sending a response to the ProSe Function. 36. The processing circuitry of claim 35 wherein the announcement is received as one of a broadcast, a multicast, or a unicast. 37. The processing circuitry of claim 35, wherein the circuitry is to start operation by receiving basic safety messages (BSM) over a wireless local area network (WLAN) 38. An apparatus comprising:
means for receiving a message including a Proximity Services (ProSe) capability indication to indicate at least one ProSe capability of a user equipment (UE) in a vehicular environment; means for storing the capability indication; means for providing the capability information to a ProSe functionality to authorize capabilities indicated by the capability information; means for generating a message to the UE including a ProSe authorized indication to indicate that the UE is authorized to use ProSe to communicate with other UEs in the vehicular environment. 39. The apparatus of claim 38, wherein the received message is an Attach Request message and the capability indication is included in a UE Network Capability information element (IE) in the Attach Request message. 40. The apparatus of claim 38, wherein the received message is a Tracking Area Update Request message and the capability indication is included in a UE Network Capability information dement (IE) in the Tracking Area Update Request message. 41. The apparatus of claim 38, wherein the means for receiving, means for storing and means for generating are comprised of an evolved node B eNB and wherein the means for providing provides the capability information to a ProSe functionality of a packet data network gateway (PGW). | The discovery and establishment of communication groups is described for wireless vehicular communications. Some embodiments include receiving a registration request from a user equipment (UE) in a vehicular environment to provide services over a wireless access in vehicular environments (WAVE) basic service set (WBSS) in wireless channels 5 at a vehicular proximity services (ProSe) function, deciding at the ProSe function to authorize registration of the UE to provide services over the WBSS, and sending a registration response from the ProSe function confirming WBSS information to be used for the services after deciding to authorize the UE.1.-21. (canceled) 23. A machine-readable medium having instructions thereon that when operated on by the machine cause the machine to perform operations comprising;
receiving a registration request from a user equipment (UE) in a vehicular environment to provide services over a wireless access in vehicular environments (WAVE) basic service set (WBSS) in wireless channels at a vehicular proximity services (ProSe) function; deciding at the ProSe function to authorize registration of the UE to provide services over the WBSS; and sending a registration response from the ProSe function confirming WBSS information to be used for the services after deciding to authorize the UE. 24. The medium of claim 23, wherein the wireless channels are dedicated short range communications channels.) 23. The medium of claim 23, wherein the wireless channels are 802.11p channels. 26. The medium of claim 23, wherein the registration request includes WBSS information including configuration parameters from the UE. 27. The medium of claim 26, wherein the WBSS information corresponds to a WBSS from which the UE wishes to obtain announcements. 28. The medium of claim 26, wherein the WBSS information corresponds to a WBSS within which the UE wishes to transmit messages 29. The medium of claim 28, wherein the messages comprise basic safety messages (BSM). 30. The medium of claim 23, wherein sending a registration response comprises sending WBSS information from the ProSe function to change WBSS configuration parameters from parameters of the registration request. 31. The medium of claim 23, wherein the WBSS information include one or more of:
a basic service set identifier (BSSID); as DSRC channel number, for example a control channel (CCH) or a service channel (SCH); UE authentication information; and one or more service ids, such as a Provider Service Identifier (PSID) which uniquely defines application services provided by a higher layer entity. 32. The medium of claim 23, wherein deciding to authorize comprises Authenticating the UE's credentials with an intelligent transportation system (ITS) server. 33. The medium of claim 23, wherein receiving the registration request comprises receiving the registration request at an evolved node B (eNB) and wherein deciding comprises confirming authorization of the UE at a ProSe function in a core network (CN). 34. The medium of claim 23, wherein receiving the registration request comprises receiving the registration request in an Attach Request or Tracking Area Update Request message. 35. Processing circuitry of a user equipment (UE) in a vehicular environment, the processing circuitry to:
receive an announcement of availability of a wireless access in vehicular environments (WAVE) basic service set (WBSS) at the UE from a vehicular environment proximity services (ProSe) Function, the announcement including a list of services provided by the announced WBSS; determine at the UE whether the UE is subscribed to a listed service of the announced WBSS; and start operation by the UE in the announced WBSS if the UE is subscribed by joining the WBSS without sending a response to the ProSe Function. 36. The processing circuitry of claim 35 wherein the announcement is received as one of a broadcast, a multicast, or a unicast. 37. The processing circuitry of claim 35, wherein the circuitry is to start operation by receiving basic safety messages (BSM) over a wireless local area network (WLAN) 38. An apparatus comprising:
means for receiving a message including a Proximity Services (ProSe) capability indication to indicate at least one ProSe capability of a user equipment (UE) in a vehicular environment; means for storing the capability indication; means for providing the capability information to a ProSe functionality to authorize capabilities indicated by the capability information; means for generating a message to the UE including a ProSe authorized indication to indicate that the UE is authorized to use ProSe to communicate with other UEs in the vehicular environment. 39. The apparatus of claim 38, wherein the received message is an Attach Request message and the capability indication is included in a UE Network Capability information element (IE) in the Attach Request message. 40. The apparatus of claim 38, wherein the received message is a Tracking Area Update Request message and the capability indication is included in a UE Network Capability information dement (IE) in the Tracking Area Update Request message. 41. The apparatus of claim 38, wherein the means for receiving, means for storing and means for generating are comprised of an evolved node B eNB and wherein the means for providing provides the capability information to a ProSe functionality of a packet data network gateway (PGW). | 2,400 |
8,859 | 8,859 | 15,465,498 | 2,477 | Methods, systems, and devices for wireless communication are described for a data channel-referenced resource allocation for a control channel. In an implementation, a user equipment (UE) may identify, for a transmission time interval (TTI), a first uplink resource allocation to the UE of a first channel. The UE may determine, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE. The UE may transmit, during the TTI, the first channel and the second channel. | 1. A method for wireless communication, comprising:
identifying, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel; determining, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and transmitting, during the TTI, the first channel and the second channel. 2. The method of claim 1, wherein the first channel is a data channel and the second channel is a control channel. 3. The method of claim 1, wherein the first uplink resource allocation of the first channel and the second uplink resource allocation of the second channel are physically contiguous at least during a portion of the TTI. 4. The method of claim 1, wherein the second channel is mapped to a first frequency location for a first portion of the TTI and a second frequency location for a second portion of the TTI. 5. The method of claim 1, wherein the determining of the second uplink resource allocation comprises:
locating the second channel in a frequency resource adjacent to at least one of a lower boundary or an upper boundary of the first uplink resource allocation. 6. The method of claim 1, wherein a size of the second uplink resource allocation of the second channel is determined based at least in part on at least one of an indication in a control channel, a size of the first uplink resource allocation of the first channel, a payload size of information carried on the second channel, a location of the first uplink resource allocation of the first channel, a format of the second channel, a duration of the TTI, or a combination thereof. 7. The method of claim 1, wherein information of a first type is mapped to the first channel and information of a second type is mapped to the second channel. 8. The method of claim 7, wherein the information of the first type comprises data and the information of the second type comprises uplink control information. 9. The method of claim 8, further comprising:
mapping a first portion of the uplink control information to the first channel; and mapping a second portion of the uplink control information to the second channel. 10. The method of claim 1, further comprising:
receiving an allocation message indicating the first uplink resource allocation and a number of subcarriers for the second channel. 11. The method of claim 1, further comprising:
receiving an allocation message indicating the first uplink resource allocation. 12. The method of claim 1, wherein the first uplink resource allocation has a first granularity and the second uplink resource allocation has a second granularity different from the first granularity. 13. The method of claim 1, wherein the second channel is orthogonalized to a channel for at least one other UE transmitted in at least a portion of the second uplink resource allocation using a spreading code or a precoding matrix. 14. The method of claim 1, wherein the determining of the second uplink resource allocation comprises:
locating the second channel in a frequency resource interposed within the first uplink resource allocation. 15. The method of claim 14, wherein the second channel is not adjacent to a lower frequency boundary or an upper frequency boundary of the first uplink resource allocation. 16. The method of claim 1, wherein the transmitting, during the TTI, the first channel and the second channel comprises:
generating a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform for the first channel; and generating a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the second channel. 17. The method of claim 1, wherein the transmitting, during the TTI, the first channel and the second channel comprises:
generating a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the first channel; and generating a DFT-S-OFDM waveform for the second channel. 18. The method of claim 1, further comprising:
determining that the UE is to use a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform or a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform during a second TTI; determining to multiplex data information with control information into the first channel for the second TTI; and transmitting, during the second TTI, the multiplexed data and control information in the first channel using the DFT-S-OFDM waveform or the CP-OFDM waveform. 19. The method of claim 1, wherein the transmitting, during the TTI, the first channel and the second channel comprises:
determining, for the first channel, a plurality of precoding matrices associated with a plurality of layers for the TTI; applying the plurality of precoding matrices to precode information of a first type for transmission of the first channel over the plurality of layers; and applying one of the plurality of precoding matrices to precode information of a second type for transmission of the second channel over one of the plurality of layers. 20. The method of claim 1, wherein transmitting, during the TTI, the first channel and the second channel comprises:
time-division multiplexing the first channel with the second channel during the TTI. 21. The method of claim 20, further comprising:
determining to time-division multiplex the first channel with the second channel based at least in part on a duration of the TTI, a size of the first uplink resource allocation of the first channel, a payload size of information carried on the second channel, or combinations thereof. 22. An apparatus for wireless communication, in a system comprising:
a processor; memory in electronic communication with the processor; and instructions stored in the memory and operable, when executed by the processor, to cause the apparatus to:
identify, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel;
determine, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and
transmit, during the TTI, the first channel and the second channel. 23. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
locate the second channel in a frequency resource adjacent to at least one of a lower boundary or an upper boundary of the first uplink resource allocation. 24. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
map information of a first type to the first channel and information of a second type to the second channel. 25. The apparatus of claim 22, wherein the instructions when executed by the processor to cause the apparatus to determine the second uplink resource allocation further comprise instructions that, when executed by the processor, cause the apparatus to:
locate the second channel in a frequency resource interposed within the first uplink resource allocation. 26. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
generate a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform for the first channel; and generate a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the second channel. 27. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
generate a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the first channel; and generate a DFT-S-OFDM waveform for the second channel. 28. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
determine that the UE is to use a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform or a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform during a second TTI; determine to multiplex data information with control information into the first channel for the second TTI; and transmit, during the second TTI, the multiplexed data and control information in the first channel using the DFT-S-OFDM waveform or the CP-OFDM waveform. 29. An apparatus for wireless communication, comprising:
means for identifying, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel; means for determining, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and means for transmitting, during the TTI, the first channel and the second channel. 30. A non-transitory computer readable medium storing code for wireless communication, the code comprising instructions executable by a processor to:
identify, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel; determine, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and transmit, during the TTI, the first channel and the second channel. | Methods, systems, and devices for wireless communication are described for a data channel-referenced resource allocation for a control channel. In an implementation, a user equipment (UE) may identify, for a transmission time interval (TTI), a first uplink resource allocation to the UE of a first channel. The UE may determine, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE. The UE may transmit, during the TTI, the first channel and the second channel.1. A method for wireless communication, comprising:
identifying, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel; determining, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and transmitting, during the TTI, the first channel and the second channel. 2. The method of claim 1, wherein the first channel is a data channel and the second channel is a control channel. 3. The method of claim 1, wherein the first uplink resource allocation of the first channel and the second uplink resource allocation of the second channel are physically contiguous at least during a portion of the TTI. 4. The method of claim 1, wherein the second channel is mapped to a first frequency location for a first portion of the TTI and a second frequency location for a second portion of the TTI. 5. The method of claim 1, wherein the determining of the second uplink resource allocation comprises:
locating the second channel in a frequency resource adjacent to at least one of a lower boundary or an upper boundary of the first uplink resource allocation. 6. The method of claim 1, wherein a size of the second uplink resource allocation of the second channel is determined based at least in part on at least one of an indication in a control channel, a size of the first uplink resource allocation of the first channel, a payload size of information carried on the second channel, a location of the first uplink resource allocation of the first channel, a format of the second channel, a duration of the TTI, or a combination thereof. 7. The method of claim 1, wherein information of a first type is mapped to the first channel and information of a second type is mapped to the second channel. 8. The method of claim 7, wherein the information of the first type comprises data and the information of the second type comprises uplink control information. 9. The method of claim 8, further comprising:
mapping a first portion of the uplink control information to the first channel; and mapping a second portion of the uplink control information to the second channel. 10. The method of claim 1, further comprising:
receiving an allocation message indicating the first uplink resource allocation and a number of subcarriers for the second channel. 11. The method of claim 1, further comprising:
receiving an allocation message indicating the first uplink resource allocation. 12. The method of claim 1, wherein the first uplink resource allocation has a first granularity and the second uplink resource allocation has a second granularity different from the first granularity. 13. The method of claim 1, wherein the second channel is orthogonalized to a channel for at least one other UE transmitted in at least a portion of the second uplink resource allocation using a spreading code or a precoding matrix. 14. The method of claim 1, wherein the determining of the second uplink resource allocation comprises:
locating the second channel in a frequency resource interposed within the first uplink resource allocation. 15. The method of claim 14, wherein the second channel is not adjacent to a lower frequency boundary or an upper frequency boundary of the first uplink resource allocation. 16. The method of claim 1, wherein the transmitting, during the TTI, the first channel and the second channel comprises:
generating a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform for the first channel; and generating a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the second channel. 17. The method of claim 1, wherein the transmitting, during the TTI, the first channel and the second channel comprises:
generating a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the first channel; and generating a DFT-S-OFDM waveform for the second channel. 18. The method of claim 1, further comprising:
determining that the UE is to use a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform or a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform during a second TTI; determining to multiplex data information with control information into the first channel for the second TTI; and transmitting, during the second TTI, the multiplexed data and control information in the first channel using the DFT-S-OFDM waveform or the CP-OFDM waveform. 19. The method of claim 1, wherein the transmitting, during the TTI, the first channel and the second channel comprises:
determining, for the first channel, a plurality of precoding matrices associated with a plurality of layers for the TTI; applying the plurality of precoding matrices to precode information of a first type for transmission of the first channel over the plurality of layers; and applying one of the plurality of precoding matrices to precode information of a second type for transmission of the second channel over one of the plurality of layers. 20. The method of claim 1, wherein transmitting, during the TTI, the first channel and the second channel comprises:
time-division multiplexing the first channel with the second channel during the TTI. 21. The method of claim 20, further comprising:
determining to time-division multiplex the first channel with the second channel based at least in part on a duration of the TTI, a size of the first uplink resource allocation of the first channel, a payload size of information carried on the second channel, or combinations thereof. 22. An apparatus for wireless communication, in a system comprising:
a processor; memory in electronic communication with the processor; and instructions stored in the memory and operable, when executed by the processor, to cause the apparatus to:
identify, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel;
determine, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and
transmit, during the TTI, the first channel and the second channel. 23. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
locate the second channel in a frequency resource adjacent to at least one of a lower boundary or an upper boundary of the first uplink resource allocation. 24. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
map information of a first type to the first channel and information of a second type to the second channel. 25. The apparatus of claim 22, wherein the instructions when executed by the processor to cause the apparatus to determine the second uplink resource allocation further comprise instructions that, when executed by the processor, cause the apparatus to:
locate the second channel in a frequency resource interposed within the first uplink resource allocation. 26. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
generate a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform for the first channel; and generate a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the second channel. 27. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
generate a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform for the first channel; and generate a DFT-S-OFDM waveform for the second channel. 28. The apparatus of claim 22, further comprising instructions that, when executed by the processor, cause the apparatus to:
determine that the UE is to use a discrete Fourier transform spread orthogonal frequency division multiplexing (DFT-S-OFDM) waveform or a cyclic prefix orthogonal frequency division multiplexing (CP-OFDM) waveform during a second TTI; determine to multiplex data information with control information into the first channel for the second TTI; and transmit, during the second TTI, the multiplexed data and control information in the first channel using the DFT-S-OFDM waveform or the CP-OFDM waveform. 29. An apparatus for wireless communication, comprising:
means for identifying, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel; means for determining, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and means for transmitting, during the TTI, the first channel and the second channel. 30. A non-transitory computer readable medium storing code for wireless communication, the code comprising instructions executable by a processor to:
identify, for a transmission time interval (TTI), a first uplink resource allocation to a user equipment (UE) of a first channel; determine, based at least in part on the first uplink resource allocation of the first channel, a second uplink resource allocation of a second channel to the UE; and transmit, during the TTI, the first channel and the second channel. | 2,400 |
8,860 | 8,860 | 15,783,863 | 2,414 | The present disclosure relates to a method for use in a wireless communication device reporting ACK or NACK in dynamic TDD configurations. In the method, an indication of a reference UL TDD configuration and a reference DL TDD configuration is indicated. Then, ACK or NACK bits with a fixed number of the ACK or NACK bits based on the reference DL TDD configuration are reported at a timing based on the reference DL TDD configuration. The present disclosure also relates to a wireless communication device for reporting ACK/NACK in dynamic TDD configurations. | 1. A method for use in a wireless communication device reporting acknowledgement (ACK) or non-acknowledgement (NACK) in dynamic time division duplex (TDD) configurations, the method comprising:
receiving an indication of a reference uplink (UL) TDD configuration and a reference downlink (DL) TDD configuration; and reporting ACK or NACK bits with a fixed number of the ACK or NACK bits based on the reference DL TDD configuration at a timing based on the reference DL TDD configuration. 2. The method of claim 1, further comprising:
receiving downlink control information (DCI) for UL scheduling based on the reference DL TDD configuration; and interpreting the DCI for UL scheduling based on the reference UL TDD configuration. 3. The method of claim 1, wherein the fixed number of the ACK or NACK bits is determined based on the maximum bit number available in the reference DL TDD configuration for one or more DL subframes allocated to the wireless communication device. 4. The method of claim 1, wherein the reference UL TDD configuration is TDD configuration 0, and the reference DL TDD configuration is one of TDD configurations 1-6. 5. The method of claim 4, wherein the reference DL TDD configuration is TDD configuration 1 or TDD configuration 2. 6. The method of claim 1, wherein each ACK or NACK bit corresponds to a DL subframe mapping to a current UL physical uplink shared channel (PUSCH). 7. The method of claim 1, wherein if physical downlink control channel (PDCCH) for DL scheduling is not detected in a DL subframe, an ACK or NACK bit corresponding to the DL subframe is set to NACK. 8. The method of claim 1, wherein if no DCI for DL scheduling is detected in any DL subframe, the ACK or NACK bits are not reported. 9. The method of claim 1, wherein the ACK or NACK bits are separately encoded and mapped to separate resource elements in UL transmission. 10. The method of claim 1, wherein the DCI for UL scheduling comprises DCI format 0. 11. A wireless communication device for reporting acknowledgement (ACK) or non-acknowledgement (NACK) in dynamic time division duplex (TDD) configurations, the wireless communication device comprising a receiver, a transmitter, a memory and a processor,
wherein the memory is configured to store TDD configurations; the processor is configured to control the receiver to receive an indication of a reference uplink (UL) TDD configuration and a reference downlink (DL) TDD configuration; and the processor is configured to control the transmitter to report ACK or NACK bits with a fixed number of the ACK or NACK bits based on the reference DL TDD configuration at a timing based on the reference DL TDD configuration. 12. The wireless communication device of claim 11, wherein
the processor is further configured to control the receiver to receive downlink control information (DCI) for UL scheduling based on the reference DL TDD configuration; and the processor is further configured to interpret the DCI for UL scheduling based on the reference UL TDD configuration. 13. The wireless communication device of claim 11, wherein the fixed number of the ACK or NACK bits is determined based on the maximum bit number available in the reference DL TDD configuration for one or more DL subframes allocated to the wireless communication device. 14. The wireless communication device of claim 11, wherein the reference UL TDD configuration is TDD configuration 0, and the reference DL TDD configuration is one of TDD configurations 1-6. 15. The wireless communication device of claim 14, wherein the reference DL TDD configuration is TDD configuration 1 or TDD configuration 2. 16. The wireless communication device of claim 11, wherein each ACK or NACK bit corresponds to a DL subframe mapping to a current UL physical uplink shared channel (PUSCH). 17. The wireless communication device of claim 11, wherein if the receiver does not receive physical downlink control channel (PDCCH) for DL scheduling in a DL subframe, the processor sets an ACK or NACK bit corresponding to the DL subframe to NACK. 18. The wireless communication device of claim 11, wherein if the receiver receives no DCI for DL scheduling in any DL subframe, the processor controls the transmitter not to report the ACK or NACK bits. 19. The wireless communication device of claim 11, wherein the processor separately encodes ACK or NACK bits and maps the encoded ACK or NACK bits to separate resource elements in UL transmission. 20. The wireless communication device of claim 11, wherein the DCI for UL scheduling comprises DCI format 0. | The present disclosure relates to a method for use in a wireless communication device reporting ACK or NACK in dynamic TDD configurations. In the method, an indication of a reference UL TDD configuration and a reference DL TDD configuration is indicated. Then, ACK or NACK bits with a fixed number of the ACK or NACK bits based on the reference DL TDD configuration are reported at a timing based on the reference DL TDD configuration. The present disclosure also relates to a wireless communication device for reporting ACK/NACK in dynamic TDD configurations.1. A method for use in a wireless communication device reporting acknowledgement (ACK) or non-acknowledgement (NACK) in dynamic time division duplex (TDD) configurations, the method comprising:
receiving an indication of a reference uplink (UL) TDD configuration and a reference downlink (DL) TDD configuration; and reporting ACK or NACK bits with a fixed number of the ACK or NACK bits based on the reference DL TDD configuration at a timing based on the reference DL TDD configuration. 2. The method of claim 1, further comprising:
receiving downlink control information (DCI) for UL scheduling based on the reference DL TDD configuration; and interpreting the DCI for UL scheduling based on the reference UL TDD configuration. 3. The method of claim 1, wherein the fixed number of the ACK or NACK bits is determined based on the maximum bit number available in the reference DL TDD configuration for one or more DL subframes allocated to the wireless communication device. 4. The method of claim 1, wherein the reference UL TDD configuration is TDD configuration 0, and the reference DL TDD configuration is one of TDD configurations 1-6. 5. The method of claim 4, wherein the reference DL TDD configuration is TDD configuration 1 or TDD configuration 2. 6. The method of claim 1, wherein each ACK or NACK bit corresponds to a DL subframe mapping to a current UL physical uplink shared channel (PUSCH). 7. The method of claim 1, wherein if physical downlink control channel (PDCCH) for DL scheduling is not detected in a DL subframe, an ACK or NACK bit corresponding to the DL subframe is set to NACK. 8. The method of claim 1, wherein if no DCI for DL scheduling is detected in any DL subframe, the ACK or NACK bits are not reported. 9. The method of claim 1, wherein the ACK or NACK bits are separately encoded and mapped to separate resource elements in UL transmission. 10. The method of claim 1, wherein the DCI for UL scheduling comprises DCI format 0. 11. A wireless communication device for reporting acknowledgement (ACK) or non-acknowledgement (NACK) in dynamic time division duplex (TDD) configurations, the wireless communication device comprising a receiver, a transmitter, a memory and a processor,
wherein the memory is configured to store TDD configurations; the processor is configured to control the receiver to receive an indication of a reference uplink (UL) TDD configuration and a reference downlink (DL) TDD configuration; and the processor is configured to control the transmitter to report ACK or NACK bits with a fixed number of the ACK or NACK bits based on the reference DL TDD configuration at a timing based on the reference DL TDD configuration. 12. The wireless communication device of claim 11, wherein
the processor is further configured to control the receiver to receive downlink control information (DCI) for UL scheduling based on the reference DL TDD configuration; and the processor is further configured to interpret the DCI for UL scheduling based on the reference UL TDD configuration. 13. The wireless communication device of claim 11, wherein the fixed number of the ACK or NACK bits is determined based on the maximum bit number available in the reference DL TDD configuration for one or more DL subframes allocated to the wireless communication device. 14. The wireless communication device of claim 11, wherein the reference UL TDD configuration is TDD configuration 0, and the reference DL TDD configuration is one of TDD configurations 1-6. 15. The wireless communication device of claim 14, wherein the reference DL TDD configuration is TDD configuration 1 or TDD configuration 2. 16. The wireless communication device of claim 11, wherein each ACK or NACK bit corresponds to a DL subframe mapping to a current UL physical uplink shared channel (PUSCH). 17. The wireless communication device of claim 11, wherein if the receiver does not receive physical downlink control channel (PDCCH) for DL scheduling in a DL subframe, the processor sets an ACK or NACK bit corresponding to the DL subframe to NACK. 18. The wireless communication device of claim 11, wherein if the receiver receives no DCI for DL scheduling in any DL subframe, the processor controls the transmitter not to report the ACK or NACK bits. 19. The wireless communication device of claim 11, wherein the processor separately encodes ACK or NACK bits and maps the encoded ACK or NACK bits to separate resource elements in UL transmission. 20. The wireless communication device of claim 11, wherein the DCI for UL scheduling comprises DCI format 0. | 2,400 |
8,861 | 8,861 | 14,657,617 | 2,481 | According to certain aspects, an apparatus for coding video information includes a memory and a processor configured to determine whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and in response to determining that the first syntax element is not present in the bitstream: obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and determine whether to set the first flag equal to a second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. | 1. An apparatus for coding video information, comprising:
a memory for storing video information associated with a plurality of layers; and a hardware processor operationally coupled to the memory and configured to:
determine whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and
in response to determining that the first syntax element is not present in the bitstream:
obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determine whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 2. The apparatus of claim 1, wherein the processor is configured to set the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 3. The apparatus of claim 1, wherein the processor is configured to set the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 4. The apparatus of claim 1, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 5. The apparatus of claim 4, wherein the first flag comprises sps_temporal_id_nesting_flag. 6. The apparatus of claim 4, wherein the first picture is not used as a reference picture when the value of the first flag is equal to 1. 7. The apparatus of claim 1, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. 8. The apparatus of claim 7, wherein the second flag comprises vps_temporal_id_nesting_flag. 9. The apparatus of claim 1, wherein the first syntax element comprises sps— temporal_id_nesting_flag and the second syntax element comprises sps_max_sub_layers_minus1. 10. A method of coding video information, comprising:
storing video information associated with a plurality of layers; determining whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and in response to determining that the first syntax element is not present in the bitstream:
obtaining a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determining whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 11. The method of claim 10, wherein said determining whether to set the value of the first flag equal to the value of the second flag comprises setting the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 12. The method of claim 10, wherein said determining whether to set the value of the first flag equal to the value of the second flag comprises setting the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 13. The method of claim 10, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 14. The method of claim 13, wherein the first flag comprises sps_temporal_id_nesting_flag. 15. The method of claim 13, wherein the first picture is not used as a reference picture when the value of the first flag is equal to 1. 16. The method of claim 10, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. 17. The method of claim 16, wherein the second flag comprises vps_temporal_id_nesting_flag. 18. The method of claim 10, wherein the first syntax element comprises sps— temporal_id_nesting_flag and the second syntax element comprises sps_max_sub_layers_minus1. 19. A non-transitory computer readable medium comprising instructions that when executed on a processor comprising computer hardware cause the processor to:
store video information associated with a plurality of layers; determine whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and in response to determining that the first syntax element is not present in the bitstream:
obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determine whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 20. The computer readable medium of claim 19, wherein the instructions further cause the processor to set the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 21. The computer readable medium of claim 19, wherein the instructions further cause the processor to set the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 22. The computer readable medium of claim 19, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 23. The computer readable medium of claim 19, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. 24. An apparatus for coding video information, comprising:
means for storing video information associated with a plurality of layers; means for determining whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested, the means configured to:
in response to determining that the first syntax element is not present in the bitstream:
obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determine whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 25. The apparatus of claim 24, wherein the means for determining whether the first syntax element is present in the bitstream is configured to set the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 26. The apparatus of claim 24, wherein the means for determining whether the first syntax element is present in the bitstream is configured to set the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 27. The apparatus of claim 24, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 28. The apparatus of claim 24, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. | According to certain aspects, an apparatus for coding video information includes a memory and a processor configured to determine whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and in response to determining that the first syntax element is not present in the bitstream: obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and determine whether to set the first flag equal to a second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element.1. An apparatus for coding video information, comprising:
a memory for storing video information associated with a plurality of layers; and a hardware processor operationally coupled to the memory and configured to:
determine whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and
in response to determining that the first syntax element is not present in the bitstream:
obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determine whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 2. The apparatus of claim 1, wherein the processor is configured to set the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 3. The apparatus of claim 1, wherein the processor is configured to set the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 4. The apparatus of claim 1, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 5. The apparatus of claim 4, wherein the first flag comprises sps_temporal_id_nesting_flag. 6. The apparatus of claim 4, wherein the first picture is not used as a reference picture when the value of the first flag is equal to 1. 7. The apparatus of claim 1, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. 8. The apparatus of claim 7, wherein the second flag comprises vps_temporal_id_nesting_flag. 9. The apparatus of claim 1, wherein the first syntax element comprises sps— temporal_id_nesting_flag and the second syntax element comprises sps_max_sub_layers_minus1. 10. A method of coding video information, comprising:
storing video information associated with a plurality of layers; determining whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and in response to determining that the first syntax element is not present in the bitstream:
obtaining a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determining whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 11. The method of claim 10, wherein said determining whether to set the value of the first flag equal to the value of the second flag comprises setting the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 12. The method of claim 10, wherein said determining whether to set the value of the first flag equal to the value of the second flag comprises setting the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 13. The method of claim 10, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 14. The method of claim 13, wherein the first flag comprises sps_temporal_id_nesting_flag. 15. The method of claim 13, wherein the first picture is not used as a reference picture when the value of the first flag is equal to 1. 16. The method of claim 10, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. 17. The method of claim 16, wherein the second flag comprises vps_temporal_id_nesting_flag. 18. The method of claim 10, wherein the first syntax element comprises sps— temporal_id_nesting_flag and the second syntax element comprises sps_max_sub_layers_minus1. 19. A non-transitory computer readable medium comprising instructions that when executed on a processor comprising computer hardware cause the processor to:
store video information associated with a plurality of layers; determine whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested; and in response to determining that the first syntax element is not present in the bitstream:
obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determine whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 20. The computer readable medium of claim 19, wherein the instructions further cause the processor to set the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 21. The computer readable medium of claim 19, wherein the instructions further cause the processor to set the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 22. The computer readable medium of claim 19, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 23. The computer readable medium of claim 19, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. 24. An apparatus for coding video information, comprising:
means for storing video information associated with a plurality of layers; means for determining whether a first syntax element is present in a bitstream, the first syntax element associated with a sequence parameter set (SPS) and a first flag indicative of whether a temporal identifier (ID) of a reference picture for pictures that refer to the SPS can be nested, the means configured to:
in response to determining that the first syntax element is not present in the bitstream:
obtain a second syntax element indicative of a maximum number of temporal sub-layers in a particular layer of the plurality of layers; and
determine whether to set a value of the first flag equal to a value of a second flag, the second flag indicative of whether a temporal ID of a reference picture for any pictures can be nested based at least in part on a value of the second syntax element. 25. The apparatus of claim 24, wherein the means for determining whether the first syntax element is present in the bitstream is configured to set the value of the first flag equal to the value of the second flag, in response to the value of the second syntax element being greater than 0, the second flag associated with a video parameter set (VPS) in the bitstream. 26. The apparatus of claim 24, wherein the means for determining whether the first syntax element is present in the bitstream is configured to set the value of the first flag equal to 1, in response to the value of the second syntax element being less than or equal to 0. 27. The apparatus of claim 24, wherein the first flag indicates whether a current picture in a current access unit (AU) referring to the SPS can use a first picture as a reference picture wherein the first picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a second picture has a temporal ID lower than the temporal ID of the first picture and follows the first picture but precedes the current picture in decoding order. 28. The apparatus of claim 24, wherein the second flag indicates whether a current picture in a current AU can use a third picture as a reference picture wherein the third picture has a temporal ID that is lower than or equal to a temporal ID of the current picture and precedes the current picture in decoding order when a fourth picture has a temporal ID lower than the temporal ID of the third picture and follows the third picture but precedes the current picture in decoding order. | 2,400 |
8,862 | 8,862 | 14,870,600 | 2,453 | A system and method for stateless distribution of bidirectional flows with network address translation (NAT). The method comprises: determining an original source port for a first packet of a front-end received from a client device, wherein the original source port is associated with a processing core; selecting a new source port for a back-end flow, wherein the new source port is selected such that the back-end flow is returned to the processing core of the front-end flow; replacing the original source port with the new source port; and transmitting the incoming flow to a destination server. | 1. A method for stateless distribution of bidirectional flows with network address translation (NAT), comprising:
determining an original source port for a first packet of a front-end flow received from a client device, wherein the original source port is associated with a processing core; selecting a new source port for a back-end flow, wherein the new source port is selected such that the back-end flow is returned to the processing core of the front-end flow; replacing the original source port with the new source port; and transmitting the incoming flow to a destination server. 2. The method of claim 1, wherein the back-end flow is directed to the destination server. 3. The method of claim 1, wherein selecting the new source port further comprises:
selecting a port number ensuring that a first number of least significant bits of a receive-side scaling (RSS) result for the front-end flow are identical to a second number of least significant bits of a RSS result for the back-end flow. 4. The method of claim 3, further comprising:
applying a modulo operation between the first number of least significant bits of the result for the front-end flow and the second number of least significant bits of the RSS result for the back-end flow. 5. The method of claim 4, wherein the processing core is selected from a plurality of processing cores. 6. The method of claim 4, wherein the number of least significant bits of the RSS results is equal to or higher than the logarithm of the number of processing cores in the plurality of processing cores to base 2. 7. The method of claim 1, further comprising:
selecting the processing core based on at least one of: layer 3 parameters of an Open Systems Intercommunication (OSI) model, and layer 4 parameters of an OSI model. 8. The method of claim 1, wherein transmitting the incoming flow to the destination server further comprises:
performing a network address translation (NAT) on at least one of: a source internet protocol (IP) address, a destination IP address, a source port number, and a destination port number. 9. The method of claim 8, wherein the NAT is any of: static NAT, dynamic NAT, and port address translation. 10. The method of claim 1, further comprising:
saving the new source port and the corresponding original source port in a local session table. 11. The method of claim 10, further comprising:
receiving, by the processing core, a subsequent packet belonging to the flow of the first packet; looking up the new selected source port matching a source port designated in the subsequent packet; replacing the source port designated in the subsequent packet with the new source port; and sending the subsequent packet to the destination server. 12. The method of claim 10, further comprising:
receiving, by the processing core, a packet from the destination server, wherein the packet belongs to the flow of the first packet; looking up the original source port matching the new selected source port designated in the received packet; replacing the new selected source port designated in the received packet with the original source port; and sending the subsequent packet to the client device. 13. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 14. A system for stateless distribution of bidirectional flows with network address translation, comprising:
a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: determine an original source port for a first packet of a front-end flow received from a client device, wherein the original source port is associated with a processing core; select a new source port for a back-end flow, wherein the new source port is selected such that the back-end flow is returned to the processing core of the front-end flow; replace the original source port with the new source port; and transmit the incoming flow to a destination server. 15. The system of claim 14, wherein the back-end flow is directed to the destination server. 16. The system of claim 14, wherein the system is further configured to:
select a port number ensuring that a first number of least significant bits of a receive-side scaling (RSS) result for the front-end flow are identical to a second number of least significant bits of a RSS result for the back-end flow. 17. The system of claim 16, wherein the system is further configured to:
apply a modulo operation between the first number of least significant bits of the result for the front-end flow and the second number of least significant bits of the RSS result for the back-end flow. 18. The system of claim 17, wherein the processing core is selected from a plurality of processing cores. 19. The system of claim 17, wherein the number of least significant bits of the RSS results is equal to or higher than the logarithm of the number of processing cores in the plurality of processing cores to base 2. 20. The system of claim 14, wherein the system is further configured to:
select the processing core based on at least one of: layer 3 parameters of an Open Systems Intercommunication (OSI) model, and layer 4 parameters of an OSI model. 21. The system of claim 14, wherein the system is further configured to:
perform a network address translation (NAT) on at least one of: an source internet protocol (IP) address, a destination IP address, a source port number, and a destination port number. 22. The system of claim 21, wherein the NAT is any of: static NAT, dynamic NAT, and port address translation. 23. The system of claim 14, wherein the system is further configured to:
save the new source port and the corresponding original source port in a local session table. 24. The system of claim 23, wherein the system is further configured to:
receive, by the processing core, a subsequent packet belonging to the flow of the first packet; look up the new selected source port matching a source port designated in the subsequent packet; replace the source port designated in the subsequent packet with the new source port; and send the subsequent packet to the destination server. 25. The system of claim 23, wherein the system is further configured to:
receive, by the processing core, a packet from the destination server, wherein the packet belongs to the flow of the first packet; look up the original source port matching the new selected source port designated in the received packet; replace the new selected source port designated in the received packet with the original source port; and send the subsequent packet to the client device. | A system and method for stateless distribution of bidirectional flows with network address translation (NAT). The method comprises: determining an original source port for a first packet of a front-end received from a client device, wherein the original source port is associated with a processing core; selecting a new source port for a back-end flow, wherein the new source port is selected such that the back-end flow is returned to the processing core of the front-end flow; replacing the original source port with the new source port; and transmitting the incoming flow to a destination server.1. A method for stateless distribution of bidirectional flows with network address translation (NAT), comprising:
determining an original source port for a first packet of a front-end flow received from a client device, wherein the original source port is associated with a processing core; selecting a new source port for a back-end flow, wherein the new source port is selected such that the back-end flow is returned to the processing core of the front-end flow; replacing the original source port with the new source port; and transmitting the incoming flow to a destination server. 2. The method of claim 1, wherein the back-end flow is directed to the destination server. 3. The method of claim 1, wherein selecting the new source port further comprises:
selecting a port number ensuring that a first number of least significant bits of a receive-side scaling (RSS) result for the front-end flow are identical to a second number of least significant bits of a RSS result for the back-end flow. 4. The method of claim 3, further comprising:
applying a modulo operation between the first number of least significant bits of the result for the front-end flow and the second number of least significant bits of the RSS result for the back-end flow. 5. The method of claim 4, wherein the processing core is selected from a plurality of processing cores. 6. The method of claim 4, wherein the number of least significant bits of the RSS results is equal to or higher than the logarithm of the number of processing cores in the plurality of processing cores to base 2. 7. The method of claim 1, further comprising:
selecting the processing core based on at least one of: layer 3 parameters of an Open Systems Intercommunication (OSI) model, and layer 4 parameters of an OSI model. 8. The method of claim 1, wherein transmitting the incoming flow to the destination server further comprises:
performing a network address translation (NAT) on at least one of: a source internet protocol (IP) address, a destination IP address, a source port number, and a destination port number. 9. The method of claim 8, wherein the NAT is any of: static NAT, dynamic NAT, and port address translation. 10. The method of claim 1, further comprising:
saving the new source port and the corresponding original source port in a local session table. 11. The method of claim 10, further comprising:
receiving, by the processing core, a subsequent packet belonging to the flow of the first packet; looking up the new selected source port matching a source port designated in the subsequent packet; replacing the source port designated in the subsequent packet with the new source port; and sending the subsequent packet to the destination server. 12. The method of claim 10, further comprising:
receiving, by the processing core, a packet from the destination server, wherein the packet belongs to the flow of the first packet; looking up the original source port matching the new selected source port designated in the received packet; replacing the new selected source port designated in the received packet with the original source port; and sending the subsequent packet to the client device. 13. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 14. A system for stateless distribution of bidirectional flows with network address translation, comprising:
a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: determine an original source port for a first packet of a front-end flow received from a client device, wherein the original source port is associated with a processing core; select a new source port for a back-end flow, wherein the new source port is selected such that the back-end flow is returned to the processing core of the front-end flow; replace the original source port with the new source port; and transmit the incoming flow to a destination server. 15. The system of claim 14, wherein the back-end flow is directed to the destination server. 16. The system of claim 14, wherein the system is further configured to:
select a port number ensuring that a first number of least significant bits of a receive-side scaling (RSS) result for the front-end flow are identical to a second number of least significant bits of a RSS result for the back-end flow. 17. The system of claim 16, wherein the system is further configured to:
apply a modulo operation between the first number of least significant bits of the result for the front-end flow and the second number of least significant bits of the RSS result for the back-end flow. 18. The system of claim 17, wherein the processing core is selected from a plurality of processing cores. 19. The system of claim 17, wherein the number of least significant bits of the RSS results is equal to or higher than the logarithm of the number of processing cores in the plurality of processing cores to base 2. 20. The system of claim 14, wherein the system is further configured to:
select the processing core based on at least one of: layer 3 parameters of an Open Systems Intercommunication (OSI) model, and layer 4 parameters of an OSI model. 21. The system of claim 14, wherein the system is further configured to:
perform a network address translation (NAT) on at least one of: an source internet protocol (IP) address, a destination IP address, a source port number, and a destination port number. 22. The system of claim 21, wherein the NAT is any of: static NAT, dynamic NAT, and port address translation. 23. The system of claim 14, wherein the system is further configured to:
save the new source port and the corresponding original source port in a local session table. 24. The system of claim 23, wherein the system is further configured to:
receive, by the processing core, a subsequent packet belonging to the flow of the first packet; look up the new selected source port matching a source port designated in the subsequent packet; replace the source port designated in the subsequent packet with the new source port; and send the subsequent packet to the destination server. 25. The system of claim 23, wherein the system is further configured to:
receive, by the processing core, a packet from the destination server, wherein the packet belongs to the flow of the first packet; look up the original source port matching the new selected source port designated in the received packet; replace the new selected source port designated in the received packet with the original source port; and send the subsequent packet to the client device. | 2,400 |
8,863 | 8,863 | 13,907,112 | 2,465 | A method and an apparatus for an interference measurement method of a terminal in a mobile communication system is provided. The method includes measuring a signal component based on at least one Channel Status Information-Reference Signal (CSI-RS) allocated by a base station, measuring an interference component based on at least one Interference Measurement Resource (IMR) allocated by a base station, receiving a feedback combination configuration of the signal component and the interference component, generating feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI), and transmitting the feedback information to the base station. | 1. An interference measurement method of a terminal in a mobile communication system, the method comprising:
measuring a signal component based on at least one Channel Status Information-Reference Signal (CSI-RS) allocated by a base station; measuring an interference component based on at least one Interference Measurement Resource (IMR) allocated by a base station; receiving a feedback combination configuration of the signal component and the interference component; generating feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI); and transmitting the feedback information to the base station. 2. The method of claim 1, wherein the receiving of the feedback combination configuration comprises receiving a feedback report configuration. 3. The method of claim 1, wherein the transmitting of the feedback information comprises selecting one of the at least one generated RI as a selected reference RI and transmitting the selected reference RI to the base station. 4. The method of claim 3, wherein the selecting of the at least one generated RI as the selected reference RI comprises selecting the selected reference RI based on at least one of the feedback combination configuration and the feedback report configuration. 5. The method of claim 2, wherein the receiving of the feedback report configuration comprises receiving the feedback report configuration through Radio Resource Control (RRC) signaling. 6. The method of claim 2, wherein the transmitting of the feedback information comprises transmitting one of the at least one generated CQI. 7. An interference measurement method of a base station in a mobile communication system, the method comprising:
allocating at least one Channel Status Information-Reference Signal (CSI-RS) for measuring a signal component and at least one Interference Measurement Resource (IMR) for measuring an interference component to a terminal; transmitting a feedback combination configuration of the signal component and the interference component; and receiving feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI) generated by the terminal based on the feedback combination configuration. 8. The method of claim 7, wherein the transmitting of the feedback combination configuration comprises receiving a feedback report configuration. 9. The method of claim 7, wherein the receiving of the feedback report configuration comprises receiving a reference RI selected from among the at least one RI generated by the terminal. 10. The method of claim 9, wherein the terminal selects one of the at least one RI to be the reference RI based on at least one of the feedback combination configuration and the feedback report configuration. 11. The method of claim 8, wherein the receiving of the feedback report configuration comprises receiving the feedback report configuration through a Radio Resource Control (RRC) signaling. 12. The method of claim 8, wherein the terminal transmits a difference value that is a difference of two of the at least one CQI from among plural CQI values. 13. A terminal of a mobile communication system, the terminal comprising:
a transceiver transmitting and receiving signals to and from a base station; and a control unit controlling measuring a signal component based on at least one Channel Status Information-Reference Signal (CSI-RS) allocated by a base station, measuring an interference component based on at least one Interference Measurement Resource (IMR) allocated by a base station, receiving a feedback combination configuration of the signal component and the interference component, generating feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI), and transmitting the feedback information to the base station. 14. The terminal of claim 13, wherein the control unit controls receiving a feedback report configuration. 15. The terminal of claim 13, wherein the control unit controls selecting one of the at least one generated RI as a selected reference RI and transmitting the selected reference RI to the base station. 16. The terminal of claim 15, wherein the control unit controls the selecting of the one of the at least one generated RI as the selected RI based on at least one of a feedback combination configuration and the feedback report configuration. 17. The terminal of claim 14, wherein the control unit controls the receiving of the feedback report configuration to be through Radio Resource Control (RRC) signaling. 18. The terminal of claim 14, wherein the control unit controls the transmitting of the feedback information to include transmitting one of the at least one generated CQI. 19. A base station of a mobile communication system, the base station comprising:
a transceiver transmitting and receiving signals to and from a terminal; and a control unit controlling the transceiver, allocating at least one Channel Status Information-Reference Signal (CSI-RS) for measuring a signal component and at least one Interference Measurement Resource (IMR) for measuring an interference component to a terminal, transmitting a feedback combination configuration of the signal component and the interference component, and receiving feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI) generated by the terminal based on the feedback combination configuration. 20. The base station of claim 19, wherein the control unit controls receiving a feedback report configuration. 21. The base station of claim 19, wherein the control unit controls receiving, when the feedback report configuration is a specific value, a reference RI selected from among the at least one RI generated by the terminal. 22. The base station of claim 21, wherein the terminal selects one of the at least one RI to be the reference RI based on at least one of the feedback combination configuration and the feedback report configuration. 23. The base station of claim 20, wherein the control unit controls the receiving of the feedback report configuration signal to be through a Radio Resource Control (RRC) signaling. 24. The base station of claim 20, wherein the terminal transmits a difference value that is a difference of two of the at least one CQI from among plural CQI values. | A method and an apparatus for an interference measurement method of a terminal in a mobile communication system is provided. The method includes measuring a signal component based on at least one Channel Status Information-Reference Signal (CSI-RS) allocated by a base station, measuring an interference component based on at least one Interference Measurement Resource (IMR) allocated by a base station, receiving a feedback combination configuration of the signal component and the interference component, generating feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI), and transmitting the feedback information to the base station.1. An interference measurement method of a terminal in a mobile communication system, the method comprising:
measuring a signal component based on at least one Channel Status Information-Reference Signal (CSI-RS) allocated by a base station; measuring an interference component based on at least one Interference Measurement Resource (IMR) allocated by a base station; receiving a feedback combination configuration of the signal component and the interference component; generating feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI); and transmitting the feedback information to the base station. 2. The method of claim 1, wherein the receiving of the feedback combination configuration comprises receiving a feedback report configuration. 3. The method of claim 1, wherein the transmitting of the feedback information comprises selecting one of the at least one generated RI as a selected reference RI and transmitting the selected reference RI to the base station. 4. The method of claim 3, wherein the selecting of the at least one generated RI as the selected reference RI comprises selecting the selected reference RI based on at least one of the feedback combination configuration and the feedback report configuration. 5. The method of claim 2, wherein the receiving of the feedback report configuration comprises receiving the feedback report configuration through Radio Resource Control (RRC) signaling. 6. The method of claim 2, wherein the transmitting of the feedback information comprises transmitting one of the at least one generated CQI. 7. An interference measurement method of a base station in a mobile communication system, the method comprising:
allocating at least one Channel Status Information-Reference Signal (CSI-RS) for measuring a signal component and at least one Interference Measurement Resource (IMR) for measuring an interference component to a terminal; transmitting a feedback combination configuration of the signal component and the interference component; and receiving feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI) generated by the terminal based on the feedback combination configuration. 8. The method of claim 7, wherein the transmitting of the feedback combination configuration comprises receiving a feedback report configuration. 9. The method of claim 7, wherein the receiving of the feedback report configuration comprises receiving a reference RI selected from among the at least one RI generated by the terminal. 10. The method of claim 9, wherein the terminal selects one of the at least one RI to be the reference RI based on at least one of the feedback combination configuration and the feedback report configuration. 11. The method of claim 8, wherein the receiving of the feedback report configuration comprises receiving the feedback report configuration through a Radio Resource Control (RRC) signaling. 12. The method of claim 8, wherein the terminal transmits a difference value that is a difference of two of the at least one CQI from among plural CQI values. 13. A terminal of a mobile communication system, the terminal comprising:
a transceiver transmitting and receiving signals to and from a base station; and a control unit controlling measuring a signal component based on at least one Channel Status Information-Reference Signal (CSI-RS) allocated by a base station, measuring an interference component based on at least one Interference Measurement Resource (IMR) allocated by a base station, receiving a feedback combination configuration of the signal component and the interference component, generating feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI), and transmitting the feedback information to the base station. 14. The terminal of claim 13, wherein the control unit controls receiving a feedback report configuration. 15. The terminal of claim 13, wherein the control unit controls selecting one of the at least one generated RI as a selected reference RI and transmitting the selected reference RI to the base station. 16. The terminal of claim 15, wherein the control unit controls the selecting of the one of the at least one generated RI as the selected RI based on at least one of a feedback combination configuration and the feedback report configuration. 17. The terminal of claim 14, wherein the control unit controls the receiving of the feedback report configuration to be through Radio Resource Control (RRC) signaling. 18. The terminal of claim 14, wherein the control unit controls the transmitting of the feedback information to include transmitting one of the at least one generated CQI. 19. A base station of a mobile communication system, the base station comprising:
a transceiver transmitting and receiving signals to and from a terminal; and a control unit controlling the transceiver, allocating at least one Channel Status Information-Reference Signal (CSI-RS) for measuring a signal component and at least one Interference Measurement Resource (IMR) for measuring an interference component to a terminal, transmitting a feedback combination configuration of the signal component and the interference component, and receiving feedback information including at least one of at least one Channel Quality Indicator (CQI), at least one Rank Indicator (RI), and at least one Precoding Matrix Indicator (PMI) generated by the terminal based on the feedback combination configuration. 20. The base station of claim 19, wherein the control unit controls receiving a feedback report configuration. 21. The base station of claim 19, wherein the control unit controls receiving, when the feedback report configuration is a specific value, a reference RI selected from among the at least one RI generated by the terminal. 22. The base station of claim 21, wherein the terminal selects one of the at least one RI to be the reference RI based on at least one of the feedback combination configuration and the feedback report configuration. 23. The base station of claim 20, wherein the control unit controls the receiving of the feedback report configuration signal to be through a Radio Resource Control (RRC) signaling. 24. The base station of claim 20, wherein the terminal transmits a difference value that is a difference of two of the at least one CQI from among plural CQI values. | 2,400 |
8,864 | 8,864 | 15,488,067 | 2,491 | A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process includes the user entering his or her credentials and being authenticated to the connection broker. In addition to user authentication, the SSO process includes connection broker authentication to confirm that the connection broker is trustworthy. When the connection broker is authenticated, the user credentials are transmitted to the connection broker in a secure manner and the connection broker forwards them onto a machine hosting the remote session so that the user can be logged into the remote session without entering his or her credentials again. | 1. A method of authenticating a user to a service running in a system, comprising:
responsive to receiving an input of user credentials at a client computing device, logging the user into the client computing device which is configured to communicate with the service via a network; storing the user credentials in the client computing device; displaying, on the client computing device, a first user interface including an option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service; and responsive to a first request, made via the first user interface, to access the service using the same user credentials used to log into the client computing device:
transmitting the stored user credentials from the client computing device to the service, and
at the service, authenticating the user using the user credentials transmitted from the client computing device. 2. The method of claim 1, further comprising, configuring the first user interface to enable the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service. 3. The method of claim 1, wherein:
the first user interface is displayed responsive to a launching, in the client computing device, of a virtualized desktop infrastructure (VDI) client which facilitates a remote session with the service; and the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service is a checkbox in the first user interface. 4. The method of claim 1, further comprising:
responsive to a second request, made via the first user interface, to not access the service using the same user credentials used to log into the client computing device, displaying at the client computing device a second user interface which prompts the user to input user credentials for accessing the service. 5. The method of claim 4, wherein the second user interface prompts the user to input user credentials for a different authentication technique than a technique used to log into the client computing device. 6. The method of claim 1, further comprising, if authentication of the user at the service using the user credentials transmitted from the client computing device fails, displaying a second user interface which prompts the user to input user credentials for accessing the service. 7. The method of claim 1, wherein either the user credentials include a user ID and a password, or the user credentials include a certificate stored in a smart card and a PIN to access the certificate. 8. The method of claim 1, further comprising,
authenticating a connection broker, which manages connections to the service, to a process which runs in the client computing device and has access to the stored user credentials; responsive to successful authentication of the connection broker to the process, transmitting the stored user credentials via the process from the client computing device to the authenticated connection broker; and responsive to receiving the user credentials at the authenticated connection broker, forwarding the received user credentials from the authenticated connection broker to the service. 9. The method of claim 8, wherein the user credentials are securely stored in the client computing device and securely transmitted from the client computing device to the connection broker and from the connection broker to the service. 10. The method of claim 1, wherein the service is a remote desktop running in a virtual machine. 11. A non-transitory computer-readable storage medium containing a program which, when executed by one or more processors, performs operations for authenticating a user to a service running in a system, the operations comprising:
responsive to receiving an input of user credentials at a client computing device, logging the user into the client computing device which is configured to communicate with the service via a network; storing the user credentials in the client computing device; displaying, on the client computing device, a first user interface including an option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service; and responsive to a first request, made via the first user interface, to access the service using the same user credentials used to log into the client computing device:
transmitting the stored user credentials from the client computing device to the service, and
at the service, authenticating the user using the user credentials transmitted from the client computing device. 12. The computer-readable storage medium of claim 11, the operations further comprising, configuring the first user interface to enable the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service. 13. The computer-readable storage medium of claim 11, wherein:
the first user interface is displayed responsive to a launching, in the client computing device, of a virtualized desktop infrastructure (VDI) client which facilitates a remote session with the service; and the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service is a checkbox in the first user interface. 14. The computer-readable storage medium of claim 11, the operations further comprising:
responsive to a second request, made via the first user interface, to not access the service using the same user credentials used to log into the client computing device, displaying a second user interface which prompts the user to input user credentials for accessing the service. 15. The computer-readable storage medium of claim 14, wherein the second user interface prompts the user to input user credentials for a different authentication technique than a technique used to log into the client computing device. 16. The computer-readable storage medium of claim 11, the operations further comprising, if authentication of the user at the service using the user credentials transmitted from the client computing device fails, displaying a second user interface which prompts the user to input user credentials for accessing the service. 17. The computer-readable storage medium of claim 11, wherein either the user credentials include a user ID and a password, or the user credentials include a certificate stored in a smart card and a PIN to access the certificate. 18. The computer-readable storage medium of claim 11, the operations further comprising,
authenticating a connection broker, which manages connections to the service, to a process which runs in the client computing device and has access to the stored user credentials; responsive to successful authentication of the connection broker to the process, transmitting the stored user credentials via the process from the client computing device to the authenticated connection broker; and responsive to receiving the user credentials at the authenticated connection broker, forwarding the received user credentials from the authenticated connection broker to the service. 19. The computer-readable storage medium of claim 18, wherein the user credentials are securely stored in the client computing device and securely transmitted from the client computing device to the connection broker and from the connection broker to the service. 20. A system in communication with one or more server computers in which a service runs, comprising:
a processor; and a memory, wherein the memory includes a program for authenticating a user to the service, the program being configured to perform operations comprising:
responsive to receiving an input of user credentials, logging the user into the system,
storing the user credentials,
displaying a user interface including an option permitting the user to select whether to use the same user credentials used to log into the system to also access the service, and
responsive to a request, made via the user interface, to access the service using the same user credentials used to log into the system, transmitting the user credentials to the service,
wherein the user is authenticated at the service using the transmitted user credentials. | A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process includes the user entering his or her credentials and being authenticated to the connection broker. In addition to user authentication, the SSO process includes connection broker authentication to confirm that the connection broker is trustworthy. When the connection broker is authenticated, the user credentials are transmitted to the connection broker in a secure manner and the connection broker forwards them onto a machine hosting the remote session so that the user can be logged into the remote session without entering his or her credentials again.1. A method of authenticating a user to a service running in a system, comprising:
responsive to receiving an input of user credentials at a client computing device, logging the user into the client computing device which is configured to communicate with the service via a network; storing the user credentials in the client computing device; displaying, on the client computing device, a first user interface including an option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service; and responsive to a first request, made via the first user interface, to access the service using the same user credentials used to log into the client computing device:
transmitting the stored user credentials from the client computing device to the service, and
at the service, authenticating the user using the user credentials transmitted from the client computing device. 2. The method of claim 1, further comprising, configuring the first user interface to enable the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service. 3. The method of claim 1, wherein:
the first user interface is displayed responsive to a launching, in the client computing device, of a virtualized desktop infrastructure (VDI) client which facilitates a remote session with the service; and the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service is a checkbox in the first user interface. 4. The method of claim 1, further comprising:
responsive to a second request, made via the first user interface, to not access the service using the same user credentials used to log into the client computing device, displaying at the client computing device a second user interface which prompts the user to input user credentials for accessing the service. 5. The method of claim 4, wherein the second user interface prompts the user to input user credentials for a different authentication technique than a technique used to log into the client computing device. 6. The method of claim 1, further comprising, if authentication of the user at the service using the user credentials transmitted from the client computing device fails, displaying a second user interface which prompts the user to input user credentials for accessing the service. 7. The method of claim 1, wherein either the user credentials include a user ID and a password, or the user credentials include a certificate stored in a smart card and a PIN to access the certificate. 8. The method of claim 1, further comprising,
authenticating a connection broker, which manages connections to the service, to a process which runs in the client computing device and has access to the stored user credentials; responsive to successful authentication of the connection broker to the process, transmitting the stored user credentials via the process from the client computing device to the authenticated connection broker; and responsive to receiving the user credentials at the authenticated connection broker, forwarding the received user credentials from the authenticated connection broker to the service. 9. The method of claim 8, wherein the user credentials are securely stored in the client computing device and securely transmitted from the client computing device to the connection broker and from the connection broker to the service. 10. The method of claim 1, wherein the service is a remote desktop running in a virtual machine. 11. A non-transitory computer-readable storage medium containing a program which, when executed by one or more processors, performs operations for authenticating a user to a service running in a system, the operations comprising:
responsive to receiving an input of user credentials at a client computing device, logging the user into the client computing device which is configured to communicate with the service via a network; storing the user credentials in the client computing device; displaying, on the client computing device, a first user interface including an option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service; and responsive to a first request, made via the first user interface, to access the service using the same user credentials used to log into the client computing device:
transmitting the stored user credentials from the client computing device to the service, and
at the service, authenticating the user using the user credentials transmitted from the client computing device. 12. The computer-readable storage medium of claim 11, the operations further comprising, configuring the first user interface to enable the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service. 13. The computer-readable storage medium of claim 11, wherein:
the first user interface is displayed responsive to a launching, in the client computing device, of a virtualized desktop infrastructure (VDI) client which facilitates a remote session with the service; and the option permitting the user to select whether to use the same user credentials used to log into the client computing device to also access the service is a checkbox in the first user interface. 14. The computer-readable storage medium of claim 11, the operations further comprising:
responsive to a second request, made via the first user interface, to not access the service using the same user credentials used to log into the client computing device, displaying a second user interface which prompts the user to input user credentials for accessing the service. 15. The computer-readable storage medium of claim 14, wherein the second user interface prompts the user to input user credentials for a different authentication technique than a technique used to log into the client computing device. 16. The computer-readable storage medium of claim 11, the operations further comprising, if authentication of the user at the service using the user credentials transmitted from the client computing device fails, displaying a second user interface which prompts the user to input user credentials for accessing the service. 17. The computer-readable storage medium of claim 11, wherein either the user credentials include a user ID and a password, or the user credentials include a certificate stored in a smart card and a PIN to access the certificate. 18. The computer-readable storage medium of claim 11, the operations further comprising,
authenticating a connection broker, which manages connections to the service, to a process which runs in the client computing device and has access to the stored user credentials; responsive to successful authentication of the connection broker to the process, transmitting the stored user credentials via the process from the client computing device to the authenticated connection broker; and responsive to receiving the user credentials at the authenticated connection broker, forwarding the received user credentials from the authenticated connection broker to the service. 19. The computer-readable storage medium of claim 18, wherein the user credentials are securely stored in the client computing device and securely transmitted from the client computing device to the connection broker and from the connection broker to the service. 20. A system in communication with one or more server computers in which a service runs, comprising:
a processor; and a memory, wherein the memory includes a program for authenticating a user to the service, the program being configured to perform operations comprising:
responsive to receiving an input of user credentials, logging the user into the system,
storing the user credentials,
displaying a user interface including an option permitting the user to select whether to use the same user credentials used to log into the system to also access the service, and
responsive to a request, made via the user interface, to access the service using the same user credentials used to log into the system, transmitting the user credentials to the service,
wherein the user is authenticated at the service using the transmitted user credentials. | 2,400 |
8,865 | 8,865 | 15,438,779 | 2,434 | The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages. | 1. A method, comprising:
receiving, by at least one computing device, an invitee list and a schedule associated with an event; generating, by the at least one computing device, a calendar message for the event based on the invitee list and the schedule; identifying, by the at least one computing device, a file for attachment to the calendar message, the file being identified through an extension of at least one function of a secure content file manager to a message handling application; determining, by the at least one computing device, that sharing the file is permitted; generating, by the at least one computing device, a resource locator associated with the file, wherein the resource locator uniquely identifies the file in a managed computing device environment; inserting, by the at least one computing device, the resource locator into the calendar message; and forwarding, by the at least one computing device, the calendar message to distribute the file for access on at least one other computing device using the resource locator. 2. The method according to claim 1, wherein determining that sharing the file is permitted comprises communicating, by the at least one computing device, over a computer network with a management service executed by a remote computing environment communicatively coupled to the at least one computing device over the computer network. 3. The method according to claim 1, wherein determining that sharing the file is permitted comprises determining, by the at least one computing device, that file sharing is permitted according to an operating parameter of the at least one computing device as established by a management service executed by a computing environment communicatively coupled to the at least one computing device over a computer network. 4. The method according to claim 1, wherein determining that sharing the file is permitted comprises determining, by the at least one computing device, that the file is permitted to be shared with at least one user identified in the invitee list. 5. The method according to claim 1, further comprising:
identifying, by the at least one computing device, an other file for attachment to the calendar message; determining, by the at least one computing device, that sharing the other file is not permitted; and generating, by the at least one computing device, a sharing restriction notification in response to a determination that sharing the other file is not permitted. 6. The method according to claim 1, further comprising:
receiving, by the at least one computing device, a file access schedule associated with the file; and inserting, by the at least one computing device, the file access schedule into the calendar message. 7. The method according to claim 6, wherein the file access schedule comprises a period of time that at least one of begins before a start of the schedule associated with the event or ends after an end of the schedule associated with the event. 8. The method according to claim 1, wherein the resource locator comprises an environment-unique file identifier recognized uniquely among a plurality of managed applications executed by a plurality of computing devices in the managed computing device environment. 9. A non-transitory computer-readable medium embodying program code executable in at least one computing device that, when executed by the at least one computing device, directs the at least one computing device to at least:
receive an addressee list and a message body associated with a message; generate the message based on the addressee list; identify a file for attachment to the message through an extension of at least one function of a secure content file manager to another application; determine whether sharing the file is permitted; generate a resource locator associated with the file and insert the resource locator into the message in response to a determination that sharing the file is permitted; and forward the message to distribute the file for access on at least one other computing device using the resource locator, wherein the resource locator unique identifies the file in a managed computing device environment. 10. The non-transitory computer-readable medium according to claim 9, wherein, to determine whether sharing the file is permitted, the at least one computing device is further configured to communicate over a computer network with a management service executed by a remote computing environment communicatively coupled to the at least one computing device over the computer network. 11. The non-transitory computer-readable medium according to claim 9, wherein, to determine whether sharing the file is permitted, the at least one computing device is further configured to determine whether file sharing is permitted according to an operating parameter of the at least one computing device as established by a management service executed by a computing environment communicatively coupled to the at least one computing device over a computer network. 12. The non-transitory computer-readable medium according to claim 9, wherein, to determine whether sharing the file is permitted, the at least one computing device is further configured to determine whether the file is permitted to be shared with at least one user identified in the addressee list. 13. The non-transitory computer-readable medium according to claim 9, wherein the at least one computing device is further configured to generate a sharing restriction notification in response to a determination that sharing the file is not permitted. 14. The non-transitory computer-readable medium according to claim 9, wherein the at least one computing device is further configured to receive a file access schedule associated with the file and insert the file access schedule into the message. 15. The non-transitory computer-readable medium according to claim 9, wherein the resource locator comprises an environment-unique file identifier recognized uniquely among a plurality of managed applications executed by a plurality of computing devices in the managed computing device environment. 16. A system, comprising:
a memory device configured to store computer-readable instructions thereon; and at least one computing device configured, through execution of the computer-readable instructions, to:
identify a file for attachment to a message through an extension to a secure content file manager;
determine that sharing the file is permitted;
generate a resource locator to the file, wherein the resource locator unique identifies the file in a managed computing device environment;
insert the resource locator into the message; and
forward the message based on at least one addressee of the message, to distribute the file for access by the at least one addressee using the resource locator. 17. The system according to claim 16, wherein, to determine that sharing the file is permitted, the at least one computing device is further configured to determine that file sharing is permitted according to an operating parameter of the at least one computing device as established by a management service executed by a computing environment communicatively coupled to the at least one computing device over a computer network. 18. The system according to claim 16, wherein, to determine that sharing the file is permitted, the at least one computing device is further configured to determine that the file is permitted to be shared with at least one user identified in an addressee list of the message. 19. The system according to claim 16, wherein the at least one computing device is further configured to receive a file access schedule associated with the file and insert the file access schedule into the message. 20. The system according to claim 16, wherein the resource locator to the file comprises an environment-unique file identifier recognized uniquely among a plurality of managed computing devices in the managed computing device environment. | The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.1. A method, comprising:
receiving, by at least one computing device, an invitee list and a schedule associated with an event; generating, by the at least one computing device, a calendar message for the event based on the invitee list and the schedule; identifying, by the at least one computing device, a file for attachment to the calendar message, the file being identified through an extension of at least one function of a secure content file manager to a message handling application; determining, by the at least one computing device, that sharing the file is permitted; generating, by the at least one computing device, a resource locator associated with the file, wherein the resource locator uniquely identifies the file in a managed computing device environment; inserting, by the at least one computing device, the resource locator into the calendar message; and forwarding, by the at least one computing device, the calendar message to distribute the file for access on at least one other computing device using the resource locator. 2. The method according to claim 1, wherein determining that sharing the file is permitted comprises communicating, by the at least one computing device, over a computer network with a management service executed by a remote computing environment communicatively coupled to the at least one computing device over the computer network. 3. The method according to claim 1, wherein determining that sharing the file is permitted comprises determining, by the at least one computing device, that file sharing is permitted according to an operating parameter of the at least one computing device as established by a management service executed by a computing environment communicatively coupled to the at least one computing device over a computer network. 4. The method according to claim 1, wherein determining that sharing the file is permitted comprises determining, by the at least one computing device, that the file is permitted to be shared with at least one user identified in the invitee list. 5. The method according to claim 1, further comprising:
identifying, by the at least one computing device, an other file for attachment to the calendar message; determining, by the at least one computing device, that sharing the other file is not permitted; and generating, by the at least one computing device, a sharing restriction notification in response to a determination that sharing the other file is not permitted. 6. The method according to claim 1, further comprising:
receiving, by the at least one computing device, a file access schedule associated with the file; and inserting, by the at least one computing device, the file access schedule into the calendar message. 7. The method according to claim 6, wherein the file access schedule comprises a period of time that at least one of begins before a start of the schedule associated with the event or ends after an end of the schedule associated with the event. 8. The method according to claim 1, wherein the resource locator comprises an environment-unique file identifier recognized uniquely among a plurality of managed applications executed by a plurality of computing devices in the managed computing device environment. 9. A non-transitory computer-readable medium embodying program code executable in at least one computing device that, when executed by the at least one computing device, directs the at least one computing device to at least:
receive an addressee list and a message body associated with a message; generate the message based on the addressee list; identify a file for attachment to the message through an extension of at least one function of a secure content file manager to another application; determine whether sharing the file is permitted; generate a resource locator associated with the file and insert the resource locator into the message in response to a determination that sharing the file is permitted; and forward the message to distribute the file for access on at least one other computing device using the resource locator, wherein the resource locator unique identifies the file in a managed computing device environment. 10. The non-transitory computer-readable medium according to claim 9, wherein, to determine whether sharing the file is permitted, the at least one computing device is further configured to communicate over a computer network with a management service executed by a remote computing environment communicatively coupled to the at least one computing device over the computer network. 11. The non-transitory computer-readable medium according to claim 9, wherein, to determine whether sharing the file is permitted, the at least one computing device is further configured to determine whether file sharing is permitted according to an operating parameter of the at least one computing device as established by a management service executed by a computing environment communicatively coupled to the at least one computing device over a computer network. 12. The non-transitory computer-readable medium according to claim 9, wherein, to determine whether sharing the file is permitted, the at least one computing device is further configured to determine whether the file is permitted to be shared with at least one user identified in the addressee list. 13. The non-transitory computer-readable medium according to claim 9, wherein the at least one computing device is further configured to generate a sharing restriction notification in response to a determination that sharing the file is not permitted. 14. The non-transitory computer-readable medium according to claim 9, wherein the at least one computing device is further configured to receive a file access schedule associated with the file and insert the file access schedule into the message. 15. The non-transitory computer-readable medium according to claim 9, wherein the resource locator comprises an environment-unique file identifier recognized uniquely among a plurality of managed applications executed by a plurality of computing devices in the managed computing device environment. 16. A system, comprising:
a memory device configured to store computer-readable instructions thereon; and at least one computing device configured, through execution of the computer-readable instructions, to:
identify a file for attachment to a message through an extension to a secure content file manager;
determine that sharing the file is permitted;
generate a resource locator to the file, wherein the resource locator unique identifies the file in a managed computing device environment;
insert the resource locator into the message; and
forward the message based on at least one addressee of the message, to distribute the file for access by the at least one addressee using the resource locator. 17. The system according to claim 16, wherein, to determine that sharing the file is permitted, the at least one computing device is further configured to determine that file sharing is permitted according to an operating parameter of the at least one computing device as established by a management service executed by a computing environment communicatively coupled to the at least one computing device over a computer network. 18. The system according to claim 16, wherein, to determine that sharing the file is permitted, the at least one computing device is further configured to determine that the file is permitted to be shared with at least one user identified in an addressee list of the message. 19. The system according to claim 16, wherein the at least one computing device is further configured to receive a file access schedule associated with the file and insert the file access schedule into the message. 20. The system according to claim 16, wherein the resource locator to the file comprises an environment-unique file identifier recognized uniquely among a plurality of managed computing devices in the managed computing device environment. | 2,400 |
8,866 | 8,866 | 15,681,980 | 2,426 | Methods and systems are described for providing optimal representations of content. A user interface may present content based on one or more images representing the content. User interactions associated with the content may be tracked based on which of the one or more images was used to represent the content. Statistical information may be tracked to determine which groups of users respond to particular images used to represent content. The statistical information may be used to select which images are used to represent the content for additional users. | 1. A method comprising:
transmitting, to a user interface associated with a first user, a first image of a plurality of images associated with a content asset, wherein the first image is a representation of the content asset; receiving an indication of a user interaction with the user interface, wherein the user interaction is indicative of a first type of response of the first user to the first image; updating, based on the indication of the user interaction and a characteristic group associated with the first user, statistical information associated with the content asset, wherein the statistical information comprises a first metric associated with the first type of response and a second metric associated with a second type of response, and wherein the first metric is updated based on the indication of the user interaction, and wherein the characteristic group is determined for the updating the statistical information based on a content attribute associated with the content asset; and transmitting, based on the statistical information, the first image to represent the content asset in the user interface for a second user, wherein the second user is associated with the characteristic group. 2. The method of claim 1, wherein the characteristic group comprises a demographic group. 3. The method of claim 1, wherein the indication of the user interaction with the user interface comprises a menu context of the user interaction. 4. (canceled) 5. The method of claim 4, wherein the statistical information comprises a count of a number of times any user associated with the characteristic group selected an interface element comprising the first image. 6. The method of claim 1, further comprising determining to represent the content asset by the first image for the second user, wherein the first image is determined based on being associated with a highest statistical value of the plurality of images for the characteristic group, wherein transmitting the first image is based on determining to represent the content asset by the first image for the second user. 7. The method of claim 1, wherein the user interaction comprises selection of a tile in a menu of the user interface, wherein the tile comprises the first image. 8. A method comprising:
receiving, from a user interface associated with a first user, a request for interface data; determining, based on the request, a content asset to represent via the user interface; determining, based on a content attribute associated with the content asset, a characteristic group associated with the first user; determining statistical information associated with the content asset and the characteristic group, wherein the statistical information indicates responses of users associated with the characteristic group to a plurality of images used to represent the content asset, wherein the plurality of images comprises a first image, wherein the statistical information comprises a first metric associated with a first type of response and a second metric associated with a second type of response; and transmitting, based on the statistical information, the first image to represent the content asset in the user interface for the first user. 9. The method of claim 8, wherein the characteristic group comprises a demographic group. 10. The method of claim 8, wherein determining the characteristic group associated with the first user comprises determining a correspondence between user information associated with the first user and a characteristic associated with the characteristic group. 11. (canceled) 12. (canceled) 13. The method of claim 8, further comprising determining to represent the content asset by the first image for the first user, wherein the first image is determined based on being associated with a highest statistical value of the plurality of images for the characteristic group, wherein transmitting the first image is based on determining to represent the content asset by the first image for the first user. 14. The method of claim 8, wherein receiving, from the user interface associated with the first user, a request for interface data comprises receiving a request for the interface data to update a menu or a page of the user interface associated with the first user. 15. A method comprising:
transmitting, to a user interface associated with a first user, data indicative of a first representation of a content asset; receiving, based on the first representation, a request for the content asset; determining, based on the request and a content attribute associated with the content asset, a characteristic group and a first type of response, wherein the first type of response is determined from at least the first type of response and a second type of response; updating first data indicative of the first type of response and an association of the first representation with the characteristic group; and transmitting, to a user interface associated with a second user and based on the first data, data indicative of the first representation of the content asset. 16. The method of claim 15, wherein the characteristic group comprises a demographic group. 17. The method of claim 15, wherein the request for the content asset comprises a request to access a user interface page associated with the content asset. 18. (canceled) 19. (canceled) 20. The method of claim 15, further comprising determining to represent the content asset by the first representation for the second user, wherein the first representation is determined based on being associated with a highest statistical value of a plurality of representations associated with the characteristic group, wherein transmitting the data indicative of the first representation of the content asset is based on the determining to represent the content asset by the first representation for the second user. 21. The method of claim 1, wherein the first type of response comprises a positive response, and wherein the second type of response comprises a negative response. 22. The method of claim 1, wherein the first type of response is indicative of selection of the content asset, and wherein the second type of response is indicative of non-selection of the content asset. 23. The method of claim 1, wherein the first metric comprises an amount of selections of the content asset associated with the first image, and wherein the second metric comprises an amount of non-selections of the content asset associated with the first image. 24. (canceled) 25. The method of claim 1, wherein the content attribute comprises one or more of a category, a genre, or a type of content. 26. The method of claim 1, further comprising updating, based on an additional characteristic group and an indication of an additional user interaction associated with an additional content asset, statistical information associated with the additional content asset, wherein the additional characteristic group is determined for the updating the statistical information based on an additional content attribute associated with the additional content asset. | Methods and systems are described for providing optimal representations of content. A user interface may present content based on one or more images representing the content. User interactions associated with the content may be tracked based on which of the one or more images was used to represent the content. Statistical information may be tracked to determine which groups of users respond to particular images used to represent content. The statistical information may be used to select which images are used to represent the content for additional users.1. A method comprising:
transmitting, to a user interface associated with a first user, a first image of a plurality of images associated with a content asset, wherein the first image is a representation of the content asset; receiving an indication of a user interaction with the user interface, wherein the user interaction is indicative of a first type of response of the first user to the first image; updating, based on the indication of the user interaction and a characteristic group associated with the first user, statistical information associated with the content asset, wherein the statistical information comprises a first metric associated with the first type of response and a second metric associated with a second type of response, and wherein the first metric is updated based on the indication of the user interaction, and wherein the characteristic group is determined for the updating the statistical information based on a content attribute associated with the content asset; and transmitting, based on the statistical information, the first image to represent the content asset in the user interface for a second user, wherein the second user is associated with the characteristic group. 2. The method of claim 1, wherein the characteristic group comprises a demographic group. 3. The method of claim 1, wherein the indication of the user interaction with the user interface comprises a menu context of the user interaction. 4. (canceled) 5. The method of claim 4, wherein the statistical information comprises a count of a number of times any user associated with the characteristic group selected an interface element comprising the first image. 6. The method of claim 1, further comprising determining to represent the content asset by the first image for the second user, wherein the first image is determined based on being associated with a highest statistical value of the plurality of images for the characteristic group, wherein transmitting the first image is based on determining to represent the content asset by the first image for the second user. 7. The method of claim 1, wherein the user interaction comprises selection of a tile in a menu of the user interface, wherein the tile comprises the first image. 8. A method comprising:
receiving, from a user interface associated with a first user, a request for interface data; determining, based on the request, a content asset to represent via the user interface; determining, based on a content attribute associated with the content asset, a characteristic group associated with the first user; determining statistical information associated with the content asset and the characteristic group, wherein the statistical information indicates responses of users associated with the characteristic group to a plurality of images used to represent the content asset, wherein the plurality of images comprises a first image, wherein the statistical information comprises a first metric associated with a first type of response and a second metric associated with a second type of response; and transmitting, based on the statistical information, the first image to represent the content asset in the user interface for the first user. 9. The method of claim 8, wherein the characteristic group comprises a demographic group. 10. The method of claim 8, wherein determining the characteristic group associated with the first user comprises determining a correspondence between user information associated with the first user and a characteristic associated with the characteristic group. 11. (canceled) 12. (canceled) 13. The method of claim 8, further comprising determining to represent the content asset by the first image for the first user, wherein the first image is determined based on being associated with a highest statistical value of the plurality of images for the characteristic group, wherein transmitting the first image is based on determining to represent the content asset by the first image for the first user. 14. The method of claim 8, wherein receiving, from the user interface associated with the first user, a request for interface data comprises receiving a request for the interface data to update a menu or a page of the user interface associated with the first user. 15. A method comprising:
transmitting, to a user interface associated with a first user, data indicative of a first representation of a content asset; receiving, based on the first representation, a request for the content asset; determining, based on the request and a content attribute associated with the content asset, a characteristic group and a first type of response, wherein the first type of response is determined from at least the first type of response and a second type of response; updating first data indicative of the first type of response and an association of the first representation with the characteristic group; and transmitting, to a user interface associated with a second user and based on the first data, data indicative of the first representation of the content asset. 16. The method of claim 15, wherein the characteristic group comprises a demographic group. 17. The method of claim 15, wherein the request for the content asset comprises a request to access a user interface page associated with the content asset. 18. (canceled) 19. (canceled) 20. The method of claim 15, further comprising determining to represent the content asset by the first representation for the second user, wherein the first representation is determined based on being associated with a highest statistical value of a plurality of representations associated with the characteristic group, wherein transmitting the data indicative of the first representation of the content asset is based on the determining to represent the content asset by the first representation for the second user. 21. The method of claim 1, wherein the first type of response comprises a positive response, and wherein the second type of response comprises a negative response. 22. The method of claim 1, wherein the first type of response is indicative of selection of the content asset, and wherein the second type of response is indicative of non-selection of the content asset. 23. The method of claim 1, wherein the first metric comprises an amount of selections of the content asset associated with the first image, and wherein the second metric comprises an amount of non-selections of the content asset associated with the first image. 24. (canceled) 25. The method of claim 1, wherein the content attribute comprises one or more of a category, a genre, or a type of content. 26. The method of claim 1, further comprising updating, based on an additional characteristic group and an indication of an additional user interaction associated with an additional content asset, statistical information associated with the additional content asset, wherein the additional characteristic group is determined for the updating the statistical information based on an additional content attribute associated with the additional content asset. | 2,400 |
8,867 | 8,867 | 16,049,480 | 2,484 | The image capture system of the present disclosure comprises an illuminator comprising at least one infrared light LED or laser and one visible light LED, an image sensor that is sensitive to infrared light and visible light, a memory configured to store instructions, and a processor configured to execute instructions to cause the image capture system to emit infrared light as a pre-flash, receive image data comprising at least one infrared image, and determine infrared exposure settings based on the infrared image data. Although the image capture system of the present disclosure is described as having an illuminator configured to emit infrared light, the illuminator may be configured to emit other invisible light. For example, in an alternate embodiment, the illuminator is configured to emit UV light during pre-flash. In such an embodiment, the image sensor is configured to detect UV light. | 1. An image capture system, comprising:
an illuminator configured to emit infrared light having at least one infrared wavelength and emit visible light having at least one visible wavelength; at least one image sensor having a sensitivity to an infrared range of wavelengths that includes the at least one infrared wavelength and a visible range of wavelengths that includes the at least one visible wavelength; at least one processor coupled to the illuminator and the at least one image sensor; and a memory configured to store instructions, that, when executed by the at least one processor, cause the image capture system to perform operations, the operations comprising:
emitting infrared light from the illuminator as a pre-flash;
while the infrared light is being emitted, capturing at least one infrared image with the at least one image sensor;
determining an infrared exposure setting based on the at least one infrared image;
scaling the infrared exposure setting to determine a visible exposure setting;
emitting visible light from the illuminator as a flash; and
while the visible light is being emitted, capturing a visible image with the at least one image sensor using the visible exposure setting. 2. The image capture system of claim 1, wherein the at least one image sensor comprises at least two pixel types. 3. The image capture system of claim 2, wherein the at least two pixel types comprise infrared pixels and at least one of red pixels, green pixels, or blue pixels. 4. The image capture system of claim 1, wherein the operations further comprise:
determining an infrared focus setting based on the at least one infrared image. 5. The image capture system of claim 4, wherein the operations further comprise:
scaling the infrared focus setting to determine a visible focus setting; and capturing the visible image with the at least one image sensor using the visible exposure setting and the visible focus setting. 6. The image capture system of claim 1, wherein the operations further comprise:
adjusting white balance settings to pre-defined white balance settings. 7. The image capture system of claim 1, wherein the visible exposure setting differs from the infrared exposure setting. 8. The image capture system of claim 7, wherein:
the visible exposure setting includes a visible shutter speed; and the infrared exposure setting includes an infrared shutter speed different from the visible shutter speed. 9. (canceled) 10. The image capture system of claim 1, wherein the at least one image sensor comprises three pixel types. 11. The image capture system of claim 10, wherein the three pixels types comprise red pixels, green pixels, and blue pixels. 12. The image capture system of claim 1, wherein the illuminator comprises:
at least one infrared light emitting diode configured to emit the infrared light having the at least one infrared wavelength; and at least one visible light emitting diode configured to emit the visible light having the at least one visible wavelength. 13. The image capture system of claim 1, wherein the illuminator comprises:
at least one infrared laser configured to emit the infrared light having the at least one infrared wavelength; and at least one visible light emitting diode configured to emit the visible light having the at least one visible wavelength. 14. The image capture system of claim 1 wherein the at least one image sensor comprises a single image sensor that includes red pixels, green pixels, blue pixels, and infrared pixels. 15. The image capture system of claim 1, wherein the at least one image sensor comprises an infrared image sensor that includes infrared pixels and a visible image sensor that includes red pixels, green pixels, and blue pixels. 16. The image capture system of claim 15, wherein the infrared image sensor and the visible image sensor are calibrated against each other for at least one of automatic focus and automatic exposure. 17. A method for capturing an image, the method comprising:
emitting infrared light as a pre-flash; while the infrared light is being emitted, capturing at least one infrared image; determining an infrared exposure setting based on the at least one infrared image; scaling the infrared exposure setting to determine a visible exposure setting; emitting visible light as a flash; and while the visible light is being emitted, capturing a visible image using the visible exposure setting. 18. (canceled) 19. The method of claim 17, further comprising:
determining an infrared focus setting based on the at least one infrared image; scaling the infrared focus setting to determine a visible focus setting; and capturing the visible image using the visible focus setting. 20. The method of claim 17, further comprising adjusting white balance settings to pre-defined white balance settings. 21. An image capture system, comprising:
at least one infrared light emitting diode configured to emit an infrared light having at least one infrared wavelength; at least one visible light emitting diode configured to emit a visible light having at least one visible wavelength; at least one image sensor, the at least one image sensor including infrared pixels that have a sensitivity to an infrared range of wavelengths that includes the at least one infrared wavelength, the at least one image sensor including visible pixels that have a sensitivity to a visible range of wavelengths that includes the at least visible wavelength; at least one processor coupled to the illuminator and the at least one image sensor; and a memory configured to store instructions, that, when executed by the at least one processor, cause the image capture system to perform operations, the operations comprising:
emitting infrared light from the illuminator as a pre-flash;
while the infrared light is being emitted, capturing at least one infrared image with the at least one image sensor;
determining an infrared shutter speed based on the at least one infrared image;
scaling the infrared shutter speed to determine a visible shutter speed different from the infrared shutter speed;
emitting visible light from the illuminator as a flash; and
while the visible light is being emitted, capturing a visible image with the at least one image sensor using the visible shutter speed. 22. The image capture system of claim 21, wherein the operations further comprise:
determining an infrared focus setting based on the at least one infrared image; scaling the infrared focus setting to determine a visible focus setting; and capturing the visible image with the at least one image sensor using the visible shutter speed and the visible focus setting. | The image capture system of the present disclosure comprises an illuminator comprising at least one infrared light LED or laser and one visible light LED, an image sensor that is sensitive to infrared light and visible light, a memory configured to store instructions, and a processor configured to execute instructions to cause the image capture system to emit infrared light as a pre-flash, receive image data comprising at least one infrared image, and determine infrared exposure settings based on the infrared image data. Although the image capture system of the present disclosure is described as having an illuminator configured to emit infrared light, the illuminator may be configured to emit other invisible light. For example, in an alternate embodiment, the illuminator is configured to emit UV light during pre-flash. In such an embodiment, the image sensor is configured to detect UV light.1. An image capture system, comprising:
an illuminator configured to emit infrared light having at least one infrared wavelength and emit visible light having at least one visible wavelength; at least one image sensor having a sensitivity to an infrared range of wavelengths that includes the at least one infrared wavelength and a visible range of wavelengths that includes the at least one visible wavelength; at least one processor coupled to the illuminator and the at least one image sensor; and a memory configured to store instructions, that, when executed by the at least one processor, cause the image capture system to perform operations, the operations comprising:
emitting infrared light from the illuminator as a pre-flash;
while the infrared light is being emitted, capturing at least one infrared image with the at least one image sensor;
determining an infrared exposure setting based on the at least one infrared image;
scaling the infrared exposure setting to determine a visible exposure setting;
emitting visible light from the illuminator as a flash; and
while the visible light is being emitted, capturing a visible image with the at least one image sensor using the visible exposure setting. 2. The image capture system of claim 1, wherein the at least one image sensor comprises at least two pixel types. 3. The image capture system of claim 2, wherein the at least two pixel types comprise infrared pixels and at least one of red pixels, green pixels, or blue pixels. 4. The image capture system of claim 1, wherein the operations further comprise:
determining an infrared focus setting based on the at least one infrared image. 5. The image capture system of claim 4, wherein the operations further comprise:
scaling the infrared focus setting to determine a visible focus setting; and capturing the visible image with the at least one image sensor using the visible exposure setting and the visible focus setting. 6. The image capture system of claim 1, wherein the operations further comprise:
adjusting white balance settings to pre-defined white balance settings. 7. The image capture system of claim 1, wherein the visible exposure setting differs from the infrared exposure setting. 8. The image capture system of claim 7, wherein:
the visible exposure setting includes a visible shutter speed; and the infrared exposure setting includes an infrared shutter speed different from the visible shutter speed. 9. (canceled) 10. The image capture system of claim 1, wherein the at least one image sensor comprises three pixel types. 11. The image capture system of claim 10, wherein the three pixels types comprise red pixels, green pixels, and blue pixels. 12. The image capture system of claim 1, wherein the illuminator comprises:
at least one infrared light emitting diode configured to emit the infrared light having the at least one infrared wavelength; and at least one visible light emitting diode configured to emit the visible light having the at least one visible wavelength. 13. The image capture system of claim 1, wherein the illuminator comprises:
at least one infrared laser configured to emit the infrared light having the at least one infrared wavelength; and at least one visible light emitting diode configured to emit the visible light having the at least one visible wavelength. 14. The image capture system of claim 1 wherein the at least one image sensor comprises a single image sensor that includes red pixels, green pixels, blue pixels, and infrared pixels. 15. The image capture system of claim 1, wherein the at least one image sensor comprises an infrared image sensor that includes infrared pixels and a visible image sensor that includes red pixels, green pixels, and blue pixels. 16. The image capture system of claim 15, wherein the infrared image sensor and the visible image sensor are calibrated against each other for at least one of automatic focus and automatic exposure. 17. A method for capturing an image, the method comprising:
emitting infrared light as a pre-flash; while the infrared light is being emitted, capturing at least one infrared image; determining an infrared exposure setting based on the at least one infrared image; scaling the infrared exposure setting to determine a visible exposure setting; emitting visible light as a flash; and while the visible light is being emitted, capturing a visible image using the visible exposure setting. 18. (canceled) 19. The method of claim 17, further comprising:
determining an infrared focus setting based on the at least one infrared image; scaling the infrared focus setting to determine a visible focus setting; and capturing the visible image using the visible focus setting. 20. The method of claim 17, further comprising adjusting white balance settings to pre-defined white balance settings. 21. An image capture system, comprising:
at least one infrared light emitting diode configured to emit an infrared light having at least one infrared wavelength; at least one visible light emitting diode configured to emit a visible light having at least one visible wavelength; at least one image sensor, the at least one image sensor including infrared pixels that have a sensitivity to an infrared range of wavelengths that includes the at least one infrared wavelength, the at least one image sensor including visible pixels that have a sensitivity to a visible range of wavelengths that includes the at least visible wavelength; at least one processor coupled to the illuminator and the at least one image sensor; and a memory configured to store instructions, that, when executed by the at least one processor, cause the image capture system to perform operations, the operations comprising:
emitting infrared light from the illuminator as a pre-flash;
while the infrared light is being emitted, capturing at least one infrared image with the at least one image sensor;
determining an infrared shutter speed based on the at least one infrared image;
scaling the infrared shutter speed to determine a visible shutter speed different from the infrared shutter speed;
emitting visible light from the illuminator as a flash; and
while the visible light is being emitted, capturing a visible image with the at least one image sensor using the visible shutter speed. 22. The image capture system of claim 21, wherein the operations further comprise:
determining an infrared focus setting based on the at least one infrared image; scaling the infrared focus setting to determine a visible focus setting; and capturing the visible image with the at least one image sensor using the visible shutter speed and the visible focus setting. | 2,400 |
8,868 | 8,868 | 13,576,221 | 2,425 | An example sewer preparation from the main (PFM) device provides for the inspection and preparation of the sewer pipe from the main sewer pipe. The PFM device provides for the insertion of one or more individual and separately controllable tools into the sewer pipe. The tools include a clean out tool and a camera. | 1. A sewer preparation system comprising:
a plurality of drive modules linked together, each of the drive modules including a separately actuateable motor for moving a control conduit; a plurality of tools corresponding with the plurality of drive modules, each of the tools attached to an end of a corresponding control conduit; and a launch head coupled to the plurality of drive modules for storing the tools, the launch head defining a passageway through which each of the plurality of tools extends into a pipe. 2. The sewer preparation system as recited in claim 1, including a control assembly governing operation of the drive motors within each of the plurality of drive modules independently and separately for extending each of the plurality of tools from the launch head into a pipe. 3. The sewer preparation system as recited in claim 1, wherein the launch head includes a snout defining a portion of the passageway, the snout rotatable for directing an extended one of the plurality of tools out of the launch head. 4. The sewer preparation system as recited in claim 3, including a motor for rotating the snout. 5. The sewer preparation system as recited in claim 1, wherein each of the plurality of motors comprise a hydraulic motor. 6. The sewer preparation system as recited in claim 1, wherein the drive module includes a conduit drive mechanism driven by a corresponding motor, the drive module comprising first and second opposing drive wheel for frictionally driving a control conduit through the launch head. 7. The sewer preparation system as recited in claim 1, wherein each of the drive modules includes a control conduit guide for directing all of the control conduits through each of the drive modules and one of the control conduits into driving engagement with the conduit drive mechanism. 8. The sewer preparation system as recited in claim 1, wherein at least one of the control conduits comprises a hose supplying water at a desired pressure to a corresponding one of the plurality of tools. 9. The sewer preparation system as recited in claim 6, wherein one of the corresponding plurality of tools comprises a cleaning tool for cleaning sewer pipe. 10. The sewer preparation system as recited in claim 1, wherein at least one of the corresponding plurality of tools comprises a camera and the corresponding control conduits comprise an electric conduit for communicating information from the camera. 11. The sewer preparation system as recited in claim 1, wherein the control assembly is mounted within a support vehicle. 12. The sewer preparation system as recited in claim 11, wherein control assembly includes a plurality corresponding reels for holding and driving each of the control conduits, wherein each of the reels are controlled for feeding the corresponding control conduit in concert with the corresponding drive modules. 13. The sewer preparation system as recited in claim 12, wherein the motor and reel for a corresponding one of the control conduits are controlled by the control assembly to maintain a desired tension on the control conduit. 14. The sewer preparation system as recited in claim 13, wherein the control assembly individually controls each of the motors and reel assemblies for extending a corresponding tool into a lateral pipe. 15. The sewer preparation system as recited in claim 1, wherein one of the plurality of tools comprises an inspection head for measuring internal dimensions of a pipe. 16. The sewer preparation system as recited in claim 13, including a sensor for measuring a length of control conduit extended from each of the reels. 17. The sewer preparation system as recited in claim 11, wherein the control assembly comprises at least one monitor for displaying images transmitted from a camera disposed at an end of one of the control conduits. 18. The sewer preparation system as recited in claim 1, including a tow device for moving the drive modules within a pipe. | An example sewer preparation from the main (PFM) device provides for the inspection and preparation of the sewer pipe from the main sewer pipe. The PFM device provides for the insertion of one or more individual and separately controllable tools into the sewer pipe. The tools include a clean out tool and a camera.1. A sewer preparation system comprising:
a plurality of drive modules linked together, each of the drive modules including a separately actuateable motor for moving a control conduit; a plurality of tools corresponding with the plurality of drive modules, each of the tools attached to an end of a corresponding control conduit; and a launch head coupled to the plurality of drive modules for storing the tools, the launch head defining a passageway through which each of the plurality of tools extends into a pipe. 2. The sewer preparation system as recited in claim 1, including a control assembly governing operation of the drive motors within each of the plurality of drive modules independently and separately for extending each of the plurality of tools from the launch head into a pipe. 3. The sewer preparation system as recited in claim 1, wherein the launch head includes a snout defining a portion of the passageway, the snout rotatable for directing an extended one of the plurality of tools out of the launch head. 4. The sewer preparation system as recited in claim 3, including a motor for rotating the snout. 5. The sewer preparation system as recited in claim 1, wherein each of the plurality of motors comprise a hydraulic motor. 6. The sewer preparation system as recited in claim 1, wherein the drive module includes a conduit drive mechanism driven by a corresponding motor, the drive module comprising first and second opposing drive wheel for frictionally driving a control conduit through the launch head. 7. The sewer preparation system as recited in claim 1, wherein each of the drive modules includes a control conduit guide for directing all of the control conduits through each of the drive modules and one of the control conduits into driving engagement with the conduit drive mechanism. 8. The sewer preparation system as recited in claim 1, wherein at least one of the control conduits comprises a hose supplying water at a desired pressure to a corresponding one of the plurality of tools. 9. The sewer preparation system as recited in claim 6, wherein one of the corresponding plurality of tools comprises a cleaning tool for cleaning sewer pipe. 10. The sewer preparation system as recited in claim 1, wherein at least one of the corresponding plurality of tools comprises a camera and the corresponding control conduits comprise an electric conduit for communicating information from the camera. 11. The sewer preparation system as recited in claim 1, wherein the control assembly is mounted within a support vehicle. 12. The sewer preparation system as recited in claim 11, wherein control assembly includes a plurality corresponding reels for holding and driving each of the control conduits, wherein each of the reels are controlled for feeding the corresponding control conduit in concert with the corresponding drive modules. 13. The sewer preparation system as recited in claim 12, wherein the motor and reel for a corresponding one of the control conduits are controlled by the control assembly to maintain a desired tension on the control conduit. 14. The sewer preparation system as recited in claim 13, wherein the control assembly individually controls each of the motors and reel assemblies for extending a corresponding tool into a lateral pipe. 15. The sewer preparation system as recited in claim 1, wherein one of the plurality of tools comprises an inspection head for measuring internal dimensions of a pipe. 16. The sewer preparation system as recited in claim 13, including a sensor for measuring a length of control conduit extended from each of the reels. 17. The sewer preparation system as recited in claim 11, wherein the control assembly comprises at least one monitor for displaying images transmitted from a camera disposed at an end of one of the control conduits. 18. The sewer preparation system as recited in claim 1, including a tow device for moving the drive modules within a pipe. | 2,400 |
8,869 | 8,869 | 15,505,893 | 2,465 | The proposed technology generally relates to interworking and integration of different radio access networks, and more specifically to carrier aggregation between different radio access networks such as a cellular radio access network, e.g. a 3GPP network, on one hand and a WLAN network such as Wi-Fi, on the other hand. Such tight interworking/aggregation of radio access networks puts new requirements on efficient handling of authentication and security aspects. The proposed technology provides methods, and corresponding network nodes, computer programs, carriers comprising such computer programs, and computer program products as well as arrangements to support carrier aggregation between different radio access networks. | 1. A method of operation of a first network node for supporting carrier aggregation between different radio access networks, the first network node configured for operation in a first radio access network, the method comprising:
configuring a second network node of a second radio access network with keying material; and configuring the second network node to establish an association with a wireless device associated with a given identifier based on said keying material; and configuring said second network node to forward data from the wireless device to said first network node. 2. The method of claim 1, wherein the method further comprises configuring the wireless device with information enabling the wireless device to derive said keying material. 3. The method of claim 1, wherein the establishment of the association is based on exchange of random value(s) between the second network node and the wireless device, enabling generation of a key using said random value(s) and the keying material. 4. The method of claim 1, wherein the method further comprises configuring the wireless device with a network identifier associated with the second network node, enabling the wireless device to establish the association with the configured second network node. 5-11. (canceled) 12. A first network node configured to support carrier aggregation between different radio access networks, the first network node adapted for operation in a first radio access network,
wherein the first network node is adapted to configure a second network node of a second radio access network with keying material; wherein the first network node is adapted to configure the second network node to establish an association with a wireless device associated with a given identifier based on said keying material; and wherein the first network node is adapted to configure said second network node to forward data from the wireless device to said first network node. 13-20. (canceled) 21. A method of operation of a second network node for supporting carrier aggregation between different radio access networks, the second network node configured for operation in a second radio access network, the method comprising:
receiving configuration for establishing an association with a wireless device; announcing a network identifier; establishing the association with the wireless device if the wireless device connected to the second network node using the network identifier; and receiving data from the wireless device and forwarding the data to a first network node of a first radio access network. 22-40. (canceled) 41. A method of operation of a wireless device for supporting carrier aggregation between different radio access networks, the method comprising:
receiving information for establishing an association with a second network node of a second radio access network, said information comprising a network identifier; establishing an association with the second network node using the network identifier; and sending data, targeted for a first network node of a first radio access network, to the second network node. 42. The method of claim 41, wherein the information comprises keying material. 43. The method of claim 41, wherein the method further comprises deriving a key based on at least the received information and using said key to establish the association with the second network node. 44. The method of claim 43, wherein the establishment of the association is based on exchange of random value(s) between the second network node and the wireless device, enabling generation of a key using said random value(s) and the derived key. 45. The method of claim 43, wherein the key(s) enables encryption of over-the-air traffic. 46. The method of claim 41, wherein the first radio access network is a cellular radio access network and the second radio access network is Wireless Local Area Network, WLAN, and the first network node is a base station and the second network node is an access point, and the wireless device is a User Equipment, UE, and/or wireless station, STA. 47. The method of claim 41, wherein the association is a security association between the wireless device and the second network node. 48. The method of claim 47, wherein aggregated UE data targeted for the first network node is encrypted based on the established security association. 49. The method of claim 47, wherein the security association is a WLAN security association. 50. The method of claim 41, wherein the network identifier is a network node identifier and the keying material includes one or more security keys and/or information for deriving one or more security keys. 51. A wireless device configured to support carrier aggregation between different radio access networks,
wherein the wireless device is adapted to receive information for establishing an association with a network node of a radio access network, said information comprising a network identifier; wherein the wireless device is adapted to establish an association with the network node using the network identifier; and wherein the wireless device is adapted to send, to the network node, data targeted for another network node of a different radio access network. 52. The wireless device of claim 51, wherein the wireless device is adapted to receive information comprising keying material. 53. The wireless device of claim 51, wherein the wireless device is adapted to derive a key based on at least the received information and using said key to establish the association with the network node. 54-63. (canceled) 64. An arrangement for supporting carrier aggregation between different radio access networks,
wherein the arrangement is configured to provide keying material to an access point of a Wireless Local Area Network, WLAN, to enable establishment of a security association between the access point and a wireless device to ensure over-the-air WLAN security for carrier aggregation when forwarding traffic data of the wireless device to and from a base station of a cellular radio access network via the access point. 65. The arrangement of claim 64, wherein the arrangement comprises a processor and a memory, wherein the memory comprises instructions executable by the processor, whereby the processor is operative to support carrier aggregation. 66-73. (canceled) | The proposed technology generally relates to interworking and integration of different radio access networks, and more specifically to carrier aggregation between different radio access networks such as a cellular radio access network, e.g. a 3GPP network, on one hand and a WLAN network such as Wi-Fi, on the other hand. Such tight interworking/aggregation of radio access networks puts new requirements on efficient handling of authentication and security aspects. The proposed technology provides methods, and corresponding network nodes, computer programs, carriers comprising such computer programs, and computer program products as well as arrangements to support carrier aggregation between different radio access networks.1. A method of operation of a first network node for supporting carrier aggregation between different radio access networks, the first network node configured for operation in a first radio access network, the method comprising:
configuring a second network node of a second radio access network with keying material; and configuring the second network node to establish an association with a wireless device associated with a given identifier based on said keying material; and configuring said second network node to forward data from the wireless device to said first network node. 2. The method of claim 1, wherein the method further comprises configuring the wireless device with information enabling the wireless device to derive said keying material. 3. The method of claim 1, wherein the establishment of the association is based on exchange of random value(s) between the second network node and the wireless device, enabling generation of a key using said random value(s) and the keying material. 4. The method of claim 1, wherein the method further comprises configuring the wireless device with a network identifier associated with the second network node, enabling the wireless device to establish the association with the configured second network node. 5-11. (canceled) 12. A first network node configured to support carrier aggregation between different radio access networks, the first network node adapted for operation in a first radio access network,
wherein the first network node is adapted to configure a second network node of a second radio access network with keying material; wherein the first network node is adapted to configure the second network node to establish an association with a wireless device associated with a given identifier based on said keying material; and wherein the first network node is adapted to configure said second network node to forward data from the wireless device to said first network node. 13-20. (canceled) 21. A method of operation of a second network node for supporting carrier aggregation between different radio access networks, the second network node configured for operation in a second radio access network, the method comprising:
receiving configuration for establishing an association with a wireless device; announcing a network identifier; establishing the association with the wireless device if the wireless device connected to the second network node using the network identifier; and receiving data from the wireless device and forwarding the data to a first network node of a first radio access network. 22-40. (canceled) 41. A method of operation of a wireless device for supporting carrier aggregation between different radio access networks, the method comprising:
receiving information for establishing an association with a second network node of a second radio access network, said information comprising a network identifier; establishing an association with the second network node using the network identifier; and sending data, targeted for a first network node of a first radio access network, to the second network node. 42. The method of claim 41, wherein the information comprises keying material. 43. The method of claim 41, wherein the method further comprises deriving a key based on at least the received information and using said key to establish the association with the second network node. 44. The method of claim 43, wherein the establishment of the association is based on exchange of random value(s) between the second network node and the wireless device, enabling generation of a key using said random value(s) and the derived key. 45. The method of claim 43, wherein the key(s) enables encryption of over-the-air traffic. 46. The method of claim 41, wherein the first radio access network is a cellular radio access network and the second radio access network is Wireless Local Area Network, WLAN, and the first network node is a base station and the second network node is an access point, and the wireless device is a User Equipment, UE, and/or wireless station, STA. 47. The method of claim 41, wherein the association is a security association between the wireless device and the second network node. 48. The method of claim 47, wherein aggregated UE data targeted for the first network node is encrypted based on the established security association. 49. The method of claim 47, wherein the security association is a WLAN security association. 50. The method of claim 41, wherein the network identifier is a network node identifier and the keying material includes one or more security keys and/or information for deriving one or more security keys. 51. A wireless device configured to support carrier aggregation between different radio access networks,
wherein the wireless device is adapted to receive information for establishing an association with a network node of a radio access network, said information comprising a network identifier; wherein the wireless device is adapted to establish an association with the network node using the network identifier; and wherein the wireless device is adapted to send, to the network node, data targeted for another network node of a different radio access network. 52. The wireless device of claim 51, wherein the wireless device is adapted to receive information comprising keying material. 53. The wireless device of claim 51, wherein the wireless device is adapted to derive a key based on at least the received information and using said key to establish the association with the network node. 54-63. (canceled) 64. An arrangement for supporting carrier aggregation between different radio access networks,
wherein the arrangement is configured to provide keying material to an access point of a Wireless Local Area Network, WLAN, to enable establishment of a security association between the access point and a wireless device to ensure over-the-air WLAN security for carrier aggregation when forwarding traffic data of the wireless device to and from a base station of a cellular radio access network via the access point. 65. The arrangement of claim 64, wherein the arrangement comprises a processor and a memory, wherein the memory comprises instructions executable by the processor, whereby the processor is operative to support carrier aggregation. 66-73. (canceled) | 2,400 |
8,870 | 8,870 | 15,707,643 | 2,478 | Aspects of the disclosure relate to management of information streams. The information streams can be delivered according to adaptive streaming mechanisms. In one aspect, a method of data stream management can comprise receiving a plurality of data streams having a specific bit rate and a segmentation signaling structure, comprising at least one segmentation signaling marker. The method may also comprise monitoring the segmentation signaling structure of at least one data stream and supplying, based on the monitoring, a metric indicative of compliance with a predetermined segmentation signaling structure. | 1. A method, comprising:
receiving, from at least one encoder, a plurality of data streams for specific content, each data stream of the plurality of data streams having a specific bit rate and a segmentation signaling structure comprising at least one segmentation signaling marker; monitoring, by a monitoring device, the segmentation signaling structure of at least one data stream of the plurality of data streams; determining, by the monitoring device and based on the monitoring, a compliance metric indicative of compliance with one or more rules related to the segmentation signaling structure; supplying, to a system management device used by a service provider for analyzing compliance of the at least one encoder to the one or more rules, the compliance metric; and supplying a metric indicative of a number of packets in two or more data streams of the plurality of data streams having a common time stamp. | Aspects of the disclosure relate to management of information streams. The information streams can be delivered according to adaptive streaming mechanisms. In one aspect, a method of data stream management can comprise receiving a plurality of data streams having a specific bit rate and a segmentation signaling structure, comprising at least one segmentation signaling marker. The method may also comprise monitoring the segmentation signaling structure of at least one data stream and supplying, based on the monitoring, a metric indicative of compliance with a predetermined segmentation signaling structure.1. A method, comprising:
receiving, from at least one encoder, a plurality of data streams for specific content, each data stream of the plurality of data streams having a specific bit rate and a segmentation signaling structure comprising at least one segmentation signaling marker; monitoring, by a monitoring device, the segmentation signaling structure of at least one data stream of the plurality of data streams; determining, by the monitoring device and based on the monitoring, a compliance metric indicative of compliance with one or more rules related to the segmentation signaling structure; supplying, to a system management device used by a service provider for analyzing compliance of the at least one encoder to the one or more rules, the compliance metric; and supplying a metric indicative of a number of packets in two or more data streams of the plurality of data streams having a common time stamp. | 2,400 |
8,871 | 8,871 | 15,215,023 | 2,439 | Systems, methods, and computer-readable storage media for automatic port identification. The present technology can involve determining that a wireless device has connected to a network device on a network, and determining which of the ports on the network device the wireless device has connected to. The determining the port connected to the wireless device can involve determining respective traffic patterns to be provided to selected ports on the network device, determining a traffic pattern transmitted by the wireless device, determining that the traffic pattern transmitted by the wireless device has a similarity to a traffic pattern from the respective traffic patterns, and based on the similarity, determining that a port associated with the traffic pattern is connected to the wireless device. The present technology can also involve selecting a port policy for the port. | 1. A method comprising:
determining that a wireless device has connected to one of a plurality of ports on a network device associated with a network; determining which of the plurality of ports on the network device is connected to the wireless device by:
determining one or more predetermined traffic patterns to be transmitted by the network device via one or more of the plurality of ports;
determining one or more traffic patterns transmitted by the wireless device;
determining that the one or more traffic patterns transmitted by the wireless device has a threshold degree of similarity to a matching traffic pattern from the one or more predetermined traffic patterns, to yield a traffic pattern match; and
based on the traffic pattern match, determining that a port from the plurality of ports that is associated with the matching traffic pattern is connected to the wireless device, to yield an identified port; and
selecting a port policy to be applied to the identified port. 2. The method of claim 1, further comprising verifying that the identified port is connected to the wireless device by:
implementing a verification policy on the identified port, the verification policy configured to cause a first traffic pattern to be transmitted by a device connected to the identified port; detecting a second traffic pattern transmitted by the wireless device; determining a degree of similarity between the first traffic pattern and the second traffic pattern; determining a confidence level based on the degree of similarity; and verifying that the identified port is connected to the wireless device when the confidence level exceeds a threshold. 3. The method of claim 2, wherein implementing the verification policy comprises instructing the identified port to transmit the first traffic pattern to the device connected to the identified port. 4. The method of claim 2, wherein the first traffic pattern is generated by limiting or stopping traffic transmitted by the identified port to the device connected to the identified port during a predetermined portion of a time interval. 5. The method of claim 2, wherein the first traffic pattern comprises a duty cycle produced by stopping traffic transmitted via the identified port for a particular sub-interval of time within a predetermined interval of time, wherein the predetermined interval of time comprises a first sub-interval of time, a second sub-interval of time that is sequentially after the first sub-interval of time, and a third sub-interval of time that is sequentially after the second sub-interval of time, wherein the particular sub-interval of time is the second sub-interval of time. 6. The method of claim 2, wherein the first traffic pattern comprises a duty cycle produced by stopping traffic transmitted via the identified port for a particular sub-interval of time within a predetermined interval of time. 7. The method of claim 6, wherein the predetermined interval of time comprises a first sub-interval of time and one or more second sub-intervals of time that are sequentially after the first sub-interval of time, wherein the particular sub-interval of time is the first sub-interval of time. 8. The method of claim 6, wherein the predetermined interval of time comprises one or more first sub-intervals of time and a second sub-interval of time that is sequentially after the one or more first sub-intervals of time, wherein the particular sub-interval of time is the second sub-interval of time. 9. The computer-implemented method of claim 1, further comprising verifying that the identified port is connected to the wireless device by:
applying respective policies to multiple ports on the network device, the multiple ports comprising the identified port, wherein the respective policies are configured to cause respective traffic patterns to be transmitted by respective devices connected to the multiple ports; detecting a first traffic pattern transmitted by the wireless device; determining a respective degree of similarity between the first traffic pattern and each of the respective traffic patterns; determining, based on the respective degree of similarity, respective confidence levels for each of the multiple ports; and verifying that the identified port is connected to the wireless device when a respective confidence level associated with the identified port exceeds a threshold. 10. The method of claim 1, wherein at least two of the respective traffic patterns are different. 11. The method of claim 10, wherein a difference between the at least two of the respective traffic patterns is based on at least one of a respective duty cycle associated with each of the at least two of the respective traffic patterns and a length of a respective time interval associated with each of the at least two of the respective traffic patterns. 12. The method of claim 1, further comprising selecting the port policy for the identified port comprises applying the port policy to the identified port, wherein the port policy is configured to limit throughput of the identified port, move traffic of the identified port to an isolated virtual local area network, add one or more firewall or security rules, reduce power to the identified port, or disable the identified port. 13. A system comprising:
one or more processors; and at least one computer-readable storage medium having stored therein instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
detecting that a wireless device has connected to one of a plurality of ports on a network device associated with a network;
determining which of the plurality of ports on the network device is connected to the wireless device by:
generating one or more predetermined traffic patterns for output by the one or more of the plurality of ports;
determining one or more wireless traffic patterns transmitted by the wireless device;
matching the one or more wireless traffic patterns to at least one of the one or more predetermined traffic patterns to yield a match; and
based on the match, determining that a particular port from the plurality of ports that is associated with the at least one of the one or more predetermined traffic patterns is connected to the wireless device; and
selecting a port policy for the particular port. 14. The system of claim 13, the at least one computer-readable storage medium having stored therein additional instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
determining a confidence level associated with the determining that the particular port is connected to the wireless device, the determining of the confidence level comprising:
providing to one or more of the plurality of ports a respective signal configured to cause one or more respective traffic patterns to be provided to a respective device connected to the one or more of the plurality of ports, wherein the one or more of the plurality of ports comprises the particular port;
determining a wireless traffic pattern transmitted by the wireless device;
determining a degree of similarity between the wireless traffic pattern transmitted by the wireless device and a traffic pattern from the respective traffic patterns, the traffic pattern being associated with the particular port;
determining the confidence level based on the degree of similarity. 15. The system of claim 14, wherein each of the one or more respective traffic patterns comprises at least one of:
a modified throughput; one or more predetermined sequences of packets; and one or more duty cycles, the one or more duty cycles generated by stopping or limiting traffic transmitted during a particular portion of a predetermined time interval. 16. The system of claim 13, wherein the port policy is configured to limit throughput of the particular port, move traffic of the particular port to an isolated virtual local area network, add one or more firewall or security rules to be applied to traffic associated with the particular port, reducing power to the particular port, or disabling the particular port. 17. A non-transitory computer-readable storage medium having stored therein instructions which, when executed by a processor, cause the processor to perform operations comprising:
determining that a wireless device has connected to one of a plurality of ports on a network device associated with a network; determining which of the plurality of ports on the network device the wireless device has connected to, the determining comprising:
determining one or more predetermined traffic patterns for the one or more of the plurality of ports;
determining one or more wireless traffic patterns transmitted by the wireless device;
determining a degree of similarity between the one or more wireless traffic patterns and a traffic pattern from the one or more predetermined traffic patterns, to yield a match; and
based on the match, determining that a particular port from the plurality of ports that is associated with the traffic pattern is connected to the wireless device; and
selecting a port policy associated with the particular port. 18. The non-transitory computer-readable storage medium of claim 17, wherein determining the one or more wireless traffic patterns transmitted by the wireless device is based on one or more signals received from a second wireless device that has wirelessly detected the one or more wireless traffic patterns, the one or more signals comprising at least one of a message reporting the one or more wireless traffic patterns and traffic from the wireless device detected by the second wireless device, the traffic from the wireless device detected by the second wireless device being associated with the one or more wireless traffic patterns. 19. The non-transitory computer-readable storage medium of claim 17, storing additional instructions which, when executed by the processor, cause the processor to perform operations comprising:
determining a confidence level associated with the determining that the particular port is connected to the wireless device, the determining the confidence level comprising:
providing to one or more of the plurality of ports a respective signal configured to cause one or more respective traffic patterns to be provided to a respective device connected to the one or more of the plurality of ports, wherein the one or more of the plurality of ports comprises the particular port;
determining a wireless traffic pattern transmitted by the wireless device; and
determining the confidence level based on a respective degree of similarity between the one or more respective traffic patterns and the wireless traffic pattern, wherein the higher the respective degree of similarity the higher the confidence level determined for the identified port; and
verifying that the particular port is connected to the wireless device when the confidence level exceeds a threshold. 20. The non-transitory computer-readable storage medium of claim 17, wherein selecting the port policy comprises applying the port policy to the particular port, wherein the port policy is configured to:
limit throughput of the particular port; move traffic associated with the particular port to an isolated virtual local area network; apply one or more firewall or security rules to traffic associated with the particular port; reduce power to the particular port; or disable the particular port | Systems, methods, and computer-readable storage media for automatic port identification. The present technology can involve determining that a wireless device has connected to a network device on a network, and determining which of the ports on the network device the wireless device has connected to. The determining the port connected to the wireless device can involve determining respective traffic patterns to be provided to selected ports on the network device, determining a traffic pattern transmitted by the wireless device, determining that the traffic pattern transmitted by the wireless device has a similarity to a traffic pattern from the respective traffic patterns, and based on the similarity, determining that a port associated with the traffic pattern is connected to the wireless device. The present technology can also involve selecting a port policy for the port.1. A method comprising:
determining that a wireless device has connected to one of a plurality of ports on a network device associated with a network; determining which of the plurality of ports on the network device is connected to the wireless device by:
determining one or more predetermined traffic patterns to be transmitted by the network device via one or more of the plurality of ports;
determining one or more traffic patterns transmitted by the wireless device;
determining that the one or more traffic patterns transmitted by the wireless device has a threshold degree of similarity to a matching traffic pattern from the one or more predetermined traffic patterns, to yield a traffic pattern match; and
based on the traffic pattern match, determining that a port from the plurality of ports that is associated with the matching traffic pattern is connected to the wireless device, to yield an identified port; and
selecting a port policy to be applied to the identified port. 2. The method of claim 1, further comprising verifying that the identified port is connected to the wireless device by:
implementing a verification policy on the identified port, the verification policy configured to cause a first traffic pattern to be transmitted by a device connected to the identified port; detecting a second traffic pattern transmitted by the wireless device; determining a degree of similarity between the first traffic pattern and the second traffic pattern; determining a confidence level based on the degree of similarity; and verifying that the identified port is connected to the wireless device when the confidence level exceeds a threshold. 3. The method of claim 2, wherein implementing the verification policy comprises instructing the identified port to transmit the first traffic pattern to the device connected to the identified port. 4. The method of claim 2, wherein the first traffic pattern is generated by limiting or stopping traffic transmitted by the identified port to the device connected to the identified port during a predetermined portion of a time interval. 5. The method of claim 2, wherein the first traffic pattern comprises a duty cycle produced by stopping traffic transmitted via the identified port for a particular sub-interval of time within a predetermined interval of time, wherein the predetermined interval of time comprises a first sub-interval of time, a second sub-interval of time that is sequentially after the first sub-interval of time, and a third sub-interval of time that is sequentially after the second sub-interval of time, wherein the particular sub-interval of time is the second sub-interval of time. 6. The method of claim 2, wherein the first traffic pattern comprises a duty cycle produced by stopping traffic transmitted via the identified port for a particular sub-interval of time within a predetermined interval of time. 7. The method of claim 6, wherein the predetermined interval of time comprises a first sub-interval of time and one or more second sub-intervals of time that are sequentially after the first sub-interval of time, wherein the particular sub-interval of time is the first sub-interval of time. 8. The method of claim 6, wherein the predetermined interval of time comprises one or more first sub-intervals of time and a second sub-interval of time that is sequentially after the one or more first sub-intervals of time, wherein the particular sub-interval of time is the second sub-interval of time. 9. The computer-implemented method of claim 1, further comprising verifying that the identified port is connected to the wireless device by:
applying respective policies to multiple ports on the network device, the multiple ports comprising the identified port, wherein the respective policies are configured to cause respective traffic patterns to be transmitted by respective devices connected to the multiple ports; detecting a first traffic pattern transmitted by the wireless device; determining a respective degree of similarity between the first traffic pattern and each of the respective traffic patterns; determining, based on the respective degree of similarity, respective confidence levels for each of the multiple ports; and verifying that the identified port is connected to the wireless device when a respective confidence level associated with the identified port exceeds a threshold. 10. The method of claim 1, wherein at least two of the respective traffic patterns are different. 11. The method of claim 10, wherein a difference between the at least two of the respective traffic patterns is based on at least one of a respective duty cycle associated with each of the at least two of the respective traffic patterns and a length of a respective time interval associated with each of the at least two of the respective traffic patterns. 12. The method of claim 1, further comprising selecting the port policy for the identified port comprises applying the port policy to the identified port, wherein the port policy is configured to limit throughput of the identified port, move traffic of the identified port to an isolated virtual local area network, add one or more firewall or security rules, reduce power to the identified port, or disable the identified port. 13. A system comprising:
one or more processors; and at least one computer-readable storage medium having stored therein instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
detecting that a wireless device has connected to one of a plurality of ports on a network device associated with a network;
determining which of the plurality of ports on the network device is connected to the wireless device by:
generating one or more predetermined traffic patterns for output by the one or more of the plurality of ports;
determining one or more wireless traffic patterns transmitted by the wireless device;
matching the one or more wireless traffic patterns to at least one of the one or more predetermined traffic patterns to yield a match; and
based on the match, determining that a particular port from the plurality of ports that is associated with the at least one of the one or more predetermined traffic patterns is connected to the wireless device; and
selecting a port policy for the particular port. 14. The system of claim 13, the at least one computer-readable storage medium having stored therein additional instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
determining a confidence level associated with the determining that the particular port is connected to the wireless device, the determining of the confidence level comprising:
providing to one or more of the plurality of ports a respective signal configured to cause one or more respective traffic patterns to be provided to a respective device connected to the one or more of the plurality of ports, wherein the one or more of the plurality of ports comprises the particular port;
determining a wireless traffic pattern transmitted by the wireless device;
determining a degree of similarity between the wireless traffic pattern transmitted by the wireless device and a traffic pattern from the respective traffic patterns, the traffic pattern being associated with the particular port;
determining the confidence level based on the degree of similarity. 15. The system of claim 14, wherein each of the one or more respective traffic patterns comprises at least one of:
a modified throughput; one or more predetermined sequences of packets; and one or more duty cycles, the one or more duty cycles generated by stopping or limiting traffic transmitted during a particular portion of a predetermined time interval. 16. The system of claim 13, wherein the port policy is configured to limit throughput of the particular port, move traffic of the particular port to an isolated virtual local area network, add one or more firewall or security rules to be applied to traffic associated with the particular port, reducing power to the particular port, or disabling the particular port. 17. A non-transitory computer-readable storage medium having stored therein instructions which, when executed by a processor, cause the processor to perform operations comprising:
determining that a wireless device has connected to one of a plurality of ports on a network device associated with a network; determining which of the plurality of ports on the network device the wireless device has connected to, the determining comprising:
determining one or more predetermined traffic patterns for the one or more of the plurality of ports;
determining one or more wireless traffic patterns transmitted by the wireless device;
determining a degree of similarity between the one or more wireless traffic patterns and a traffic pattern from the one or more predetermined traffic patterns, to yield a match; and
based on the match, determining that a particular port from the plurality of ports that is associated with the traffic pattern is connected to the wireless device; and
selecting a port policy associated with the particular port. 18. The non-transitory computer-readable storage medium of claim 17, wherein determining the one or more wireless traffic patterns transmitted by the wireless device is based on one or more signals received from a second wireless device that has wirelessly detected the one or more wireless traffic patterns, the one or more signals comprising at least one of a message reporting the one or more wireless traffic patterns and traffic from the wireless device detected by the second wireless device, the traffic from the wireless device detected by the second wireless device being associated with the one or more wireless traffic patterns. 19. The non-transitory computer-readable storage medium of claim 17, storing additional instructions which, when executed by the processor, cause the processor to perform operations comprising:
determining a confidence level associated with the determining that the particular port is connected to the wireless device, the determining the confidence level comprising:
providing to one or more of the plurality of ports a respective signal configured to cause one or more respective traffic patterns to be provided to a respective device connected to the one or more of the plurality of ports, wherein the one or more of the plurality of ports comprises the particular port;
determining a wireless traffic pattern transmitted by the wireless device; and
determining the confidence level based on a respective degree of similarity between the one or more respective traffic patterns and the wireless traffic pattern, wherein the higher the respective degree of similarity the higher the confidence level determined for the identified port; and
verifying that the particular port is connected to the wireless device when the confidence level exceeds a threshold. 20. The non-transitory computer-readable storage medium of claim 17, wherein selecting the port policy comprises applying the port policy to the particular port, wherein the port policy is configured to:
limit throughput of the particular port; move traffic associated with the particular port to an isolated virtual local area network; apply one or more firewall or security rules to traffic associated with the particular port; reduce power to the particular port; or disable the particular port | 2,400 |
8,872 | 8,872 | 15,643,085 | 2,476 | Methods, apparatuses, and computer program products for synchronization in a network are provided. One method includes configuring a first node for joining a first synchronization group with a second node on a lowest stratum, receiving at least one synchronization signal comprising information on at least an identity of the second node, and synchronizing the first node to the first synchronization group based on the synchronization signal. | 1. An apparatus, comprising:
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to determine which one of a plurality of possible synchronisation sources to use as a synchronisation source, based at least partly on information about an identity of a synchronisation group to which the possible synchronisation sources belong. 2. The apparatus according to claim 1, wherein said information about the identity of the synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 3. The apparatus according to claim 2, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to obtain information about the identity of the synchronization source on the lowest stratum of the synchronisation group for a detected synchronization source from transmissions of the detected synchronization source. 4. The apparatus according to claim 2, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to obtain information about the identity of the lowest stratum of the synchronisation group for a possible synchronisation source from information received through backhaul. 5. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to select a possible synchronisation source of a more preferred synchronisation group over a possible synchronisation source of a less preferred synchronisation group, even in the event that a stratum of the possible synchronisation source of the more preferred synchronisation group is higher than a stratum of the possible synchronisation source of the less preferred synchronisation group. 6. An apparatus, comprising:
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to broadcast information about an identity of a synchronisation group to which a possible synchronisation source belongs, for use by one or more nodes when selecting a synchronisation source. 7. The apparatus according to claim 6, wherein said information about the identity of a synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 8. A method, comprising:
determining which one of a plurality of possible synchronisation sources to use as a synchronisation source, based at least partly on information about an identity of a synchronisation group to which the possible synchronisation sources belong. 9. The method according to claim 8, wherein said information about the identity of the synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 10. The method according to claim 9, further comprising obtaining information about the identity of the synchronization source on the lowest stratum of the synchronisation group for a detected synchronization source from transmissions of the detected synchronization source. 11. The method according to claim 9, further comprising obtaining information about the identity of the lowest stratum of the synchronisation group for a possible synchronisation source from information received through backhaul. 12. The method according to claim 8, further comprising selecting a possible synchronisation source of a more preferred synchronisation group over a possible synchronisation source of a less preferred synchronisation group, even in the event that a stratum of the possible synchronisation source of the more preferred synchronisation group is higher than a stratum of the possible synchronisation source of the less preferred synchronisation group. 13. A method, comprising:
broadcasting information about an identity of a synchronisation group to which a possible synchronisation source belongs, for use by one or more nodes when selecting a synchronisation source. 14. The method according to claim 13, wherein said information about the identity of the synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 15. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a method according to claim 8. 16. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a method according to claim 13. | Methods, apparatuses, and computer program products for synchronization in a network are provided. One method includes configuring a first node for joining a first synchronization group with a second node on a lowest stratum, receiving at least one synchronization signal comprising information on at least an identity of the second node, and synchronizing the first node to the first synchronization group based on the synchronization signal.1. An apparatus, comprising:
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to determine which one of a plurality of possible synchronisation sources to use as a synchronisation source, based at least partly on information about an identity of a synchronisation group to which the possible synchronisation sources belong. 2. The apparatus according to claim 1, wherein said information about the identity of the synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 3. The apparatus according to claim 2, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to obtain information about the identity of the synchronization source on the lowest stratum of the synchronisation group for a detected synchronization source from transmissions of the detected synchronization source. 4. The apparatus according to claim 2, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to obtain information about the identity of the lowest stratum of the synchronisation group for a possible synchronisation source from information received through backhaul. 5. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to select a possible synchronisation source of a more preferred synchronisation group over a possible synchronisation source of a less preferred synchronisation group, even in the event that a stratum of the possible synchronisation source of the more preferred synchronisation group is higher than a stratum of the possible synchronisation source of the less preferred synchronisation group. 6. An apparatus, comprising:
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to broadcast information about an identity of a synchronisation group to which a possible synchronisation source belongs, for use by one or more nodes when selecting a synchronisation source. 7. The apparatus according to claim 6, wherein said information about the identity of a synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 8. A method, comprising:
determining which one of a plurality of possible synchronisation sources to use as a synchronisation source, based at least partly on information about an identity of a synchronisation group to which the possible synchronisation sources belong. 9. The method according to claim 8, wherein said information about the identity of the synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 10. The method according to claim 9, further comprising obtaining information about the identity of the synchronization source on the lowest stratum of the synchronisation group for a detected synchronization source from transmissions of the detected synchronization source. 11. The method according to claim 9, further comprising obtaining information about the identity of the lowest stratum of the synchronisation group for a possible synchronisation source from information received through backhaul. 12. The method according to claim 8, further comprising selecting a possible synchronisation source of a more preferred synchronisation group over a possible synchronisation source of a less preferred synchronisation group, even in the event that a stratum of the possible synchronisation source of the more preferred synchronisation group is higher than a stratum of the possible synchronisation source of the less preferred synchronisation group. 13. A method, comprising:
broadcasting information about an identity of a synchronisation group to which a possible synchronisation source belongs, for use by one or more nodes when selecting a synchronisation source. 14. The method according to claim 13, wherein said information about the identity of the synchronisation group comprises the identity of the synchronization source on a lowest stratum of the synchronisation group. 15. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a method according to claim 8. 16. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a method according to claim 13. | 2,400 |
8,873 | 8,873 | 13,549,913 | 2,437 | A controller and method of controlling a mobile device. The controller is coupled to a mobile device through a mobile communications environment. The controller is coupled to the mobile communications environment at a location remote from the mobile device, and includes a receiver that receives data from the mobile device, a processor that evaluates the data received from the mobile device based upon rules for the mobile device, and a transmitter that sends data to the mobile device to at least one of alert the user to a condition and modify current operating parameters on the mobile device. | 1. A controller coupled to a mobile device through a mobile communications environment, the controller being coupled to the mobile communications environment at a location remote from the mobile device, the controller comprising:
a receiver that receives data from the mobile device; a processor that evaluates the data received from the mobile device based upon rules for the mobile device; and a transmitter that sends data to the mobile device to at least one of alert the user to a condition and modify current operating parameters on the mobile device. 2. The controller according to claim 1, wherein the data received from the mobile device comprises an amount of usage time per network and the received data is logged by the controller. 3. The controller according to claim 2, wherein the amount of usage time is aggregated per network. 4. The controller according to claim 3, wherein the rules include per user limits of usage time per network. 5. The controller according to claim 4, wherein the controller is configured to automatically disable a network interface on the mobile device to avoid a user exceeding the usage time limits for a network associated with the disabled network interface. 6. The controller according to claim 2, wherein the received data further comprises a time stamp of an occurrence of the usage time, and the usage time is aggregated per network and according to the time stamp. 7. The controller according to claim 6, wherein, for each network, the controller monitors a plurality of time periods, and each time period is associated with a billing rate for usage time. 8. The controller according to claim 7, wherein the rules include per user limits of cost per network. 9. The controller according to claim 8, wherein the controller is configured to automatically disable a network interface on the mobile device to avoid a user exceeding the cost limits for a network associated with the disabled network interface. 10. The controller according to claim 4, wherein the controller is configured map the aggregated usage time to project when usage time limits will be exceeded. 11. The controller according to claim 10, wherein the controller is configured to automatically notify a user of the mobile device of the projected exceeding of the usage time limits for a network. 12. A method of remotely controlling a mobile device through a mobile communications environment, the method comprising:
receiving data from the mobile device; evaluating the data received from the mobile device based upon rules for the mobile device; and sending data to the mobile device to at least one of alert the user to a condition and modify current operating parameters on the mobile device. 13. The method according to claim 12, wherein the data received from the mobile device comprises an amount of usage time per network and the method further comprises aggregating the amount of usage time per network. 14. The method according to claim 13, wherein the rules include per user limits of usage time per network. 15. The method according to claim 14, further comprising automatically disabling a network interface on the mobile device to avoid a user exceeding the usage time limits for a network associated with the disabled network interface. 16. The method according to claim 12, wherein the received data further comprises a time stamp of an occurrence of the usage time, and method further comprises aggregating the usage time per network and according to the time stamp. 17. The method according to claim 16, further comprising monitoring a plurality of time periods for each network, wherein each time period is associated with a billing rate for usage time. 18. The method according to claim 17, wherein the rules include per user limits of cost per network, and the method further includes automatically disabling a network interface on the mobile device to avoid the user exceeding the cost limits for a network associated with the disabled network interface. 19. The method according to claim 12, further comprising mapping the aggregated usage time to project when usage time limits will be exceeded. 20. The method according to claim 19, automatically notifying a user of the mobile device of the projected exceeding of the usage time limits for a network. | A controller and method of controlling a mobile device. The controller is coupled to a mobile device through a mobile communications environment. The controller is coupled to the mobile communications environment at a location remote from the mobile device, and includes a receiver that receives data from the mobile device, a processor that evaluates the data received from the mobile device based upon rules for the mobile device, and a transmitter that sends data to the mobile device to at least one of alert the user to a condition and modify current operating parameters on the mobile device.1. A controller coupled to a mobile device through a mobile communications environment, the controller being coupled to the mobile communications environment at a location remote from the mobile device, the controller comprising:
a receiver that receives data from the mobile device; a processor that evaluates the data received from the mobile device based upon rules for the mobile device; and a transmitter that sends data to the mobile device to at least one of alert the user to a condition and modify current operating parameters on the mobile device. 2. The controller according to claim 1, wherein the data received from the mobile device comprises an amount of usage time per network and the received data is logged by the controller. 3. The controller according to claim 2, wherein the amount of usage time is aggregated per network. 4. The controller according to claim 3, wherein the rules include per user limits of usage time per network. 5. The controller according to claim 4, wherein the controller is configured to automatically disable a network interface on the mobile device to avoid a user exceeding the usage time limits for a network associated with the disabled network interface. 6. The controller according to claim 2, wherein the received data further comprises a time stamp of an occurrence of the usage time, and the usage time is aggregated per network and according to the time stamp. 7. The controller according to claim 6, wherein, for each network, the controller monitors a plurality of time periods, and each time period is associated with a billing rate for usage time. 8. The controller according to claim 7, wherein the rules include per user limits of cost per network. 9. The controller according to claim 8, wherein the controller is configured to automatically disable a network interface on the mobile device to avoid a user exceeding the cost limits for a network associated with the disabled network interface. 10. The controller according to claim 4, wherein the controller is configured map the aggregated usage time to project when usage time limits will be exceeded. 11. The controller according to claim 10, wherein the controller is configured to automatically notify a user of the mobile device of the projected exceeding of the usage time limits for a network. 12. A method of remotely controlling a mobile device through a mobile communications environment, the method comprising:
receiving data from the mobile device; evaluating the data received from the mobile device based upon rules for the mobile device; and sending data to the mobile device to at least one of alert the user to a condition and modify current operating parameters on the mobile device. 13. The method according to claim 12, wherein the data received from the mobile device comprises an amount of usage time per network and the method further comprises aggregating the amount of usage time per network. 14. The method according to claim 13, wherein the rules include per user limits of usage time per network. 15. The method according to claim 14, further comprising automatically disabling a network interface on the mobile device to avoid a user exceeding the usage time limits for a network associated with the disabled network interface. 16. The method according to claim 12, wherein the received data further comprises a time stamp of an occurrence of the usage time, and method further comprises aggregating the usage time per network and according to the time stamp. 17. The method according to claim 16, further comprising monitoring a plurality of time periods for each network, wherein each time period is associated with a billing rate for usage time. 18. The method according to claim 17, wherein the rules include per user limits of cost per network, and the method further includes automatically disabling a network interface on the mobile device to avoid the user exceeding the cost limits for a network associated with the disabled network interface. 19. The method according to claim 12, further comprising mapping the aggregated usage time to project when usage time limits will be exceeded. 20. The method according to claim 19, automatically notifying a user of the mobile device of the projected exceeding of the usage time limits for a network. | 2,400 |
8,874 | 8,874 | 15,420,420 | 2,431 | In some examples, an alert relating to an issue in a computing arrangement is received. Contextual information is determined for the alert, the determined contextual information comprising spatial and temporal distributions of previous instances of the alert or similar alerts. The contextual information is communicated for use in addressing the issue in the computing arrangement. | 1. A non-transitory machine-readable storage medium storing instructions that upon execution cause a system to:
receive an alert relating to an issue in a computing arrangement; determine contextual information for the alert, the determined contextual information comprising spatial and temporal distributions of previous instances of the alert or similar alerts; and communicate the contextual information for use in addressing the issue in the computing arrangement. 2. The non-transitory machine-readable storage medium of claim 1, wherein the spatial distribution of the previous instances of the alert or similar alerts comprises a distribution of the previous instances of the alert or similar alerts across different physical or virtual locations. 3. The non-transitory machine-readable storage medium of claim 1, wherein the temporal distribution of the previous instances of the alert or similar alerts comprises a distribution of the previous instances of the alert or similar alerts across different time instances. 4. The non-transitory machine-readable storage medium of claim 1, wherein the contextual information further comprises information temporally correlating a first alert and a second alert. 5. The non-transitory machine-readable storage medium of claim 1, wherein the contextual information further comprises a spatial distribution of instances of the alert or similar alerts within a current time window. 6. The non-transitory machine-readable storage medium of claim 1, wherein the contextual information further comprises attributes associated with the alert, the attributes selected from among a user that the alert relates to, a machine involved in the alert, a network address involved in the alert, a network port involved in the alert, a domain name involved in the alert, a protocol involved in the alert, a program involved in the alert, and an amount of transferred data that triggered the alert. 7. The non-transitory machine-readable storage medium 6, wherein the contextual information comprises a difference between a value of a given attribute attributes in a first time window and a value of the given attribute in a second time window. 8. The non-transitory machine-readable storage medium 1, wherein the contextual information comprises a peer group of users, machines, or programs that share a feature. 9. The non-transitory machine-readable storage medium 1, wherein the contextual information comprises information regarding past investigations for resolving the alert or similar alerts. 10. A method a computing system comprising a processor, the method comprising:
receiving an alert relating to an issue in a computing arrangement; determining contextual information for the alert, the determined contextual information comprising a distribution of instances of the alert or similar alerts in historical event data and a distribution of instances of the alert or similar alerts in event data in a current time window; and communicating, over a network to a management system, the contextual information for use in addressing the issue in the computing arrangement. 11. The method of claim 10, wherein the contextual information further comprises a statistic of values of an attribute in historical event data and a statistic of values of the attribute in the current time window. 12. The method of claim 10, wherein the contextual information further comprises information of past investigations to resolve the issue in the computing arrangement. 13. The method of claim 10, wherein the alert involves an entity, and wherein the contextual information further comprises information of past investigations performed with respect the entity. 14. A computing system comprising:
a processor; and a non-transitory storage medium storing instructions executable on the processor to:
receive an alert relating to an issue in a computing arrangement;
determine contextual information for the alert, the determined contextual information comprising distributions of previous instances of the alert or similar alerts, and information of past investigations to resolve the issue; and
communicate, to a management system, the contextual information for use in addressing the issue in the computing arrangement. 15. The computing system of claim 14, wherein the distributions comprise a spatial distribution of the previous instances of the alert or similar alerts across different virtual networks. | In some examples, an alert relating to an issue in a computing arrangement is received. Contextual information is determined for the alert, the determined contextual information comprising spatial and temporal distributions of previous instances of the alert or similar alerts. The contextual information is communicated for use in addressing the issue in the computing arrangement.1. A non-transitory machine-readable storage medium storing instructions that upon execution cause a system to:
receive an alert relating to an issue in a computing arrangement; determine contextual information for the alert, the determined contextual information comprising spatial and temporal distributions of previous instances of the alert or similar alerts; and communicate the contextual information for use in addressing the issue in the computing arrangement. 2. The non-transitory machine-readable storage medium of claim 1, wherein the spatial distribution of the previous instances of the alert or similar alerts comprises a distribution of the previous instances of the alert or similar alerts across different physical or virtual locations. 3. The non-transitory machine-readable storage medium of claim 1, wherein the temporal distribution of the previous instances of the alert or similar alerts comprises a distribution of the previous instances of the alert or similar alerts across different time instances. 4. The non-transitory machine-readable storage medium of claim 1, wherein the contextual information further comprises information temporally correlating a first alert and a second alert. 5. The non-transitory machine-readable storage medium of claim 1, wherein the contextual information further comprises a spatial distribution of instances of the alert or similar alerts within a current time window. 6. The non-transitory machine-readable storage medium of claim 1, wherein the contextual information further comprises attributes associated with the alert, the attributes selected from among a user that the alert relates to, a machine involved in the alert, a network address involved in the alert, a network port involved in the alert, a domain name involved in the alert, a protocol involved in the alert, a program involved in the alert, and an amount of transferred data that triggered the alert. 7. The non-transitory machine-readable storage medium 6, wherein the contextual information comprises a difference between a value of a given attribute attributes in a first time window and a value of the given attribute in a second time window. 8. The non-transitory machine-readable storage medium 1, wherein the contextual information comprises a peer group of users, machines, or programs that share a feature. 9. The non-transitory machine-readable storage medium 1, wherein the contextual information comprises information regarding past investigations for resolving the alert or similar alerts. 10. A method a computing system comprising a processor, the method comprising:
receiving an alert relating to an issue in a computing arrangement; determining contextual information for the alert, the determined contextual information comprising a distribution of instances of the alert or similar alerts in historical event data and a distribution of instances of the alert or similar alerts in event data in a current time window; and communicating, over a network to a management system, the contextual information for use in addressing the issue in the computing arrangement. 11. The method of claim 10, wherein the contextual information further comprises a statistic of values of an attribute in historical event data and a statistic of values of the attribute in the current time window. 12. The method of claim 10, wherein the contextual information further comprises information of past investigations to resolve the issue in the computing arrangement. 13. The method of claim 10, wherein the alert involves an entity, and wherein the contextual information further comprises information of past investigations performed with respect the entity. 14. A computing system comprising:
a processor; and a non-transitory storage medium storing instructions executable on the processor to:
receive an alert relating to an issue in a computing arrangement;
determine contextual information for the alert, the determined contextual information comprising distributions of previous instances of the alert or similar alerts, and information of past investigations to resolve the issue; and
communicate, to a management system, the contextual information for use in addressing the issue in the computing arrangement. 15. The computing system of claim 14, wherein the distributions comprise a spatial distribution of the previous instances of the alert or similar alerts across different virtual networks. | 2,400 |
8,875 | 8,875 | 14,321,495 | 2,434 | According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device. | 1-20. (canceled) 21. A method for authorizing a transaction, the method comprising:
receiving, at an application operating on a first user device, information associated with authorizing the transaction, the information being received from a device of a transaction partner; providing, at the application operating on the first user device, a first digital signature authorizing the transaction, the first digital signature being generated using a first cryptographic key stored on the first user device; sending, from the application operating on the first user device to an identity repository, a request to authorize the transaction, wherein the identity repository is remotely located away from the first user device and is accessed over the Internet; receiving, at the application operating on the first user device and from the identity repository, a second digital signature authorizing the transaction, the second digital signature being provided by the identity repository using a second cryptographic key stored at the identity repository; and sending, from the application operating on the first user device to the device of the transaction partner, the first digital signature and the second digital signature, wherein the device of the transaction partner authorizes the transaction by verifying the first digital signature and the second digital signature using paired keys of the first cryptographic key and the second cryptographic key. 22. The method of claim 21, further comprising:
at the application operating on the first user device and from the identity repository, a third digital signature authorizing the transaction, the third digital signature being provided by an application operating on a second user device, the third digital signature having been sent from the application operating on the second user device to the identity repository in response to a request from the identity repository to the application operating on the second user device to authorize the transaction, wherein the third digital signature is generated using a third cryptographic key stored on the second user device; and sending, from the application operating on the first user device to the device of the transaction partner, the third digital signature, wherein the device of the transaction partner further authorizes the transaction by verifying the third digital signature using a paired key of the third cryptographic key. 23. The method of claim 22, wherein:
the first user device and a second user device comprise a same computing device; the application operating on the first user device comprises a web browser operating on the computing device; and the application operating on the second user device comprises an app operating on the computing device, the app being provided by the identity repository. 24. The method of claim 21, wherein the information associated with authorizing the transaction comprises a digital challenge, wherein the first digital signature is generated by signing the digital challenge with the first cryptographic key, and wherein the second digital signature is generated by signing the digital challenge with the second cryptographic key. 25. The method of claim 21, further comprising, prior to receiving the information associated with authorizing the transaction, registering the first user device or the application operating on the first user device with the device of the transaction partner, wherein said registering comprises sending the paired keys of the first cryptographic key and the second cryptographic key to the device of the transaction partner. 26. The method of claim 21, wherein:
the first cryptographic key stored on the first user device is not accessible to the identity repository; the second cryptographic key stored at the identity repository is not accessible to the first user device; the first cryptographic key comprises a first private key, and the pair of the first cryptographic key comprises a first public key; and the second cryptographic key comprises a second private key, and the pair of the second cryptographic key comprises a second public key. 27. The method of claim 21, further comprising:
sending, from the application operating on the first user device to the identity repository, a request for payment information for completing the transaction; receiving, at the application operating on the first user device from the identity repository, encrypted payment information in response to the request for the payment information for completing the transaction; decrypting, at the application operating on the first user device, the encrypted payment information to generate the payment information; and sending, from the application operating on the first user device to the device of the transaction partner, the payment information, wherein the payment information comprises an account number. 28. A non-transitory computer readable medium comprising instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
receiving, at an application operating on a first user device, information associated with authorizing the transaction, the information being received from a device of a transaction partner; providing, at the application operating on the first user device, a first digital signature authorizing the transaction, the first digital signature being generated using a first cryptographic key stored on the first user device; sending, from the application operating on the first user device to an identity repository, a request to authorize the transaction, wherein the identity repository is remotely located away from the first user device and is accessed over the Internet; receiving, at the application operating on the first user device and from the identity repository, a second digital signature authorizing the transaction, the second digital signature being provided by the identity repository using a second cryptographic key stored at the identity repository; and sending, from the application operating on the first user device to the device of the transaction partner, the first digital signature and the second digital signature, wherein the device of the transaction partner authorizes the transaction by verifying the first digital signature and the second digital signature using paired keys of the first cryptographic key and the second cryptographic key. 29. The non-transitory computer readable medium of claim 28, further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
at the application operating on the first user device and from the identity repository, a third digital signature authorizing the transaction, the third digital signature being provided by an application operating on a second user device, the third digital signature having been sent from the application operating on the second user device to the identity repository in response to a request from the identity repository to the application operating on the second user device to authorize the transaction, wherein the third digital signature is generated using a third cryptographic key stored on the second user device; and sending, from the application operating on the first user device to the device of the transaction partner, the third digital signature, wherein the device of the transaction partner further authorizes the transaction by verifying the third digital signature using a paired key of the third cryptographic key. 30. The non-transitory computer readable medium of claim 29, wherein:
the first user device and a second user device comprise a same computing device; the application operating on the first user device comprises a web browser operating on the computing device; and the application operating on the second user device comprises an app operating on the computing device, the app being provided by the identity repository. 31. The non-transitory computer readable medium of claim 28, wherein the information associated with authorizing the transaction comprises a digital challenge, wherein the first digital signature is generated by signing the digital challenge with the first cryptographic key, and wherein the second digital signature is generated by signing the digital challenge with the second cryptographic key. 32. The non-transitory computer readable medium of claim 28, further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising, prior to receiving the information associated with authorizing the transaction, registering the first user device or the application operating on the first user device with the device of the transaction partner, wherein said registering comprises sending the paired keys of the first cryptographic key and the second cryptographic key to the device of the transaction partner. 33. The non-transitory computer readable medium of claim 28, wherein:
the first cryptographic key stored on the first user device is not accessible to the identity repository; the second cryptographic key stored at the identity repository is not accessible to the first user device; the first cryptographic key comprises a first private key, and the pair of the first cryptographic key comprises a first public key; and the second cryptographic key comprises a second private key, and the pair of the second cryptographic key comprises a second public key. 34. The non-transitory computer readable medium of claim 28, further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
sending, from the application operating on the first user device to the identity repository, a request for payment information for completing the transaction; receiving, at the application operating on the first user device from the identity repository, encrypted payment information in response to the request for the payment information for completing the transaction; decrypting, at the application operating on the first user device, the encrypted payment information to generate the payment information; and sending, from the application operating on the first user device to the device of the transaction partner, the payment information, wherein the payment information comprises an account number. 35. A system comprising:
one or more processors; and one or more memory devices comprising instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
receiving, at an application operating on the system, information associated with authorizing the transaction, the information being received from a device of a transaction partner;
providing, at the application operating on the system, a first digital signature authorizing the transaction, the first digital signature being generated using a first cryptographic key stored on the system;
sending, from the application operating on the system to an identity repository, a request to authorize the transaction, wherein the identity repository is remotely located away from the system and is accessed over the Internet;
receiving, at the application operating on the system and from the identity repository, a second digital signature authorizing the transaction, the second digital signature being provided by the identity repository using a second cryptographic key stored at the identity repository; and
sending, from the application operating on the system to the device of the transaction partner, the first digital signature and the second digital signature, wherein the device of the transaction partner authorizes the transaction by verifying the first digital signature and the second digital signature using paired keys of the first cryptographic key and the second cryptographic key. 36. The system of claim 35, the one or more memory devices further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
at the application operating on the system and from the identity repository, a third digital signature authorizing the transaction, the third digital signature being provided by an application operating on a second system, the third digital signature having been sent from the application operating on the second system to the identity repository in response to a request from the identity repository to the application operating on the second system to authorize the transaction, wherein the third digital signature is generated using a third cryptographic key stored on the second system; and sending, from the application operating on the system to the device of the transaction partner, the third digital signature, wherein the device of the transaction partner further authorizes the transaction by verifying the third digital signature using a paired key of the third cryptographic key. 37. The system of claim 35, wherein the information associated with authorizing the transaction comprises a digital challenge, wherein the first digital signature is generated by signing the digital challenge with the first cryptographic key, and wherein the second digital signature is generated by signing the digital challenge with the second cryptographic key. 38. The system of claim 35, the one or more memory devices further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising, prior to receiving the information associated with authorizing the transaction, registering the system or the application operating on the system with the device of the transaction partner, wherein said registering comprises sending the paired keys of the first cryptographic key and the second cryptographic key to the device of the transaction partner. 39. The system of claim 35, wherein:
the first cryptographic key stored on the system is not accessible to the identity repository; the second cryptographic key stored at the identity repository is not accessible to the system; the first cryptographic key comprises a first private key, and the pair of the first cryptographic key comprises a first public key; and the second cryptographic key comprises a second private key, and the pair of the second cryptographic key comprises a second public key. 40. The system of claim 35, the one or more memory devices further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
sending, from the application operating on the system to the identity repository, a request for payment information for completing the transaction; receiving, at the application operating on the system from the identity repository, encrypted payment information in response to the request for the payment information for completing the transaction; decrypting, at the application operating on the system, the encrypted payment information to generate the payment information; and sending, from the application operating on the system to the device of the transaction partner, the payment information, wherein the payment information comprises an account number. | According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.1-20. (canceled) 21. A method for authorizing a transaction, the method comprising:
receiving, at an application operating on a first user device, information associated with authorizing the transaction, the information being received from a device of a transaction partner; providing, at the application operating on the first user device, a first digital signature authorizing the transaction, the first digital signature being generated using a first cryptographic key stored on the first user device; sending, from the application operating on the first user device to an identity repository, a request to authorize the transaction, wherein the identity repository is remotely located away from the first user device and is accessed over the Internet; receiving, at the application operating on the first user device and from the identity repository, a second digital signature authorizing the transaction, the second digital signature being provided by the identity repository using a second cryptographic key stored at the identity repository; and sending, from the application operating on the first user device to the device of the transaction partner, the first digital signature and the second digital signature, wherein the device of the transaction partner authorizes the transaction by verifying the first digital signature and the second digital signature using paired keys of the first cryptographic key and the second cryptographic key. 22. The method of claim 21, further comprising:
at the application operating on the first user device and from the identity repository, a third digital signature authorizing the transaction, the third digital signature being provided by an application operating on a second user device, the third digital signature having been sent from the application operating on the second user device to the identity repository in response to a request from the identity repository to the application operating on the second user device to authorize the transaction, wherein the third digital signature is generated using a third cryptographic key stored on the second user device; and sending, from the application operating on the first user device to the device of the transaction partner, the third digital signature, wherein the device of the transaction partner further authorizes the transaction by verifying the third digital signature using a paired key of the third cryptographic key. 23. The method of claim 22, wherein:
the first user device and a second user device comprise a same computing device; the application operating on the first user device comprises a web browser operating on the computing device; and the application operating on the second user device comprises an app operating on the computing device, the app being provided by the identity repository. 24. The method of claim 21, wherein the information associated with authorizing the transaction comprises a digital challenge, wherein the first digital signature is generated by signing the digital challenge with the first cryptographic key, and wherein the second digital signature is generated by signing the digital challenge with the second cryptographic key. 25. The method of claim 21, further comprising, prior to receiving the information associated with authorizing the transaction, registering the first user device or the application operating on the first user device with the device of the transaction partner, wherein said registering comprises sending the paired keys of the first cryptographic key and the second cryptographic key to the device of the transaction partner. 26. The method of claim 21, wherein:
the first cryptographic key stored on the first user device is not accessible to the identity repository; the second cryptographic key stored at the identity repository is not accessible to the first user device; the first cryptographic key comprises a first private key, and the pair of the first cryptographic key comprises a first public key; and the second cryptographic key comprises a second private key, and the pair of the second cryptographic key comprises a second public key. 27. The method of claim 21, further comprising:
sending, from the application operating on the first user device to the identity repository, a request for payment information for completing the transaction; receiving, at the application operating on the first user device from the identity repository, encrypted payment information in response to the request for the payment information for completing the transaction; decrypting, at the application operating on the first user device, the encrypted payment information to generate the payment information; and sending, from the application operating on the first user device to the device of the transaction partner, the payment information, wherein the payment information comprises an account number. 28. A non-transitory computer readable medium comprising instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
receiving, at an application operating on a first user device, information associated with authorizing the transaction, the information being received from a device of a transaction partner; providing, at the application operating on the first user device, a first digital signature authorizing the transaction, the first digital signature being generated using a first cryptographic key stored on the first user device; sending, from the application operating on the first user device to an identity repository, a request to authorize the transaction, wherein the identity repository is remotely located away from the first user device and is accessed over the Internet; receiving, at the application operating on the first user device and from the identity repository, a second digital signature authorizing the transaction, the second digital signature being provided by the identity repository using a second cryptographic key stored at the identity repository; and sending, from the application operating on the first user device to the device of the transaction partner, the first digital signature and the second digital signature, wherein the device of the transaction partner authorizes the transaction by verifying the first digital signature and the second digital signature using paired keys of the first cryptographic key and the second cryptographic key. 29. The non-transitory computer readable medium of claim 28, further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
at the application operating on the first user device and from the identity repository, a third digital signature authorizing the transaction, the third digital signature being provided by an application operating on a second user device, the third digital signature having been sent from the application operating on the second user device to the identity repository in response to a request from the identity repository to the application operating on the second user device to authorize the transaction, wherein the third digital signature is generated using a third cryptographic key stored on the second user device; and sending, from the application operating on the first user device to the device of the transaction partner, the third digital signature, wherein the device of the transaction partner further authorizes the transaction by verifying the third digital signature using a paired key of the third cryptographic key. 30. The non-transitory computer readable medium of claim 29, wherein:
the first user device and a second user device comprise a same computing device; the application operating on the first user device comprises a web browser operating on the computing device; and the application operating on the second user device comprises an app operating on the computing device, the app being provided by the identity repository. 31. The non-transitory computer readable medium of claim 28, wherein the information associated with authorizing the transaction comprises a digital challenge, wherein the first digital signature is generated by signing the digital challenge with the first cryptographic key, and wherein the second digital signature is generated by signing the digital challenge with the second cryptographic key. 32. The non-transitory computer readable medium of claim 28, further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising, prior to receiving the information associated with authorizing the transaction, registering the first user device or the application operating on the first user device with the device of the transaction partner, wherein said registering comprises sending the paired keys of the first cryptographic key and the second cryptographic key to the device of the transaction partner. 33. The non-transitory computer readable medium of claim 28, wherein:
the first cryptographic key stored on the first user device is not accessible to the identity repository; the second cryptographic key stored at the identity repository is not accessible to the first user device; the first cryptographic key comprises a first private key, and the pair of the first cryptographic key comprises a first public key; and the second cryptographic key comprises a second private key, and the pair of the second cryptographic key comprises a second public key. 34. The non-transitory computer readable medium of claim 28, further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
sending, from the application operating on the first user device to the identity repository, a request for payment information for completing the transaction; receiving, at the application operating on the first user device from the identity repository, encrypted payment information in response to the request for the payment information for completing the transaction; decrypting, at the application operating on the first user device, the encrypted payment information to generate the payment information; and sending, from the application operating on the first user device to the device of the transaction partner, the payment information, wherein the payment information comprises an account number. 35. A system comprising:
one or more processors; and one or more memory devices comprising instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
receiving, at an application operating on the system, information associated with authorizing the transaction, the information being received from a device of a transaction partner;
providing, at the application operating on the system, a first digital signature authorizing the transaction, the first digital signature being generated using a first cryptographic key stored on the system;
sending, from the application operating on the system to an identity repository, a request to authorize the transaction, wherein the identity repository is remotely located away from the system and is accessed over the Internet;
receiving, at the application operating on the system and from the identity repository, a second digital signature authorizing the transaction, the second digital signature being provided by the identity repository using a second cryptographic key stored at the identity repository; and
sending, from the application operating on the system to the device of the transaction partner, the first digital signature and the second digital signature, wherein the device of the transaction partner authorizes the transaction by verifying the first digital signature and the second digital signature using paired keys of the first cryptographic key and the second cryptographic key. 36. The system of claim 35, the one or more memory devices further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
at the application operating on the system and from the identity repository, a third digital signature authorizing the transaction, the third digital signature being provided by an application operating on a second system, the third digital signature having been sent from the application operating on the second system to the identity repository in response to a request from the identity repository to the application operating on the second system to authorize the transaction, wherein the third digital signature is generated using a third cryptographic key stored on the second system; and sending, from the application operating on the system to the device of the transaction partner, the third digital signature, wherein the device of the transaction partner further authorizes the transaction by verifying the third digital signature using a paired key of the third cryptographic key. 37. The system of claim 35, wherein the information associated with authorizing the transaction comprises a digital challenge, wherein the first digital signature is generated by signing the digital challenge with the first cryptographic key, and wherein the second digital signature is generated by signing the digital challenge with the second cryptographic key. 38. The system of claim 35, the one or more memory devices further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising, prior to receiving the information associated with authorizing the transaction, registering the system or the application operating on the system with the device of the transaction partner, wherein said registering comprises sending the paired keys of the first cryptographic key and the second cryptographic key to the device of the transaction partner. 39. The system of claim 35, wherein:
the first cryptographic key stored on the system is not accessible to the identity repository; the second cryptographic key stored at the identity repository is not accessible to the system; the first cryptographic key comprises a first private key, and the pair of the first cryptographic key comprises a first public key; and the second cryptographic key comprises a second private key, and the pair of the second cryptographic key comprises a second public key. 40. The system of claim 35, the one or more memory devices further comprising additional instructions that, when executed by the one or more processors, cause the one or more processors to perform additional operations comprising:
sending, from the application operating on the system to the identity repository, a request for payment information for completing the transaction; receiving, at the application operating on the system from the identity repository, encrypted payment information in response to the request for the payment information for completing the transaction; decrypting, at the application operating on the system, the encrypted payment information to generate the payment information; and sending, from the application operating on the system to the device of the transaction partner, the payment information, wherein the payment information comprises an account number. | 2,400 |
8,876 | 8,876 | 15,240,616 | 2,456 | An apparatus, system, method, and program product are disclosed for sending messages to an unavailable device. The apparatus includes a status module that determines that a recipient device for a message is unavailable to receive the message. The apparatus includes a message module that sends the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message. The apparatus includes a notification module that sends a notification to the recipient device that the message is available to access from the intermediate device. | 1. An apparatus comprising:
a status module that determines that a recipient device for a message is unavailable to receive the message; a message module that sends the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message; and a notification module that sends a notification to the recipient device that the message is available to access from the intermediate device. 2. The apparatus of claim 1, wherein the status module determines that the recipient device is unavailable in response to sending the message to the recipient device and not receiving a reply. 3. The apparatus of claim 1 wherein the status module determines that the recipient device is unavailable based on one or more characteristics of the recipient device, the one or more characteristics comprising:
a utilization level of the recipient device satisfying a predetermined utilization threshold;
a used capacity of a message buffer of the recipient device satisfying a predetermined buffer capacity;
a health status of the recipient device satisfying predetermined health threshold; and
a network status of the recipient device satisfying a predetermined network threshold. 4. The apparatus of claim 1, wherein the status module determines that the recipient device is unavailable to receive the message in response to determining that a network connection to the intermediate device is faster than a network connection to the recipient device. 5. The apparatus of claim 1, further comprising a device module that selects the intermediate device in response to one or more of:
determining that a service for receiving, storing, and transmitting messages to the recipient device is available on the intermediate device; determining that one or more characteristics of the intermediate device satisfies one or more predefined requirements; and determining that the intermediate device is on a list of predetermined intermediate devices. 6. The apparatus of claim 1, further comprising a storage module that stores the received message in a storage location on the intermediate device that is accessible to the recipient device. 7. The apparatus of claim 6, wherein the storage location comprises a directory, the directory determined based on one or more of:
a unique identifier for a device that the message is sent from; and information included in one or more headers of the message. 8. The apparatus of claim 1, wherein the notification module periodically sends the notification to the recipient device at predetermined intervals while the message is available to access from the intermediate device. 9. The apparatus of claim 1, wherein the notification comprises one or more of a location of the intermediate device, an identifier for the intermediate device, and a storage location for the message on the intermediate device. 10. The apparatus of claim 1, further comprising a cleanup module that deletes the message from the intermediate device in response to:
expiration of a predefined amount of time; receiving a cleanup command; and the recipient device accessing the message. 11. A method comprising:
determining that a recipient device for a message is unavailable to receive the message; sending the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message; and sending a notification to the recipient device that the message is available to access from the intermediate device. 12. The method of claim 11, wherein determining that the recipient device is unavailable comprises sending the message to the recipient device and not receiving a reply. 13. The method of claim 11, further comprising determining that the recipient device is unavailable based on one or more characteristics of the recipient device, the one or more characteristics comprising:
a utilization level of the recipient device satisfying a predetermined utilization threshold; a used capacity of a message buffer of the recipient device satisfying a predetermined buffer capacity; a health status of the recipient device satisfying predetermined health threshold; and a network status of the recipient device satisfying a predetermined network threshold. 14. The method of claim 11, further comprising determining that the recipient device is unavailable to receive the message in response to determining that a network connection to the intermediate device is faster than a network connection to the recipient device. 15. The method of claim 11, further comprising selecting the intermediate device in response to one or more of:
determining that a service for receiving, storing, and transmitting messages to the recipient device is available on the intermediate device; determining that one or more characteristics of the intermediate device satisfies one or more predefined requirements; and determining that the intermediate device is on a list of predetermined intermediate device. 16. The method of claim 11, further comprising storing the received message in a storage location on the intermediate device that is accessible to the recipient device, the storage location comprising a directory, the directory determined based on one or more of:
a unique identifier for a device that the message is sent from; and information included in one or more headers of the message. 17. The method of claim 11, further comprising periodically sending the notification to the recipient device at predetermined intervals while the message is available to access from the intermediate device. 18. The method of claim 11, wherein the notification comprises one or more of a location of the intermediate device, an identifier for the intermediate device, and a storage location for the message on the intermediate device. 19. The method of claim 11, further comprising deleting the message from the intermediate device in response to:
expiration of a predefined amount of time; receiving a cleanup command; and the recipient device accessing the message. 20. A program product comprising a computer readable storage medium that stores code executable by a processor, the executable code comprising code to perform:
determining that a recipient device for a message is unavailable to receive the message; sending the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message; and sending a notification to the recipient device that the message is available to access from the intermediate device. | An apparatus, system, method, and program product are disclosed for sending messages to an unavailable device. The apparatus includes a status module that determines that a recipient device for a message is unavailable to receive the message. The apparatus includes a message module that sends the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message. The apparatus includes a notification module that sends a notification to the recipient device that the message is available to access from the intermediate device.1. An apparatus comprising:
a status module that determines that a recipient device for a message is unavailable to receive the message; a message module that sends the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message; and a notification module that sends a notification to the recipient device that the message is available to access from the intermediate device. 2. The apparatus of claim 1, wherein the status module determines that the recipient device is unavailable in response to sending the message to the recipient device and not receiving a reply. 3. The apparatus of claim 1 wherein the status module determines that the recipient device is unavailable based on one or more characteristics of the recipient device, the one or more characteristics comprising:
a utilization level of the recipient device satisfying a predetermined utilization threshold;
a used capacity of a message buffer of the recipient device satisfying a predetermined buffer capacity;
a health status of the recipient device satisfying predetermined health threshold; and
a network status of the recipient device satisfying a predetermined network threshold. 4. The apparatus of claim 1, wherein the status module determines that the recipient device is unavailable to receive the message in response to determining that a network connection to the intermediate device is faster than a network connection to the recipient device. 5. The apparatus of claim 1, further comprising a device module that selects the intermediate device in response to one or more of:
determining that a service for receiving, storing, and transmitting messages to the recipient device is available on the intermediate device; determining that one or more characteristics of the intermediate device satisfies one or more predefined requirements; and determining that the intermediate device is on a list of predetermined intermediate devices. 6. The apparatus of claim 1, further comprising a storage module that stores the received message in a storage location on the intermediate device that is accessible to the recipient device. 7. The apparatus of claim 6, wherein the storage location comprises a directory, the directory determined based on one or more of:
a unique identifier for a device that the message is sent from; and information included in one or more headers of the message. 8. The apparatus of claim 1, wherein the notification module periodically sends the notification to the recipient device at predetermined intervals while the message is available to access from the intermediate device. 9. The apparatus of claim 1, wherein the notification comprises one or more of a location of the intermediate device, an identifier for the intermediate device, and a storage location for the message on the intermediate device. 10. The apparatus of claim 1, further comprising a cleanup module that deletes the message from the intermediate device in response to:
expiration of a predefined amount of time; receiving a cleanup command; and the recipient device accessing the message. 11. A method comprising:
determining that a recipient device for a message is unavailable to receive the message; sending the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message; and sending a notification to the recipient device that the message is available to access from the intermediate device. 12. The method of claim 11, wherein determining that the recipient device is unavailable comprises sending the message to the recipient device and not receiving a reply. 13. The method of claim 11, further comprising determining that the recipient device is unavailable based on one or more characteristics of the recipient device, the one or more characteristics comprising:
a utilization level of the recipient device satisfying a predetermined utilization threshold; a used capacity of a message buffer of the recipient device satisfying a predetermined buffer capacity; a health status of the recipient device satisfying predetermined health threshold; and a network status of the recipient device satisfying a predetermined network threshold. 14. The method of claim 11, further comprising determining that the recipient device is unavailable to receive the message in response to determining that a network connection to the intermediate device is faster than a network connection to the recipient device. 15. The method of claim 11, further comprising selecting the intermediate device in response to one or more of:
determining that a service for receiving, storing, and transmitting messages to the recipient device is available on the intermediate device; determining that one or more characteristics of the intermediate device satisfies one or more predefined requirements; and determining that the intermediate device is on a list of predetermined intermediate device. 16. The method of claim 11, further comprising storing the received message in a storage location on the intermediate device that is accessible to the recipient device, the storage location comprising a directory, the directory determined based on one or more of:
a unique identifier for a device that the message is sent from; and information included in one or more headers of the message. 17. The method of claim 11, further comprising periodically sending the notification to the recipient device at predetermined intervals while the message is available to access from the intermediate device. 18. The method of claim 11, wherein the notification comprises one or more of a location of the intermediate device, an identifier for the intermediate device, and a storage location for the message on the intermediate device. 19. The method of claim 11, further comprising deleting the message from the intermediate device in response to:
expiration of a predefined amount of time; receiving a cleanup command; and the recipient device accessing the message. 20. A program product comprising a computer readable storage medium that stores code executable by a processor, the executable code comprising code to perform:
determining that a recipient device for a message is unavailable to receive the message; sending the message to an intermediate device for storage until the recipient device is available to receive the message in response to determining that the recipient device is unavailable to receive the message; and sending a notification to the recipient device that the message is available to access from the intermediate device. | 2,400 |
8,877 | 8,877 | 15,604,971 | 2,413 | A novel method of operating a Distributed Cable Modem Termination System is provided. Each branch CMTS node in a distributed CMTS supports a complete CMTS system and with full-spectrum ports. One or more MAC domains are defined at each branch CMTS node. A MAC domain defined at a branch CMTS node includes only service flows of the CMs that are connected to the branch CMTS node. Identifiers of service flows coming from a branch CMTS node are always unique, i.e., two different service flows of the branch CMTS would always have different SIDs, even if they belong to different MAC domains. On the other hand, service flows belonging to different branch CMTS nodes are free to reuse the same identifiers. | 1. A system comprising:
a distributed CMTS comprising a root CMTS node and a plurality of branch CMTS nodes for distributing downstream signals from the root CMTS node to a plurality of CMs and for relaying upstream signals from the plurality of CMs to the root CMTS node; each branch CMTS node receiving upstream signals from a corresponding set of CMs by using a set of physical upstream channels, wherein a first CM transmits a first upstream signal on a first physical upstream channel of a first branch CMTS node by using a first transmission opportunity that is identified by a first service flow identifier, wherein a second CM transmits a second upstream signal on a second physical upstream channel of a second branch CMTS node by using a second transmission opportunity that is identified by a second service flow identifier, wherein the first and second service flow identifiers are identical. 2. The system of claim 1, wherein a third CM transmits a third upstream signal on the first physical upstream channel of the first branch CMTS node by using a third transmission opportunity that is identified by a third service flow identifier, wherein the first and third service flow identifiers are different identifiers for identifying different transmission opportunities on the first physical upstream channel. 3. The system of claim 2, wherein the first physical upstream channel is temporally divided into a set of intervals comprising a first interval identified by the first service flow identifier as the first transmission opportunity and a second interval identified by the third service flow identifier as the third transmission opportunity. 5. The system of claim 1, wherein the first physical upstream channel is temporally divided according to a set of allocation maps, each allocation map defining a logical upstream channel, each allocation map referencing a common timing reference that is used by all CMs receiving downstream signals from the first branch CMTS node. 6. The system of claim 5, wherein the common timing reference is distributed by a DOCSIS SYNC message to all CMs receiving downstream signals from the first branch CMTS node. 7. The system of claim 1, wherein the first branch CMTS node provides a plurality of MAC domains for CMs connected to the first branch CMTS node. 8. The system of claim 7, wherein the first branch CMTS node provides a plurality of service flows through the plurality of MAC domains, wherein each service flow has a service flow identifier that is unique across the MAC domains of the first branch CMTS. 10. The system of claim 7, wherein the a first MAC domain comprises a first set of logical upstream channels of the first branch CMTS node and the second MAC domain comprises a second set of logical channels of the first branch CMTS node. 11. The system of claim 10, wherein the first and second MAC domains do not comprise any physical upstream channels of any other branch CMTS node. 12. The system of claim 1, wherein each branch CMTS node comprises a set of physical RF ports for communicating with its corresponding set of CMs, wherein each of the physical RF ports is a full-spectrum DOCSIS port. 13. The system of claim 1, wherein each CMTS branch node distributes downstream signals through a plurality of physical downstream channels. 14. The system of claim 1, wherein each physical upstream channel is a DOCSIS RF signal at a signal center frequency in an upstream carrier path. 15. The system of claim 1, wherein each branch CMTS node is a fiber node (FN) and the root node is a cable head end. 16. A method comprising:
at first branch CMTS node, sending an allocation map to a first CM and a second CM that are connected to the first branch CMTS node through a first CATV network, the allocation map specifying a first transmission opportunity for a first service flow from the first CM and second transmission opportunity for a second service flow from the second CM, wherein the first service flow is identified by a first service flow identifier and the second service flow is identified by a second service flow identifier, wherein the first and second service flow identifiers are different; receiving at a particular physical upstream channel (i) upstream data for the first service flow during the first transmission opportunity from the first CM and (ii) upstream data for the second service flow during the second transmission opportunity from the second CM; and relaying the received upstream data for the first and second service flow to a root CMTS node that is connected to the first branch CMTS node and a second branch CMTS node through an optical fiber network, wherein the first service flow identifier is identical to a third service flow identifier for identifying a third service flow from a third CM that is connected to the second branch CMTS node through a second CATV cable network. 17. The method of claim 16, wherein the first service flow is associated with a first service flow identifier (SID) and the second service flow is associated with a second different SID. 18. The method of claim 16, wherein the physical upstream channel is temporally divided into a set of intervals comprising a first interval identified by the first SID as the first transmission opportunity and a second interval identified by the second SID as the second transmission opportunity. 19. The method of claim 18, wherein the physical upstream channel is temporally divided according to a set of allocation maps, each allocation map defining a logical upstream channel, each allocation map referencing a common timing reference that is used by all CMs receiving downstream signals from the particular branch CMTS node. 20. The method of claim 16, wherein the first service flow belongs to a first MAC domain and the second service flow belongs to a second MAC domain, wherein each service flow is assigned a unique SID that is different from all other service flows provided through the branch CMTS node. | A novel method of operating a Distributed Cable Modem Termination System is provided. Each branch CMTS node in a distributed CMTS supports a complete CMTS system and with full-spectrum ports. One or more MAC domains are defined at each branch CMTS node. A MAC domain defined at a branch CMTS node includes only service flows of the CMs that are connected to the branch CMTS node. Identifiers of service flows coming from a branch CMTS node are always unique, i.e., two different service flows of the branch CMTS would always have different SIDs, even if they belong to different MAC domains. On the other hand, service flows belonging to different branch CMTS nodes are free to reuse the same identifiers.1. A system comprising:
a distributed CMTS comprising a root CMTS node and a plurality of branch CMTS nodes for distributing downstream signals from the root CMTS node to a plurality of CMs and for relaying upstream signals from the plurality of CMs to the root CMTS node; each branch CMTS node receiving upstream signals from a corresponding set of CMs by using a set of physical upstream channels, wherein a first CM transmits a first upstream signal on a first physical upstream channel of a first branch CMTS node by using a first transmission opportunity that is identified by a first service flow identifier, wherein a second CM transmits a second upstream signal on a second physical upstream channel of a second branch CMTS node by using a second transmission opportunity that is identified by a second service flow identifier, wherein the first and second service flow identifiers are identical. 2. The system of claim 1, wherein a third CM transmits a third upstream signal on the first physical upstream channel of the first branch CMTS node by using a third transmission opportunity that is identified by a third service flow identifier, wherein the first and third service flow identifiers are different identifiers for identifying different transmission opportunities on the first physical upstream channel. 3. The system of claim 2, wherein the first physical upstream channel is temporally divided into a set of intervals comprising a first interval identified by the first service flow identifier as the first transmission opportunity and a second interval identified by the third service flow identifier as the third transmission opportunity. 5. The system of claim 1, wherein the first physical upstream channel is temporally divided according to a set of allocation maps, each allocation map defining a logical upstream channel, each allocation map referencing a common timing reference that is used by all CMs receiving downstream signals from the first branch CMTS node. 6. The system of claim 5, wherein the common timing reference is distributed by a DOCSIS SYNC message to all CMs receiving downstream signals from the first branch CMTS node. 7. The system of claim 1, wherein the first branch CMTS node provides a plurality of MAC domains for CMs connected to the first branch CMTS node. 8. The system of claim 7, wherein the first branch CMTS node provides a plurality of service flows through the plurality of MAC domains, wherein each service flow has a service flow identifier that is unique across the MAC domains of the first branch CMTS. 10. The system of claim 7, wherein the a first MAC domain comprises a first set of logical upstream channels of the first branch CMTS node and the second MAC domain comprises a second set of logical channels of the first branch CMTS node. 11. The system of claim 10, wherein the first and second MAC domains do not comprise any physical upstream channels of any other branch CMTS node. 12. The system of claim 1, wherein each branch CMTS node comprises a set of physical RF ports for communicating with its corresponding set of CMs, wherein each of the physical RF ports is a full-spectrum DOCSIS port. 13. The system of claim 1, wherein each CMTS branch node distributes downstream signals through a plurality of physical downstream channels. 14. The system of claim 1, wherein each physical upstream channel is a DOCSIS RF signal at a signal center frequency in an upstream carrier path. 15. The system of claim 1, wherein each branch CMTS node is a fiber node (FN) and the root node is a cable head end. 16. A method comprising:
at first branch CMTS node, sending an allocation map to a first CM and a second CM that are connected to the first branch CMTS node through a first CATV network, the allocation map specifying a first transmission opportunity for a first service flow from the first CM and second transmission opportunity for a second service flow from the second CM, wherein the first service flow is identified by a first service flow identifier and the second service flow is identified by a second service flow identifier, wherein the first and second service flow identifiers are different; receiving at a particular physical upstream channel (i) upstream data for the first service flow during the first transmission opportunity from the first CM and (ii) upstream data for the second service flow during the second transmission opportunity from the second CM; and relaying the received upstream data for the first and second service flow to a root CMTS node that is connected to the first branch CMTS node and a second branch CMTS node through an optical fiber network, wherein the first service flow identifier is identical to a third service flow identifier for identifying a third service flow from a third CM that is connected to the second branch CMTS node through a second CATV cable network. 17. The method of claim 16, wherein the first service flow is associated with a first service flow identifier (SID) and the second service flow is associated with a second different SID. 18. The method of claim 16, wherein the physical upstream channel is temporally divided into a set of intervals comprising a first interval identified by the first SID as the first transmission opportunity and a second interval identified by the second SID as the second transmission opportunity. 19. The method of claim 18, wherein the physical upstream channel is temporally divided according to a set of allocation maps, each allocation map defining a logical upstream channel, each allocation map referencing a common timing reference that is used by all CMs receiving downstream signals from the particular branch CMTS node. 20. The method of claim 16, wherein the first service flow belongs to a first MAC domain and the second service flow belongs to a second MAC domain, wherein each service flow is assigned a unique SID that is different from all other service flows provided through the branch CMTS node. | 2,400 |
8,878 | 8,878 | 15,406,249 | 2,477 | Described herein are systems, methods, and software to enhance network traffic management. In one implementation, a first host identifies a packet to be transferred from a first virtual machine on the first host to a second virtual machine on a second host. In response to identifying the packet, the first host identifies a source logical port for the first virtual machine, and transferring a communication to the second host, wherein the communication encapsulates the data packet and the source logical port. Once the packet is received by the second host, the second host may use the source logical port to determine a forwarding action for the packet. | 1. A method of operating a virtual computing environment to provide packet enforcement using logical ports, the method comprising:
in each of a first host computing system and second host computing system, maintaining a data plane forwarding configuration based on forwarding rules and logical port status information for virtual machines in the virtual computing environment; in the first host computing system, identifying a packet to be transferred from a virtual machine executing on the first host computing system to a virtual machine executing on the second host computing system; in the first host computing system, identifying a source logical port associated with the virtual machine on the first host computing system; in the first host computing system, transferring a communication to the second host computing system, wherein the communication encapsulates at least the packet and the source logical port; in the second host computing system, receiving the communication; and in the second host computing system, determining a forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration. 2. The method of claim 1, wherein determining the forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration comprises determining the forwarding action for the packet in the communication based at least on the source logical port, a destination logical port for the virtual machine executing on the second host computing system, and the data plane forwarding configuration. 3. The method of claim 1 further comprising, in the first host computing system, identifying a destination logical port for the virtual machine executing on the second host computing system, and determining a source forwarding action for the packet based on at least the source logical port, the destination logical port, and the data plane forwarding configuration. 4. The method of claim 3, wherein transferring the communication to the second host computing system comprises transferring the communication to the second host computing system when the source forwarding action indicates the communication is permitted. 5. The method of claim 1, wherein the communication encapsulates the source logical port in a header for the communication and encapsulates the packet in a payload for the communication. 6. The method of claim 1, wherein the forwarding action comprises one of a block action or a permit action. 7. The method of claim 1, wherein transferring the communication to the second host computing system comprises transferring the communication to the second host computing system using a tunneling protocol for host computing systems. 8. A virtual computing environment to provide packet enforcement using logical ports, the virtual computing environment comprising:
a first host computing system and a second host computing system each configured to maintain a data plane forwarding configuration based on forwarding rules and logical port status information for virtual machines in the virtual computing environment; the first host computing system configured to identify a packet to be transferred from a virtual machine executing on the first host computing system to a virtual machine executing on the second host computing system, identify a source logical port associated with the virtual machine on the first host computing system, and transfer a communication to the second host computing system, wherein the communication encapsulates at least the packet and the source logical port; and the second host computing system configured to receive the communication and determine a forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration. 9. The virtual computing environment of claim 8, wherein second host computing system configured to determine the forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration direct the processing system to determine the forwarding action for the packet in the communication based at least on the source logical port, a destination logical port for the virtual machine executing on the second host computing system, and the data plane forwarding configuration. 10. The virtual computing environment of claim 8, wherein the first host computing system is further configured to identify a destination logical port, and determine a source forwarding action for the packet based on at least the source logical port, the destination logical port, and the data plane forwarding configuration. 11. The virtual computing environment of claim 10, wherein the first host computing system configured to transfer the communication to the second host computing system is configured to transfer the communication to the second host computing system when the source forwarding action indicates the communication is permitted. 12. The virtual computing environment of claim 8, wherein the communication encapsulates the source logical port in a header for the communication and encapsulates the packet in a payload for the communication. 13. The virtual computing environment of claim 8, wherein the forwarding action comprises one of a block action or a permit action. 14. An apparatus comprising:
one or more computer readable storage media: processing instructions stored on the one or more computer readable storage media to provide packet forwarding enforcement that, when read and executed by a processing system, direct the processing system to at least:
maintain a data plane forwarding configuration based on forwarding rules and logical port status information for virtual machines in a virtual computing environment;
identify, at a first virtual switch, a packet to be transferred from the first virtual machine coupled to a first virtual switch to a second virtual machine coupled to a second virtual switch, wherein the first virtual switch and second virtual switch are coupled via a virtual router;
identify a source logical port associated with the first virtual machine;
transfer a communication to the second virtual switch, wherein the communication encapsulates at least the packet and the source logical port;
receive, at the second virtual switch, the communication; and
determine a forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration. 15. The apparatus of claim 14, wherein the program instructions to determine the forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration direct the processing system to determine the forwarding action for the packet in the communication based at least on the source logical port, a destination logical port for the second virtual machine, and the data plane forwarding configuration. 16. The apparatus of claim 14, wherein the program instructions further direct the processing system to, prior to transferring the communication to the second virtual switch, identifying a destination logical port for the second virtual machine, and determine a source forwarding action for the packet based on at least the source logical port, the destination logical port, and the data plane forwarding configuration. 17. The apparatus of claim 16, wherein the program instructions to transfer the communication to the second virtual switch direct the processing system to transfer the communication to the second virtual switch when the source forwarding action indicates the communication is permitted. 18. The apparatus of claim 14, wherein the first virtual machine and second virtual machine execute on a host computing system. 19. The apparatus of claim 14, wherein the communication encapsulates the source logical port in a header for the communication and encapsulates the packet in a payload for the communication. 20. The apparatus of claim 15 further comprising the processing system communicatively coupled to the one or more computer readable storage media. | Described herein are systems, methods, and software to enhance network traffic management. In one implementation, a first host identifies a packet to be transferred from a first virtual machine on the first host to a second virtual machine on a second host. In response to identifying the packet, the first host identifies a source logical port for the first virtual machine, and transferring a communication to the second host, wherein the communication encapsulates the data packet and the source logical port. Once the packet is received by the second host, the second host may use the source logical port to determine a forwarding action for the packet.1. A method of operating a virtual computing environment to provide packet enforcement using logical ports, the method comprising:
in each of a first host computing system and second host computing system, maintaining a data plane forwarding configuration based on forwarding rules and logical port status information for virtual machines in the virtual computing environment; in the first host computing system, identifying a packet to be transferred from a virtual machine executing on the first host computing system to a virtual machine executing on the second host computing system; in the first host computing system, identifying a source logical port associated with the virtual machine on the first host computing system; in the first host computing system, transferring a communication to the second host computing system, wherein the communication encapsulates at least the packet and the source logical port; in the second host computing system, receiving the communication; and in the second host computing system, determining a forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration. 2. The method of claim 1, wherein determining the forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration comprises determining the forwarding action for the packet in the communication based at least on the source logical port, a destination logical port for the virtual machine executing on the second host computing system, and the data plane forwarding configuration. 3. The method of claim 1 further comprising, in the first host computing system, identifying a destination logical port for the virtual machine executing on the second host computing system, and determining a source forwarding action for the packet based on at least the source logical port, the destination logical port, and the data plane forwarding configuration. 4. The method of claim 3, wherein transferring the communication to the second host computing system comprises transferring the communication to the second host computing system when the source forwarding action indicates the communication is permitted. 5. The method of claim 1, wherein the communication encapsulates the source logical port in a header for the communication and encapsulates the packet in a payload for the communication. 6. The method of claim 1, wherein the forwarding action comprises one of a block action or a permit action. 7. The method of claim 1, wherein transferring the communication to the second host computing system comprises transferring the communication to the second host computing system using a tunneling protocol for host computing systems. 8. A virtual computing environment to provide packet enforcement using logical ports, the virtual computing environment comprising:
a first host computing system and a second host computing system each configured to maintain a data plane forwarding configuration based on forwarding rules and logical port status information for virtual machines in the virtual computing environment; the first host computing system configured to identify a packet to be transferred from a virtual machine executing on the first host computing system to a virtual machine executing on the second host computing system, identify a source logical port associated with the virtual machine on the first host computing system, and transfer a communication to the second host computing system, wherein the communication encapsulates at least the packet and the source logical port; and the second host computing system configured to receive the communication and determine a forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration. 9. The virtual computing environment of claim 8, wherein second host computing system configured to determine the forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration direct the processing system to determine the forwarding action for the packet in the communication based at least on the source logical port, a destination logical port for the virtual machine executing on the second host computing system, and the data plane forwarding configuration. 10. The virtual computing environment of claim 8, wherein the first host computing system is further configured to identify a destination logical port, and determine a source forwarding action for the packet based on at least the source logical port, the destination logical port, and the data plane forwarding configuration. 11. The virtual computing environment of claim 10, wherein the first host computing system configured to transfer the communication to the second host computing system is configured to transfer the communication to the second host computing system when the source forwarding action indicates the communication is permitted. 12. The virtual computing environment of claim 8, wherein the communication encapsulates the source logical port in a header for the communication and encapsulates the packet in a payload for the communication. 13. The virtual computing environment of claim 8, wherein the forwarding action comprises one of a block action or a permit action. 14. An apparatus comprising:
one or more computer readable storage media: processing instructions stored on the one or more computer readable storage media to provide packet forwarding enforcement that, when read and executed by a processing system, direct the processing system to at least:
maintain a data plane forwarding configuration based on forwarding rules and logical port status information for virtual machines in a virtual computing environment;
identify, at a first virtual switch, a packet to be transferred from the first virtual machine coupled to a first virtual switch to a second virtual machine coupled to a second virtual switch, wherein the first virtual switch and second virtual switch are coupled via a virtual router;
identify a source logical port associated with the first virtual machine;
transfer a communication to the second virtual switch, wherein the communication encapsulates at least the packet and the source logical port;
receive, at the second virtual switch, the communication; and
determine a forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration. 15. The apparatus of claim 14, wherein the program instructions to determine the forwarding action for the packet in the communication based at least on the source logical port and the data plane forwarding configuration direct the processing system to determine the forwarding action for the packet in the communication based at least on the source logical port, a destination logical port for the second virtual machine, and the data plane forwarding configuration. 16. The apparatus of claim 14, wherein the program instructions further direct the processing system to, prior to transferring the communication to the second virtual switch, identifying a destination logical port for the second virtual machine, and determine a source forwarding action for the packet based on at least the source logical port, the destination logical port, and the data plane forwarding configuration. 17. The apparatus of claim 16, wherein the program instructions to transfer the communication to the second virtual switch direct the processing system to transfer the communication to the second virtual switch when the source forwarding action indicates the communication is permitted. 18. The apparatus of claim 14, wherein the first virtual machine and second virtual machine execute on a host computing system. 19. The apparatus of claim 14, wherein the communication encapsulates the source logical port in a header for the communication and encapsulates the packet in a payload for the communication. 20. The apparatus of claim 15 further comprising the processing system communicatively coupled to the one or more computer readable storage media. | 2,400 |
8,879 | 8,879 | 15,070,130 | 2,459 | An information processing system includes a server and a plurality of information processing apparatuses provided to be able to communicate with the server and another information processing apparatus through a network. Each information processing apparatus obtains information from an information storage medium by establishing contactless communication with the information storage medium. The server sets a combination of information processing apparatuses which establish mutual communication connection through the network, of the plurality of information processing apparatuses. The information processing apparatuses set by the server, of the plurality of information processing apparatuses, perform data communication processing therebetween, by using the information obtained from the information storage medium through the network. | 1. An information processing system, comprising:
a server; and a plurality of information processing apparatuses provided to be able to communicate with the server and another information processing apparatus through a network, each information processing apparatus obtaining medium information from an information storage medium by establishing contactless communication with the information storage medium, the server setting a combination of information processing apparatuses which establish mutual communication connection through the network, of the plurality of information processing apparatuses, and information processing apparatuses set by the server, of the plurality of information processing apparatuses, performing data communication processing between the information processing apparatuses, by using the medium information obtained from the information storage medium through the network. 2. The information processing system according to claim 1, wherein
each information processing apparatus executes an application program, obtains information from the information storage medium during execution of the application program, and performs the data communication processing by using the information obtained from the information storage medium for use in the application program. 3. The information processing system according to claim 1, wherein
each information processing apparatus includes
a reading unit for reading the medium information stored in the information storage medium by establishing contactless communication with the information storage medium, and
a transmission unit for transmitting information associated with the medium information to the server in accordance with reading by the reading unit,
the server including
a matching processing unit for setting information processing apparatuses which satisfy a prescribed condition for performing the data communication processing, based on information transmitted from each of the plurality of information processing apparatuses, and
a result transmission unit for transmitting connection information necessary for communication connection to the set information processing apparatuses of the plurality of information processing apparatuses, and
each information processing apparatus further includes a communication processing unit for performing the data communication processing for transmitting and receiving data by using the medium information, based on the connection information transmitted from the result transmission unit. 4. The information processing system according to claim 3, wherein
the information associated with the medium information includes information indicating whether the medium information is to be used for the data communication processing, and the matching processing unit sets information processing apparatuses which use the medium information and perform the data communication processing, based on the information transmitted from each of the plurality of information processing apparatuses. 5. The information processing system according to claim 3, wherein
each information processing apparatus further includes
a processor which performs prescribed information processing by using the medium information, and
an updating unit which updates the medium information by establishing contactless communication, based on a result of processing by the processor, and
the communication processing unit performs the data communication processing for transmitting and receiving data by using the updated medium information, based on the connection information transmitted from the result transmission unit after the medium information is updated. 6. The information processing system according to claim 3, wherein
the communication processing unit performs the data communication processing for transmitting and receiving data by using a character which is based on the medium information and cannot accept an operation by a user. 7. The information processing system according to claim 3, wherein
the communication processing unit performs the data communication processing for transmitting and receiving data by using information on a player character which can accept an operation by a user and information on a support character controlled by a computer based on the medium information. 8. The information processing system according to claim 3, wherein
the information associated with the medium information includes partial data forming the medium information, and the matching processing unit sets information processing apparatuses which satisfy a prescribed condition for performing the data communication processing based on the partial data included in the information transmitted from each of the plurality of information processing apparatuses. 9. The information processing system according to claim 3, wherein
each information processing apparatus further includes an updating unit for updating the medium information based on a result of the data communication processing. 10. The information processing system according to claim 3, wherein
the matching processing unit includes a list generation unit for generating a list of other information processing apparatuses which satisfy the prescribed condition for performing the data communication processing based on the information transmitted from each of the plurality of information processing apparatuses and transmitting the list to the information processing apparatus, each information processing apparatus further includes a selection unit for accepting selection of an information processing apparatus which performs the data communication processing, from the list of other information processing apparatuses transmitted from the list generation unit, and the matching processing unit further includes a setting unit for setting information processing apparatuses which perform the data communication processing based on a result of selection from the list, which is transmitted from the information processing apparatus. 11. A method of controlling an information processing system including a server and a plurality of information processing apparatuses provided to be able to communicate with the server and another information processing apparatus through a network, comprising the steps of:
each information processing apparatus obtaining medium information from an information storage medium by establishing contactless communication with the information storage medium; the server setting a combination of information processing apparatuses which establish communication connection through the network, of the plurality of information processing apparatuses; and performing data communication processing using the medium information obtained from the information storage medium through the network, between information processing apparatuses set by the server, of the plurality of information processing apparatuses. 12. A server provided to be able to communicate with a plurality of information processing apparatuses through a network, each of which can obtain information from an information storage medium by establishing contactless communication with the information storage medium, comprising:
a matching processing unit for setting information processing apparatuses which satisfy a prescribed condition for performing data communication processing, based on information transmitted from each of the plurality of information processing apparatuses and associated with the information storage medium; and a result transmission unit for transmitting connection information necessary for communication connection to the set information processing apparatuses of the plurality of information processing apparatuses. 13. A non-transitory storage medium encoded with a computer readable program executed by a computer of a server provided to be able to communicate with a plurality of information processing apparatuses through a network, each of which can obtain information from an information storage medium by establishing contactless communication with the information storage medium, the program causing the computer of the server to function as:
a matching processing unit for setting information processing apparatuses which satisfy a prescribed condition for performing data communication processing, based on information transmitted from each of the plurality of information processing apparatuses and associated with the information storage medium; and a result transmission unit for transmitting connection information necessary for communication connection to the set information processing apparatuses of the plurality of information processing apparatuses. 14. An information processing apparatus provided to be able to communicate with a server and another information processing apparatus through a network, comprising:
a reading unit for reading medium information stored in an information storage medium by establishing contactless communication with the information storage medium; a transmission unit for transmitting information associated with the medium information to the server in accordance with reading by the reading unit; and a communication processing unit for performing, by using the medium information obtained from the information storage medium, processing for data communication with another information processing apparatus set by the server, with which the information processing apparatus communicates and connects through the network. 15. A non-transitory storage medium encoded with a computer readable program executed by a computer of an information processing apparatus provided to be able to communicate with a server and another information processing apparatus through a network, the program causing the computer of the information processing apparatus to function as:
a reading unit for reading medium information stored in an information storage medium by establishing contactless communication with the information storage medium; a transmission unit for transmitting information associated with the medium information to the server in accordance with reading by the reading unit; and a communication processing unit for performing, by using the medium information obtained from the information storage medium, processing for data communication with another information processing apparatus set by the server, with which the information processing apparatus communicates and connects through the network. | An information processing system includes a server and a plurality of information processing apparatuses provided to be able to communicate with the server and another information processing apparatus through a network. Each information processing apparatus obtains information from an information storage medium by establishing contactless communication with the information storage medium. The server sets a combination of information processing apparatuses which establish mutual communication connection through the network, of the plurality of information processing apparatuses. The information processing apparatuses set by the server, of the plurality of information processing apparatuses, perform data communication processing therebetween, by using the information obtained from the information storage medium through the network.1. An information processing system, comprising:
a server; and a plurality of information processing apparatuses provided to be able to communicate with the server and another information processing apparatus through a network, each information processing apparatus obtaining medium information from an information storage medium by establishing contactless communication with the information storage medium, the server setting a combination of information processing apparatuses which establish mutual communication connection through the network, of the plurality of information processing apparatuses, and information processing apparatuses set by the server, of the plurality of information processing apparatuses, performing data communication processing between the information processing apparatuses, by using the medium information obtained from the information storage medium through the network. 2. The information processing system according to claim 1, wherein
each information processing apparatus executes an application program, obtains information from the information storage medium during execution of the application program, and performs the data communication processing by using the information obtained from the information storage medium for use in the application program. 3. The information processing system according to claim 1, wherein
each information processing apparatus includes
a reading unit for reading the medium information stored in the information storage medium by establishing contactless communication with the information storage medium, and
a transmission unit for transmitting information associated with the medium information to the server in accordance with reading by the reading unit,
the server including
a matching processing unit for setting information processing apparatuses which satisfy a prescribed condition for performing the data communication processing, based on information transmitted from each of the plurality of information processing apparatuses, and
a result transmission unit for transmitting connection information necessary for communication connection to the set information processing apparatuses of the plurality of information processing apparatuses, and
each information processing apparatus further includes a communication processing unit for performing the data communication processing for transmitting and receiving data by using the medium information, based on the connection information transmitted from the result transmission unit. 4. The information processing system according to claim 3, wherein
the information associated with the medium information includes information indicating whether the medium information is to be used for the data communication processing, and the matching processing unit sets information processing apparatuses which use the medium information and perform the data communication processing, based on the information transmitted from each of the plurality of information processing apparatuses. 5. The information processing system according to claim 3, wherein
each information processing apparatus further includes
a processor which performs prescribed information processing by using the medium information, and
an updating unit which updates the medium information by establishing contactless communication, based on a result of processing by the processor, and
the communication processing unit performs the data communication processing for transmitting and receiving data by using the updated medium information, based on the connection information transmitted from the result transmission unit after the medium information is updated. 6. The information processing system according to claim 3, wherein
the communication processing unit performs the data communication processing for transmitting and receiving data by using a character which is based on the medium information and cannot accept an operation by a user. 7. The information processing system according to claim 3, wherein
the communication processing unit performs the data communication processing for transmitting and receiving data by using information on a player character which can accept an operation by a user and information on a support character controlled by a computer based on the medium information. 8. The information processing system according to claim 3, wherein
the information associated with the medium information includes partial data forming the medium information, and the matching processing unit sets information processing apparatuses which satisfy a prescribed condition for performing the data communication processing based on the partial data included in the information transmitted from each of the plurality of information processing apparatuses. 9. The information processing system according to claim 3, wherein
each information processing apparatus further includes an updating unit for updating the medium information based on a result of the data communication processing. 10. The information processing system according to claim 3, wherein
the matching processing unit includes a list generation unit for generating a list of other information processing apparatuses which satisfy the prescribed condition for performing the data communication processing based on the information transmitted from each of the plurality of information processing apparatuses and transmitting the list to the information processing apparatus, each information processing apparatus further includes a selection unit for accepting selection of an information processing apparatus which performs the data communication processing, from the list of other information processing apparatuses transmitted from the list generation unit, and the matching processing unit further includes a setting unit for setting information processing apparatuses which perform the data communication processing based on a result of selection from the list, which is transmitted from the information processing apparatus. 11. A method of controlling an information processing system including a server and a plurality of information processing apparatuses provided to be able to communicate with the server and another information processing apparatus through a network, comprising the steps of:
each information processing apparatus obtaining medium information from an information storage medium by establishing contactless communication with the information storage medium; the server setting a combination of information processing apparatuses which establish communication connection through the network, of the plurality of information processing apparatuses; and performing data communication processing using the medium information obtained from the information storage medium through the network, between information processing apparatuses set by the server, of the plurality of information processing apparatuses. 12. A server provided to be able to communicate with a plurality of information processing apparatuses through a network, each of which can obtain information from an information storage medium by establishing contactless communication with the information storage medium, comprising:
a matching processing unit for setting information processing apparatuses which satisfy a prescribed condition for performing data communication processing, based on information transmitted from each of the plurality of information processing apparatuses and associated with the information storage medium; and a result transmission unit for transmitting connection information necessary for communication connection to the set information processing apparatuses of the plurality of information processing apparatuses. 13. A non-transitory storage medium encoded with a computer readable program executed by a computer of a server provided to be able to communicate with a plurality of information processing apparatuses through a network, each of which can obtain information from an information storage medium by establishing contactless communication with the information storage medium, the program causing the computer of the server to function as:
a matching processing unit for setting information processing apparatuses which satisfy a prescribed condition for performing data communication processing, based on information transmitted from each of the plurality of information processing apparatuses and associated with the information storage medium; and a result transmission unit for transmitting connection information necessary for communication connection to the set information processing apparatuses of the plurality of information processing apparatuses. 14. An information processing apparatus provided to be able to communicate with a server and another information processing apparatus through a network, comprising:
a reading unit for reading medium information stored in an information storage medium by establishing contactless communication with the information storage medium; a transmission unit for transmitting information associated with the medium information to the server in accordance with reading by the reading unit; and a communication processing unit for performing, by using the medium information obtained from the information storage medium, processing for data communication with another information processing apparatus set by the server, with which the information processing apparatus communicates and connects through the network. 15. A non-transitory storage medium encoded with a computer readable program executed by a computer of an information processing apparatus provided to be able to communicate with a server and another information processing apparatus through a network, the program causing the computer of the information processing apparatus to function as:
a reading unit for reading medium information stored in an information storage medium by establishing contactless communication with the information storage medium; a transmission unit for transmitting information associated with the medium information to the server in accordance with reading by the reading unit; and a communication processing unit for performing, by using the medium information obtained from the information storage medium, processing for data communication with another information processing apparatus set by the server, with which the information processing apparatus communicates and connects through the network. | 2,400 |
8,880 | 8,880 | 16,397,136 | 2,431 | Single tap launch and login to a secure application is provided. User authentication information is verified based on fingerprint data in response to the data processing system receiving an input via a finger of a user on a display screen to execute the secure application. The user authentication information is passed to the secure application as an invoking parameter to execute the secure application. Content corresponding to the secure application is received in response to execution of the secure application. | 1. A computer-implemented method for providing single tap user authentication, launch and login to a secure application having restricted access requiring authentication for access thereto by a user, the computer-implemented method comprising:
responsive to a data processing system receiving an input via a finger of the user on a display screen to execute the secure application, verifying, by the data processing system, user authentication information based on fingerprint data; responsive to verifying the user authentication information, launching, by the data processing system, the secure application using the user authentication information as an invoking parameter to execute the secure application; and receiving, by the data processing system, content corresponding to the secure application in response to execution of the secure application, wherein the user is authenticated by verifying the user authentication information, the secure application is launched, and the user is logged into the secure application responsive to a single tap of the finger of the user on the display screen. 2. The computer-implemented method of claim 1 further comprising:
responsive to the data processing system determining that the finger of the user contacted the display screen, scanning, by the data processing system, a fingerprint of the finger of the user contacting the display screen to obtain the fingerprint data. 3. The computer-implemented method of claim 2 further comprising:
responsive to the data processing system scanning the fingerprint, retrieving, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template, wherein the user authentication data is specific to the secure application. 4. The computer-implemented method of claim 2 further comprising:
responsive to the data processing system scanning the fingerprint, generating, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template, wherein the user authentication data is specific to the secure application. 5. The computer-implemented method of claim 1, wherein the display screen is locked when the finger of the user contacts the display screen, and wherein the user authentication information is verified by the data processing system without unlocking the display screen. 6. The computer-implemented method of claim 1, wherein the display screen is locked when the finger of the user contacts the display screen, and further comprising:
responsive to verifying the user authentication information, unlocking the display screen. 7. The computer-implemented method of claim 1 further comprising:
displaying, by the data processing system, the content of the secure application in response to the secure application receiving the user authentication information. 8. The computer-implemented method of claim 1, wherein the data processing system utilizes an operating system of the data processing system to concurrently perform the verifying of the user authentication information and the launching of the secure application. 9. A data processing system for providing single tap user authentication, launch and login to a secure application having restricted access requiring authentication for access thereto by a user, the data processing system comprising:
a bus system; a storage device connected to the bus system, wherein the storage device stores program instructions; and a processor connected to the bus system, wherein the processor executes the program instructions to: verify user authentication information based on fingerprint data responsive to the data processing system receiving an input via a finger of the user on a display screen to execute the secure application; launch the secure application using the user authentication information as an invoking parameter to execute the secure application responsive to verifying the user authentication information; and receive content corresponding to the secure application in response to execution of the secure application, wherein the user is authenticated by verifying the user authentication information, the secure application is launched, and the user is logged into the secure application based on a single tap of the finger of the user on the display screen. 10. The data processing system of claim 9 further comprising:
scan a fingerprint of the finger of the user contacting the display screen to obtain the fingerprint data responsive to the data processing system determining that the finger of the user contacted the display screen. 11. The data processing system of claim 10 further comprising:
retrieving, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template responsive to scanning the fingerprint, wherein the user authentication data is specific to the secure application. 12. The data processing system of claim 9 further comprising:
display the content of the secure application in response to the secure application receiving the user authentication information. 13. The data processing system of claim 9, wherein the data processing system utilizes an operating system of the data processing system to concurrently perform the verifying of the user authentication information and the launching of the secure application. 14. A computer program product for providing single tap user authentication, launch and login to a secure application having restricted access requiring authentication for access thereto by a user, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a data processing system to cause the data processing system to perform a method comprising:
verifying, by the data processing system, user authentication information based on fingerprint data responsive to the data processing system receiving an input via a finger of the user on a display screen to execute the secure application; launching, by the data processing system, the secure application using the user authentication information as an invoking parameter to execute the secure application responsive to verifying the user authentication information; and receiving, by the data processing system, content corresponding to the secure application in response to execution of the secure application, wherein the user is authenticated by verifying the user authentication information, the secure application is launched, and the user is logged into the secure application responsive to a single tap of the finger of the user on the display screen. 15. The computer program product of claim 14 further comprising:
scanning a fingerprint of the finger of the user contacting the display screen to obtain the fingerprint data responsive to the data processing system determining that the finger of the user contacted the display screen. 16. The computer program product of claim 15 further comprising:
retrieving, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template responsive to scanning the fingerprint, wherein the user authentication data is specific to the secure application. 17. The computer program product of claim 14, wherein the display screen is locked when the finger of the user contacts the display screen, and wherein the user authentication information is verified by the data processing system without unlocking the display screen. 18. The computer program product of claim 14, wherein the display screen is locked when the finger of the user contacts the display screen, and further comprising:
responsive to verifying the user authentication information, unlocking the display screen. 19. The computer program product of claim 14 further comprising:
displaying the content of the secure application in response to the secure application receiving the user authentication information. 20. The computer program product of claim 14, wherein the data processing system utilizes an operating system of the data processing system to concurrently perform the verifying of the user authentication information and the launching of the secure application. | Single tap launch and login to a secure application is provided. User authentication information is verified based on fingerprint data in response to the data processing system receiving an input via a finger of a user on a display screen to execute the secure application. The user authentication information is passed to the secure application as an invoking parameter to execute the secure application. Content corresponding to the secure application is received in response to execution of the secure application.1. A computer-implemented method for providing single tap user authentication, launch and login to a secure application having restricted access requiring authentication for access thereto by a user, the computer-implemented method comprising:
responsive to a data processing system receiving an input via a finger of the user on a display screen to execute the secure application, verifying, by the data processing system, user authentication information based on fingerprint data; responsive to verifying the user authentication information, launching, by the data processing system, the secure application using the user authentication information as an invoking parameter to execute the secure application; and receiving, by the data processing system, content corresponding to the secure application in response to execution of the secure application, wherein the user is authenticated by verifying the user authentication information, the secure application is launched, and the user is logged into the secure application responsive to a single tap of the finger of the user on the display screen. 2. The computer-implemented method of claim 1 further comprising:
responsive to the data processing system determining that the finger of the user contacted the display screen, scanning, by the data processing system, a fingerprint of the finger of the user contacting the display screen to obtain the fingerprint data. 3. The computer-implemented method of claim 2 further comprising:
responsive to the data processing system scanning the fingerprint, retrieving, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template, wherein the user authentication data is specific to the secure application. 4. The computer-implemented method of claim 2 further comprising:
responsive to the data processing system scanning the fingerprint, generating, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template, wherein the user authentication data is specific to the secure application. 5. The computer-implemented method of claim 1, wherein the display screen is locked when the finger of the user contacts the display screen, and wherein the user authentication information is verified by the data processing system without unlocking the display screen. 6. The computer-implemented method of claim 1, wherein the display screen is locked when the finger of the user contacts the display screen, and further comprising:
responsive to verifying the user authentication information, unlocking the display screen. 7. The computer-implemented method of claim 1 further comprising:
displaying, by the data processing system, the content of the secure application in response to the secure application receiving the user authentication information. 8. The computer-implemented method of claim 1, wherein the data processing system utilizes an operating system of the data processing system to concurrently perform the verifying of the user authentication information and the launching of the secure application. 9. A data processing system for providing single tap user authentication, launch and login to a secure application having restricted access requiring authentication for access thereto by a user, the data processing system comprising:
a bus system; a storage device connected to the bus system, wherein the storage device stores program instructions; and a processor connected to the bus system, wherein the processor executes the program instructions to: verify user authentication information based on fingerprint data responsive to the data processing system receiving an input via a finger of the user on a display screen to execute the secure application; launch the secure application using the user authentication information as an invoking parameter to execute the secure application responsive to verifying the user authentication information; and receive content corresponding to the secure application in response to execution of the secure application, wherein the user is authenticated by verifying the user authentication information, the secure application is launched, and the user is logged into the secure application based on a single tap of the finger of the user on the display screen. 10. The data processing system of claim 9 further comprising:
scan a fingerprint of the finger of the user contacting the display screen to obtain the fingerprint data responsive to the data processing system determining that the finger of the user contacted the display screen. 11. The data processing system of claim 10 further comprising:
retrieving, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template responsive to scanning the fingerprint, wherein the user authentication data is specific to the secure application. 12. The data processing system of claim 9 further comprising:
display the content of the secure application in response to the secure application receiving the user authentication information. 13. The data processing system of claim 9, wherein the data processing system utilizes an operating system of the data processing system to concurrently perform the verifying of the user authentication information and the launching of the secure application. 14. A computer program product for providing single tap user authentication, launch and login to a secure application having restricted access requiring authentication for access thereto by a user, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a data processing system to cause the data processing system to perform a method comprising:
verifying, by the data processing system, user authentication information based on fingerprint data responsive to the data processing system receiving an input via a finger of the user on a display screen to execute the secure application; launching, by the data processing system, the secure application using the user authentication information as an invoking parameter to execute the secure application responsive to verifying the user authentication information; and receiving, by the data processing system, content corresponding to the secure application in response to execution of the secure application, wherein the user is authenticated by verifying the user authentication information, the secure application is launched, and the user is logged into the secure application responsive to a single tap of the finger of the user on the display screen. 15. The computer program product of claim 14 further comprising:
scanning a fingerprint of the finger of the user contacting the display screen to obtain the fingerprint data responsive to the data processing system determining that the finger of the user contacted the display screen. 16. The computer program product of claim 15 further comprising:
retrieving, by the data processing system, the user authentication information based on matching the fingerprint data to a stored biometric fingerprint template responsive to scanning the fingerprint, wherein the user authentication data is specific to the secure application. 17. The computer program product of claim 14, wherein the display screen is locked when the finger of the user contacts the display screen, and wherein the user authentication information is verified by the data processing system without unlocking the display screen. 18. The computer program product of claim 14, wherein the display screen is locked when the finger of the user contacts the display screen, and further comprising:
responsive to verifying the user authentication information, unlocking the display screen. 19. The computer program product of claim 14 further comprising:
displaying the content of the secure application in response to the secure application receiving the user authentication information. 20. The computer program product of claim 14, wherein the data processing system utilizes an operating system of the data processing system to concurrently perform the verifying of the user authentication information and the launching of the secure application. | 2,400 |
8,881 | 8,881 | 15,428,959 | 2,469 | A wireless local area network (WLAN) station (STA) reports, with a medium access control (MAC) frame, a buffer status of an urgent traffic identifier (TID) to a second STA. In some embodiments, the second STA is also an access point (AP). The delay in reporting is reduced by providing a buffer status report for the urgent TID in a data frame being transmitted to carry data for a current TID. The buffer status report, in some embodiments, provides the value of the urgent TID. In some embodiments, the buffer status report provides an indication of the amount of data in a buffer corresponding to the urgent TID. In some embodiments, the buffer status report is based on an aggregated measure of more than one buffer with data awaiting transmission. The transmission of the MAC frame, in some embodiments, is unsolicited. | 1. A method for communicating buffer status, the method performed by a wireless local area network station (STA) comprising a first buffer and a second buffer, the method comprising:
receiving a trigger frame from an access point (AP); forming a frame body of a medium access control (MAC) frame based at least in part on a first data portion from the first buffer, wherein the first data portion is associated with a first traffic identifier; forming a MAC header of the MAC frame, wherein the MAC header comprises a buffer status report for a second data portion in the second buffer, and wherein the second data portion is associated with a second traffic identifier, different from the first traffic identifier; and transmitting the MAC frame to the AP. 2. The method of claim 1, further comprising:
receiving from the AP a second trigger frame indicating the second traffic identifier; forming a second MAC frame having a second frame body comprising at least a part of the second data portion; and transmitting the second MAC frame to the AP. 3. The method of claim 1, wherein the first traffic identifier represents a first traffic category (TC) associated with a first user priority (UP) and the second traffic identifier represents a second TC associated with a second UP. 4. The method of claim 1, wherein the first traffic identifier represents a first traffic stream (TS) and the second traffic identifier represents a second TS. 5. The method of claim 1, wherein the first data portion comprises voice application data. 6. The method of claim 5, wherein the second data portion comprises video application data. 7. The method of claim 1, wherein the buffer status report includes a traffic identifier value and a queue information value. 8. The method of claim 7, wherein the traffic identifier value comprises a TID and the queue information value corresponds to units of 256 octets stored in the second buffer. 9. A wireless local area network station (STA) comprising:
a memory; and a processor, wherein the memory comprises instructions that when executed by the processor cause the STA to:
receive a trigger frame from an access point (AP),
form a frame body of a medium access control (MAC) frame based at least in part on a first data portion from a first buffer of the memory, wherein the first data portion is associated with a first traffic identifier,
form a MAC header of the MAC frame, wherein the MAC header comprises a buffer status report based at least in part on the first buffer and on one or more other buffers of the memory, and
transmit the MAC frame to the AP. 10. The STA of claim 9, wherein the buffer status report comprises an aggregated buffer status, a second traffic identifier different than the first traffic identifier, and queue information corresponding to the second traffic identifier. 11. The STA of claim 9, wherein the buffer status report comprises an aggregated buffer status, wherein the aggregated buffer status is based on a first amount of data in the first buffer and a second amount of data stored in at least one of the one or more other buffers. 12. The STA of claim 11, wherein the aggregated buffer status provides an indication of data buffered in at least three data buffers associated with the STA. 13. A non-transitory computer readable medium comprising instructions that when executed by a processor in a wireless local area network station (STA) cause the STA to:
receive a trigger frame from an access point (AP); form a frame body of a medium access control (MAC) frame based at least in part on a first data portion from a first memory buffer, wherein the first data portion is associated with a first traffic identifier; form a MAC header of the MAC frame, wherein the MAC header comprises a buffer status report for a second data portion in a second memory buffer, and wherein the second data portion is associated with a second traffic identifier different than the first traffic identifier; and transmit the MAC frame to the AP. 14. The non-transitory computer readable medium of claim 13, wherein the instructions further cause the STA to:
receive from the AP a second trigger frame indicating the second traffic identifier; form a second MAC frame having a second frame body comprising at least a part of the second data portion; and transmit the second MAC frame to the AP. 15. The non-transitory computer readable medium of claim 13, wherein the first traffic identifier represents a first traffic category (TC) associated with a first user priority (UP) and the second traffic identifier represents a second TC associated with a second UP. 16. The non-transitory computer readable medium of claim 13, wherein the first traffic identifier represents a first traffic stream (TS) and the second traffic identifier represents a second TS. 17. The non-transitory computer readable medium of claim 13, wherein the first data portion comprises voice application data. 18. The non-transitory computer readable medium of claim 17, wherein the second data portion comprises video application data. 19. The non-transitory computer readable medium of claim 13, wherein the buffer status report includes a traffic identifier value and a queue information value. 20. The non-transitory computer readable medium of claim 19, wherein the traffic identifier value comprises a TID and the queue information value corresponds to units of 256 octets stored in the second memory buffer. | A wireless local area network (WLAN) station (STA) reports, with a medium access control (MAC) frame, a buffer status of an urgent traffic identifier (TID) to a second STA. In some embodiments, the second STA is also an access point (AP). The delay in reporting is reduced by providing a buffer status report for the urgent TID in a data frame being transmitted to carry data for a current TID. The buffer status report, in some embodiments, provides the value of the urgent TID. In some embodiments, the buffer status report provides an indication of the amount of data in a buffer corresponding to the urgent TID. In some embodiments, the buffer status report is based on an aggregated measure of more than one buffer with data awaiting transmission. The transmission of the MAC frame, in some embodiments, is unsolicited.1. A method for communicating buffer status, the method performed by a wireless local area network station (STA) comprising a first buffer and a second buffer, the method comprising:
receiving a trigger frame from an access point (AP); forming a frame body of a medium access control (MAC) frame based at least in part on a first data portion from the first buffer, wherein the first data portion is associated with a first traffic identifier; forming a MAC header of the MAC frame, wherein the MAC header comprises a buffer status report for a second data portion in the second buffer, and wherein the second data portion is associated with a second traffic identifier, different from the first traffic identifier; and transmitting the MAC frame to the AP. 2. The method of claim 1, further comprising:
receiving from the AP a second trigger frame indicating the second traffic identifier; forming a second MAC frame having a second frame body comprising at least a part of the second data portion; and transmitting the second MAC frame to the AP. 3. The method of claim 1, wherein the first traffic identifier represents a first traffic category (TC) associated with a first user priority (UP) and the second traffic identifier represents a second TC associated with a second UP. 4. The method of claim 1, wherein the first traffic identifier represents a first traffic stream (TS) and the second traffic identifier represents a second TS. 5. The method of claim 1, wherein the first data portion comprises voice application data. 6. The method of claim 5, wherein the second data portion comprises video application data. 7. The method of claim 1, wherein the buffer status report includes a traffic identifier value and a queue information value. 8. The method of claim 7, wherein the traffic identifier value comprises a TID and the queue information value corresponds to units of 256 octets stored in the second buffer. 9. A wireless local area network station (STA) comprising:
a memory; and a processor, wherein the memory comprises instructions that when executed by the processor cause the STA to:
receive a trigger frame from an access point (AP),
form a frame body of a medium access control (MAC) frame based at least in part on a first data portion from a first buffer of the memory, wherein the first data portion is associated with a first traffic identifier,
form a MAC header of the MAC frame, wherein the MAC header comprises a buffer status report based at least in part on the first buffer and on one or more other buffers of the memory, and
transmit the MAC frame to the AP. 10. The STA of claim 9, wherein the buffer status report comprises an aggregated buffer status, a second traffic identifier different than the first traffic identifier, and queue information corresponding to the second traffic identifier. 11. The STA of claim 9, wherein the buffer status report comprises an aggregated buffer status, wherein the aggregated buffer status is based on a first amount of data in the first buffer and a second amount of data stored in at least one of the one or more other buffers. 12. The STA of claim 11, wherein the aggregated buffer status provides an indication of data buffered in at least three data buffers associated with the STA. 13. A non-transitory computer readable medium comprising instructions that when executed by a processor in a wireless local area network station (STA) cause the STA to:
receive a trigger frame from an access point (AP); form a frame body of a medium access control (MAC) frame based at least in part on a first data portion from a first memory buffer, wherein the first data portion is associated with a first traffic identifier; form a MAC header of the MAC frame, wherein the MAC header comprises a buffer status report for a second data portion in a second memory buffer, and wherein the second data portion is associated with a second traffic identifier different than the first traffic identifier; and transmit the MAC frame to the AP. 14. The non-transitory computer readable medium of claim 13, wherein the instructions further cause the STA to:
receive from the AP a second trigger frame indicating the second traffic identifier; form a second MAC frame having a second frame body comprising at least a part of the second data portion; and transmit the second MAC frame to the AP. 15. The non-transitory computer readable medium of claim 13, wherein the first traffic identifier represents a first traffic category (TC) associated with a first user priority (UP) and the second traffic identifier represents a second TC associated with a second UP. 16. The non-transitory computer readable medium of claim 13, wherein the first traffic identifier represents a first traffic stream (TS) and the second traffic identifier represents a second TS. 17. The non-transitory computer readable medium of claim 13, wherein the first data portion comprises voice application data. 18. The non-transitory computer readable medium of claim 17, wherein the second data portion comprises video application data. 19. The non-transitory computer readable medium of claim 13, wherein the buffer status report includes a traffic identifier value and a queue information value. 20. The non-transitory computer readable medium of claim 19, wherein the traffic identifier value comprises a TID and the queue information value corresponds to units of 256 octets stored in the second memory buffer. | 2,400 |
8,882 | 8,882 | 15,922,323 | 2,413 | A method and apparatus having a synchronization signal sequence structure for low complexity cell detection is provided. The method includes establishing a set of a plurality of synchronization signal sequences to be used in connection with a communication target. Each one of the plurality of synchronization signal sequences includes at least a first sub-sequence, which includes either a first preselected sequence or a complex conjugate of the first preselected sequence, and a second sub-sequence, which includes either a second preselected sequence or a complex conjugate of the second preselected sequence. The second preselected sequence is different than the first preselected sequence, and is different than the complex conjugate of the first preselected sequence. Further, a length of the first sub-sequence and a length of the second sub-sequence are smaller than a length of the synchronization signal sequence. A signal including a synchronization signal is then received, where the synchronization signal comprises one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences, and the synchronization signal is then detected. | 1. A method in a user equipment, the method comprising:
establishing a set of a plurality of synchronization signal sequences to be used in connection with a communication target, where each one of the plurality of synchronization signal sequences comprises
at least a first sub-sequence, which includes either a first preselected sequence or a complex conjugate of the first preselected sequence, and a second sub-sequence, which includes either a second preselected sequence or a complex conjugate of the second preselected sequence,
where the second preselected sequence is different than the first preselected sequence, and is different than the complex conjugate of the first preselected sequence, and
where a length of the first sub-sequence and a length of the second sub-sequence are smaller than a length of the synchronization signal sequence;
receiving a signal including a synchronization signal, where the synchronization signal comprises one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences; and detecting the synchronization signal. 2. A method in accordance with claim 1, wherein the communication target includes a network comprising one or more network entities respectively associated with one or more communication areas, and the user equipment communicates with the network via the one or more network entities. 3. A method in accordance with claim 2, further comprising using the detected synchronization signal to identify at least a partial physical-layer cell identity of one of the one or more network entities. 4. A method in accordance with claim 1, wherein the communication target includes a direct communication connection with another user equipment. 5. A method in accordance with claim 1, wherein establishing the set of the plurality of synchronization signal sequences includes generating a predetermined set of the plurality of synchronization signal sequences. 6. A method in accordance with claim 1, wherein the first preselected sequence and the second preselected sequence are Zadoff-Chu sequences, where each of the first and second sub-sequences uses a different Zadoff-Chu sequence root index. 7. A method in accordance with claim 1, wherein detecting the synchronization signal includes computing cross-correlations between the received signal and the set of the plurality of synchronization signal sequences. 8. A method in accordance with claim 7, wherein computing cross-correlations includes computing multiplications to calculate cross-correlations between the received signal and the set of the plurality of synchronization signal sequences, wherein the multiplications are at least in part based on multiplications of the received signal with a first portion of each respective one of the plurality of synchronization signal sequences in the set, which corresponds to the first preselected sequence, and multiplications of the received signal with a second portion of each respective one of the plurality of synchronization signal sequences in the set, which corresponds to the second preselected sequence. 9. A method in accordance with claim 8, wherein computing multiplications to calculate cross-correlations includes using a frequency shift of multiplications of the received signal with the first portion of each respective one of the plurality of synchronization signal sequences in the set to calculate the cross-correlations between the received signal and the set of the plurality of synchronization signal sequences. 10. A method in accordance with claim 8, wherein computing multiplications to calculate cross-correlations includes using a frequency shift of multiplications of the received signal with the second portion of each respective one of the plurality of synchronization signal sequences in the set to calculate the cross-correlations between the received signal and the set of the plurality of synchronization signal sequences. 11. A method in accordance with claim 1, wherein a first one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises the first sub-sequence being transmitted in a first set of subcarriers of a synchronization signal transmission band, and the second sub-sequence being transmitted in a second set of subcarriers of the synchronization signal transmission band. 12. A method in accordance with claim 11, wherein a second one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises the second sub-sequence being transmitted in the first set of subcarriers of the synchronization signal transmission band, and the first sub-sequence being transmitted in the second set of subcarriers of the synchronization signal transmission band. 13. A method in accordance with claim 12, wherein a third one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises a complex conjugate of the first sub-sequence being transmitted in the first set of subcarriers of the synchronization signal transmission band, and a complex conjugate of the second sub-sequence being transmitted in the second set of subcarriers of the synchronization signal transmission band, and
a fourth one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises the complex conjugate of the second sub-sequence being transmitted in the first set of subcarriers of the synchronization signal transmission band, and the complex conjugate of the first sub-sequence being transmitted in the second set of subcarriers of the synchronization signal transmission band. 14. A method in accordance with claim 1, wherein one or more elements of at least one of the first and second sub-sequences are punctured by the communication target when used as part of a respective one of the synchronization signal sequences. 15. A method in accordance with claim 1, wherein a transmission bandwidth of the synchronization signal in terms of a number of subcarriers is equal to a radix-2 fast Fourier transform size. 16. A user equipment in a communication network including a communication target from which a synchronization signal can be received, the user equipment comprising:
a controller that establishes a set of a plurality of synchronization signal sequences to be used with the communication target, where each one of the plurality of synchronization signal sequences comprises
at least a first sub-sequence, which includes either a first preselected sequence or a complex conjugate of the first preselected sequence, and a second sub-sequence, which includes either a second preselected sequence or a complex conjugate of the second preselected sequence,
where the second preselected sequence is different than the first preselected sequence, and is different than the complex conjugate of the first preselected sequence, and
where a length of the first sub-sequence and a length of the second sub-sequence are smaller than a length of the synchronization signal sequence; and
a transceiver that receives a signal including a synchronization signal, where the synchronization signal comprises one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences; and wherein the controller further detects the synchronization signal. 17. A user equipment in accordance with claim 16, wherein the communication target includes a network comprising one or more network entities respectively associated with one or more communication areas, and the user equipment communicates with the network via the one or more network entities. 18. A user equipment in accordance with claim 17, wherein the controller uses the detected synchronization signal to identify at least a partial physical-layer cell identity of one of the one or more network entities. 19. A user equipment in accordance with claim 16, wherein the communication target includes a direct communication connection with another user equipment. 20. A user equipment in accordance with claim 16, wherein the first preselected sequence and the second preselected sequence used by the controller to establish a set of a plurality of synchronization signal sequences are Zadoff-Chu sequences, where each of the first and second preselected sequences uses a different Zadoff-Chu sequence root index. | A method and apparatus having a synchronization signal sequence structure for low complexity cell detection is provided. The method includes establishing a set of a plurality of synchronization signal sequences to be used in connection with a communication target. Each one of the plurality of synchronization signal sequences includes at least a first sub-sequence, which includes either a first preselected sequence or a complex conjugate of the first preselected sequence, and a second sub-sequence, which includes either a second preselected sequence or a complex conjugate of the second preselected sequence. The second preselected sequence is different than the first preselected sequence, and is different than the complex conjugate of the first preselected sequence. Further, a length of the first sub-sequence and a length of the second sub-sequence are smaller than a length of the synchronization signal sequence. A signal including a synchronization signal is then received, where the synchronization signal comprises one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences, and the synchronization signal is then detected.1. A method in a user equipment, the method comprising:
establishing a set of a plurality of synchronization signal sequences to be used in connection with a communication target, where each one of the plurality of synchronization signal sequences comprises
at least a first sub-sequence, which includes either a first preselected sequence or a complex conjugate of the first preselected sequence, and a second sub-sequence, which includes either a second preselected sequence or a complex conjugate of the second preselected sequence,
where the second preselected sequence is different than the first preselected sequence, and is different than the complex conjugate of the first preselected sequence, and
where a length of the first sub-sequence and a length of the second sub-sequence are smaller than a length of the synchronization signal sequence;
receiving a signal including a synchronization signal, where the synchronization signal comprises one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences; and detecting the synchronization signal. 2. A method in accordance with claim 1, wherein the communication target includes a network comprising one or more network entities respectively associated with one or more communication areas, and the user equipment communicates with the network via the one or more network entities. 3. A method in accordance with claim 2, further comprising using the detected synchronization signal to identify at least a partial physical-layer cell identity of one of the one or more network entities. 4. A method in accordance with claim 1, wherein the communication target includes a direct communication connection with another user equipment. 5. A method in accordance with claim 1, wherein establishing the set of the plurality of synchronization signal sequences includes generating a predetermined set of the plurality of synchronization signal sequences. 6. A method in accordance with claim 1, wherein the first preselected sequence and the second preselected sequence are Zadoff-Chu sequences, where each of the first and second sub-sequences uses a different Zadoff-Chu sequence root index. 7. A method in accordance with claim 1, wherein detecting the synchronization signal includes computing cross-correlations between the received signal and the set of the plurality of synchronization signal sequences. 8. A method in accordance with claim 7, wherein computing cross-correlations includes computing multiplications to calculate cross-correlations between the received signal and the set of the plurality of synchronization signal sequences, wherein the multiplications are at least in part based on multiplications of the received signal with a first portion of each respective one of the plurality of synchronization signal sequences in the set, which corresponds to the first preselected sequence, and multiplications of the received signal with a second portion of each respective one of the plurality of synchronization signal sequences in the set, which corresponds to the second preselected sequence. 9. A method in accordance with claim 8, wherein computing multiplications to calculate cross-correlations includes using a frequency shift of multiplications of the received signal with the first portion of each respective one of the plurality of synchronization signal sequences in the set to calculate the cross-correlations between the received signal and the set of the plurality of synchronization signal sequences. 10. A method in accordance with claim 8, wherein computing multiplications to calculate cross-correlations includes using a frequency shift of multiplications of the received signal with the second portion of each respective one of the plurality of synchronization signal sequences in the set to calculate the cross-correlations between the received signal and the set of the plurality of synchronization signal sequences. 11. A method in accordance with claim 1, wherein a first one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises the first sub-sequence being transmitted in a first set of subcarriers of a synchronization signal transmission band, and the second sub-sequence being transmitted in a second set of subcarriers of the synchronization signal transmission band. 12. A method in accordance with claim 11, wherein a second one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises the second sub-sequence being transmitted in the first set of subcarriers of the synchronization signal transmission band, and the first sub-sequence being transmitted in the second set of subcarriers of the synchronization signal transmission band. 13. A method in accordance with claim 12, wherein a third one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises a complex conjugate of the first sub-sequence being transmitted in the first set of subcarriers of the synchronization signal transmission band, and a complex conjugate of the second sub-sequence being transmitted in the second set of subcarriers of the synchronization signal transmission band, and
a fourth one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences comprises the complex conjugate of the second sub-sequence being transmitted in the first set of subcarriers of the synchronization signal transmission band, and the complex conjugate of the first sub-sequence being transmitted in the second set of subcarriers of the synchronization signal transmission band. 14. A method in accordance with claim 1, wherein one or more elements of at least one of the first and second sub-sequences are punctured by the communication target when used as part of a respective one of the synchronization signal sequences. 15. A method in accordance with claim 1, wherein a transmission bandwidth of the synchronization signal in terms of a number of subcarriers is equal to a radix-2 fast Fourier transform size. 16. A user equipment in a communication network including a communication target from which a synchronization signal can be received, the user equipment comprising:
a controller that establishes a set of a plurality of synchronization signal sequences to be used with the communication target, where each one of the plurality of synchronization signal sequences comprises
at least a first sub-sequence, which includes either a first preselected sequence or a complex conjugate of the first preselected sequence, and a second sub-sequence, which includes either a second preselected sequence or a complex conjugate of the second preselected sequence,
where the second preselected sequence is different than the first preselected sequence, and is different than the complex conjugate of the first preselected sequence, and
where a length of the first sub-sequence and a length of the second sub-sequence are smaller than a length of the synchronization signal sequence; and
a transceiver that receives a signal including a synchronization signal, where the synchronization signal comprises one of the synchronization signal sequences from the set of the plurality of synchronization signal sequences; and wherein the controller further detects the synchronization signal. 17. A user equipment in accordance with claim 16, wherein the communication target includes a network comprising one or more network entities respectively associated with one or more communication areas, and the user equipment communicates with the network via the one or more network entities. 18. A user equipment in accordance with claim 17, wherein the controller uses the detected synchronization signal to identify at least a partial physical-layer cell identity of one of the one or more network entities. 19. A user equipment in accordance with claim 16, wherein the communication target includes a direct communication connection with another user equipment. 20. A user equipment in accordance with claim 16, wherein the first preselected sequence and the second preselected sequence used by the controller to establish a set of a plurality of synchronization signal sequences are Zadoff-Chu sequences, where each of the first and second preselected sequences uses a different Zadoff-Chu sequence root index. | 2,400 |
8,883 | 8,883 | 15,375,605 | 2,443 | Systems and methods for social based online matchmaking system are provided. In particular, some embodiments provide recommendations for connections (i.e., candidate users) based on the user's social networking and social matching system connections and activity. Along with one-on-one dates, the user can enable communications within to establish group outings with a candidate user, and each of their respective friend groups which may include single or non-single friends. For example, the user can create a dialog with a candidate user from their extended degrees of social connections and a separate dialogue with friends (i.e., non-candidate users). The user may not be able to see full dating profiles of the non-candidate users, which may be the user's friends or the candidate user's shortlisted friends. Additionally, a user can disable the matchmaking features and show that they have done so to the rest of the users to indicate a status of not looking. | 1. A method comprising: a social based online matchmaking system for matching users. 2. The method of claim 1, wherein said user registers and allows the system to access the user's online social network. 3. The method of claim 1, wherein said user has the option to invite others to join the system. 4. The method of claim 1, wherein if any of the first degree of connection from the said user's social network joins or are already part of the system, those connections would become part of the user's first degree of connection on the system. 5. The method of claim 1, wherein said user can input additional profile data into the system. 6. The method of claim 1, wherein said user only has potential matches from a second to third degree of connection or open connection on the system. 7. The method of claim 1, wherein matches from a second to third degree of connection comes from when there is a linked connection(s) in the system that is between the user and the second to third degree of connection. 8. The method of claim 1, wherein open connection matches are matches from outside the second and third degree of connection. 9. The method of claim 1, wherein said user has the ability to view the matching profiles of potential matches from the user's second to third degree of connection or open connection on the system that matches the said user's preference criteria or of a match that liked the said user's profile. 10. The method of claim 1, wherein said user has the ability to view just the extremely limited details from the profiles of the user's first degree of connection and the third degree and open connection matches' short listed first degree of connection as described in claim 14. 11. The method of claim 1, wherein said user can freely message their first degree connections, and reply to any active messages in their message box. 12. The method of claim 1, wherein said user can only initiate a message with matches on their second to third degree or open connection if there is a mutual interest and that the user has full access through an initial free trial, an incentivized membership, a promotional membership, or a paid membership. 13. The method of claim 1, wherein once said user loses full access they could only view the partial profiles for other users in the second to third degree or open connection who also don't have full access, but can view the full profiles of other users who has full access. 14. The method of claim 1, wherein said user can shortlist the connections from their first degree of connection, and their shortlisted first degree of connection would be viewable on their profile to their potential matches from their third degree or open connection. 15. The method of claim 1, wherein said user will have a certain type of messages in their inbox where it would be for messages with someone from their first degree of connection and for messages with the shortlisted first degree of connection from their matches, where links with the message to each other's profiles only shows the extremely limited profiles described in claim 10. 16. The method of claim 1, wherein said user will have another type of messages in their inbox where it would be for messages with someone from their second to third degree of connection or open connection, where links with the messages to each other's profiles only shows partially limited or full profiles depending on the said user's access and the access of who is being messaged as described in claim 13. 17. The method of claim 1, wherein said user can change their access to where their extremely limited profile is just for viewing and for messaging as described in claim 10 and claim 15, and an indication of their different access is viewable to the users that can view them in the system, and where their partial or full profiles won't be available for viewing or for messaging as described in claim 13 and claim 16. 18. The method of claim 1, wherein said system can alternatively be a free or advertisement based system for the said user where the said user will have full access, and won't be attaining full access through the reasons described in claim 12 or lose full access as describe in claim 13. 19. The method of claim 1, wherein said system can alternatively or can also alternatively include extended degrees of connections where those connections would function in the same way as a third degree of connection for the said user. 20. The method of claim 1, wherein said system can alternatively or can also alternatively include open connection matches as matches from outside the second degree of connection and not include third degree connections. | Systems and methods for social based online matchmaking system are provided. In particular, some embodiments provide recommendations for connections (i.e., candidate users) based on the user's social networking and social matching system connections and activity. Along with one-on-one dates, the user can enable communications within to establish group outings with a candidate user, and each of their respective friend groups which may include single or non-single friends. For example, the user can create a dialog with a candidate user from their extended degrees of social connections and a separate dialogue with friends (i.e., non-candidate users). The user may not be able to see full dating profiles of the non-candidate users, which may be the user's friends or the candidate user's shortlisted friends. Additionally, a user can disable the matchmaking features and show that they have done so to the rest of the users to indicate a status of not looking.1. A method comprising: a social based online matchmaking system for matching users. 2. The method of claim 1, wherein said user registers and allows the system to access the user's online social network. 3. The method of claim 1, wherein said user has the option to invite others to join the system. 4. The method of claim 1, wherein if any of the first degree of connection from the said user's social network joins or are already part of the system, those connections would become part of the user's first degree of connection on the system. 5. The method of claim 1, wherein said user can input additional profile data into the system. 6. The method of claim 1, wherein said user only has potential matches from a second to third degree of connection or open connection on the system. 7. The method of claim 1, wherein matches from a second to third degree of connection comes from when there is a linked connection(s) in the system that is between the user and the second to third degree of connection. 8. The method of claim 1, wherein open connection matches are matches from outside the second and third degree of connection. 9. The method of claim 1, wherein said user has the ability to view the matching profiles of potential matches from the user's second to third degree of connection or open connection on the system that matches the said user's preference criteria or of a match that liked the said user's profile. 10. The method of claim 1, wherein said user has the ability to view just the extremely limited details from the profiles of the user's first degree of connection and the third degree and open connection matches' short listed first degree of connection as described in claim 14. 11. The method of claim 1, wherein said user can freely message their first degree connections, and reply to any active messages in their message box. 12. The method of claim 1, wherein said user can only initiate a message with matches on their second to third degree or open connection if there is a mutual interest and that the user has full access through an initial free trial, an incentivized membership, a promotional membership, or a paid membership. 13. The method of claim 1, wherein once said user loses full access they could only view the partial profiles for other users in the second to third degree or open connection who also don't have full access, but can view the full profiles of other users who has full access. 14. The method of claim 1, wherein said user can shortlist the connections from their first degree of connection, and their shortlisted first degree of connection would be viewable on their profile to their potential matches from their third degree or open connection. 15. The method of claim 1, wherein said user will have a certain type of messages in their inbox where it would be for messages with someone from their first degree of connection and for messages with the shortlisted first degree of connection from their matches, where links with the message to each other's profiles only shows the extremely limited profiles described in claim 10. 16. The method of claim 1, wherein said user will have another type of messages in their inbox where it would be for messages with someone from their second to third degree of connection or open connection, where links with the messages to each other's profiles only shows partially limited or full profiles depending on the said user's access and the access of who is being messaged as described in claim 13. 17. The method of claim 1, wherein said user can change their access to where their extremely limited profile is just for viewing and for messaging as described in claim 10 and claim 15, and an indication of their different access is viewable to the users that can view them in the system, and where their partial or full profiles won't be available for viewing or for messaging as described in claim 13 and claim 16. 18. The method of claim 1, wherein said system can alternatively be a free or advertisement based system for the said user where the said user will have full access, and won't be attaining full access through the reasons described in claim 12 or lose full access as describe in claim 13. 19. The method of claim 1, wherein said system can alternatively or can also alternatively include extended degrees of connections where those connections would function in the same way as a third degree of connection for the said user. 20. The method of claim 1, wherein said system can alternatively or can also alternatively include open connection matches as matches from outside the second degree of connection and not include third degree connections. | 2,400 |
8,884 | 8,884 | 14,135,565 | 2,449 | Some embodiments use proxies on host devices to capture broadcast DHCP traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. To suppress DHCP broadcast, the proxy for a particular VM monitors the VM's traffic to detect and intercept a DHCP discover message. When the proxy receives a DHCP discover message, the proxy retrieves DHCP configuration data that was previously stored on the host for the VM. In some embodiments, the DHCP configuration data is stored on the host for the VM during the installation of the VM in response to an administrator's request or as part of an installation script that installs the VM. The DHCP configuration data in some embodiments is stored in one common data store for all the VMs that execute on the host, while in other embodiments, each VM's DHCP configuration data is stored in a DHCP data store that is uniquely maintained for the VM. In some of these latter embodiments, the data in the unique DHCP data store for a VM can easily migrate with the VM when the VM migrates from one host to another host. | 1. A method of capturing dynamic host configuration protocol (DHCP) broadcast messages in a network with a plurality of host devices executing a plurality of virtual machines (VMs), the method comprising:
during an initiation of a particular VM on a host device, obtaining DHCP configuration data and storing the DHCP configuration data in a DHCP data store; intercepting along a datapath a DHCP broadcast message sent by the particular VM; converting the broadcast message to a unicast query to the DHCP data store to retrieve the DHCP configuration data; based on a reply to the query, supplying a DHCP broadcast message reply to the particular VM, wherein said DHCP broadcast message reply is in a format that a DHCP server replies to a DHCP broadcast message. 2. The method of claim 1, wherein the DHCP configuration data includes a network address, wherein supplying the DHCP broadcast message reply comprises providing a set of DHCP broadcast message replies to the particular VM to provide the VM with the requested DHCP configuration data. 3. The method of claim 2, wherein the set of DHCP broadcast message replies comprises:
a DHCP offer with at least part of the DHCP configuration; and a DHCP acknowledge that is supplied to the particular VM in response to a DHCP request broadcast received from the particular VM. 4. The method of claim 3, wherein the DHCP acknowledge includes additional DCHP configuration data. 5. The method of claim 1, wherein the query to the DHCP data store is a control channel communication that is an out-of-band control channel connection established between a proxy that intercepts the DHCP broadcast message and the DHCP data store. 6. The method of claim 5, wherein an agent serves as an intermediary between the proxy and the DHCP data store. 7. The method of claim 1, wherein
the host devices each comprise at least one physical forwarding elements (PFEs); the PFEs collectively implement a plurality of logical forwarding elements (LFEs); wherein the DHCP configuration data is data that defines network attributes in one of the LFEs. 8. The method of claim 1 further comprising formulating the broadcast message reply based on the reply from the controller. 9. The method of claim 1, wherein the initiation of the VM comprises installation of the VM on the host. 10. The method of claim 1, wherein the initiation of the VM comprises booting-up of the VM on the host. 11. A non-transitory machine readable medium storing a program for assigning Internet protocol (IP) addresses in a network with a plurality of host devices executing a plurality of virtual machines (VMs), the program comprising sets of instructions for:
during an initiation of a particular VM on a host device, obtaining dynamic host configuration protocol (DHCP) configuration data and storing the DHCP configuration data in a DHCP data store; intercepting along a datapath a DHCP broadcast message sent by the particular VM; converting the broadcast message to a unicast query to the DHCP data store to retrieve the DHCP configuration data; based on a reply to the query, supplying a DHCP broadcast message reply to the particular VM, wherein said DHCP broadcast message reply is in a format that a DHCP server replies to a DHCP broadcast message. 12. The machine readable medium of claim 1, wherein the DHCP configuration data includes a network address, wherein the set of instructions for supplying the DHCP broadcast message reply comprises a set of instructions for providing a set of DHCP broadcast message replies to the particular VM to provide the VM with the requested DHCP configuration data. 13. The machine readable medium of claim 2, wherein the set of DHCP broadcast message replies comprises:
a DHCP offer with at least part of the DHCP configuration; and a DHCP acknowledge that is supplied to the particular VM in response to a DHCP request broadcast received from the particular VM. 14. The machine readable medium of claim 3, wherein the DHCP acknowledge includes additional DCHP configuration data. 15. The machine readable medium of claim 1, wherein the query to the DHCP data store is a control channel communication that is an out-of-band control channel connection established between a proxy that intercepts the DHCP broadcast message and the DHCP data store. 16. The machine readable medium of claim 5, wherein an agent serves as an intermediary between the proxy and the DHCP data store. 17. The machine readable medium of claim 1, wherein
the host devices each comprise at least one physical forwarding elements (PFEs); the PFEs collectively implement a plurality of logical forwarding elements (LFEs); wherein the DHCP configuration data is data that defines network attributes in one of the LFEs. 18. The machine readable medium of claim 1, wherein the program further comprises a set of instructions for formulating the broadcast message reply based on the reply from the controller. 19. The machine readable medium of claim 1, wherein the initiation of the VM comprises installation of the VM on the host. 20. The machine readable medium of claim 1, wherein the initiation of the VM comprises booting-up of the VM on the host. | Some embodiments use proxies on host devices to capture broadcast DHCP traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. To suppress DHCP broadcast, the proxy for a particular VM monitors the VM's traffic to detect and intercept a DHCP discover message. When the proxy receives a DHCP discover message, the proxy retrieves DHCP configuration data that was previously stored on the host for the VM. In some embodiments, the DHCP configuration data is stored on the host for the VM during the installation of the VM in response to an administrator's request or as part of an installation script that installs the VM. The DHCP configuration data in some embodiments is stored in one common data store for all the VMs that execute on the host, while in other embodiments, each VM's DHCP configuration data is stored in a DHCP data store that is uniquely maintained for the VM. In some of these latter embodiments, the data in the unique DHCP data store for a VM can easily migrate with the VM when the VM migrates from one host to another host.1. A method of capturing dynamic host configuration protocol (DHCP) broadcast messages in a network with a plurality of host devices executing a plurality of virtual machines (VMs), the method comprising:
during an initiation of a particular VM on a host device, obtaining DHCP configuration data and storing the DHCP configuration data in a DHCP data store; intercepting along a datapath a DHCP broadcast message sent by the particular VM; converting the broadcast message to a unicast query to the DHCP data store to retrieve the DHCP configuration data; based on a reply to the query, supplying a DHCP broadcast message reply to the particular VM, wherein said DHCP broadcast message reply is in a format that a DHCP server replies to a DHCP broadcast message. 2. The method of claim 1, wherein the DHCP configuration data includes a network address, wherein supplying the DHCP broadcast message reply comprises providing a set of DHCP broadcast message replies to the particular VM to provide the VM with the requested DHCP configuration data. 3. The method of claim 2, wherein the set of DHCP broadcast message replies comprises:
a DHCP offer with at least part of the DHCP configuration; and a DHCP acknowledge that is supplied to the particular VM in response to a DHCP request broadcast received from the particular VM. 4. The method of claim 3, wherein the DHCP acknowledge includes additional DCHP configuration data. 5. The method of claim 1, wherein the query to the DHCP data store is a control channel communication that is an out-of-band control channel connection established between a proxy that intercepts the DHCP broadcast message and the DHCP data store. 6. The method of claim 5, wherein an agent serves as an intermediary between the proxy and the DHCP data store. 7. The method of claim 1, wherein
the host devices each comprise at least one physical forwarding elements (PFEs); the PFEs collectively implement a plurality of logical forwarding elements (LFEs); wherein the DHCP configuration data is data that defines network attributes in one of the LFEs. 8. The method of claim 1 further comprising formulating the broadcast message reply based on the reply from the controller. 9. The method of claim 1, wherein the initiation of the VM comprises installation of the VM on the host. 10. The method of claim 1, wherein the initiation of the VM comprises booting-up of the VM on the host. 11. A non-transitory machine readable medium storing a program for assigning Internet protocol (IP) addresses in a network with a plurality of host devices executing a plurality of virtual machines (VMs), the program comprising sets of instructions for:
during an initiation of a particular VM on a host device, obtaining dynamic host configuration protocol (DHCP) configuration data and storing the DHCP configuration data in a DHCP data store; intercepting along a datapath a DHCP broadcast message sent by the particular VM; converting the broadcast message to a unicast query to the DHCP data store to retrieve the DHCP configuration data; based on a reply to the query, supplying a DHCP broadcast message reply to the particular VM, wherein said DHCP broadcast message reply is in a format that a DHCP server replies to a DHCP broadcast message. 12. The machine readable medium of claim 1, wherein the DHCP configuration data includes a network address, wherein the set of instructions for supplying the DHCP broadcast message reply comprises a set of instructions for providing a set of DHCP broadcast message replies to the particular VM to provide the VM with the requested DHCP configuration data. 13. The machine readable medium of claim 2, wherein the set of DHCP broadcast message replies comprises:
a DHCP offer with at least part of the DHCP configuration; and a DHCP acknowledge that is supplied to the particular VM in response to a DHCP request broadcast received from the particular VM. 14. The machine readable medium of claim 3, wherein the DHCP acknowledge includes additional DCHP configuration data. 15. The machine readable medium of claim 1, wherein the query to the DHCP data store is a control channel communication that is an out-of-band control channel connection established between a proxy that intercepts the DHCP broadcast message and the DHCP data store. 16. The machine readable medium of claim 5, wherein an agent serves as an intermediary between the proxy and the DHCP data store. 17. The machine readable medium of claim 1, wherein
the host devices each comprise at least one physical forwarding elements (PFEs); the PFEs collectively implement a plurality of logical forwarding elements (LFEs); wherein the DHCP configuration data is data that defines network attributes in one of the LFEs. 18. The machine readable medium of claim 1, wherein the program further comprises a set of instructions for formulating the broadcast message reply based on the reply from the controller. 19. The machine readable medium of claim 1, wherein the initiation of the VM comprises installation of the VM on the host. 20. The machine readable medium of claim 1, wherein the initiation of the VM comprises booting-up of the VM on the host. | 2,400 |
8,885 | 8,885 | 13,478,082 | 2,494 | Systems and methods for accessing account information are provided. For example, an indication to launch an application that may provide account information may be received. A determination may be made regarding whether the indication is an initial interaction with the application. If the indication is an initial interaction, one or more credentials may be received via an interface that may be displayed via the application. If the indication is not the initial interaction, a token may be accessed. A request that may include the credentials or token may then be generated and transmitted such that credentials or token may be used to authenticate a device that includes the application and a user thereof, a new token may be generated, and a response with the new token and/or account information may be transmitted. The account information may then be displayed by an interface of the application. | 1. A method for accessing account information on a device, the method comprising:
receiving an indication to launch an application configured to provide the account information at the device; determining, at the device, whether the received indication is an initial interaction with the application; accessing a token stored on the device if, based on the determination, the received indication is not the initial interaction with the application; and transmitting, via the device, a request comprising the token, wherein the token is configured to be used to authenticate the device and a user thereof for access to the account information without credentials being supplied by the user. 2. The method of claim 1, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 3. The method of claim 1, further comprising:
providing, on the device, a credential interface configured to receive one or more credentials if, based on the determination, the received indication is the initial interaction with the application; receiving, at the device, the one or more credentials via the credential interface; and transmitting, via the device, a request comprising the one or more credentials and an identifier associated with the device. 4. The method of claim 3, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 5. The method of claim 3, wherein the one or more credentials and the identifier associated with the device are configured to be used to authenticate the device and the user thereof for the initial interaction with the application for access to the account information and to generate the token based on the identifier associated with the device configured to be used for subsequent interactions. 6. The method of claim 1, further comprising:
receiving, at the device, a response comprising a new token and account information; and providing, on the device, an account information interface to display the account information. 7. The method of claim 1, wherein the account information comprises at least one of the following: an account balance; a credit limit; available credit; a last payment date; and a next payment date. 8. A method for accessing account information on a device, the method comprising:
receiving an indication to launch an application configured to provide account information at the device; determining, at the device, whether the received indication is an initial interaction with the application; providing a credential interface on the device configured to receive one or more credentials if, based on the determination, the received indication is the initial interaction with the application; receiving, at the device, the one or more credentials via the credential interface; and transmitting, via the device, a request comprising the one or more credentials and an identifier of the device, wherein the one or more credentials are configured to be used to authenticate the device and a user thereof for the initial interaction with the application for access to the account information and to generate a token associated with the identifier of the device configured to be used to authenticate the device and the user thereof during subsequent interactions with the application for access to the account information without an additional credential being supplied by the user. 9. The method of claim 8, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 10. The method of claim 8, further comprising:
accessing, via the device, a token stored on the device if, based on the determination, the received indication is not the initial interaction with the application; and transmitting, via the device, a request comprising the token, wherein the token is configured to be used to authenticate the device and a user thereof for access to the account information without credentials being supplied by the user. 11. The method of claim 10, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 12. The method of claim 8, further comprising:
receiving, at the device, a response comprising a new token and account information; and providing, on the device, an account information interface to display the account information. 13. The method of claim 12, wherein the token and new token are based on a secure hash algorithm 1 (SHA-1) hashing function. 14. The method of claim 8, wherein the account information comprises at least one of the following: an account balance; a credit limit; available credit; a last payment date; and a next payment date. 15. A system for accessing account information, the system comprising:
a processor configured to:
receive a request from a device;
determine whether the request comprises a token;
authenticate the device and a user thereof based on the token to provide access to the account information when the request comprises the token;
generate a new token when the device and the user thereof are authenticated with the token received in the request, wherein the new token is configured to be used to authenticate the device and the user thereof without credentials being supplied by the user during subsequent interactions with an application that provides the account information; and
transmit a response to the received request comprising the new token and the account information. 16. The system of claim 15, wherein the processor is further configured to encrypt the new token. 17. The system of claim 16, wherein the new token is encrypted using an AES 1024 key and a base 64. 18. The system of claim 15, wherein the token and new token are generated based on at least one of the following: a date, a time, a customer identifier, a device identifier, and a random number. 19. The system of claim 18, wherein the request comprises at a credential and the device identifier, and wherein the processor is further configured to:
authenticate the device and the user thereof based on the credential when the request does not comprise the token; and generate the new token associated with the device identifier when the device and the user thereof are authenticated with the credential received in the request. 20. The system of claim 15, wherein the account information comprises at least one of the following: an account balance; a credit limit; available credit; a last payment date; and a next payment date. | Systems and methods for accessing account information are provided. For example, an indication to launch an application that may provide account information may be received. A determination may be made regarding whether the indication is an initial interaction with the application. If the indication is an initial interaction, one or more credentials may be received via an interface that may be displayed via the application. If the indication is not the initial interaction, a token may be accessed. A request that may include the credentials or token may then be generated and transmitted such that credentials or token may be used to authenticate a device that includes the application and a user thereof, a new token may be generated, and a response with the new token and/or account information may be transmitted. The account information may then be displayed by an interface of the application.1. A method for accessing account information on a device, the method comprising:
receiving an indication to launch an application configured to provide the account information at the device; determining, at the device, whether the received indication is an initial interaction with the application; accessing a token stored on the device if, based on the determination, the received indication is not the initial interaction with the application; and transmitting, via the device, a request comprising the token, wherein the token is configured to be used to authenticate the device and a user thereof for access to the account information without credentials being supplied by the user. 2. The method of claim 1, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 3. The method of claim 1, further comprising:
providing, on the device, a credential interface configured to receive one or more credentials if, based on the determination, the received indication is the initial interaction with the application; receiving, at the device, the one or more credentials via the credential interface; and transmitting, via the device, a request comprising the one or more credentials and an identifier associated with the device. 4. The method of claim 3, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 5. The method of claim 3, wherein the one or more credentials and the identifier associated with the device are configured to be used to authenticate the device and the user thereof for the initial interaction with the application for access to the account information and to generate the token based on the identifier associated with the device configured to be used for subsequent interactions. 6. The method of claim 1, further comprising:
receiving, at the device, a response comprising a new token and account information; and providing, on the device, an account information interface to display the account information. 7. The method of claim 1, wherein the account information comprises at least one of the following: an account balance; a credit limit; available credit; a last payment date; and a next payment date. 8. A method for accessing account information on a device, the method comprising:
receiving an indication to launch an application configured to provide account information at the device; determining, at the device, whether the received indication is an initial interaction with the application; providing a credential interface on the device configured to receive one or more credentials if, based on the determination, the received indication is the initial interaction with the application; receiving, at the device, the one or more credentials via the credential interface; and transmitting, via the device, a request comprising the one or more credentials and an identifier of the device, wherein the one or more credentials are configured to be used to authenticate the device and a user thereof for the initial interaction with the application for access to the account information and to generate a token associated with the identifier of the device configured to be used to authenticate the device and the user thereof during subsequent interactions with the application for access to the account information without an additional credential being supplied by the user. 9. The method of claim 8, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 10. The method of claim 8, further comprising:
accessing, via the device, a token stored on the device if, based on the determination, the received indication is not the initial interaction with the application; and transmitting, via the device, a request comprising the token, wherein the token is configured to be used to authenticate the device and a user thereof for access to the account information without credentials being supplied by the user. 11. The method of claim 10, wherein the request comprises a Hypertext Transfer Protocol (HTTP) POST request. 12. The method of claim 8, further comprising:
receiving, at the device, a response comprising a new token and account information; and providing, on the device, an account information interface to display the account information. 13. The method of claim 12, wherein the token and new token are based on a secure hash algorithm 1 (SHA-1) hashing function. 14. The method of claim 8, wherein the account information comprises at least one of the following: an account balance; a credit limit; available credit; a last payment date; and a next payment date. 15. A system for accessing account information, the system comprising:
a processor configured to:
receive a request from a device;
determine whether the request comprises a token;
authenticate the device and a user thereof based on the token to provide access to the account information when the request comprises the token;
generate a new token when the device and the user thereof are authenticated with the token received in the request, wherein the new token is configured to be used to authenticate the device and the user thereof without credentials being supplied by the user during subsequent interactions with an application that provides the account information; and
transmit a response to the received request comprising the new token and the account information. 16. The system of claim 15, wherein the processor is further configured to encrypt the new token. 17. The system of claim 16, wherein the new token is encrypted using an AES 1024 key and a base 64. 18. The system of claim 15, wherein the token and new token are generated based on at least one of the following: a date, a time, a customer identifier, a device identifier, and a random number. 19. The system of claim 18, wherein the request comprises at a credential and the device identifier, and wherein the processor is further configured to:
authenticate the device and the user thereof based on the credential when the request does not comprise the token; and generate the new token associated with the device identifier when the device and the user thereof are authenticated with the credential received in the request. 20. The system of claim 15, wherein the account information comprises at least one of the following: an account balance; a credit limit; available credit; a last payment date; and a next payment date. | 2,400 |
8,886 | 8,886 | 14,969,834 | 2,416 | In one embodiment, a system comprises logic to receive a data packet. The logic is further to identify, based on the data packet, a plurality of candidate rules. The candidate rules may comprise a first candidate rule from a first database of rules and a second candidate rule from a second database of rules. The logic is further to select a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet. The rule specifies at least one action to be performed on the data packet. | 1. A system comprising:
logic comprising at least one logic gate, the logic to:
receive a data packet;
identify, based on the data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and
select a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 2. The system of claim 1, further comprising a first random access memory comprising the first database of rules and a second random access memory comprising the second database of rules. 3. The system of claim 2, further comprising a content addressable memory to store a third database of rules and wherein the plurality of candidate rules comprises a third rule identified from the third database of rules. 4. The system of claim 1, wherein the logic is further to:
calculate an index based on the data packet; and identify the first candidate rule from the first database of rules based on the index. 5. The system of claim 4, wherein calculating the index based on the data packet comprises applying a bitwise mask to the data packet. 6. The system of claim 4, wherein calculating the index based on the data packet comprises calculating a hash value based on the data packet. 7. The system of claim 4, wherein the logic is further to:
access a table of indices based on the calculated index to obtain one or more second indices; and access the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 8. The system of claim 4, wherein the logic is further to:
access a table of cages based on the calculated index, wherein a cage comprises an array of elements, an element comprising an index to a rule and a preliminary function that indicates whether it is possible for the rule to match the data packet; and wherein the first candidate rule is identified based on a determination that a preliminary function of a cage indicates that it is possible for the first candidate rule to match the data packet. 9. The system of claim 4, wherein the logic is further to calculate the index using a mask based index function comprising:
a masking unit that performs a bitwise AND operation between the data packet and a mask; and a plurality of compression units, a compression unit to compute a hash based at least in part on a portion of an output of the masking unit. 10. The system of claim 7, wherein the table of indices comprises a plurality of entries, an entry of the plurality of entries corresponds to an index that may be calculated based on the data packet, and at least one entry of the plurality of entries comprises a plurality of second indices. 11. The system of claim 1, wherein the plurality of candidate rules comprise a plurality of rules selected from the first database of rules based on distinct indexes computed based on the data packet. 12. The system of claim 1, wherein the logic is further to distribute a majority of a plurality of rules among a plurality of databases of rules stored in random access memories and to assign the remaining rules of the plurality of rules to a content addressable memory. 13. The system of claim 1, wherein the logic is further to perform, on the data packet, the action specified by the selected rule. 14. A method comprising:
receiving a data packet; identifying, based on the data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and selecting a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 15. The method of claim 14, further comprising:
calculating an index based on the data packet; and identifying the first candidate rule from the first database of rules based on the index. 16. The method of claim 15, further comprising:
accessing a table of indices based on the calculated index to obtain one or more second indices; and accessing the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 17. The method of claim 14, further comprising distributing a majority of a plurality of rules among a plurality of databases of rules to be stored in random access memories and assigning the remaining rules of the plurality of rules to a content addressable memory. 18. At least one machine readable storage medium having instructions stored thereon, the instructions when executed by a machine to cause the machine to:
receive a data packet; identify, based on the data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and select a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 19. The medium of claim 18, the instructions when executed by the machine to further cause the machine to:
calculate an index based on the data packet; and identify the first candidate rule from the first database of rules based on the index. 20. The medium of claim 19, the instructions when executed by the machine to further cause the machine to:
access a table of indices based on the calculated index to obtain one or more second indices; and access the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 21. The medium of claim 18, the instructions when executed by the machine to further cause the machine to distribute a majority of a plurality of rules among a plurality of databases of rules to be stored in random access memories and to assign the remaining rules of the plurality of rules to a content addressable memory. 22. An apparatus comprising:
means for identifying, based on a received data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and means for selecting a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 23. The apparatus of claim 22, further comprising:
means for calculating an index based on the data packet; and means for identifying the first candidate rule from the first database of rules based on the index. 24. The apparatus of claim 23, further comprising:
means for accessing a table of indices based on the calculated index to obtain one or more second indices; and means for accessing the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 25. The apparatus of claim 22, further comprising means for distributing a majority of a plurality of rules among a plurality of databases of rules to be stored in random access memories and for assigning the remaining rules of the plurality of rules to a content addressable memory. | In one embodiment, a system comprises logic to receive a data packet. The logic is further to identify, based on the data packet, a plurality of candidate rules. The candidate rules may comprise a first candidate rule from a first database of rules and a second candidate rule from a second database of rules. The logic is further to select a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet. The rule specifies at least one action to be performed on the data packet.1. A system comprising:
logic comprising at least one logic gate, the logic to:
receive a data packet;
identify, based on the data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and
select a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 2. The system of claim 1, further comprising a first random access memory comprising the first database of rules and a second random access memory comprising the second database of rules. 3. The system of claim 2, further comprising a content addressable memory to store a third database of rules and wherein the plurality of candidate rules comprises a third rule identified from the third database of rules. 4. The system of claim 1, wherein the logic is further to:
calculate an index based on the data packet; and identify the first candidate rule from the first database of rules based on the index. 5. The system of claim 4, wherein calculating the index based on the data packet comprises applying a bitwise mask to the data packet. 6. The system of claim 4, wherein calculating the index based on the data packet comprises calculating a hash value based on the data packet. 7. The system of claim 4, wherein the logic is further to:
access a table of indices based on the calculated index to obtain one or more second indices; and access the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 8. The system of claim 4, wherein the logic is further to:
access a table of cages based on the calculated index, wherein a cage comprises an array of elements, an element comprising an index to a rule and a preliminary function that indicates whether it is possible for the rule to match the data packet; and wherein the first candidate rule is identified based on a determination that a preliminary function of a cage indicates that it is possible for the first candidate rule to match the data packet. 9. The system of claim 4, wherein the logic is further to calculate the index using a mask based index function comprising:
a masking unit that performs a bitwise AND operation between the data packet and a mask; and a plurality of compression units, a compression unit to compute a hash based at least in part on a portion of an output of the masking unit. 10. The system of claim 7, wherein the table of indices comprises a plurality of entries, an entry of the plurality of entries corresponds to an index that may be calculated based on the data packet, and at least one entry of the plurality of entries comprises a plurality of second indices. 11. The system of claim 1, wherein the plurality of candidate rules comprise a plurality of rules selected from the first database of rules based on distinct indexes computed based on the data packet. 12. The system of claim 1, wherein the logic is further to distribute a majority of a plurality of rules among a plurality of databases of rules stored in random access memories and to assign the remaining rules of the plurality of rules to a content addressable memory. 13. The system of claim 1, wherein the logic is further to perform, on the data packet, the action specified by the selected rule. 14. A method comprising:
receiving a data packet; identifying, based on the data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and selecting a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 15. The method of claim 14, further comprising:
calculating an index based on the data packet; and identifying the first candidate rule from the first database of rules based on the index. 16. The method of claim 15, further comprising:
accessing a table of indices based on the calculated index to obtain one or more second indices; and accessing the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 17. The method of claim 14, further comprising distributing a majority of a plurality of rules among a plurality of databases of rules to be stored in random access memories and assigning the remaining rules of the plurality of rules to a content addressable memory. 18. At least one machine readable storage medium having instructions stored thereon, the instructions when executed by a machine to cause the machine to:
receive a data packet; identify, based on the data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and select a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 19. The medium of claim 18, the instructions when executed by the machine to further cause the machine to:
calculate an index based on the data packet; and identify the first candidate rule from the first database of rules based on the index. 20. The medium of claim 19, the instructions when executed by the machine to further cause the machine to:
access a table of indices based on the calculated index to obtain one or more second indices; and access the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 21. The medium of claim 18, the instructions when executed by the machine to further cause the machine to distribute a majority of a plurality of rules among a plurality of databases of rules to be stored in random access memories and to assign the remaining rules of the plurality of rules to a content addressable memory. 22. An apparatus comprising:
means for identifying, based on a received data packet, a plurality of candidate rules, the candidate rules comprising a first candidate rule from a first database of rules and a second candidate rule from a second database of rules; and means for selecting a rule from among the plurality of candidate rules based on a priority associated with the rule and a determination that the rule matches the data packet, the rule specifying at least one action to be performed on the data packet. 23. The apparatus of claim 22, further comprising:
means for calculating an index based on the data packet; and means for identifying the first candidate rule from the first database of rules based on the index. 24. The apparatus of claim 23, further comprising:
means for accessing a table of indices based on the calculated index to obtain one or more second indices; and means for accessing the first database of rules based on the one or more second indices to identify at least one candidate rule of the plurality of candidate rules. 25. The apparatus of claim 22, further comprising means for distributing a majority of a plurality of rules among a plurality of databases of rules to be stored in random access memories and for assigning the remaining rules of the plurality of rules to a content addressable memory. | 2,400 |
8,887 | 8,887 | 16,035,811 | 2,476 | A wireless communication method using a plurality of antennas performed by a controller, the wireless communication method including obtaining a target transmission power level and beam forming information, determining at least one inactive antenna from among the plurality of antennas, based on the target transmission power level and the beam forming information, and controlling transmission signals provided to the plurality of antennas such that transmission via the at least one inactive antenna does not occur. | 1. A wireless communication method using a plurality of antennas performed by a controller, the wireless communication method comprising:
obtaining a target transmission power level and beam forming information; determining at least one inactive antenna from among the plurality of antennas, based on the target transmission power level and the beam forming information; and controlling transmission signals provided to the plurality of antennas such that transmission via the at least one inactive antenna does not occur. 2. The wireless communication method of claim 1, wherein the obtaining comprises receiving information the target transmission power level via at least one of the plurality of antennas. 3. The wireless communication method of claim 1, wherein the obtaining comprises calculating the target transmission power level based on a signal received via at least one of the plurality of antennas. 4. The wireless communication method of claim 1, wherein the beam forming information comprises respective phases of a plurality of transmission signals to be output via corresponding antennas of the plurality of antennas for transmitting a beam in a first direction. 5. The wireless communication method of claim 4, further comprising:
controlling each of a plurality of active antennas from among the plurality of antennas to output a respective transmission signal having a first transmission power, wherein the determining the at least one inactive antenna includes determining a number of inactive antennas based on the target transmission power level and the first transmission power. 6. The wireless communication method of claim 5, wherein the determining the at least one inactive antenna further comprises:
calculating a beam error from a first beam gain and a second beam gain, the first beam gain being based on the beam forming information, and the second beam gain being based on the number of inactive antennas; and determining the at least one inactive antenna based on the beam error. 7. The wireless communication method of claim 6, wherein the calculating the beam error comprises integrating a difference between the first beam gain and the second beam gain in a beam space. 8. The wireless communication method of claim 7, wherein
the beam space is configured with quantized directions, and the beam error is a sum of differences between the first beam gain and the second beam gain, the differences respectively corresponding to the quantized directions. 9. The wireless communication method of claim 7, wherein the beam space is defined as a range that is between a second direction and a third direction and includes the first direction. 10. The wireless communication method of claim 5, wherein the determining the at least one inactive antenna further comprises:
referring to one or more patterns of inactive antennas defined according to the number of inactive antennas; and determining the at least one inactive antenna based on the one or more patterns of inactive antennas. 11. The wireless communication method of claim 10, wherein each of the one or more patterns of inactive antennas defines at least one outermost antenna from among the plurality of antennas as being inactive. 12. The wireless communication method of claim 11, wherein the one or more patterns of inactive antennas include a pattern defining at least one antenna arranged as a second outermost antenna with respect to the at least one outermost antenna as being inactive. 13. The wireless communication method of claim 4, wherein the beam forming information further comprises respective transmission powers of the plurality of transmission signals to be used for transmitting the beam in the first direction. 14. The wireless communication method of claim 13, wherein
the determining the at least one inactive antenna comprises sequentially determining the at least one inactive antenna according to a defined rule and the respective transmission powers of the plurality of transmission signals, and the defined rule specifies that at least one outermost antenna from among a plurality of active antennas of the plurality of antennas is inactivated. 15. The wireless communication method of claim 14, wherein the determining the at least one inactive antenna comprises:
determining the at least one inactive antenna to include a particular outermost antenna from among a plurality of outermost antennas of the plurality of active antennas such that a remaining transmission power when the particular outermost antenna is inactive is closest to the target transmission power level; and determining whether to terminate the determining the at least one inactive antenna based on the remaining transmission power and the target transmission power level. 16. The wireless communication method of claim 1, further comprising:
obtaining blockage information of the plurality of antennas, wherein the determining the at least one inactive antenna includes determining the at least one inactive antenna further based on the blockage information. 17. An apparatus for controlling a plurality of antennas, the apparatus comprising:
a phase controller configured to generate a phase control signal for controlling respective phases of a plurality of transmission signals output via the plurality of antennas to transmit a beam in a first direction; and a power controller configured to
generate a power control signal for controlling respective transmission powers of the plurality of transmission signals, and
selectively inactivate one or more antennas of the plurality of antennas based on a target transmission power level and the respective phases. 18. The apparatus of claim 17, wherein the power controller is configured to:
control each of the respective transmission powers to be equal to a first transmission power, and determine a number of the one or more antennas to be selectively inactivated based on the target transmission power level and the first transmission power. 19. (canceled) 20. (canceled) 21. The apparatus of claim 17, wherein the power controller is configured to generate the power control signal based on the first direction. 22. (canceled) 23. (canceled) 24. A wireless communication equipment comprising:
an antenna array including a plurality of antennas; a plurality of phase shifters configured to adjust respective phases of a plurality of transmission signals output via the plurality of antennas; a plurality of power amplifiers configured to adjust respective transmission powers of the plurality of transmission signals; and a controller configured to
control the plurality of phase shifters, and
control the plurality of power amplifiers such that one or more antennas among the plurality of antennas is selectively inactivated based on a target transmission power level and beam forming information. 25.-32. (canceled) | A wireless communication method using a plurality of antennas performed by a controller, the wireless communication method including obtaining a target transmission power level and beam forming information, determining at least one inactive antenna from among the plurality of antennas, based on the target transmission power level and the beam forming information, and controlling transmission signals provided to the plurality of antennas such that transmission via the at least one inactive antenna does not occur.1. A wireless communication method using a plurality of antennas performed by a controller, the wireless communication method comprising:
obtaining a target transmission power level and beam forming information; determining at least one inactive antenna from among the plurality of antennas, based on the target transmission power level and the beam forming information; and controlling transmission signals provided to the plurality of antennas such that transmission via the at least one inactive antenna does not occur. 2. The wireless communication method of claim 1, wherein the obtaining comprises receiving information the target transmission power level via at least one of the plurality of antennas. 3. The wireless communication method of claim 1, wherein the obtaining comprises calculating the target transmission power level based on a signal received via at least one of the plurality of antennas. 4. The wireless communication method of claim 1, wherein the beam forming information comprises respective phases of a plurality of transmission signals to be output via corresponding antennas of the plurality of antennas for transmitting a beam in a first direction. 5. The wireless communication method of claim 4, further comprising:
controlling each of a plurality of active antennas from among the plurality of antennas to output a respective transmission signal having a first transmission power, wherein the determining the at least one inactive antenna includes determining a number of inactive antennas based on the target transmission power level and the first transmission power. 6. The wireless communication method of claim 5, wherein the determining the at least one inactive antenna further comprises:
calculating a beam error from a first beam gain and a second beam gain, the first beam gain being based on the beam forming information, and the second beam gain being based on the number of inactive antennas; and determining the at least one inactive antenna based on the beam error. 7. The wireless communication method of claim 6, wherein the calculating the beam error comprises integrating a difference between the first beam gain and the second beam gain in a beam space. 8. The wireless communication method of claim 7, wherein
the beam space is configured with quantized directions, and the beam error is a sum of differences between the first beam gain and the second beam gain, the differences respectively corresponding to the quantized directions. 9. The wireless communication method of claim 7, wherein the beam space is defined as a range that is between a second direction and a third direction and includes the first direction. 10. The wireless communication method of claim 5, wherein the determining the at least one inactive antenna further comprises:
referring to one or more patterns of inactive antennas defined according to the number of inactive antennas; and determining the at least one inactive antenna based on the one or more patterns of inactive antennas. 11. The wireless communication method of claim 10, wherein each of the one or more patterns of inactive antennas defines at least one outermost antenna from among the plurality of antennas as being inactive. 12. The wireless communication method of claim 11, wherein the one or more patterns of inactive antennas include a pattern defining at least one antenna arranged as a second outermost antenna with respect to the at least one outermost antenna as being inactive. 13. The wireless communication method of claim 4, wherein the beam forming information further comprises respective transmission powers of the plurality of transmission signals to be used for transmitting the beam in the first direction. 14. The wireless communication method of claim 13, wherein
the determining the at least one inactive antenna comprises sequentially determining the at least one inactive antenna according to a defined rule and the respective transmission powers of the plurality of transmission signals, and the defined rule specifies that at least one outermost antenna from among a plurality of active antennas of the plurality of antennas is inactivated. 15. The wireless communication method of claim 14, wherein the determining the at least one inactive antenna comprises:
determining the at least one inactive antenna to include a particular outermost antenna from among a plurality of outermost antennas of the plurality of active antennas such that a remaining transmission power when the particular outermost antenna is inactive is closest to the target transmission power level; and determining whether to terminate the determining the at least one inactive antenna based on the remaining transmission power and the target transmission power level. 16. The wireless communication method of claim 1, further comprising:
obtaining blockage information of the plurality of antennas, wherein the determining the at least one inactive antenna includes determining the at least one inactive antenna further based on the blockage information. 17. An apparatus for controlling a plurality of antennas, the apparatus comprising:
a phase controller configured to generate a phase control signal for controlling respective phases of a plurality of transmission signals output via the plurality of antennas to transmit a beam in a first direction; and a power controller configured to
generate a power control signal for controlling respective transmission powers of the plurality of transmission signals, and
selectively inactivate one or more antennas of the plurality of antennas based on a target transmission power level and the respective phases. 18. The apparatus of claim 17, wherein the power controller is configured to:
control each of the respective transmission powers to be equal to a first transmission power, and determine a number of the one or more antennas to be selectively inactivated based on the target transmission power level and the first transmission power. 19. (canceled) 20. (canceled) 21. The apparatus of claim 17, wherein the power controller is configured to generate the power control signal based on the first direction. 22. (canceled) 23. (canceled) 24. A wireless communication equipment comprising:
an antenna array including a plurality of antennas; a plurality of phase shifters configured to adjust respective phases of a plurality of transmission signals output via the plurality of antennas; a plurality of power amplifiers configured to adjust respective transmission powers of the plurality of transmission signals; and a controller configured to
control the plurality of phase shifters, and
control the plurality of power amplifiers such that one or more antennas among the plurality of antennas is selectively inactivated based on a target transmission power level and beam forming information. 25.-32. (canceled) | 2,400 |
8,888 | 8,888 | 16,167,176 | 2,492 | Techniques are disclosed for improving user experience of multimedia streaming over computer networks. More specifically, techniques presented herein reduce (or eliminate) latency in playback start time for streaming digital media content resulting from digital rights management (DRM) authorizations. A streaming media client (e.g., a browser, set-top box, mobile telephone or tablet “app”) may request a “fast-expiring” license for titles the streaming media client predicts a user is likely to begin streaming. A fast-expiring license is a DRM license (and associated decryption key) which is valid for only a very limited time after being used for playback. During the validity period of such a license, the client device requests a “normal” or “regular” license to continue accessing the title after the fast-expiring license expires. | 1. A computer-implemented method, comprising:
presenting, in a streaming media interface, a set of one or more media titles available for streaming from a library of media titles; prior to receiving, from a user interacting with the streaming media interface, a request to stream a first media title from the library, sending a request for a fast-expiring license for the first media title, wherein the fast-expiring license is valid for a fixed time interval after playback of the first media title begins, wherein the fixed interval is less than a playback time of the first media title, and wherein the first media title is predicted to be a next selected media title for streaming; receiving the requested fast-expiring license; and in response to receiving, from the user interacting with the streaming media interface, the request to stream the first media title:
retrieving an encrypted first portion of the first media title,
decrypting the encrypted first portion using a key associated with the fast-expiring license, and
initiating playback of the first portion of the first media title on the streaming media interface. 2. The computer-implemented method of claim 1, further comprising, prior to receiving the request to stream the first media title from the library, sending a request for metadata describing a file storing the first media title. 3. The computer-implemented method of claim 1, wherein the first portion of the first media title resides at a point within the first media title reached during a prior streaming session involving the first media title. 4. The computer-implemented method of claim 1, further comprising, after receiving the request to stream the first media title:
generating a request for a DRM license to access the first media title; and sending the request for the DRM license to a streaming media service. 5. The computer-implemented method of claim 4, further comprising, prior to the end of the fixed time interval:
receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license. 6. The computer-implemented method of claim 1, further comprising sending a request for at least a second fast-expiring license associated with at least a second media title included in the set of one or more media titles. 7. The computer-implemented method of claim 1, further comprising:
after receiving the request to stream the first media title, generating a request for a DRM license to access the first media title, and sending the request to a streaming media service; prior to the end of the fixed time interval, receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license; and sending a request for at least a second fast-expiring license associated with at least a second included in the set of one or more media titles. 8. A non-transitory computer-readable medium including instructions that, when executed by a processor, cause the processor to perform the steps of:
presenting, in a streaming media interface, a set of one or more media titles available for streaming from a library of media titles; prior to receiving, from a user interacting with the streaming media interface, a request to stream a first media title from the library, sending a request for a fast-expiring license for the first media title, wherein the fast-expiring license is valid for a fixed time interval after playback of the first media title begins, wherein the fixed interval is less than a playback time of the first media title, and wherein the first media title is predicted to be a next selected media title for streaming; receiving the requested fast-expiring license; and in response to receiving, from the user interacting with the streaming media interface, the request to stream the first media title:
retrieving an encrypted first portion of the first media title,
decrypting the encrypted first portion using a key associated with the fast-expiring license, and
initiating playback of the first portion of the first media title on the streaming media interface. 9. The non-transitory computer-readable medium of claim 8, further comprising, prior to receiving the request to stream the first media title from the library, sending a request for metadata describing a file storing the first media title. 10. The non-transitory computer-readable medium of claim 8, wherein the first portion of the first media title resides at a point within the first media title reached during a prior streaming session involving the first media title. 11. The non-transitory computer-readable medium of claim 8, further comprising, after receiving the request to stream the first media title:
generating a request for a DRM license to access the first media title; and sending the request for the DRM license to a streaming media service. 12. The non-transitory computer-readable medium of claim 11, further comprising, prior to the end of the fixed time interval:
receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license. 13. The non-transitory computer-readable medium of claim 8, further comprising sending a request for at least a second fast-expiring license associated with at least a second media title included in the set of one or more media titles. 14. The non-transitory computer-readable medium of claim 8, further comprising:
after receiving the request to stream the first media title, generating a request for a DRM license to access the first media title, and sending the request to a streaming media service; prior to the end of the fixed time interval, receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license; and sending a request for at least a second fast-expiring license associated with at least a second included in the set of one or more media titles. 15. A system, comprising:
a memory including instructions; and a processor that is coupled to the memory and, when executing the instructions, is configured to:
present, in a streaming media interface, a set of one or more media titles available for streaming from a library of media titles;
prior to receiving, from a user interacting with the streaming media interface, a request to stream a first media title from the library, send a request for a fast-expiring license for the first media title, wherein the fast-expiring license is valid for a fixed time interval after playback of the first media title begins, wherein the fixed interval is less than a playback time of the first media title, and wherein the first media title is predicted to be a next selected media title for streaming;
receive the requested fast-expiring license; and
in response to receiving, from the user interacting with the streaming media interface, the request to stream the first media title:
retrieve an encrypted first portion of the first media title,
decrypt the encrypted first portion using a key associated with the fast-expiring license, and
initiate playback of the first portion of the first media title on the streaming media interface. 16. The system of claim 15, wherein the processor is further configured to, prior to receiving the request to stream the first media title from the library, send a request for metadata describing a file storing the first media title. 17. The system of claim 15, wherein the first portion of the first media title resides at a point within the first media title reached during a prior streaming session involving the first media title. 18. The system of claim 15, wherein the processor is further configured to, after receiving the request to stream the first media title:
generate a request for a DRM license to access the first media title; and send the request for the DRM license to a streaming media service. 19. The system of claim 18, wherein the processor is further configured to, prior to the end of the fixed time interval:
receive the DRM license, and access portions of the first media title using a key associated with the DRM license. 20. The system of claim 15, wherein the processor is further configured to send a request for at least a second fast-expiring license associated with at least a second media title included in the set of one or more media titles. 21. The system of claim 15, wherein the processor is further configured to:
after receiving the request to stream the first media title, generate a request for a DRM license to access the first media title, and sending the request to a streaming media service; prior to the end of the fixed time interval, receive the DRM license, and accessing portions of the first media title using a key associated with the DRM license; and send a request for at least a second fast-expiring license associated with at least a second included in the set of one or more media titles. | Techniques are disclosed for improving user experience of multimedia streaming over computer networks. More specifically, techniques presented herein reduce (or eliminate) latency in playback start time for streaming digital media content resulting from digital rights management (DRM) authorizations. A streaming media client (e.g., a browser, set-top box, mobile telephone or tablet “app”) may request a “fast-expiring” license for titles the streaming media client predicts a user is likely to begin streaming. A fast-expiring license is a DRM license (and associated decryption key) which is valid for only a very limited time after being used for playback. During the validity period of such a license, the client device requests a “normal” or “regular” license to continue accessing the title after the fast-expiring license expires.1. A computer-implemented method, comprising:
presenting, in a streaming media interface, a set of one or more media titles available for streaming from a library of media titles; prior to receiving, from a user interacting with the streaming media interface, a request to stream a first media title from the library, sending a request for a fast-expiring license for the first media title, wherein the fast-expiring license is valid for a fixed time interval after playback of the first media title begins, wherein the fixed interval is less than a playback time of the first media title, and wherein the first media title is predicted to be a next selected media title for streaming; receiving the requested fast-expiring license; and in response to receiving, from the user interacting with the streaming media interface, the request to stream the first media title:
retrieving an encrypted first portion of the first media title,
decrypting the encrypted first portion using a key associated with the fast-expiring license, and
initiating playback of the first portion of the first media title on the streaming media interface. 2. The computer-implemented method of claim 1, further comprising, prior to receiving the request to stream the first media title from the library, sending a request for metadata describing a file storing the first media title. 3. The computer-implemented method of claim 1, wherein the first portion of the first media title resides at a point within the first media title reached during a prior streaming session involving the first media title. 4. The computer-implemented method of claim 1, further comprising, after receiving the request to stream the first media title:
generating a request for a DRM license to access the first media title; and sending the request for the DRM license to a streaming media service. 5. The computer-implemented method of claim 4, further comprising, prior to the end of the fixed time interval:
receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license. 6. The computer-implemented method of claim 1, further comprising sending a request for at least a second fast-expiring license associated with at least a second media title included in the set of one or more media titles. 7. The computer-implemented method of claim 1, further comprising:
after receiving the request to stream the first media title, generating a request for a DRM license to access the first media title, and sending the request to a streaming media service; prior to the end of the fixed time interval, receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license; and sending a request for at least a second fast-expiring license associated with at least a second included in the set of one or more media titles. 8. A non-transitory computer-readable medium including instructions that, when executed by a processor, cause the processor to perform the steps of:
presenting, in a streaming media interface, a set of one or more media titles available for streaming from a library of media titles; prior to receiving, from a user interacting with the streaming media interface, a request to stream a first media title from the library, sending a request for a fast-expiring license for the first media title, wherein the fast-expiring license is valid for a fixed time interval after playback of the first media title begins, wherein the fixed interval is less than a playback time of the first media title, and wherein the first media title is predicted to be a next selected media title for streaming; receiving the requested fast-expiring license; and in response to receiving, from the user interacting with the streaming media interface, the request to stream the first media title:
retrieving an encrypted first portion of the first media title,
decrypting the encrypted first portion using a key associated with the fast-expiring license, and
initiating playback of the first portion of the first media title on the streaming media interface. 9. The non-transitory computer-readable medium of claim 8, further comprising, prior to receiving the request to stream the first media title from the library, sending a request for metadata describing a file storing the first media title. 10. The non-transitory computer-readable medium of claim 8, wherein the first portion of the first media title resides at a point within the first media title reached during a prior streaming session involving the first media title. 11. The non-transitory computer-readable medium of claim 8, further comprising, after receiving the request to stream the first media title:
generating a request for a DRM license to access the first media title; and sending the request for the DRM license to a streaming media service. 12. The non-transitory computer-readable medium of claim 11, further comprising, prior to the end of the fixed time interval:
receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license. 13. The non-transitory computer-readable medium of claim 8, further comprising sending a request for at least a second fast-expiring license associated with at least a second media title included in the set of one or more media titles. 14. The non-transitory computer-readable medium of claim 8, further comprising:
after receiving the request to stream the first media title, generating a request for a DRM license to access the first media title, and sending the request to a streaming media service; prior to the end of the fixed time interval, receiving the DRM license, and accessing portions of the first media title using a key associated with the DRM license; and sending a request for at least a second fast-expiring license associated with at least a second included in the set of one or more media titles. 15. A system, comprising:
a memory including instructions; and a processor that is coupled to the memory and, when executing the instructions, is configured to:
present, in a streaming media interface, a set of one or more media titles available for streaming from a library of media titles;
prior to receiving, from a user interacting with the streaming media interface, a request to stream a first media title from the library, send a request for a fast-expiring license for the first media title, wherein the fast-expiring license is valid for a fixed time interval after playback of the first media title begins, wherein the fixed interval is less than a playback time of the first media title, and wherein the first media title is predicted to be a next selected media title for streaming;
receive the requested fast-expiring license; and
in response to receiving, from the user interacting with the streaming media interface, the request to stream the first media title:
retrieve an encrypted first portion of the first media title,
decrypt the encrypted first portion using a key associated with the fast-expiring license, and
initiate playback of the first portion of the first media title on the streaming media interface. 16. The system of claim 15, wherein the processor is further configured to, prior to receiving the request to stream the first media title from the library, send a request for metadata describing a file storing the first media title. 17. The system of claim 15, wherein the first portion of the first media title resides at a point within the first media title reached during a prior streaming session involving the first media title. 18. The system of claim 15, wherein the processor is further configured to, after receiving the request to stream the first media title:
generate a request for a DRM license to access the first media title; and send the request for the DRM license to a streaming media service. 19. The system of claim 18, wherein the processor is further configured to, prior to the end of the fixed time interval:
receive the DRM license, and access portions of the first media title using a key associated with the DRM license. 20. The system of claim 15, wherein the processor is further configured to send a request for at least a second fast-expiring license associated with at least a second media title included in the set of one or more media titles. 21. The system of claim 15, wherein the processor is further configured to:
after receiving the request to stream the first media title, generate a request for a DRM license to access the first media title, and sending the request to a streaming media service; prior to the end of the fixed time interval, receive the DRM license, and accessing portions of the first media title using a key associated with the DRM license; and send a request for at least a second fast-expiring license associated with at least a second included in the set of one or more media titles. | 2,400 |
8,889 | 8,889 | 15,141,755 | 2,452 | An exemplary virtual reality media provider system (“system”) receives, from a media player device (“device”) by way of a network, a request for the device to provide a user with an immersive virtual reality experience. The system transmits, to the device by way of the network and in response to the request, a specification file corresponding to the immersive virtual reality experience. The specification file comprises data that defines a plurality of elements included in the immersive virtual reality experience, associates an event with a particular element included in the plurality of elements, and associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience. The device uses the specification file to provide the user with the immersive virtual reality experience. | 1. A method comprising:
receiving, by a virtual reality media provider system from a media player device by way of a network, a request for the media player device to provide a user with an immersive virtual reality experience; and transmitting, by the virtual reality media provider system to the media player device by way of the network and in response to the request, a specification file corresponding to the immersive virtual reality experience, the specification file comprising data that
defines a plurality of elements included in the immersive virtual reality experience by providing a plurality of links for use by the media player device in acquiring, by way of the network, the plurality of elements while providing the user with the immersive virtual reality experience,
associates an event with a particular element included in the plurality of elements, and
associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience. 2. The method of claim 1, wherein the specification file is readable by a plurality of different media player devices operating within a plurality of different platforms. 3. The method of claim 1, further comprising generating, by the virtual reality media provider system based on input provided by a virtual reality content creator, the specification file prior to transmitting the specification file to the media player device. 4. The method of claim 1, further comprising:
detecting, by the virtual reality media provider system while the media player device is providing the immersive virtual reality experience, an update that is to be made to the specification file that affects the immersive virtual reality experience being provided by the media player device at a future point in time; and dynamically updating, by the virtual reality media provider system in response to the detecting of the update and while the media player device is providing the immersive virtual reality experience, the specification file used by the media player device with the update. 5. The method of claim 1, wherein the transmitting of the specification file to the media player device comprises transmitting a text-based file to the media player device. 6. The method of claim 1, wherein the transmitting of the specification file comprises transmitting the specification file as binary data encoded into a video stream. 7. The method of claim 1, further comprising:
maintaining, by the virtual reality media provider system, a behavior library of pre-established and definable behaviors; and configuring, by the virtual reality media provider system, the media player device to be capable of performing each behavior included in the behavior library; wherein the behavior that is associated with the event that is associated with the particular element is included in the behavior library. 8. The method of claim 7, further comprising:
receiving, by the virtual reality media provider system, a request to create a new behavior that combines functionality of a subset of behaviors included in the behavior library; creating, by the virtual reality media provider system in response to the request, the new behavior; and adding, by the virtual reality media provider system, the new behavior to the behavior library. 9. The method of claim 7, further comprising:
receiving, by the virtual reality media provider system, a request to create a new behavior that is not based on a combination of a subset of behaviors included in the behavior library; creating, by the virtual reality media provider system in response to the request, the new behavior; adding, by the virtual reality media provider system, the new behavior to the behavior library; and reconfiguring, by the virtual reality media provider system, the media player device to be further capable of performing the new behavior. 10. The method of claim 1, further comprising:
maintaining, by the virtual reality media provider system, an event library of pre-established and definable events; and configuring, by the virtual reality media provider system, the media player device to be capable of detecting each event included in the event library; wherein the event that is associated with the particular element is included in the event library. 11. The method of claim 1, embodied as computer-executable instructions on at least one non-transitory computer-readable medium. 12. A method comprising:
transmitting, by a media player device, a request to a virtual reality media provider system by way of a network for the media player device to provide a user with an immersive virtual reality experience; receiving, by the media player device from the virtual reality media provider system in response to the request, a specification file corresponding to the immersive virtual reality experience, the specification file comprising data that
defines a plurality of elements included in the immersive virtual reality experience by providing a plurality of links for use by the media player device in acquiring, by way of the network, the plurality of elements while providing the user with the immersive virtual reality experience,
associates an event with a particular element included in the plurality of elements, and
associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience; and
using, by the media player device, the specification file to provide the user with the immersive virtual reality experience by
acquiring, based on a link included in the plurality of links and by way of the network, the particular element,
detecting the occurrence of the event that is associated with the particular element within the specification file, and
performing, in response to the detecting of the occurrence of the event, the behavior that is associated with the event in the specification file. 13. The method of claim 12, embodied as computer-executable instructions on at least one non-transitory computer-readable medium. 14. A system comprising:
at least one physical computing device that:
receives, from a media player device by way of a network, a request for the media player device to provide a user with an immersive virtual reality experience; and
transmits, to the media player device by way of the network and in response to the request, a specification file corresponding to the immersive virtual reality experience, the specification file comprising data that
defines a plurality of elements included in the immersive virtual reality experience by providing a plurality of links for use by the media player device in acquiring, by way of the network, the plurality of elements while providing the user with the immersive virtual reality experience,
associates an event with a particular element included in the plurality of elements, and
associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience. 15. The system of claim 14, wherein the specification file adheres to a data input format that is readable by a plurality of different media player devices operating within a plurality of different platforms. 16. The system of claim 14, wherein the at least one physical computing device:
detects, while the media player device is providing the immersive virtual reality experience, an update that is to be made to the specification file that will affect the immersive virtual reality experience being provided by the media player device at a future point in time; and dynamically updates, in response to the detection of the update and while the media player device is providing the immersive virtual reality experience, the specification file used by the media player device with the update. 17. The system of claim 14, wherein the at least one physical computing device transmits the specification file to the media player device by at least one of transmitting a text-based file to the media player device and transmitting the specification file as binary data encoded into a video stream. 18. The system of claim 14, wherein the at least one physical computing device:
maintains a behavior library of pre-established and definable behaviors; and configures the media player device to be capable of performing each behavior included in the behavior library; wherein the behavior that is associated with the event that is associated with the particular element is included in the behavior library. 19. The system of claim 18, wherein the at least one physical computing device:
receives a request to create a new behavior that combines functionality of a subset of behaviors included in the behavior library; creates, in response to the request, the new behavior; and adds the new behavior to the behavior library. 20. The system of claim 18, wherein the at least one physical computing device:
receives a request to create a new behavior that is not based on a combination of a subset of behaviors included in the behavior library; creates, in response to the request, the new behavior; adds the new behavior to the behavior library; and reconfigures the media player device to be further capable of performing the new behavior. | An exemplary virtual reality media provider system (“system”) receives, from a media player device (“device”) by way of a network, a request for the device to provide a user with an immersive virtual reality experience. The system transmits, to the device by way of the network and in response to the request, a specification file corresponding to the immersive virtual reality experience. The specification file comprises data that defines a plurality of elements included in the immersive virtual reality experience, associates an event with a particular element included in the plurality of elements, and associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience. The device uses the specification file to provide the user with the immersive virtual reality experience.1. A method comprising:
receiving, by a virtual reality media provider system from a media player device by way of a network, a request for the media player device to provide a user with an immersive virtual reality experience; and transmitting, by the virtual reality media provider system to the media player device by way of the network and in response to the request, a specification file corresponding to the immersive virtual reality experience, the specification file comprising data that
defines a plurality of elements included in the immersive virtual reality experience by providing a plurality of links for use by the media player device in acquiring, by way of the network, the plurality of elements while providing the user with the immersive virtual reality experience,
associates an event with a particular element included in the plurality of elements, and
associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience. 2. The method of claim 1, wherein the specification file is readable by a plurality of different media player devices operating within a plurality of different platforms. 3. The method of claim 1, further comprising generating, by the virtual reality media provider system based on input provided by a virtual reality content creator, the specification file prior to transmitting the specification file to the media player device. 4. The method of claim 1, further comprising:
detecting, by the virtual reality media provider system while the media player device is providing the immersive virtual reality experience, an update that is to be made to the specification file that affects the immersive virtual reality experience being provided by the media player device at a future point in time; and dynamically updating, by the virtual reality media provider system in response to the detecting of the update and while the media player device is providing the immersive virtual reality experience, the specification file used by the media player device with the update. 5. The method of claim 1, wherein the transmitting of the specification file to the media player device comprises transmitting a text-based file to the media player device. 6. The method of claim 1, wherein the transmitting of the specification file comprises transmitting the specification file as binary data encoded into a video stream. 7. The method of claim 1, further comprising:
maintaining, by the virtual reality media provider system, a behavior library of pre-established and definable behaviors; and configuring, by the virtual reality media provider system, the media player device to be capable of performing each behavior included in the behavior library; wherein the behavior that is associated with the event that is associated with the particular element is included in the behavior library. 8. The method of claim 7, further comprising:
receiving, by the virtual reality media provider system, a request to create a new behavior that combines functionality of a subset of behaviors included in the behavior library; creating, by the virtual reality media provider system in response to the request, the new behavior; and adding, by the virtual reality media provider system, the new behavior to the behavior library. 9. The method of claim 7, further comprising:
receiving, by the virtual reality media provider system, a request to create a new behavior that is not based on a combination of a subset of behaviors included in the behavior library; creating, by the virtual reality media provider system in response to the request, the new behavior; adding, by the virtual reality media provider system, the new behavior to the behavior library; and reconfiguring, by the virtual reality media provider system, the media player device to be further capable of performing the new behavior. 10. The method of claim 1, further comprising:
maintaining, by the virtual reality media provider system, an event library of pre-established and definable events; and configuring, by the virtual reality media provider system, the media player device to be capable of detecting each event included in the event library; wherein the event that is associated with the particular element is included in the event library. 11. The method of claim 1, embodied as computer-executable instructions on at least one non-transitory computer-readable medium. 12. A method comprising:
transmitting, by a media player device, a request to a virtual reality media provider system by way of a network for the media player device to provide a user with an immersive virtual reality experience; receiving, by the media player device from the virtual reality media provider system in response to the request, a specification file corresponding to the immersive virtual reality experience, the specification file comprising data that
defines a plurality of elements included in the immersive virtual reality experience by providing a plurality of links for use by the media player device in acquiring, by way of the network, the plurality of elements while providing the user with the immersive virtual reality experience,
associates an event with a particular element included in the plurality of elements, and
associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience; and
using, by the media player device, the specification file to provide the user with the immersive virtual reality experience by
acquiring, based on a link included in the plurality of links and by way of the network, the particular element,
detecting the occurrence of the event that is associated with the particular element within the specification file, and
performing, in response to the detecting of the occurrence of the event, the behavior that is associated with the event in the specification file. 13. The method of claim 12, embodied as computer-executable instructions on at least one non-transitory computer-readable medium. 14. A system comprising:
at least one physical computing device that:
receives, from a media player device by way of a network, a request for the media player device to provide a user with an immersive virtual reality experience; and
transmits, to the media player device by way of the network and in response to the request, a specification file corresponding to the immersive virtual reality experience, the specification file comprising data that
defines a plurality of elements included in the immersive virtual reality experience by providing a plurality of links for use by the media player device in acquiring, by way of the network, the plurality of elements while providing the user with the immersive virtual reality experience,
associates an event with a particular element included in the plurality of elements, and
associates a behavior with the event that is associated with the particular element, the behavior configured to be performed with respect to the particular element in response to an occurrence of the event within the immersive virtual reality experience. 15. The system of claim 14, wherein the specification file adheres to a data input format that is readable by a plurality of different media player devices operating within a plurality of different platforms. 16. The system of claim 14, wherein the at least one physical computing device:
detects, while the media player device is providing the immersive virtual reality experience, an update that is to be made to the specification file that will affect the immersive virtual reality experience being provided by the media player device at a future point in time; and dynamically updates, in response to the detection of the update and while the media player device is providing the immersive virtual reality experience, the specification file used by the media player device with the update. 17. The system of claim 14, wherein the at least one physical computing device transmits the specification file to the media player device by at least one of transmitting a text-based file to the media player device and transmitting the specification file as binary data encoded into a video stream. 18. The system of claim 14, wherein the at least one physical computing device:
maintains a behavior library of pre-established and definable behaviors; and configures the media player device to be capable of performing each behavior included in the behavior library; wherein the behavior that is associated with the event that is associated with the particular element is included in the behavior library. 19. The system of claim 18, wherein the at least one physical computing device:
receives a request to create a new behavior that combines functionality of a subset of behaviors included in the behavior library; creates, in response to the request, the new behavior; and adds the new behavior to the behavior library. 20. The system of claim 18, wherein the at least one physical computing device:
receives a request to create a new behavior that is not based on a combination of a subset of behaviors included in the behavior library; creates, in response to the request, the new behavior; adds the new behavior to the behavior library; and reconfigures the media player device to be further capable of performing the new behavior. | 2,400 |
8,890 | 8,890 | 14,980,710 | 2,468 | This disclosure relates to providing system information for cell access to link budget limited devices. According to some embodiments, a base station may transmit a master information block (MIB), a first system information block (SIB), and second SIBs. The first SIB and the second SIBs may be configured for different device categories, and may accordingly have different characteristics. For example, the first SIB may be configured for link budget limited devices, and may include information specific to such devices and/or may exclude information not relevant to such devices or not critical to accessing the cell. In some instances, the first SIB may also include information from the MIB, such that at least some devices may be able to decode the first SIB and gain cell access without decoding the MIB. | 1. An apparatus, comprising:
a processing element configured cause a base station that serves a cell to:
transmit a master information block (MIB) comprising first information for accessing the cell;
transmit a first system information block (SIB); and
transmit second SIBs;
wherein the first SIB comprises a subset of information comprised in the second SIBs, wherein the first SIB is configured for a lower complexity device category than the second SIBs. 2. The apparatus of claim 1,
wherein the first SIB further comprises at least a subset of information comprised in the MIB. 3. The apparatus of claim 1,
wherein the first SIB comprises information that is not included in the second SIBs or the MIB. 4. The apparatus of claim 1,
wherein the first SIB is transmitted at a fixed location within each radio frame transmitted by the base station, wherein at least a subset of the second SIBs are transmitted at variable locations. 5. The apparatus of claim 1, wherein the processing element is further configured to:
encode the first SIB using a first type of encoding; and encode the second SIBs using a second type of encoding. 6. The apparatus of claim 1, wherein the processing element is further configured to:
transmit the first SIB using a fixed modulation and coding scheme. 7. The apparatus of claim 1,
wherein one or more of the first SIB or the MIB is repeated multiple times within at least one subframe of each radio frame and/or is repeated in multiple subframes of each radio frame. 8. A base station configured to serve a cell, comprising:
an antenna; a radio operably coupled to the antenna; a processing element; wherein the antenna, radio, and processing element are configured to:
transmit a master information block (MIB) comprising first information for accessing the cell;
transmit a first system information block (SIB), wherein the first SIB is configured for at least a first device category; and
transmit second SIBS, wherein the second SIBs are configured for at least a second device category. 9. The base station of claim 8,
wherein the first SIB is transmitted at a fixed location within each radio frame transmitted by the base station, wherein the fixed location is within the central six resource blocks (RBs) of the cell. 10. The base station of claim 8,
wherein the cell is provided according to LTE, wherein the first device category is LTE category 0. 11. The base station of claim 8, wherein the first SIB comprises information specific to the first device category, wherein the information specific to the first device category comprises one or more of:
a paging repetition factor for the first device category; a physical random access channel (PRACH) repetition factor for the first device category; a random access request (RAR) repetition factor for the first device category; EPDCCH configuration information for common search space; one or more locations of bands configured for use by the first device category within cell bandwidth; or a number of bands configured for use by the first device category supported by the cell. 12. The base station of claim 8,
wherein the first SIB comprises a subset of information comprised in the second SIBs, wherein the first SIB comprises information also comprised in the MIB, wherein the first SIB is configured for a lower complexity device category than the second SIBs. 13. The base station of claim 8, wherein transmitting the MIB comprises one or more of:
repeating transmission of the MIB in multiple subframes of each frame transmitted by the base station; or repeating transmission of the MIB multiple times within a subframe of each frame transmitted by the base station. 14. The base station of claim 8,
wherein the first SIB is encoded using convolutional encoding, wherein the second SIBs are encoded using turbo encoding. 15. A wireless user equipment (UE) device, comprising:
an antenna; a radio operably coupled to the antenna; a processing element; wherein the antenna, radio, and processing element are configured to:
perform a cell search;
acquire a cell associated with a base station based on the cell search;
receive a first system information block (SIB) from the base station, wherein the first SIB is configured for link budget limited devices, wherein the base station also provides second SIBs configured for devices which are not link budget limited. 16. The UE device of claim 15,
wherein the first SIB has a fixed resource allocation within the central six resource blocks of the cell, wherein at least a subset of the second SIBs have variable resource allocation. 17. The UE device of claim 15,
wherein the first SIB comprises a subset of information comprised in the second SIBs. 18. The UE device of claim 15, wherein the antenna, radio, and processing element are further configured to:
access the cell based at least in part on information comprised in the first SIB. 19. The UE device of claim 15,
wherein the base station also transmits a master information block (MIB) comprising first information for accessing the cell, wherein the first SIB also comprises the first information, wherein the wireless device does not attempt to decode the MIB based on receiving the first SIB. 20. The UE device of claim 15, wherein the antenna, radio, and processing element are further configured to:
receive a master information block (MIB) from the base station, wherein the MIB is repeated by the base station in multiple subframes and/or multiple times within a subframe of each radio frame transmitted by the base station. | This disclosure relates to providing system information for cell access to link budget limited devices. According to some embodiments, a base station may transmit a master information block (MIB), a first system information block (SIB), and second SIBs. The first SIB and the second SIBs may be configured for different device categories, and may accordingly have different characteristics. For example, the first SIB may be configured for link budget limited devices, and may include information specific to such devices and/or may exclude information not relevant to such devices or not critical to accessing the cell. In some instances, the first SIB may also include information from the MIB, such that at least some devices may be able to decode the first SIB and gain cell access without decoding the MIB.1. An apparatus, comprising:
a processing element configured cause a base station that serves a cell to:
transmit a master information block (MIB) comprising first information for accessing the cell;
transmit a first system information block (SIB); and
transmit second SIBs;
wherein the first SIB comprises a subset of information comprised in the second SIBs, wherein the first SIB is configured for a lower complexity device category than the second SIBs. 2. The apparatus of claim 1,
wherein the first SIB further comprises at least a subset of information comprised in the MIB. 3. The apparatus of claim 1,
wherein the first SIB comprises information that is not included in the second SIBs or the MIB. 4. The apparatus of claim 1,
wherein the first SIB is transmitted at a fixed location within each radio frame transmitted by the base station, wherein at least a subset of the second SIBs are transmitted at variable locations. 5. The apparatus of claim 1, wherein the processing element is further configured to:
encode the first SIB using a first type of encoding; and encode the second SIBs using a second type of encoding. 6. The apparatus of claim 1, wherein the processing element is further configured to:
transmit the first SIB using a fixed modulation and coding scheme. 7. The apparatus of claim 1,
wherein one or more of the first SIB or the MIB is repeated multiple times within at least one subframe of each radio frame and/or is repeated in multiple subframes of each radio frame. 8. A base station configured to serve a cell, comprising:
an antenna; a radio operably coupled to the antenna; a processing element; wherein the antenna, radio, and processing element are configured to:
transmit a master information block (MIB) comprising first information for accessing the cell;
transmit a first system information block (SIB), wherein the first SIB is configured for at least a first device category; and
transmit second SIBS, wherein the second SIBs are configured for at least a second device category. 9. The base station of claim 8,
wherein the first SIB is transmitted at a fixed location within each radio frame transmitted by the base station, wherein the fixed location is within the central six resource blocks (RBs) of the cell. 10. The base station of claim 8,
wherein the cell is provided according to LTE, wherein the first device category is LTE category 0. 11. The base station of claim 8, wherein the first SIB comprises information specific to the first device category, wherein the information specific to the first device category comprises one or more of:
a paging repetition factor for the first device category; a physical random access channel (PRACH) repetition factor for the first device category; a random access request (RAR) repetition factor for the first device category; EPDCCH configuration information for common search space; one or more locations of bands configured for use by the first device category within cell bandwidth; or a number of bands configured for use by the first device category supported by the cell. 12. The base station of claim 8,
wherein the first SIB comprises a subset of information comprised in the second SIBs, wherein the first SIB comprises information also comprised in the MIB, wherein the first SIB is configured for a lower complexity device category than the second SIBs. 13. The base station of claim 8, wherein transmitting the MIB comprises one or more of:
repeating transmission of the MIB in multiple subframes of each frame transmitted by the base station; or repeating transmission of the MIB multiple times within a subframe of each frame transmitted by the base station. 14. The base station of claim 8,
wherein the first SIB is encoded using convolutional encoding, wherein the second SIBs are encoded using turbo encoding. 15. A wireless user equipment (UE) device, comprising:
an antenna; a radio operably coupled to the antenna; a processing element; wherein the antenna, radio, and processing element are configured to:
perform a cell search;
acquire a cell associated with a base station based on the cell search;
receive a first system information block (SIB) from the base station, wherein the first SIB is configured for link budget limited devices, wherein the base station also provides second SIBs configured for devices which are not link budget limited. 16. The UE device of claim 15,
wherein the first SIB has a fixed resource allocation within the central six resource blocks of the cell, wherein at least a subset of the second SIBs have variable resource allocation. 17. The UE device of claim 15,
wherein the first SIB comprises a subset of information comprised in the second SIBs. 18. The UE device of claim 15, wherein the antenna, radio, and processing element are further configured to:
access the cell based at least in part on information comprised in the first SIB. 19. The UE device of claim 15,
wherein the base station also transmits a master information block (MIB) comprising first information for accessing the cell, wherein the first SIB also comprises the first information, wherein the wireless device does not attempt to decode the MIB based on receiving the first SIB. 20. The UE device of claim 15, wherein the antenna, radio, and processing element are further configured to:
receive a master information block (MIB) from the base station, wherein the MIB is repeated by the base station in multiple subframes and/or multiple times within a subframe of each radio frame transmitted by the base station. | 2,400 |
8,891 | 8,891 | 16,133,862 | 2,485 | A processor may process a video feed of a monitored area. The processing may include attempting to decrypt the video feed using a temporally-varying digital rights management key in a state corresponding to a time at which the encrypted video feed was received and encountering a decryption error during the attempting. The processing may include comparing the video feed with an output feed from a secondary sensor to determine that at least one object is indicated in the monitored area by the output feed and not visible in the video feed. The processor may indicate a problem with the video feed. For example, the processor may indicate that the encrypted video feed has been altered prior to the receiving of the encrypted video feed due to the decryption error and/or that the video camera is malfunctioning due to the at least one object being not visible in the video feed. | 1. A monitoring system comprising:
a video camera configured to generate a video feed of a monitored area; a secondary sensor configured to generate an output feed of the monitored area; a processor in communication with the video camera and the secondary sensor; and a non-transitory memory in communication with the processor, the memory being configured to store instructions that, when executed by the processor, cause the processor to perform processing comprising:
analyzing the output feed to determine that at least one object is present in the monitored area, the analyzing comprising comparing the output feed with a known empty map of the monitored area to detect the at least one object as an object not within the map and determining a location of the at least one object relative to the map;
analyzing the video feed to attempt to detect the at least one object in the video feed, the analyzing comprising applying at least one object recognition algorithm to at least the portion of the image depicting the location of the at least one object;
based on the analyzing of the video feed, failing to detect the at least one object in the video feed due to the at least one object recognition algorithm outputting an indication that the location of the at least one object is empty; and
locking access to at least one location due to the at least one object not being detected in the video feed. 2. The system of claim 1, wherein the analyzing of the output feed comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to the known empty map of the monitored area; and detecting the at least one object based on the at one curvature being different from a known curvature in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 3. The system of claim 1, wherein the analyzing of the output feed comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to the known empty map of the monitored area; and detecting the at least one object based on the at one curvature being not present in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 4. The system of claim 1, wherein:
the analyzing of the output feed comprises generating a map of the monitored area based on data in the output feed, the map indicating the at least one object in at least one portion of the map; and the analyzing of the video feed comprises comparing the video feed to the map to determine that the at least one object is not visible in at least one portion of the video feed corresponding to a same portion of the monitored area as the at least one portion of the map. 5. The system of claim 1, further comprising at least one transceiver in communication with the processor and configured to receive a signal from an external device indicating a position of the external device within the monitored area, wherein the analyzing of the video feed further comprises determining that the external device is not visible in a portion of the video feed corresponding to a same portion of the monitored area as the position of the external device. 6. The system of claim 1, further comprising at least one transceiver in communication with the processor and configured to receive a digital rights management key that changes over time, wherein the processing further comprises encrypting the video feed using the digital rights management key and transmitting, by the at least one transceiver, the encrypted video feed to at least one playback device. 7. The system of claim 1, wherein the secondary sensor comprises at least one of a transceiver, a radar sensor, a sonar sensor, and a lidar sensor. 8. The system of claim 1, wherein the analyzing of the video feed comprises using a convolutional neural network to identify features within the monitored area that are visible in the video feed. 9. A fraud detection system comprising:
a monitoring system comprising:
a video camera configured to generate a video feed of a monitored area;
a monitoring processor in communication with the video camera;
a monitoring transceiver in communication with the monitoring processor; and
a non-transitory monitoring memory in communication with the monitoring processor, the monitoring memory being configured to store instructions that, when executed by the monitoring processor, cause the monitoring processor to perform processing comprising:
receiving, by the monitoring transceiver, a digital rights management key that changes over time;
encrypting the video feed using the digital rights management key; and
transmitting, by the monitoring transceiver, the encrypted video feed; and
a playback system comprising:
a playback processor;
a playback transceiver in communication with the playback processor; and
a non-transitory playback memory in communication with the playback processor, the playback memory being configured to store instructions that, when executed by the playback processor, cause the playback processor to perform processing comprising:
receiving, by the playback transceiver, the encrypted video feed;
receiving, by the playback transceiver, the digital rights management key in a state corresponding to a time at which the encrypted video feed was received;
attempting to decrypt the encrypted video feed using the digital rights management key received by the playback transceiver;
encountering a decryption error during the attempting; and
indicating that the encrypted video feed has been altered between the transmitting of the encrypted video feed and the receiving of the encrypted video feed due to the decryption error. 10. The system of claim 9, wherein:
the receiving by the monitoring transceiver comprises receiving a plurality of new digital rights management keys over time, wherein one of the digital rights management keys is valid at a given time; the encrypting comprises, at the given time, using the digital rights management key that is valid. 11. The system of claim 9, wherein the digital rights management key is provided by a digital rights management server separate from the monitoring system and the playback system. 12. A method of detecting video feed problems, the method comprising:
receiving, at a processor, a video feed of a monitored area; performing processing, by the processor, on the video feed, the processing comprising at least one of:
attempting to decrypt the video feed using a temporally-varying digital rights management key in a state corresponding to a time at which the encrypted video feed was received and encountering a decryption error during the attempting; and
comparing the video feed with an output feed from a secondary sensor to determine that at least one object is indicated in the monitored area by the output feed and not visible in the video feed; and
indicating, by the processor, a problem with the video feed, the indicating comprising at least one of:
indicating that the encrypted video feed has been altered prior to the receiving of the encrypted video feed due to the decryption error; and
indicating that the video camera is malfunctioning due to the at least one object being not visible in the video feed. 13. The method of claim 12, further comprising receiving, at the processor, the temporally-varying digital rights management key from a digital rights management server. 14. The method of claim 12, further comprising:
receiving, at the processor, the output feed; and analyzing, by the processor, the output feed to determine that the at least one object is present in the monitored area. 15. The method of claim 14, wherein the analyzing comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to a known empty map of the monitored area; and detecting the at least one object based on the at one curvature being different from a known curvature in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 16. The method of claim 14, wherein the analyzing comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to a known empty map of the monitored area; and detecting the at least one object based on the at one curvature being not present in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 17. The method of claim 12, further comprising:
receiving, at the processor, a signal from an external device indicating a position of the external device within the monitored area; and determining that the external device is not visible in a portion of the video feed corresponding to a same portion of the monitored area as the position of the external device. 18. The method of claim 12, further comprising using a convolutional neural network to identify features within the monitored area that are visible in the video feed. 19. The method of claim 18, further comprising analyzing the output feed to generate a map of the monitored area based on data in the output feed, the map indicating the at least one object in at least one portion of the map, wherein the comparing comprises comparing the identified features with the map. 20. The method of claim 12, wherein the secondary sensor comprises at least one of a transceiver, a radar sensor, a sonar sensor, and a lidar sensor. | A processor may process a video feed of a monitored area. The processing may include attempting to decrypt the video feed using a temporally-varying digital rights management key in a state corresponding to a time at which the encrypted video feed was received and encountering a decryption error during the attempting. The processing may include comparing the video feed with an output feed from a secondary sensor to determine that at least one object is indicated in the monitored area by the output feed and not visible in the video feed. The processor may indicate a problem with the video feed. For example, the processor may indicate that the encrypted video feed has been altered prior to the receiving of the encrypted video feed due to the decryption error and/or that the video camera is malfunctioning due to the at least one object being not visible in the video feed.1. A monitoring system comprising:
a video camera configured to generate a video feed of a monitored area; a secondary sensor configured to generate an output feed of the monitored area; a processor in communication with the video camera and the secondary sensor; and a non-transitory memory in communication with the processor, the memory being configured to store instructions that, when executed by the processor, cause the processor to perform processing comprising:
analyzing the output feed to determine that at least one object is present in the monitored area, the analyzing comprising comparing the output feed with a known empty map of the monitored area to detect the at least one object as an object not within the map and determining a location of the at least one object relative to the map;
analyzing the video feed to attempt to detect the at least one object in the video feed, the analyzing comprising applying at least one object recognition algorithm to at least the portion of the image depicting the location of the at least one object;
based on the analyzing of the video feed, failing to detect the at least one object in the video feed due to the at least one object recognition algorithm outputting an indication that the location of the at least one object is empty; and
locking access to at least one location due to the at least one object not being detected in the video feed. 2. The system of claim 1, wherein the analyzing of the output feed comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to the known empty map of the monitored area; and detecting the at least one object based on the at one curvature being different from a known curvature in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 3. The system of claim 1, wherein the analyzing of the output feed comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to the known empty map of the monitored area; and detecting the at least one object based on the at one curvature being not present in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 4. The system of claim 1, wherein:
the analyzing of the output feed comprises generating a map of the monitored area based on data in the output feed, the map indicating the at least one object in at least one portion of the map; and the analyzing of the video feed comprises comparing the video feed to the map to determine that the at least one object is not visible in at least one portion of the video feed corresponding to a same portion of the monitored area as the at least one portion of the map. 5. The system of claim 1, further comprising at least one transceiver in communication with the processor and configured to receive a signal from an external device indicating a position of the external device within the monitored area, wherein the analyzing of the video feed further comprises determining that the external device is not visible in a portion of the video feed corresponding to a same portion of the monitored area as the position of the external device. 6. The system of claim 1, further comprising at least one transceiver in communication with the processor and configured to receive a digital rights management key that changes over time, wherein the processing further comprises encrypting the video feed using the digital rights management key and transmitting, by the at least one transceiver, the encrypted video feed to at least one playback device. 7. The system of claim 1, wherein the secondary sensor comprises at least one of a transceiver, a radar sensor, a sonar sensor, and a lidar sensor. 8. The system of claim 1, wherein the analyzing of the video feed comprises using a convolutional neural network to identify features within the monitored area that are visible in the video feed. 9. A fraud detection system comprising:
a monitoring system comprising:
a video camera configured to generate a video feed of a monitored area;
a monitoring processor in communication with the video camera;
a monitoring transceiver in communication with the monitoring processor; and
a non-transitory monitoring memory in communication with the monitoring processor, the monitoring memory being configured to store instructions that, when executed by the monitoring processor, cause the monitoring processor to perform processing comprising:
receiving, by the monitoring transceiver, a digital rights management key that changes over time;
encrypting the video feed using the digital rights management key; and
transmitting, by the monitoring transceiver, the encrypted video feed; and
a playback system comprising:
a playback processor;
a playback transceiver in communication with the playback processor; and
a non-transitory playback memory in communication with the playback processor, the playback memory being configured to store instructions that, when executed by the playback processor, cause the playback processor to perform processing comprising:
receiving, by the playback transceiver, the encrypted video feed;
receiving, by the playback transceiver, the digital rights management key in a state corresponding to a time at which the encrypted video feed was received;
attempting to decrypt the encrypted video feed using the digital rights management key received by the playback transceiver;
encountering a decryption error during the attempting; and
indicating that the encrypted video feed has been altered between the transmitting of the encrypted video feed and the receiving of the encrypted video feed due to the decryption error. 10. The system of claim 9, wherein:
the receiving by the monitoring transceiver comprises receiving a plurality of new digital rights management keys over time, wherein one of the digital rights management keys is valid at a given time; the encrypting comprises, at the given time, using the digital rights management key that is valid. 11. The system of claim 9, wherein the digital rights management key is provided by a digital rights management server separate from the monitoring system and the playback system. 12. A method of detecting video feed problems, the method comprising:
receiving, at a processor, a video feed of a monitored area; performing processing, by the processor, on the video feed, the processing comprising at least one of:
attempting to decrypt the video feed using a temporally-varying digital rights management key in a state corresponding to a time at which the encrypted video feed was received and encountering a decryption error during the attempting; and
comparing the video feed with an output feed from a secondary sensor to determine that at least one object is indicated in the monitored area by the output feed and not visible in the video feed; and
indicating, by the processor, a problem with the video feed, the indicating comprising at least one of:
indicating that the encrypted video feed has been altered prior to the receiving of the encrypted video feed due to the decryption error; and
indicating that the video camera is malfunctioning due to the at least one object being not visible in the video feed. 13. The method of claim 12, further comprising receiving, at the processor, the temporally-varying digital rights management key from a digital rights management server. 14. The method of claim 12, further comprising:
receiving, at the processor, the output feed; and analyzing, by the processor, the output feed to determine that the at least one object is present in the monitored area. 15. The method of claim 14, wherein the analyzing comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to a known empty map of the monitored area; and detecting the at least one object based on the at one curvature being different from a known curvature in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 16. The method of claim 14, wherein the analyzing comprises:
generating a map of the secured area based on data in the output feed, the map comprising at least one curvature in at least one portion of the map; comparing the map of the secured area to a known empty map of the monitored area; and detecting the at least one object based on the at one curvature being not present in at least one portion of the known empty map corresponding to a same portion of the monitored area as the at least one portion of the map. 17. The method of claim 12, further comprising:
receiving, at the processor, a signal from an external device indicating a position of the external device within the monitored area; and determining that the external device is not visible in a portion of the video feed corresponding to a same portion of the monitored area as the position of the external device. 18. The method of claim 12, further comprising using a convolutional neural network to identify features within the monitored area that are visible in the video feed. 19. The method of claim 18, further comprising analyzing the output feed to generate a map of the monitored area based on data in the output feed, the map indicating the at least one object in at least one portion of the map, wherein the comparing comprises comparing the identified features with the map. 20. The method of claim 12, wherein the secondary sensor comprises at least one of a transceiver, a radar sensor, a sonar sensor, and a lidar sensor. | 2,400 |
8,892 | 8,892 | 14,661,317 | 2,457 | Methods and systems for content presentation optimization are disclosed. A content and/or service provider can receive a data sample relating to a content item presented via a device. One or more configuration settings to be applied to the device can be determined based on the data sample. The one or more determined configuration settings of the device can be automatically or manually adjusted. In an aspect, a content and/or service provider can receive a content item from a content presentation device. The received content item can be analyzed against reference data. A modified content item can be generated based on the analysis. The modified content item can be transmitted to the content presentation device for content presentation. | 1. A method comprising:
generating a data sample relating to a content item presented via a first device: transmitting the data sample to a second device; receiving one or more configuration settings to be applied to the first device from the second device, wherein the one or more configuration settings are determined by the second device based on the data sample; and applying the one or more configuration settings to the first device. 2. The method of claim 1, wherein the data sample comprises information representing an image, a video, audio, a data set, an application, or a combination thereof, relating to the content item. 3. The method of claim 1, wherein the data sample comprises information relating to an optical property, one or more current configuration settings of the first device, or a combination thereof. 4. The method of claim 1, wherein applying the one or more configuration settings to the first device comprises applying the one or more configuration settings automatically, manually, or a combination thereof. 5. The method of claim 1, wherein the one or more configuration settings are determined by the second device by comparing the data sample to reference data. 6. The method of claim 1, wherein applying the one or more configuration settings to the first device comprises adjusting one or more of a brightness, a color, a contrast, a tint, a resolution, a dimension, a volume, a sound effect, and a transmission parameter associated with the first device. 7. A method comprising:
receiving a data sample comprising a representation of content presented via a device; determining at least one parameter associated with the device, the presented content, or a combination thereof, based on the received data sample; determining one or more configuration settings based on the at least one parameter; and transmitting the determined one or more configuration settings. 8. The method of claim 7, wherein the data sample comprises an image, a video, audio, a data set, an application, or a combination thereof, associated with the content. 9. The method of claim 7, wherein the at least one parameter is determined based on one or more of an optical property, one or more current configuration settings of the device, or a combination thereof. 10. The method of claim 7, wherein the at least one parameter comprises one or more parameters associated with one or more of a video, audio, an image, a data set, an application, and one or more configuration settings for the device. 11. The method of claim 7, wherein the data sample is received from an image capture device, a video capture device, an audio capture device, or a combination thereof. 12. The method of claim 7, wherein the determined one or more configuration settings are implemented on the device for presenting the content. 13. The method of claim 12, wherein the determined one or more configuration settings are implemented automatically, manually, or a combination thereof. 14. A method comprising:
receiving a data sample, wherein the data sample represents content presented via a device; analyzing the received data sample against reference data; generating a modified content item based on the analysis; and transmitting the modified content item to the device. 15. The method of claim 14, wherein analyzing the received data sample against reference data comprises comparing one or more parameters associated with a video, audio, an image, a data set, an application, or a combination thereof between the received data sample and the reference data. 16. The method of claim 14, wherein analyzing the received data sample against reference data comprises determining an optical property, one or more current configuration settings of the device, or a combination thereof. 17. The method of claim 14, wherein the presented content comprises an image, a video, audio, a data set, an application, or a combination thereof. 18. The method of claim 14, wherein the modified content item comprises one or more of modified video, modified audio, modified image, modified data set, and modified application associated with the content item. 19. The method of claim 14, wherein the data sample is received from an image capture device, a video capture device, an audio capture device, or a combination thereof. 20. The method of claim 14, wherein the modified content item is presented on the device. | Methods and systems for content presentation optimization are disclosed. A content and/or service provider can receive a data sample relating to a content item presented via a device. One or more configuration settings to be applied to the device can be determined based on the data sample. The one or more determined configuration settings of the device can be automatically or manually adjusted. In an aspect, a content and/or service provider can receive a content item from a content presentation device. The received content item can be analyzed against reference data. A modified content item can be generated based on the analysis. The modified content item can be transmitted to the content presentation device for content presentation.1. A method comprising:
generating a data sample relating to a content item presented via a first device: transmitting the data sample to a second device; receiving one or more configuration settings to be applied to the first device from the second device, wherein the one or more configuration settings are determined by the second device based on the data sample; and applying the one or more configuration settings to the first device. 2. The method of claim 1, wherein the data sample comprises information representing an image, a video, audio, a data set, an application, or a combination thereof, relating to the content item. 3. The method of claim 1, wherein the data sample comprises information relating to an optical property, one or more current configuration settings of the first device, or a combination thereof. 4. The method of claim 1, wherein applying the one or more configuration settings to the first device comprises applying the one or more configuration settings automatically, manually, or a combination thereof. 5. The method of claim 1, wherein the one or more configuration settings are determined by the second device by comparing the data sample to reference data. 6. The method of claim 1, wherein applying the one or more configuration settings to the first device comprises adjusting one or more of a brightness, a color, a contrast, a tint, a resolution, a dimension, a volume, a sound effect, and a transmission parameter associated with the first device. 7. A method comprising:
receiving a data sample comprising a representation of content presented via a device; determining at least one parameter associated with the device, the presented content, or a combination thereof, based on the received data sample; determining one or more configuration settings based on the at least one parameter; and transmitting the determined one or more configuration settings. 8. The method of claim 7, wherein the data sample comprises an image, a video, audio, a data set, an application, or a combination thereof, associated with the content. 9. The method of claim 7, wherein the at least one parameter is determined based on one or more of an optical property, one or more current configuration settings of the device, or a combination thereof. 10. The method of claim 7, wherein the at least one parameter comprises one or more parameters associated with one or more of a video, audio, an image, a data set, an application, and one or more configuration settings for the device. 11. The method of claim 7, wherein the data sample is received from an image capture device, a video capture device, an audio capture device, or a combination thereof. 12. The method of claim 7, wherein the determined one or more configuration settings are implemented on the device for presenting the content. 13. The method of claim 12, wherein the determined one or more configuration settings are implemented automatically, manually, or a combination thereof. 14. A method comprising:
receiving a data sample, wherein the data sample represents content presented via a device; analyzing the received data sample against reference data; generating a modified content item based on the analysis; and transmitting the modified content item to the device. 15. The method of claim 14, wherein analyzing the received data sample against reference data comprises comparing one or more parameters associated with a video, audio, an image, a data set, an application, or a combination thereof between the received data sample and the reference data. 16. The method of claim 14, wherein analyzing the received data sample against reference data comprises determining an optical property, one or more current configuration settings of the device, or a combination thereof. 17. The method of claim 14, wherein the presented content comprises an image, a video, audio, a data set, an application, or a combination thereof. 18. The method of claim 14, wherein the modified content item comprises one or more of modified video, modified audio, modified image, modified data set, and modified application associated with the content item. 19. The method of claim 14, wherein the data sample is received from an image capture device, a video capture device, an audio capture device, or a combination thereof. 20. The method of claim 14, wherein the modified content item is presented on the device. | 2,400 |
8,893 | 8,893 | 14,155,619 | 2,451 | A controller that controls a machine detects an event that has occurred in the controller or the machine to compose and store event information that contains the event. Upon receiving an e-mail acquisition request from a terminal, the controller retrieves the stored event information, composes an e-mail that contains the event information, and transmits the e-mail directly to the terminal. | 1. A controller having a function of transmitting information on the controller or a machine controlled by the controller from the controller to a terminal located at a distance from the controller via an e-mail, comprising:
an event detector that detects an event that has occurred in the controller or the machine; an event information composer that composes event information containing at least one event that has occurred in the controller or the machine; an event information memory that stores the event information composed by the event information composer; an e-mail acquisition request receiver that receives an e-mail acquisition request from the terminal; an e-mail composer that acquires the event information stored in the event information memory based on the received e-mail acquisition request and composes an e-mail that contains the event information; and an e-mail transmitter that transmits the e-mail containing the event information and composed by the e-mail composer, directly to the terminal. 2. The controller according to claim 1, further comprising at least one of:
an event information adder that, when a new event occurs after the event information is composed, adds the event to the event information stored in the event information memory; an event information updater that, when the event contained in the event information stored in the event information memory is changed after the event information is composed, updates the event contained in the event information stored in the event information memory; and an event information deleter that, when the event is canceled after the event information is composed, deletes the event from the event information stored in the event information memory. 3. The controller according to claim 1, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 4. The controller according to claim 1, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 5. The controller according to claim 1, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 6. A controller having a function of transmitting information on the controller or a machine controlled by the controller from the controller to a terminal located at a distance from the controller via an e-mail, comprising:
an event detector that detects an event that has occurred in the controller or the machine; an event information composer that composes event information containing at least one event that has occurred in the controller or the machine; an event information memory that stores the event information composed by the event information composer; an event information change detector that detects a change in the event information stored in the event information memory; an e-mail composer that, when the event information change detector has detected a change in the event information, acquires the event information stored in the event information memory and composes an e-mail that contains the event information; an e-mail memory that stores the e-mail composed by the e-mail composer; an e-mail acquisition request receiver that receives an e-mail acquisition request from the terminal; and an e-mail transmitter that transmits the e-mail that contains the event information stored in the e-mail memory directly to the terminal based on the received e-mail acquisition request. 7. The controller according to claim 6, further comprising at least one of:
an event information adder that, when a new event occurs after the event information is composed, adds the event to the event information stored in the event information memory; an event information updater that, when the event contained in the event information stored in the event information memory is changed after the event information is composed, updates the event contained in the event information stored in the event information memory; and an event information deleter that, when the event is canceled after the event information is composed, deletes the event from the event information stored in the event information memory. 8. The controller according to claim 6, further comprising at least one of:
an event information adder that, when a new event occurs after the event information is composed, adds the new event to the event information stored in the event information memory; an event information updater that, when the event contained in the event information stored in the event information memory is changed after the event information is composed, updates the event contained in the event information stored in the event information memory; and an event information deleter that, when the event is canceled after the event information is composed, deletes the canceled event from the event information stored in the event information memory, and the controller further comprising at least one of: an e-mail updater that updates the event information contained in the e-mail composed by the e-mail composer, when a new event occurs after the event information is composed and the event information change detector has detected that the event is added to the event information, or when the event information change detector has detected a change in the event contained in the event information after the event information is composed; and an e-mail deleter that, when the event information change detector has detected that at least one event has been canceled after the event information is composed, deletes this event of the event information contained in the e-mail composed by the e-mail composer, and that, when the event information change detector has detected that all events have been canceled after the event information is composed, deletes the e-mail composed by the e-mail composer. 9. The controller according to claim 6, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 10. The controller according to claim 6, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 11. The controller according to claim 6, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 12. The controller according to claim 2, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 13. The controller according to claim 2, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 14. The controller according to claim 2, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 15. The controller according to claim 7, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 16. The controller according to claim 7, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 17. The controller according to claim 7, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 18. The controller according to claim 8, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 19. The controller according to claim 8, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 20. The controller according to claim 8, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. | A controller that controls a machine detects an event that has occurred in the controller or the machine to compose and store event information that contains the event. Upon receiving an e-mail acquisition request from a terminal, the controller retrieves the stored event information, composes an e-mail that contains the event information, and transmits the e-mail directly to the terminal.1. A controller having a function of transmitting information on the controller or a machine controlled by the controller from the controller to a terminal located at a distance from the controller via an e-mail, comprising:
an event detector that detects an event that has occurred in the controller or the machine; an event information composer that composes event information containing at least one event that has occurred in the controller or the machine; an event information memory that stores the event information composed by the event information composer; an e-mail acquisition request receiver that receives an e-mail acquisition request from the terminal; an e-mail composer that acquires the event information stored in the event information memory based on the received e-mail acquisition request and composes an e-mail that contains the event information; and an e-mail transmitter that transmits the e-mail containing the event information and composed by the e-mail composer, directly to the terminal. 2. The controller according to claim 1, further comprising at least one of:
an event information adder that, when a new event occurs after the event information is composed, adds the event to the event information stored in the event information memory; an event information updater that, when the event contained in the event information stored in the event information memory is changed after the event information is composed, updates the event contained in the event information stored in the event information memory; and an event information deleter that, when the event is canceled after the event information is composed, deletes the event from the event information stored in the event information memory. 3. The controller according to claim 1, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 4. The controller according to claim 1, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 5. The controller according to claim 1, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 6. A controller having a function of transmitting information on the controller or a machine controlled by the controller from the controller to a terminal located at a distance from the controller via an e-mail, comprising:
an event detector that detects an event that has occurred in the controller or the machine; an event information composer that composes event information containing at least one event that has occurred in the controller or the machine; an event information memory that stores the event information composed by the event information composer; an event information change detector that detects a change in the event information stored in the event information memory; an e-mail composer that, when the event information change detector has detected a change in the event information, acquires the event information stored in the event information memory and composes an e-mail that contains the event information; an e-mail memory that stores the e-mail composed by the e-mail composer; an e-mail acquisition request receiver that receives an e-mail acquisition request from the terminal; and an e-mail transmitter that transmits the e-mail that contains the event information stored in the e-mail memory directly to the terminal based on the received e-mail acquisition request. 7. The controller according to claim 6, further comprising at least one of:
an event information adder that, when a new event occurs after the event information is composed, adds the event to the event information stored in the event information memory; an event information updater that, when the event contained in the event information stored in the event information memory is changed after the event information is composed, updates the event contained in the event information stored in the event information memory; and an event information deleter that, when the event is canceled after the event information is composed, deletes the event from the event information stored in the event information memory. 8. The controller according to claim 6, further comprising at least one of:
an event information adder that, when a new event occurs after the event information is composed, adds the new event to the event information stored in the event information memory; an event information updater that, when the event contained in the event information stored in the event information memory is changed after the event information is composed, updates the event contained in the event information stored in the event information memory; and an event information deleter that, when the event is canceled after the event information is composed, deletes the canceled event from the event information stored in the event information memory, and the controller further comprising at least one of: an e-mail updater that updates the event information contained in the e-mail composed by the e-mail composer, when a new event occurs after the event information is composed and the event information change detector has detected that the event is added to the event information, or when the event information change detector has detected a change in the event contained in the event information after the event information is composed; and an e-mail deleter that, when the event information change detector has detected that at least one event has been canceled after the event information is composed, deletes this event of the event information contained in the e-mail composed by the e-mail composer, and that, when the event information change detector has detected that all events have been canceled after the event information is composed, deletes the e-mail composed by the e-mail composer. 9. The controller according to claim 6, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 10. The controller according to claim 6, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 11. The controller according to claim 6, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 12. The controller according to claim 2, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 13. The controller according to claim 2, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 14. The controller according to claim 2, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 15. The controller according to claim 7, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 16. The controller according to claim 7, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 17. The controller according to claim 7, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. 18. The controller according to claim 8, wherein
the e-mail acquisition request receiver and the e-mail transmitter include a post office protocol (POP) server processor for transmitting the e-mail to a POP client based on a POP communication protocol. 19. The controller according to claim 8, wherein
the e-mail acquisition request receiver and the e-mail transmitter include an Internet mail access protocol (IMAP) server processor for transmitting the e-mail to an IMAP client based on an IMAP communication protocol. 20. The controller according to claim 8, wherein
the event information is any one of alarm information of the controller, alarm information of the machine, operating information of the controller, and operating information of the machine. | 2,400 |
8,894 | 8,894 | 15,250,711 | 2,483 | The present invention relates to an encoding device and a method, a decoding device and a method, an editing device and a method, a storage medium, and a program which can perform encoding and decoding so that buffer failure does not occur. Information, such as a minimum bit rate, a minimum buffer size, and a minimum initial delay time, is contained in a random access point header contained in an accessible point in a bitstream. A bitsteam analyzing unit 72 analyzes an input bitstream, sets the above-mentioned information, and outputs the resulting information to a buffer-information adding unit 73 . The buffer-information adding unit 73 adds the input information to the input bitstream and outputs the resulting bitstream. The present invention is applicable to an encoding device and a decoding device which process bitstreams. | 1. (canceled) 2. A decoding method, comprising:
acquiring, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decoding the bitstream using the identification information and the buffer characteristic information. 3. A decoding device comprising:
circuitry configured to acquire, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decode the bitstream using the identification information and the buffer characteristic information. | The present invention relates to an encoding device and a method, a decoding device and a method, an editing device and a method, a storage medium, and a program which can perform encoding and decoding so that buffer failure does not occur. Information, such as a minimum bit rate, a minimum buffer size, and a minimum initial delay time, is contained in a random access point header contained in an accessible point in a bitstream. A bitsteam analyzing unit 72 analyzes an input bitstream, sets the above-mentioned information, and outputs the resulting information to a buffer-information adding unit 73 . The buffer-information adding unit 73 adds the input information to the input bitstream and outputs the resulting bitstream. The present invention is applicable to an encoding device and a decoding device which process bitstreams.1. (canceled) 2. A decoding method, comprising:
acquiring, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decoding the bitstream using the identification information and the buffer characteristic information. 3. A decoding device comprising:
circuitry configured to acquire, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decode the bitstream using the identification information and the buffer characteristic information. | 2,400 |
8,895 | 8,895 | 15,622,954 | 2,424 | A content selection menu is generated and provided to a user. The content selection menu includes a plurality of audiovisual (AV) programs that are provided for user selection. The AV programs may be positioned in the content selection menu in accordance with their associated score for content attributes. Upon providing the content selection to a user, the user may select a program for viewing or the user may indicate interest in a program. If the user indicates interest in a program a second content selection menu is generated based at least in part on the attributes of the program of interest. | 1. A method for generating a multi-dimensional content selection menu comprising:
obtaining a first set of a plurality of content attributes specific to a target user; assigning each content attribute of the first set to a respective axis of a plurality of axes of the content selection menu; identifying a plurality of audiovisual (AV) programs, each AV program having an associated value for each content attribute of the first set; determining, for each AV program, a position along each axis of the plurality of axes based on the value for the content attribute corresponding to the respective axis for that attribute; populating the content selection menu with the plurality of AV programs by positioning each AV program in a multidimensional space defined by the plurality of axes in accordance with the determined position along each axis of the plurality of axes; outputting the content selection menu for presentation; receiving an interest input of an AV program from the target user indicating an interest level in one of the plurality of AV programs; obtaining a second set of a second plurality of content attributes based on the interest input; associating each second content attribute of the second set with a second axis of the plurality of second axes of the second content selection menu; identifying a plurality of second AV programs different from the plurality of AV programs, each second AV program having an associated second value for each second content attribute; determining, for each second AV program, a second position along each second axis of the plurality of second axes based on the second value for the second content attribute corresponding to the respective second axis for that attribute; populating the second content selection menu with the plurality of second AV programs by positioning each second AV program in a space defined by the plurality of second axes in accordance with the determined second position; and outputting the second content selection menu for presentation. 2. The method of claim 1, further comprising:
receiving a selection input of a second AV program of the plurality of second AV programs; and providing the selected second AV program for play in response to receiving the selection input. 3. The method of claim 1, wherein a first AV program of the plurality of AV programs is displayed at a different position on the presented menu than a second AV program of the plurality of AV programs. 4. (canceled) 5. The method of claim 1 wherein outputting the content selection menu further includes:
outputting a preview of at least one AV program of the plurality of AV programs. 6. The method of claim 1 wherein an AV program of the plurality of AV programs is a live broadcast and is provided for viewing as part of the content selection menu. 7. The method of claim 1 wherein the value represents a level of association between the AV program and the content attribute of the plurality of content attributes. 8. The method of claim 1 wherein the plurality of axes are two axes or three axes. 9-13. (canceled) 14. A method for generating a multidimensional content selection menu, the method comprising:
determining a number of dimensions of the content selection menu; associating each dimension with a content attribute of a plurality of content attributes; selecting a plurality of AV programs, an AV program of the plurality of AV programs is selected based at least in part on a score of the AV program associated with at least one content attribute of the plurality of content attributes; positioning the plurality of AV programs in the content selection menu; outputting the content selection menu for display; receiving interest input of an AV program of the plurality of AV programs from a target user; generating a second content selection menu based at least in part on the interest input; and outputting the second content selection menu. 15. The method of claim 14, further comprising:
storing historical interest input data indicating user interest in AV programs; generating a subsequent content selection menu based at least in part on the historical interest input data; and outputting the subsequent content selection menu. 16. The method of claim 14, further comprising:
determining a coordinate position for each AV program of the plurality of AV programs with respect to each dimension of the content selection menu; and placing an identifier of the AV program in the content selection menu in accordance with the coordinate position. 17. The method of claim 14 wherein the plurality of content attributes are determined based at least in part on a history of AV program selection of a user. 18. The method of claim 14 wherein providing the content selection menu for display further includes:
decoding, by at least one tuner, at least one AV program of the plurality of AV programs that is live broadcast; and
displaying the decoded at least one AV program, positioned within the content selection menu, on a display device. 19. A system for generating a multidimensional content selection menu, the system comprising:
a receiver having control circuitry; a memory coupled to the control circuitry, the memory having compute-executable instructions stored thereon that, when executed, cause the control circuitry to cause the system to:
determine a number of dimensions of the content selection menu;
associate each dimension with a content attribute of a plurality of content attributes;
select a plurality of AV programs, an AV program of the plurality of AV programs is selected based at least in part on a score of the AV program associated with at least one content attribute of the plurality of content attributes;
position the plurality of AV programs in the content selection menu;
output the content selection menu for display;
receive interest input of an AV program of the plurality of AV programs from a target user;
generate a second content selection menu based at least in part on the interest input; and
associating each content attribute of the second set with an axis of a plurality of axes of the second content selection menu; and
output the second content selection menu. | A content selection menu is generated and provided to a user. The content selection menu includes a plurality of audiovisual (AV) programs that are provided for user selection. The AV programs may be positioned in the content selection menu in accordance with their associated score for content attributes. Upon providing the content selection to a user, the user may select a program for viewing or the user may indicate interest in a program. If the user indicates interest in a program a second content selection menu is generated based at least in part on the attributes of the program of interest.1. A method for generating a multi-dimensional content selection menu comprising:
obtaining a first set of a plurality of content attributes specific to a target user; assigning each content attribute of the first set to a respective axis of a plurality of axes of the content selection menu; identifying a plurality of audiovisual (AV) programs, each AV program having an associated value for each content attribute of the first set; determining, for each AV program, a position along each axis of the plurality of axes based on the value for the content attribute corresponding to the respective axis for that attribute; populating the content selection menu with the plurality of AV programs by positioning each AV program in a multidimensional space defined by the plurality of axes in accordance with the determined position along each axis of the plurality of axes; outputting the content selection menu for presentation; receiving an interest input of an AV program from the target user indicating an interest level in one of the plurality of AV programs; obtaining a second set of a second plurality of content attributes based on the interest input; associating each second content attribute of the second set with a second axis of the plurality of second axes of the second content selection menu; identifying a plurality of second AV programs different from the plurality of AV programs, each second AV program having an associated second value for each second content attribute; determining, for each second AV program, a second position along each second axis of the plurality of second axes based on the second value for the second content attribute corresponding to the respective second axis for that attribute; populating the second content selection menu with the plurality of second AV programs by positioning each second AV program in a space defined by the plurality of second axes in accordance with the determined second position; and outputting the second content selection menu for presentation. 2. The method of claim 1, further comprising:
receiving a selection input of a second AV program of the plurality of second AV programs; and providing the selected second AV program for play in response to receiving the selection input. 3. The method of claim 1, wherein a first AV program of the plurality of AV programs is displayed at a different position on the presented menu than a second AV program of the plurality of AV programs. 4. (canceled) 5. The method of claim 1 wherein outputting the content selection menu further includes:
outputting a preview of at least one AV program of the plurality of AV programs. 6. The method of claim 1 wherein an AV program of the plurality of AV programs is a live broadcast and is provided for viewing as part of the content selection menu. 7. The method of claim 1 wherein the value represents a level of association between the AV program and the content attribute of the plurality of content attributes. 8. The method of claim 1 wherein the plurality of axes are two axes or three axes. 9-13. (canceled) 14. A method for generating a multidimensional content selection menu, the method comprising:
determining a number of dimensions of the content selection menu; associating each dimension with a content attribute of a plurality of content attributes; selecting a plurality of AV programs, an AV program of the plurality of AV programs is selected based at least in part on a score of the AV program associated with at least one content attribute of the plurality of content attributes; positioning the plurality of AV programs in the content selection menu; outputting the content selection menu for display; receiving interest input of an AV program of the plurality of AV programs from a target user; generating a second content selection menu based at least in part on the interest input; and outputting the second content selection menu. 15. The method of claim 14, further comprising:
storing historical interest input data indicating user interest in AV programs; generating a subsequent content selection menu based at least in part on the historical interest input data; and outputting the subsequent content selection menu. 16. The method of claim 14, further comprising:
determining a coordinate position for each AV program of the plurality of AV programs with respect to each dimension of the content selection menu; and placing an identifier of the AV program in the content selection menu in accordance with the coordinate position. 17. The method of claim 14 wherein the plurality of content attributes are determined based at least in part on a history of AV program selection of a user. 18. The method of claim 14 wherein providing the content selection menu for display further includes:
decoding, by at least one tuner, at least one AV program of the plurality of AV programs that is live broadcast; and
displaying the decoded at least one AV program, positioned within the content selection menu, on a display device. 19. A system for generating a multidimensional content selection menu, the system comprising:
a receiver having control circuitry; a memory coupled to the control circuitry, the memory having compute-executable instructions stored thereon that, when executed, cause the control circuitry to cause the system to:
determine a number of dimensions of the content selection menu;
associate each dimension with a content attribute of a plurality of content attributes;
select a plurality of AV programs, an AV program of the plurality of AV programs is selected based at least in part on a score of the AV program associated with at least one content attribute of the plurality of content attributes;
position the plurality of AV programs in the content selection menu;
output the content selection menu for display;
receive interest input of an AV program of the plurality of AV programs from a target user;
generate a second content selection menu based at least in part on the interest input; and
associating each content attribute of the second set with an axis of a plurality of axes of the second content selection menu; and
output the second content selection menu. | 2,400 |
8,896 | 8,896 | 13,230,639 | 2,485 | An apparatus and method provide logic for processing information. In one implementation, an apparatus includes a display unit configured to display a first stereoscopic image. The first stereoscopic image includes a first and a second content, which may be disposed at corresponding display positions in a depth direction, and at least a portion of the first content appears to overlap at least a portion of the second content. A position-changing unit is configured to modify the display positions of the first and second content, in response to the apparent overlap. A control unit is configured to generate a signal to display, a second stereoscopic image that includes the first and second content disposed at the modified display positions. The display unit is further configured to display the second stereoscopic image such that the second stereoscopic image reduces the apparent overlap between the first and second content. | 1. An information processing apparatus, comprising:
a display unit configured to display a first stereoscopic image to a user, the first stereoscopic image comprising a first content and a second content, wherein:
the first and second content are disposed at corresponding display positions in a depth direction; and
at least a portion of the first content appears to the user to overlap at least a portion of the second content;
a position-changing unit configured to modify the display positions of the first and second content, in response to the apparent overlap; and a control unit configured to generate a signal to display a second stereoscopic image to the user, the second stereoscopic image comprising the first and second content disposed at the modified display positions; wherein the display unit is further configured to display the second stereoscopic image to the user, the second stereoscopic image reducing the apparent overlap between the first and second content. 2. The information processing apparatus of claim 1, wherein:
the display unit comprises a display screen; and the display positions of the first and second content are associated with corresponding displacements relative to the display screen in the depth direction. 3. The information processing apparatus of claim 2, wherein the position changing unit is further configured to:
compute a successive displacement of the first content; and modify the display position of the first content, based on at least the successive first content displacement. 4. The information processing apparatus of claim 3, wherein the position-changing unit is further configured to:
obtain metadata associated with the first content; and compute the successive first content displacement based on at least the obtained metadata. 5. The information processing apparatus of claim 4, wherein:
the metadata comprises an offset value associated with the first content; and the position-changing unit is further configured to compute the successive first content displacement by applying the offset value to the first content displacement. 6. The information processing apparatus of claim 4, wherein:
the metadata comprises a pre-determined displacement value; and the position-changing unit is further configured to assign the pre-determined displacement value to the successive first content displacement. 7. The information processing apparatus of claim 3, wherein the control unit is further configured to generate the second stereoscopic image based on the modified display position of the first content. 8. The information processing apparatus of claim 2, wherein the first content comprises a plurality of content objects, the first content objects being associated with corresponding display positions in the depth direction, and with corresponding displacements from the display screen in the depth direction. 9. The information processing apparatus of claim 8, wherein the position-changing unit is further configured to:
compute successive displacements of the first content objects; and modify the display positions of the first content objects, based on at least the successive displacements of the first content objects. 10. The information processing apparatus of claim 9, wherein the control unit is further configured to generate the second stereoscopic image based on the modified display positions of the first content objects. 11. The information processing apparatus of claim 9, wherein the position-changing unit is further configured to
determine a change in the displacement of a selected one of the first content objects; based on the determined change, compute the successive displacements of the first content objects. 12. The information processing device of claim 9, wherein the position-changing unit is further configured to:
receive metadata associated with the first content objects; compute the successive displacements for the first content objects, based on at least the metadata. 13. The information processing method of claim 12, wherein:
the metadata comprises offset values corresponding to the first content objects; and the position-changing unit is further configured to compute the successive displacements for the first content objects by applying the offset values to corresponding ones of the displacements of the first content objects. 14. The information processing apparatus of claim 2, wherein the position-changing unit is further configured to:
compute a successive displacement of the second content; modify the display position associated with the second content, based on at least the successive second content displacement. 15. The information processing apparatus of claim 14, wherein the second content comprises a user interface associated with the display unit. 16. The information processing apparatus of claim 15, wherein:
the information processing apparatus further comprises a receiving unit configured to receive an instruction from a user to display at least the user interface; and the display unit is further configured to display the user interface to the user, in response to the instruction. 17. The information processing apparatus of claim 15, wherein the user interface appears to the user to be disposed between the user and the display screen in the depth direction, and the first content appears the user to be disposed behind the display screen in the depth direction. 18. The information processing apparatus of claim 15, further comprising a detection unit, the detection unit being configured to detect a proximity of a portion of an operational tool to the modified display position of the user interface, wherein the control unit is further configured to execute a functionality of the display unit, in response to the detected proximity. 19. A computer-implemented method for processing information, comprising:
displaying a first stereoscopic image to a user, the first stereoscopic image comprising a first content and a second content, the first and second content being disposed at corresponding display positions in a depth direction, and at least a portion of the first content appears to the user to overlap at least a portion of the second content; modifying the display positions of the first and second content, in response to the apparent overlap; and generating a signal to display a second stereoscopic image to the user, the second stereoscopic image comprising the first and second content disposed at the modified display positions, and the second stereoscopic image reducing the apparent overlap between the first and second content. 20. A non-transitory, computer-readable storage medium storing a program that, when executed by a processor, causes the processor to perform a method for processing information, comprising:
displaying a first stereoscopic image to a user, the first stereoscopic image comprising a first content and a second content, the first and second content being disposed at corresponding display positions in a depth direction, and at least a portion of the first content appears to the user to overlap at least a portion of the second content; modifying the display positions of the first and second content, in response to the apparent overlap; and generating a signal to display a second stereoscopic image to the user, the second stereoscopic image comprising the first and second content disposed at the modified display positions, and the second stereoscopic image reducing the apparent overlap between the first and second content. | An apparatus and method provide logic for processing information. In one implementation, an apparatus includes a display unit configured to display a first stereoscopic image. The first stereoscopic image includes a first and a second content, which may be disposed at corresponding display positions in a depth direction, and at least a portion of the first content appears to overlap at least a portion of the second content. A position-changing unit is configured to modify the display positions of the first and second content, in response to the apparent overlap. A control unit is configured to generate a signal to display, a second stereoscopic image that includes the first and second content disposed at the modified display positions. The display unit is further configured to display the second stereoscopic image such that the second stereoscopic image reduces the apparent overlap between the first and second content.1. An information processing apparatus, comprising:
a display unit configured to display a first stereoscopic image to a user, the first stereoscopic image comprising a first content and a second content, wherein:
the first and second content are disposed at corresponding display positions in a depth direction; and
at least a portion of the first content appears to the user to overlap at least a portion of the second content;
a position-changing unit configured to modify the display positions of the first and second content, in response to the apparent overlap; and a control unit configured to generate a signal to display a second stereoscopic image to the user, the second stereoscopic image comprising the first and second content disposed at the modified display positions; wherein the display unit is further configured to display the second stereoscopic image to the user, the second stereoscopic image reducing the apparent overlap between the first and second content. 2. The information processing apparatus of claim 1, wherein:
the display unit comprises a display screen; and the display positions of the first and second content are associated with corresponding displacements relative to the display screen in the depth direction. 3. The information processing apparatus of claim 2, wherein the position changing unit is further configured to:
compute a successive displacement of the first content; and modify the display position of the first content, based on at least the successive first content displacement. 4. The information processing apparatus of claim 3, wherein the position-changing unit is further configured to:
obtain metadata associated with the first content; and compute the successive first content displacement based on at least the obtained metadata. 5. The information processing apparatus of claim 4, wherein:
the metadata comprises an offset value associated with the first content; and the position-changing unit is further configured to compute the successive first content displacement by applying the offset value to the first content displacement. 6. The information processing apparatus of claim 4, wherein:
the metadata comprises a pre-determined displacement value; and the position-changing unit is further configured to assign the pre-determined displacement value to the successive first content displacement. 7. The information processing apparatus of claim 3, wherein the control unit is further configured to generate the second stereoscopic image based on the modified display position of the first content. 8. The information processing apparatus of claim 2, wherein the first content comprises a plurality of content objects, the first content objects being associated with corresponding display positions in the depth direction, and with corresponding displacements from the display screen in the depth direction. 9. The information processing apparatus of claim 8, wherein the position-changing unit is further configured to:
compute successive displacements of the first content objects; and modify the display positions of the first content objects, based on at least the successive displacements of the first content objects. 10. The information processing apparatus of claim 9, wherein the control unit is further configured to generate the second stereoscopic image based on the modified display positions of the first content objects. 11. The information processing apparatus of claim 9, wherein the position-changing unit is further configured to
determine a change in the displacement of a selected one of the first content objects; based on the determined change, compute the successive displacements of the first content objects. 12. The information processing device of claim 9, wherein the position-changing unit is further configured to:
receive metadata associated with the first content objects; compute the successive displacements for the first content objects, based on at least the metadata. 13. The information processing method of claim 12, wherein:
the metadata comprises offset values corresponding to the first content objects; and the position-changing unit is further configured to compute the successive displacements for the first content objects by applying the offset values to corresponding ones of the displacements of the first content objects. 14. The information processing apparatus of claim 2, wherein the position-changing unit is further configured to:
compute a successive displacement of the second content; modify the display position associated with the second content, based on at least the successive second content displacement. 15. The information processing apparatus of claim 14, wherein the second content comprises a user interface associated with the display unit. 16. The information processing apparatus of claim 15, wherein:
the information processing apparatus further comprises a receiving unit configured to receive an instruction from a user to display at least the user interface; and the display unit is further configured to display the user interface to the user, in response to the instruction. 17. The information processing apparatus of claim 15, wherein the user interface appears to the user to be disposed between the user and the display screen in the depth direction, and the first content appears the user to be disposed behind the display screen in the depth direction. 18. The information processing apparatus of claim 15, further comprising a detection unit, the detection unit being configured to detect a proximity of a portion of an operational tool to the modified display position of the user interface, wherein the control unit is further configured to execute a functionality of the display unit, in response to the detected proximity. 19. A computer-implemented method for processing information, comprising:
displaying a first stereoscopic image to a user, the first stereoscopic image comprising a first content and a second content, the first and second content being disposed at corresponding display positions in a depth direction, and at least a portion of the first content appears to the user to overlap at least a portion of the second content; modifying the display positions of the first and second content, in response to the apparent overlap; and generating a signal to display a second stereoscopic image to the user, the second stereoscopic image comprising the first and second content disposed at the modified display positions, and the second stereoscopic image reducing the apparent overlap between the first and second content. 20. A non-transitory, computer-readable storage medium storing a program that, when executed by a processor, causes the processor to perform a method for processing information, comprising:
displaying a first stereoscopic image to a user, the first stereoscopic image comprising a first content and a second content, the first and second content being disposed at corresponding display positions in a depth direction, and at least a portion of the first content appears to the user to overlap at least a portion of the second content; modifying the display positions of the first and second content, in response to the apparent overlap; and generating a signal to display a second stereoscopic image to the user, the second stereoscopic image comprising the first and second content disposed at the modified display positions, and the second stereoscopic image reducing the apparent overlap between the first and second content. | 2,400 |
8,897 | 8,897 | 15,410,648 | 2,435 | A method for registering and authenticating a user based on a visual access code. The method includes presenting, to the user, images; receiving a selection of a first image; receiving a selection of at least a first set of hotspots from a plurality of hotspots included in the first image; and generating a visual access code based at least in part on the selection of the first image and the first set of hotspots. | 1. A method comprising:
presenting, to a user, a plurality of images; receiving, from the user, a selection of a first image from the plurality of images; receiving, from the user, a selection of at least a first set of hotspots from a plurality of hotspots included in the first image; and generating, via a processing device, a visual access code based at least in part on the selection of the first image and the first set of hotspots. 2. The method of claim 1, wherein each of the plurality of images is associated with a corresponding index number. 3. The method of claim 2, wherein each index number comprises a globally unique image identifier. 4. The method of claim 1, wherein each of the plurality of hotspots is associated with a corresponding index number. 5. The method of claim 1, wherein each of the plurality of hotspots is associated with a two dimensional coordinate of a corresponding pixel in the image. 6. The method of claim 1, wherein the generating the visual access code is based on the order of the selected hotspots. 7. The method of claim 1, wherein the generating the visual access code is not based on the order of the selected hotspots. 8. The method of claim 1, wherein the plurality of hotspots are visible to the user. 9. The method of claim 1, wherein the plurality of hotspots are hidden from the user. 10. The method of claim 1, wherein the locations of the plurality of hotspots are based on features of the photographs. 11. A method comprising:
presenting, to a user, a plurality of images, wherein the plurality of images include a registered image, wherein a subset of hotspots located on the registered image are associated with the user; and in response to receiving, from the user, a visual access code associated with a service, wherein the visual access code is based at least in part on a selection of the registered image from the plurality of images, and a selection of the hotspots from a plurality of hotspots located on the registered image, authenticating the user to the service. 12. The method of claim 11, wherein each of the plurality of images is associated with a corresponding index number. 13. The method of claim 12, wherein each index number comprises a globally unique image identifier. 14. The method of claim 11, wherein each of the plurality of hotspots is associated with a corresponding index number. 15. The method of claim 11, wherein each of the plurality of hotspots is associated with a two dimensional coordinate of a corresponding pixel in the image. 16. The method of claim 11, wherein the visual access code is further based on the order of the selected hotspots. 17. The method of claim 11, wherein the visual access code is not based on the order of the selected hotspots. 18. The method of claim 11, wherein the plurality of hotspots are visible to the user. 19. The method of claim 11, wherein the plurality of hotspots are hidden from the user. 20. The method of claim 11, wherein the locations of the plurality of hotspots are based on features of the photographs. | A method for registering and authenticating a user based on a visual access code. The method includes presenting, to the user, images; receiving a selection of a first image; receiving a selection of at least a first set of hotspots from a plurality of hotspots included in the first image; and generating a visual access code based at least in part on the selection of the first image and the first set of hotspots.1. A method comprising:
presenting, to a user, a plurality of images; receiving, from the user, a selection of a first image from the plurality of images; receiving, from the user, a selection of at least a first set of hotspots from a plurality of hotspots included in the first image; and generating, via a processing device, a visual access code based at least in part on the selection of the first image and the first set of hotspots. 2. The method of claim 1, wherein each of the plurality of images is associated with a corresponding index number. 3. The method of claim 2, wherein each index number comprises a globally unique image identifier. 4. The method of claim 1, wherein each of the plurality of hotspots is associated with a corresponding index number. 5. The method of claim 1, wherein each of the plurality of hotspots is associated with a two dimensional coordinate of a corresponding pixel in the image. 6. The method of claim 1, wherein the generating the visual access code is based on the order of the selected hotspots. 7. The method of claim 1, wherein the generating the visual access code is not based on the order of the selected hotspots. 8. The method of claim 1, wherein the plurality of hotspots are visible to the user. 9. The method of claim 1, wherein the plurality of hotspots are hidden from the user. 10. The method of claim 1, wherein the locations of the plurality of hotspots are based on features of the photographs. 11. A method comprising:
presenting, to a user, a plurality of images, wherein the plurality of images include a registered image, wherein a subset of hotspots located on the registered image are associated with the user; and in response to receiving, from the user, a visual access code associated with a service, wherein the visual access code is based at least in part on a selection of the registered image from the plurality of images, and a selection of the hotspots from a plurality of hotspots located on the registered image, authenticating the user to the service. 12. The method of claim 11, wherein each of the plurality of images is associated with a corresponding index number. 13. The method of claim 12, wherein each index number comprises a globally unique image identifier. 14. The method of claim 11, wherein each of the plurality of hotspots is associated with a corresponding index number. 15. The method of claim 11, wherein each of the plurality of hotspots is associated with a two dimensional coordinate of a corresponding pixel in the image. 16. The method of claim 11, wherein the visual access code is further based on the order of the selected hotspots. 17. The method of claim 11, wherein the visual access code is not based on the order of the selected hotspots. 18. The method of claim 11, wherein the plurality of hotspots are visible to the user. 19. The method of claim 11, wherein the plurality of hotspots are hidden from the user. 20. The method of claim 11, wherein the locations of the plurality of hotspots are based on features of the photographs. | 2,400 |
8,898 | 8,898 | 15,730,106 | 2,421 | A method for direct video broadcasting to video host, via a mobile device, including allowing the video host to initiate an audio communication with a user, via the user's mobile device; allowing the user, via the mobile device, to accept the initiated audio communication from the video host; providing, in response to the user accepting the initiated audio communication, audio communication between the user and the video host; and allowing, in response to the user accepting the initiated audio communication, the user to capture video, via the mobile device, and upload or stream the captured video to the video host, wherein the video host is enabled to engage in audio communications with the user, as the captured video is being captured, and wherein the audio communication is separate from the audio associated with any video being captured. | 1. A method for direct video broadcasting to at least one video host, via a mobile device, comprising:
allowing said at least one video host to initiate an audio communication with a user, via said user's mobile device; allowing said user, via said mobile device, to accept said initiated audio communication from said at least one video host; providing, in response to said user accepting said initiated audio communication, audio communication between said user and said at least one video host; and allowing, in response to said user accepting said initiated audio communication, said user to capture video, via said mobile device, and upload or stream said captured video to said at least one video host, wherein said at least one video host is enabled to engage in audio communications with said user, as said captured video is being captured, and wherein said audio communication is separate from said audio associated with any video being captured. 2. The method of claim 1, wherein said initiated audio communication is a nonverbal communication. 3. The method of claim 1, wherein said audio communication is a Voice-Over-IP audio communication. 4. The method of claim 1, wherein said audio communication is a one way communication from said at least one video host to said user. 5. The method of claim 1, wherein said audio communication is a two way communication between said at least one video host and said user. 6. The method of claim 1, wherein said audio communication is accomplished via an external speaker and/or microphone attached or coupled to said mobile device. 7. The method of claim 1, wherein said audio communication is accomplished via a speaker and/or microphone of said mobile device, which is separate from a speaker and/or microphone of said mobile device utilized for capturing audio associated with video being captured by said mobile device. 8. The method of claim 1, further comprising:
allowing said at least one video host to provide said captured video to one or more subsequent users. 9. The method of claim 1, further comprising:
requiring said user to designate at least one categorization for said captured video, prior to capturing said video. 10. The method of claim 1, further comprising:
allowing said at least one video host to store said captured video. 11. The method of claim 1, wherein said at least one video host is enabled to engage in text or nonverbal communications with said user, as said captured video is being captured. 12. A method for direct video broadcasting to at least one video host, via a mobile device, comprising:
allowing a user to initiate an audio communication with at least one video host, via said user's mobile device; allowing said at least one video host to accept said initiated audio communication from said user; providing, in response to said at least one video host accepting said initiated audio communication, audio communication between said at least one video host and said user; and allowing, in response to said at least one video host accepting said initiated audio communication, said user to capture video, via said mobile device, and upload or stream said captured video to said at least one video host, wherein said at least one video host is enabled to engage in audio communications with said user, as said captured video is being captured, and wherein said audio communication is separate from said audio associated with any video being captured. 13. The method of claim 12, wherein said initiated audio communication is a nonverbal communication. 14. The method of claim 12, wherein said audio communication is a Voice-Over-IP audio communication. 15. The method of claim 12, wherein said audio communication is a one way communication from said at least one video host to said user. 16. The method of claim 12, wherein said audio communication is a two way communication between said at least one video host and said user. 17. The method of claim 12, wherein said audio communication is accomplished via an external speaker and/or microphone attached or coupled to said mobile device. 18. The method of claim 12, wherein said audio communication is accomplished via a speaker and/or microphone of said mobile device, which is separate from a speaker and/or microphone of said mobile device utilized for capturing audio associated with video being captured by said mobile device. 19. The method of claim 12, further comprising:
requiring said user to designate at least one categorization for said captured video, prior to capturing said video. 20. The method of claim 12, wherein said at least one video host is enabled to engage in text or nonverbal communications with said user, as said captured video is being captured. | A method for direct video broadcasting to video host, via a mobile device, including allowing the video host to initiate an audio communication with a user, via the user's mobile device; allowing the user, via the mobile device, to accept the initiated audio communication from the video host; providing, in response to the user accepting the initiated audio communication, audio communication between the user and the video host; and allowing, in response to the user accepting the initiated audio communication, the user to capture video, via the mobile device, and upload or stream the captured video to the video host, wherein the video host is enabled to engage in audio communications with the user, as the captured video is being captured, and wherein the audio communication is separate from the audio associated with any video being captured.1. A method for direct video broadcasting to at least one video host, via a mobile device, comprising:
allowing said at least one video host to initiate an audio communication with a user, via said user's mobile device; allowing said user, via said mobile device, to accept said initiated audio communication from said at least one video host; providing, in response to said user accepting said initiated audio communication, audio communication between said user and said at least one video host; and allowing, in response to said user accepting said initiated audio communication, said user to capture video, via said mobile device, and upload or stream said captured video to said at least one video host, wherein said at least one video host is enabled to engage in audio communications with said user, as said captured video is being captured, and wherein said audio communication is separate from said audio associated with any video being captured. 2. The method of claim 1, wherein said initiated audio communication is a nonverbal communication. 3. The method of claim 1, wherein said audio communication is a Voice-Over-IP audio communication. 4. The method of claim 1, wherein said audio communication is a one way communication from said at least one video host to said user. 5. The method of claim 1, wherein said audio communication is a two way communication between said at least one video host and said user. 6. The method of claim 1, wherein said audio communication is accomplished via an external speaker and/or microphone attached or coupled to said mobile device. 7. The method of claim 1, wherein said audio communication is accomplished via a speaker and/or microphone of said mobile device, which is separate from a speaker and/or microphone of said mobile device utilized for capturing audio associated with video being captured by said mobile device. 8. The method of claim 1, further comprising:
allowing said at least one video host to provide said captured video to one or more subsequent users. 9. The method of claim 1, further comprising:
requiring said user to designate at least one categorization for said captured video, prior to capturing said video. 10. The method of claim 1, further comprising:
allowing said at least one video host to store said captured video. 11. The method of claim 1, wherein said at least one video host is enabled to engage in text or nonverbal communications with said user, as said captured video is being captured. 12. A method for direct video broadcasting to at least one video host, via a mobile device, comprising:
allowing a user to initiate an audio communication with at least one video host, via said user's mobile device; allowing said at least one video host to accept said initiated audio communication from said user; providing, in response to said at least one video host accepting said initiated audio communication, audio communication between said at least one video host and said user; and allowing, in response to said at least one video host accepting said initiated audio communication, said user to capture video, via said mobile device, and upload or stream said captured video to said at least one video host, wherein said at least one video host is enabled to engage in audio communications with said user, as said captured video is being captured, and wherein said audio communication is separate from said audio associated with any video being captured. 13. The method of claim 12, wherein said initiated audio communication is a nonverbal communication. 14. The method of claim 12, wherein said audio communication is a Voice-Over-IP audio communication. 15. The method of claim 12, wherein said audio communication is a one way communication from said at least one video host to said user. 16. The method of claim 12, wherein said audio communication is a two way communication between said at least one video host and said user. 17. The method of claim 12, wherein said audio communication is accomplished via an external speaker and/or microphone attached or coupled to said mobile device. 18. The method of claim 12, wherein said audio communication is accomplished via a speaker and/or microphone of said mobile device, which is separate from a speaker and/or microphone of said mobile device utilized for capturing audio associated with video being captured by said mobile device. 19. The method of claim 12, further comprising:
requiring said user to designate at least one categorization for said captured video, prior to capturing said video. 20. The method of claim 12, wherein said at least one video host is enabled to engage in text or nonverbal communications with said user, as said captured video is being captured. | 2,400 |
8,899 | 8,899 | 15,630,071 | 2,485 | Transform kernel candidates including a vertical transform type associated with a vertical motion and a horizontal transform type associated with a horizontal motion can be encoded or decoded. During an encoding operation, a residual block of a current block is transformed according to a selected transform kernel candidate to produce a transform block. A probability model for encoding the selected transform kernel candidate is then identified based on neighbor transform blocks of the transform block. The selected transform kernel candidate is then encoded according to the probability model. During a decoding operation, the encoded transform kernel candidate is decoded using the probability model. The encoded transform block is then decoded by inverse transforming dequantized transform coefficients thereof according to the decoded transform kernel candidate. | 1. A method for encoding transform kernel candidates selected for blocks of a video frame, the method comprising:
selecting one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame, the selected transform kernel candidate including a vertical transform type associated with a vertical motion of the residual block and a horizontal transform type associated with a horizontal motion of the residual block; transforming the residual block according to the selected transform kernel candidate to produce a transform block including transform coefficients; quantizing the transform coefficients; responsive to determining that at least one of the quantized transform coefficients is a non-zero coefficient, identifying a probability model for encoding the selected transform kernel candidate, the probability model identified based on a first transform kernel candidate selected for an above neighbor transform block of the transform block and a second transform kernel candidate selected for a left neighbor transform block of the transform block; and encoding the selected transform kernel candidate according to the probability model. 2. The method of claim 1, wherein selecting one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame comprises:
identifying a shape of the vertical motion of the residual block by predicting a vertical motion of a portion of the current block using a first motion vector; identifying a shape of the horizontal motion of the residual block by predicting a horizontal motion of the portion of the current block using a second motion vector; and selecting the selected transform kernel candidate based on the shape of the vertical motion of the residual block and the shape of the horizontal motion of the residual block. 3. The method of claim 1, wherein identifying a probability model for encoding the selected transform kernel candidate comprises:
determining a vertical context based on a first vertical transform type of the first transform kernel candidate and a second vertical transform type of the second transform kernel candidate; determining a horizontal context based on a first horizontal transform type of the first transform kernel candidate and a second horizontal transform type of the second transform kernel candidate; and identifying the probability model using the vertical context and the horizontal context. 4. The method of claim 1, wherein the transform block is a first transform block, wherein the method further comprises:
generating the residual block using a motion vector, the residual block including a prediction residual for the current block; and partitioning the residual block into a plurality of sub-blocks including a first residual sub-block and a second residual sub-block, wherein the first residual sub-block is transformed to produce the first transform block and the second residual sub-block is transformed to produce a second transform block. 5. The method of claim 4, wherein the selected transform kernel candidate is different from a transform kernel candidate selected for transforming the second residual sub-block. 6. The method of claim 4, wherein the selected transform kernel candidate is also selected for transforming the second residual sub-block. 7. The method of claim 1, wherein at least one of the vertical transform type or the horizontal transform type of the selected transform kernel candidate is one of a DCT, an ADST, a flipped ADST, or an identity transform. 8. An apparatus for encoding transform kernel candidates selected for blocks of a video frame, the apparatus comprising:
a processor configured to execute instructions stored in a non-transitory storage medium to:
select one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame, the selected transform kernel candidate including a vertical transform type associated with a vertical motion of the residual block and a horizontal transform type associated with a horizontal motion of the residual block;
transform the residual block according to the selected transform kernel candidate to produce a transform block including transform coefficients;
quantize the transform coefficients;
responsive to a determination that at least one of the quantized transform coefficients is a non-zero coefficient, identify a probability model for encoding the selected transform kernel candidate, the probability model identified based on a first transform kernel candidate selected for an above neighbor transform block of the transform block and a second transform kernel candidate selected for a left neighbor transform block of the transform block; and
encode the selected transform kernel candidate according to the probability model. 9. The apparatus of claim 8, wherein the instructions to select one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame include instructions to:
identify a shape of the vertical motion of the residual block by predicting a vertical motion of a portion of the current block using a first motion vector; identify a shape of the horizontal motion of the residual block by predicting a horizontal motion of the portion of the current block using a second motion vector; and select the selected transform kernel candidate based on the shape of the vertical motion of the residual block and the shape of the horizontal motion of the residual block. 10. The apparatus of claim 8, wherein the instructions to identify a probability model for encoding the selected transform kernel candidate include instructions to:
determine a vertical context based on a first vertical transform type of the first transform kernel candidate and a second vertical transform type of the second transform kernel candidate; determine a horizontal context based on a first horizontal transform type of the first transform kernel candidate and a second horizontal transform type of the second transform kernel candidate; and identify the probability model using the vertical context and the horizontal context. 11. The apparatus of claim 8, wherein the transform block is a first transform block, wherein the instructions include instructions to:
generate the residual block using a motion vector, the residual block including a prediction residual for the current block; and partition the residual block into a plurality of sub-blocks including a first residual sub-block and a second residual sub-block, wherein the first residual sub-block is transformed to produce the first transform block and the second residual sub-block is transformed to produce a second transform block. 12. The apparatus of claim 11, wherein the selected transform kernel candidate is different from a transform kernel candidate selected for the second residual sub-block. 13. The apparatus of claim 11, wherein the selected transform kernel candidate is also selected for transforming the second residual sub-block. 14. The apparatus of claim 8, wherein at least one of the vertical transform type or the horizontal transform type of the selected transform kernel candidate is one of a DCT, an ADST, a flipped ADST, or an identity transform. 15. A method for decoding an encoded transform block of a current block of an encoded video frame, the method comprising:
identifying a probability model used to encode a transform kernel candidate selected for producing the encoded transform block, the probability model identified based on a first transform kernel candidate associated with an above neighbor transform block of the encoded transform block and a second transform kernel candidate associated with a left neighbor transform block of the encoded transform block; decoding the encoded transform kernel candidate using the probability model, the encoded transform kernel candidate including a vertical transform type associated with a vertical motion of the current block and a horizontal transform type associated with a horizontal motion of the current block; and decoding the encoded transform block by inverse transforming dequantized transform coefficients of the encoded transform block according to the decoded transform kernel candidate. 16. The method of claim 15, wherein identifying a probability model used to encode a transform kernel candidate selected for producing the encoded transform block comprises:
determining a vertical context based on a first vertical transform type of the first transform kernel candidate and a second vertical transform type of the second transform kernel candidate; determining a horizontal context based on a first horizontal transform type of the first transform kernel candidate and a second horizontal transform type of the second transform kernel candidate; and identifying the probability model using the vertical context and the horizontal context. 17. The method of claim 15, wherein decoding the encoded transform kernel candidate based on the probability model comprises:
decoding, based on the probability model, a first index corresponding to the vertical transform type of the encoded transform kernel candidate based and a second index corresponding to the horizontal transform type of the encoded transform kernel candidate. 18. The method of claim 15, wherein the encoded transform block is a first encoded transform block and the current block further includes a second encoded transform block, wherein the encoded transform kernel candidate is different from a transform kernel candidate selected for transforming coefficients of the second encoded transform block. 19. The method of claim 15, wherein the probability model is identified responsive to determining that at least one quantized transform coefficient of the encoded transform block is a non-zero coefficient. 20. The method of claim 15, wherein at least one of the vertical transform type or the horizontal transform type of the encoded transform kernel candidate is one of a DCT, an ADST, a flipped ADST, or an identity transform. | Transform kernel candidates including a vertical transform type associated with a vertical motion and a horizontal transform type associated with a horizontal motion can be encoded or decoded. During an encoding operation, a residual block of a current block is transformed according to a selected transform kernel candidate to produce a transform block. A probability model for encoding the selected transform kernel candidate is then identified based on neighbor transform blocks of the transform block. The selected transform kernel candidate is then encoded according to the probability model. During a decoding operation, the encoded transform kernel candidate is decoded using the probability model. The encoded transform block is then decoded by inverse transforming dequantized transform coefficients thereof according to the decoded transform kernel candidate.1. A method for encoding transform kernel candidates selected for blocks of a video frame, the method comprising:
selecting one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame, the selected transform kernel candidate including a vertical transform type associated with a vertical motion of the residual block and a horizontal transform type associated with a horizontal motion of the residual block; transforming the residual block according to the selected transform kernel candidate to produce a transform block including transform coefficients; quantizing the transform coefficients; responsive to determining that at least one of the quantized transform coefficients is a non-zero coefficient, identifying a probability model for encoding the selected transform kernel candidate, the probability model identified based on a first transform kernel candidate selected for an above neighbor transform block of the transform block and a second transform kernel candidate selected for a left neighbor transform block of the transform block; and encoding the selected transform kernel candidate according to the probability model. 2. The method of claim 1, wherein selecting one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame comprises:
identifying a shape of the vertical motion of the residual block by predicting a vertical motion of a portion of the current block using a first motion vector; identifying a shape of the horizontal motion of the residual block by predicting a horizontal motion of the portion of the current block using a second motion vector; and selecting the selected transform kernel candidate based on the shape of the vertical motion of the residual block and the shape of the horizontal motion of the residual block. 3. The method of claim 1, wherein identifying a probability model for encoding the selected transform kernel candidate comprises:
determining a vertical context based on a first vertical transform type of the first transform kernel candidate and a second vertical transform type of the second transform kernel candidate; determining a horizontal context based on a first horizontal transform type of the first transform kernel candidate and a second horizontal transform type of the second transform kernel candidate; and identifying the probability model using the vertical context and the horizontal context. 4. The method of claim 1, wherein the transform block is a first transform block, wherein the method further comprises:
generating the residual block using a motion vector, the residual block including a prediction residual for the current block; and partitioning the residual block into a plurality of sub-blocks including a first residual sub-block and a second residual sub-block, wherein the first residual sub-block is transformed to produce the first transform block and the second residual sub-block is transformed to produce a second transform block. 5. The method of claim 4, wherein the selected transform kernel candidate is different from a transform kernel candidate selected for transforming the second residual sub-block. 6. The method of claim 4, wherein the selected transform kernel candidate is also selected for transforming the second residual sub-block. 7. The method of claim 1, wherein at least one of the vertical transform type or the horizontal transform type of the selected transform kernel candidate is one of a DCT, an ADST, a flipped ADST, or an identity transform. 8. An apparatus for encoding transform kernel candidates selected for blocks of a video frame, the apparatus comprising:
a processor configured to execute instructions stored in a non-transitory storage medium to:
select one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame, the selected transform kernel candidate including a vertical transform type associated with a vertical motion of the residual block and a horizontal transform type associated with a horizontal motion of the residual block;
transform the residual block according to the selected transform kernel candidate to produce a transform block including transform coefficients;
quantize the transform coefficients;
responsive to a determination that at least one of the quantized transform coefficients is a non-zero coefficient, identify a probability model for encoding the selected transform kernel candidate, the probability model identified based on a first transform kernel candidate selected for an above neighbor transform block of the transform block and a second transform kernel candidate selected for a left neighbor transform block of the transform block; and
encode the selected transform kernel candidate according to the probability model. 9. The apparatus of claim 8, wherein the instructions to select one of a plurality of transform kernel candidates for transforming a residual block of a current block of the video frame include instructions to:
identify a shape of the vertical motion of the residual block by predicting a vertical motion of a portion of the current block using a first motion vector; identify a shape of the horizontal motion of the residual block by predicting a horizontal motion of the portion of the current block using a second motion vector; and select the selected transform kernel candidate based on the shape of the vertical motion of the residual block and the shape of the horizontal motion of the residual block. 10. The apparatus of claim 8, wherein the instructions to identify a probability model for encoding the selected transform kernel candidate include instructions to:
determine a vertical context based on a first vertical transform type of the first transform kernel candidate and a second vertical transform type of the second transform kernel candidate; determine a horizontal context based on a first horizontal transform type of the first transform kernel candidate and a second horizontal transform type of the second transform kernel candidate; and identify the probability model using the vertical context and the horizontal context. 11. The apparatus of claim 8, wherein the transform block is a first transform block, wherein the instructions include instructions to:
generate the residual block using a motion vector, the residual block including a prediction residual for the current block; and partition the residual block into a plurality of sub-blocks including a first residual sub-block and a second residual sub-block, wherein the first residual sub-block is transformed to produce the first transform block and the second residual sub-block is transformed to produce a second transform block. 12. The apparatus of claim 11, wherein the selected transform kernel candidate is different from a transform kernel candidate selected for the second residual sub-block. 13. The apparatus of claim 11, wherein the selected transform kernel candidate is also selected for transforming the second residual sub-block. 14. The apparatus of claim 8, wherein at least one of the vertical transform type or the horizontal transform type of the selected transform kernel candidate is one of a DCT, an ADST, a flipped ADST, or an identity transform. 15. A method for decoding an encoded transform block of a current block of an encoded video frame, the method comprising:
identifying a probability model used to encode a transform kernel candidate selected for producing the encoded transform block, the probability model identified based on a first transform kernel candidate associated with an above neighbor transform block of the encoded transform block and a second transform kernel candidate associated with a left neighbor transform block of the encoded transform block; decoding the encoded transform kernel candidate using the probability model, the encoded transform kernel candidate including a vertical transform type associated with a vertical motion of the current block and a horizontal transform type associated with a horizontal motion of the current block; and decoding the encoded transform block by inverse transforming dequantized transform coefficients of the encoded transform block according to the decoded transform kernel candidate. 16. The method of claim 15, wherein identifying a probability model used to encode a transform kernel candidate selected for producing the encoded transform block comprises:
determining a vertical context based on a first vertical transform type of the first transform kernel candidate and a second vertical transform type of the second transform kernel candidate; determining a horizontal context based on a first horizontal transform type of the first transform kernel candidate and a second horizontal transform type of the second transform kernel candidate; and identifying the probability model using the vertical context and the horizontal context. 17. The method of claim 15, wherein decoding the encoded transform kernel candidate based on the probability model comprises:
decoding, based on the probability model, a first index corresponding to the vertical transform type of the encoded transform kernel candidate based and a second index corresponding to the horizontal transform type of the encoded transform kernel candidate. 18. The method of claim 15, wherein the encoded transform block is a first encoded transform block and the current block further includes a second encoded transform block, wherein the encoded transform kernel candidate is different from a transform kernel candidate selected for transforming coefficients of the second encoded transform block. 19. The method of claim 15, wherein the probability model is identified responsive to determining that at least one quantized transform coefficient of the encoded transform block is a non-zero coefficient. 20. The method of claim 15, wherein at least one of the vertical transform type or the horizontal transform type of the encoded transform kernel candidate is one of a DCT, an ADST, a flipped ADST, or an identity transform. | 2,400 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.